
Trend Micro
Trend Micro is focused on innovating smarter security solutions designed to protect against a wide range of threats including viruses, spam, phishing, spyware, botnets and data-stealing malware. Trend Micro has also increased its presence in Mobile during the last year with security, storage and privacy solutions.
Key Results & Achievements
Manage all communications regarding cyber threats, vulnerabilities, and related reports.
Managed PR for Blackhat 2012 and Defcon 2012 including working with media and Trend Micro Speakers at each event.
Strategic planning for new product offerings for consumers and small businesses.
Work with partners for success with joint media activities. Initiated communications with Blackberry at CTIA 2012 that ultimately made them a Trend Micro Partner.
Enhancing media database tools and media monitoring to include real-time monitoring of company and competitor news as well as social networking activity.
Manage public relations agency for divisional activities and additional vendor relationships
Use of social media tools for rapid and or strategic news deployment.
Building coverage of mobile and traditional PC security-focused offerings.
Endorsements
"When working with Alan it's seamless from the agency side. It's hard to tell who's on the client side and who's on the agency as he builds 'one team.' We always felt like true partners and information flowed the moment Alan received it from either the product team or the C-Suite. It made our jobs very easy as we were always working with up-to-date information. Alan was our compass on measurement. We knew exactly what success needed to look like at the onset. If goals or needs changed mid-journey, we easily shifted course as we were alerted immediately. The same with budgets. Very transparent, and we knew what we had to work with and where the priorities stood."
"I've had the pleasure of working with Alan Wallace since 2008 both at Microsoft and at Trend Micro. Alan combines his keen understanding of media from working in it himself with his passion for technology and security. Together they make him a great communicator around the true value of technology. He also has a gift for PR strategy and planning. While at Trend Micro, he spearheaded a new press outreach strategy that far exceeded expectations by landing numerous top-tier outlets like Fox Business, Washington Post, and The New Yorker which resulted in a total of nearly two million media impressions across multiple outlets. Alan is also a great person to work with: he's always happy to help and give advice with good humor, warmth, and humility. I highly recommend him and his work."
"Alan Wallace worked with me at Trend Micro and was very knowledgeable and extremely influential in getting PR and Social Media working together to amplify product launches, product promotions, market penetration, and even worked together to manage crisis communications and competitive marketing campaigns. If I had the chance to work with Alan again anywhere I would do so in a heartbeat. He knows what he's doing!"
"I worked with Alan right in the trenches of computer security PR. This is a "nobody gets out of here alive" environment, but we not only always got out alive, we always emerged victorious. This was due in a very large part to Alan's professional demeanor, his inexhaustible supply of contacts, and his very impressive gestalt of the story, the meeting, and the message involved. I would welcome any chance to work with Alan Wallace in the future."
Press Releases
REPORT EXAMPLES
Report Examples prepared and issued on behalf of Trend Micro Corporation
Evolved Threats in a “Post-PC” World
Experts have been predicting the coming “post-PC” era for a few years. So the question has been, “When will we know that it’s really here?” A simple answer is, we’ll know it’s really here when cybercriminals move beyond the PC. By that measure, 2012 is truly the year we entered the post-PC era as cybercriminals moved to embrace Android, social media platforms, and even Macs with their attacks.
TrendLabs 2012 Mobile Threat and Security Roundup: Repeating History
Android seems to be repeating history by way of Windows. The platform’s growing dominance in the mobile landscape echoes that of Windows in the desktop and laptop space. And much like Windows, Android’s popularity is making it a prime target for cybercriminals and attackers, albeit at a much faster pace.
1Q 2013 Security Roundup - Zero-Days Hits Users Hard at the Start of the Year
While exploits and vulnerabilities are a common problem for users, zero-day exploits in high-profile applications are relatively rare. That was not the case in the first quarter of 2013. Multiple zero-day exploits were found targeting popular applications like Java and Adobe Flash Player, Acrobat, and Reader.
In addition, as predicted, we saw improvements in already-known threats like spam botnets, banking Trojans, and readily available exploit kits. Other high-profile incidents include the South Korean cyber-attacks in March, which reiterated the dangers targeted attacks pose. On the mobile front, fake versions of popular apps remained a problem though phishers found a new target in the form of mobile browsers.



