In the current approach to file-based threat handling,
               patterns (or definitions) required to protect a client are, for the
               most part, delivered on a scheduled basis. Patterns are delivered
               in batches from Trend Micro to clients. When a new
               update is received, the virus/malware prevention software on the client reloads this batch
               of pattern definitions for new virus/malware risks into memory.
               If a new virus/malware risk emerges, this pattern once again needs
               to be updated partially or fully and reloaded on the client to ensure continued
               protection.
            
            Over time, there has been a significant increase in the volume
               of unique emerging threats. The increase in the volume of threats
               is projected to grow at a near-exponential rate over the coming
               years. This amounts to a growth rate that far outnumbers the volume
               of currently known security risks. Going forward, the volume of
               security risks represents a new type of security risk. The volume of
               security risks can impact server and workstation performance, network bandwidth
               usage, and, in general, the overall time it takes to deliver quality protection
               - or "time to protect".
            
            A new approach to handling the 
volume
               of threats has been pioneered by 
Trend Micro that
               aims to make 
Trend Micro customers
               immune to the threat of virus/malware volume. The technology and
               architecture used in this pioneering effort leverages technology
               that off-loads the storage of virus/malware signatures and patterns
               to the cloud. By off-loading the storage of these virus/malware
               signatures to the cloud, 
Trend Micro is
               able to provide better protection to customers against the future
               volume of emerging security risks.