
Trend Micro
Trend Micro is a global cybersecurity leader providing security software, services, and threat intelligence for businesses and consumers.
Key Results & Achievements
Manage all communications regarding cyber threats, vulnerabilities, and related reports.
Managed PR for Blackhat 2012 and Defcon 2012 including working with media and Trend Micro Speakers at each event.
Strategic planning for new product offerings for consumers and small businesses.
Work with partners for success with joint media activities. Initiated communications with Blackberry at CTIA 2012 that ultimately made them a Trend Micro Partner.
Enhancing media database tools and media monitoring to include real-time monitoring of company and competitor news as well as social networking activity.
Manage public relations agency for divisional activities and additional vendor relationships
Use of social media tools for rapid and or strategic news deployment.
Building coverage of mobile and traditional PC security-focused offerings.
Endorsements
"When working with Alan it's seamless from the agency side. It's hard to tell who's on the client side and who's on the agency as he builds 'one team.' We always felt like true partners and information flowed the moment Alan received it from either the product team or the C-Suite. It made our jobs very easy as we were always working with up-to-date information. Alan was our compass on measurement. We knew exactly what success needed to look like at the onset. If goals or needs changed mid-journey, we easily shifted course as we were alerted immediately. The same with budgets. Very transparent, and we knew what we had to work with and where the priorities stood."
"I've had the pleasure of working with Alan Wallace since 2008 both at Microsoft and at Trend Micro. Alan combines his keen understanding of media from working in it himself with his passion for technology and security. Together they make him a great communicator around the true value of technology. He also has a gift for PR strategy and planning. While at Trend Micro, he spearheaded a new press outreach strategy that far exceeded expectations by landing numerous top-tier outlets like Fox Business, Washington Post, and The New Yorker which resulted in a total of nearly two million media impressions across multiple outlets. Alan is also a great person to work with: he's always happy to help and give advice with good humor, warmth, and humility. I highly recommend him and his work."
"Alan Wallace worked with me at Trend Micro and was very knowledgeable and extremely influential in getting PR and Social Media working together to amplify product launches, product promotions, market penetration, and even worked together to manage crisis communications and competitive marketing campaigns. If I had the chance to work with Alan again anywhere I would do so in a heartbeat. He knows what he's doing!"
"I worked with Alan right in the trenches of computer security PR. This is a "nobody gets out of here alive" environment, but we not only always got out alive, we always emerged victorious. This was due in a very large part to Alan's professional demeanor, his inexhaustible supply of contacts, and his very impressive gestalt of the story, the meeting, and the message involved. I would welcome any chance to work with Alan Wallace in the future."
Press Releases
Official announcements and communications distributed through major news wire services, documenting Trend Micro's product launches, partnerships, security advisories, and company milestones.
Showing 1-20 of 29 press releases
Crippling attacks on banks and media thwarted by advanced threat protection of Trend Micro Custom Defense
Today Trend Micro Threat Researcher Kyle Wilhoit will present "Who's Really Attacking Your ICS Equipment?" at Blackhat Europe 2013, Amsterdam,...
An ISACA survey of more than 1,500 security professionals found that more than one in five respondents said their enterprise has experienced an advanced persistent threat (APT) attack. The study, sponsored by Trend Micro, found 94 percent say APTs represent a credible threat to national security and economic stability.
Spanish Police announce arrest of alleged head of Reveton ransomware cybercriminal gang in Dubai with Trend Micro assistance, marking significant international law enforcement cooperation against ransomware threats.
Trend Micro's 2012 Annual Security Roundup documents cybercriminals expanding beyond PC to target Android, social media, and Mac OS X platforms, marking evolution to "Post-PC" threat landscape.
Threats to Android, the Cloud and digital lifestyle devices will make fighting cybercriminals more complex in 2013 than ever before, according to a...
Japanese Android application review and information website Androider.JP announced it is working with Trend Micro to integrate the company's Mobile App Reputation Solution to pre-screen applications for irregularities and security problems, helping prevent the spread of illegitimate applications.
Trend Micro today announced its Trend Micro Online Security Assessment Tools for Cloud, Cyber & Mobile Security, which will provide customers with an ...
With the publication of its Analyst Insight on "The Virtues of Virtual Patching," research firm Aberdeen Group raises awareness on alternatives to...
Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cloud security leader, today announced that Trend Micro™ SafeSync™ is now available in...
Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cloud security leader, today announced DirectPass, a new password management solution....
Trend Micro Incorporated (TYO: 4704;TSE: 4704), a global cloud security leader, announced a newly created position, U.S. vice president of...
(Mobile World Congress) Trend Micro Incorporated (TYO: 4704; TSE: 4704, #TrendMicro, a global cloud security leader and long-time innovator in mobile ..
(Mobile World Congress) -- Trend Micro Incorporated (TYO: 4704; TSE: 4704, #TrendMicro), a global cloud security leader and long-time innovator in...
Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cloud security leader, today announced that the company has extended its collaboration with ...
The upcoming new year will see cybercriminals act with even more persistency and sophistication, as the world shifts from the PC-centric desktop...
Trend Micro, Inc. (TYO:4704; TSE:4704), a global cloud security leader, today announced that it will help to formally establish a "global cyber...
Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in Internet content security, today announced the latest version of Trend Micro™...
Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in Internet content security, today announced the latest release of Trend Micro...
Trend Micro Inc. (TYO: 4704;TSE: 4704) today announced enhancements to its OfficeScan, Mobile Security and Data Protection solutions, which includes...
Showing 1-20 of 29 press releases
REPORT EXAMPLES
Report Examples prepared and issued on behalf of Trend Micro Corporation
Evolved Threats in a "Post-PC" World
Experts have been predicting the coming "post-PC" era for a few years. So the question has been, "When will we know that it's really here?" A simple answer is, we'll know it's really here when cybercriminals move beyond the PC. By that measure, 2012 is truly the year we entered the post-PC era as cybercriminals moved to embrace Android, social media platforms, and even Macs with their attacks.
TrendLabs 2012 Mobile Threat and Security Roundup: Repeating History
Android seems to be repeating history by way of Windows. The platform's growing dominance in the mobile landscape echoes that of Windows in the desktop and laptop space. And much like Windows, Android's popularity is making it a prime target for cybercriminals and attackers, albeit at a much faster pace.
1Q 2013 Security Roundup - Zero-Days Hits Users Hard at the Start of the Year
While exploits and vulnerabilities are a common problem for users, zero-day exploits in high-profile applications are relatively rare. That was not the case in the first quarter of 2013. Multiple zero-day exploits were found targeting popular applications like Java and Adobe Flash Player, Acrobat, and Reader.
In addition, as predicted, we saw improvements in already-known threats like spam botnets, banking Trojans, and readily available exploit kits. Other high-profile incidents include the South Korean cyber-attacks in March, which reiterated the dangers targeted attacks pose. On the mobile front, fake versions of popular apps remained a problem though phishers found a new target in the form of mobile browsers.



