Trend Micro 2014 Annual Report Download - page 17

Download and view the complete annual report

Please find page 17 of the 2014 Trend Micro annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 51

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51

3. Management policy
(1) BASIC POLICY OF MANAGEMENT
Our Vision: A world safe for exchanging digital information.
Our Mission: Defend against threats that would impact user's digital life or IT infrastructure.
Our Strategy: Be the threat defense expert that adapts quickly to evolving user behaviors,
infrastructure and threat vectors.
Computer networks, mainly those linked to the internet, have been a global infrastructure, as
lifelines of the information society regardless of individual, business or national border for a long
time.
Today, most threats on the network such as computer viruses, spyware, spam, site defacing, and
information theft cannot be predicted and completely prevented. In an increase of cyber-crimes which
cause theft of proprietary information, monetary damages, and malicious destructions no matter
enterprise or consumer, both users could be targeted and attacked. With Advanced Persistent Threat
(APT), which is popular attack technique, enterprise are targeted as a particular organization by
multi‐faceted attacks. At the same time, consumer users could be also targeted through those new IT
technologies and services including variable devices and services like smartphones, multi-functional
mobile devices such as tablets, etc., and SNS. Now more than ever, security is the breath of life to
enterprises and individuals.
Trend Micro's vision is to protect the global IT infrastructure including growing cloud computing. As
a company, we will provide globally-relevant products and services that cover multiple areas of
computer security including assessment, minimizing damages in an emergency, and restoration to
against sequence of cyber-attacks, mainly APTs. Trend Micro is not only protecting enterprises and
individual users from the threats over the networks without interrupting economic activities and
usability, but it is also contributing to the further development of the information society by
improving the safety of the whole network system.
(2). TARGET MANAGEMENT INDEX
According to a research institute, etc., the worldwide security products that we belong to, is
estimated to expand at an annual growth rate of 6.9 percent from 2013 to 2018 (based on IDC, USA in
December 2014). Making the growth rate of our consolidated net sales to exceed the industry average
without fail is an important index that tells us whether or not we can grow to become a leading
company that can contribute to customers both in the Japanese and the global market.
In view of the fact that we have a relatively small amount of investments in physical fixed assets
such as manufacturing equipment, have no significant time-lag between accounting profit and loss and
cash flows as a characteristics of software companies, and have uncertainty about the long-term
forecast of the whole industry which, including our company, has a relatively short history, we set
target as operating income margin rate of around 30 percent at this time.
(3). MID- TO LONG-TERM BUSINESS STRATEGY
Today, computers and the Internet are used by every person and in all types of scene and location in
every country across the world. It has been a part of our society and daily life for long time. In
addition to, not only the personal computers, but also smartphones and multi-functional mobile
devices such as tablets, etc., and other varied network devices have been launched. With this stream,
application programs and purposes of use have become diversified. As a result, there is no longer a
single solution that can protect against all the different type of threat environments. Also, in the
network environment, cloud computing, which has started actual use, creates innovation in digital
information traffic with easy, speedy, and reasonable for data mining and exchange to any information
including big data. Under such a situation, the competition in the computer security market has
changed, becoming more intensive with new entries.
And our group recognizes that these changes are business opportunities.
Recently, the rising use of cloud computing technology has been spurred by companies or
organizations, etc. from the perspective of business continuity planning and personal using
diversifying mobile devices. Thus, more has to be done to create new security for this cloud
computing age. Trend Micro group has been providing security solutions that belong to Trend Micro
Smart Protection Network. These include Cloud Computing Security Architecture and Deep Security for
14