Microservices Expo Authors: Elizabeth White, Mehdi Daoudi, Pat Romanski, Flint Brenton, Gordon Haff

News Feed Item

Trend Micro Envisions Smart, Data-centric Security for the Post-PC Era

Consumerization, cloud adoption and targeted attacks drive the need for a new security model.

CUPERTINO, Calif., Oct. 5, 2011 /PRNewswire/ -- As part of its annual Insight event for the analyst community, Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cloud security leader, today unveiled the company's vision for a smarter security model inspired by a changing security landscape now marked by data breaches, and the opportunities and challenges generated by mobile devices, cloud implementations and targeted attacks.

Trend Micro CEO, Eva Chen, outlined her vision of the new model, the core of which centers on a data-centric, anti-hacker framework:

  • The security industry is at a crossroads, facing a complicated horizon that covers an escalation of targeted attacks against companies; growth in the use of unsecured personal mobile devices; and cloud implementations where data can be accessed anytime, anywhere. A bolder approach to security is needed within this new environment where users don't know who or what to trust.
  • Unlike traditional, perimeter-centric security, which assumed protectable boundaries surround critical data, the new model recognizes the level to which data is exposed and aims to rebuild lost confidence by shifting focus to the data itself.
  • Trend Micro plans to build trust within the post-PC landscape where data and devices are exposed and ubiquitous. The new security model puts the spotlight on data by integrating threat and data protection capabilities within a unified framework, ensuring visibility into who is accessing what data, when, where and how.
  • This new model updates and adds to the power of the Trend Micro(TM) Smart Protection Network(TM) infrastructure, which correlates data from more than 70 billion daily queries and has protected more than 130 million users since it was first unveiled in 2008. Customers of all sizes will continue to benefit from this real-time, cloud-based protection.
  • Under this vision, the company will build upon the cloud-based security of the Smart Protection Network by adding two essential capabilities developed with the underlying principle that data needs to be protected wherever it travels and wherever it resides:
    • Smarter threat protection brings the power of Trend Micro's global, cloud-based detection and correlation technologies inside a customer's environment with newly-developed local threat intelligence throughout their network to identify and protect against targeted attacks.
    • Smarter data protection enables integrated data protection and contextual awareness throughout the organization to ensure the confidentiality and protection of valuable data across physical, virtual and cloud environments.
  • Trend Micro is delivering more adaptive and contextually-aware security that protects the data itself - whether on a device or server; at home or on the road; in physical, virtual or cloud environments -- and provides the intelligent integration and coordination required to manage, control and defend that data in real time.

Benefits for both businesses and consumers

  • For businesses, the realization of Trend Micro's vision will mean better, faster threat protection; adaptive security that enables rather than hinders business productivity; and increased efficiency and manageability of their security, which leads to lower TCO. It means they can embrace the opportunities and advantages of cloud computing and consumerization with new confidence.
  • For consumers, Trend Micro will be better equipped to protect their digital lives located on computers, smartphones, or smartpads. With security threats becoming more pervasive and cybercriminals targeting consumers on mobile devices or engaging with friends on social networking sites, consumers of all ages need smarter, more complete protection.


During 2012 and beyond, this smarter new security model will be integrated into select Trend Micro security solutions already powered by the Smart Protection Network, serving customers who are especially concerned about their journey into the cloud, the growth of consumerization of IT within their companies, and the spread of targeted attacks. The model will manifest itself across four main Trend Micro cloud solution "pillars" of: data, infrastructure, mobile devices, and applications.

Supporting quotes:

Eva Chen, CEO, Trend Micro

"Stagnation is not an option in an industry where a multi-billion dollar cybercriminal enterprise works relentlessly to steal customers' data - and their trust. We need to continually innovate to stay ahead, and help our customers regain confidence as we deliver better security. Three years ago, Trend Micro led the industry with the Smart Protection Network, which delivered security from the cloud. Now, we are moving even further ahead in the face of advanced, multi-faceted, targeted attacks by leveraging our scalable cloud security advantage and customizing it for the data, infrastructure, devices and applications supporting the cloud journey."

Steve Quane, Chief Product Officer, Trend Micro

"This is a fundamental change in the approach to security for organizations who have relied on a perimeter-based network security model, and for consumers whose digital lives are increasingly mobile. Our new data-centric framework takes into account the changes required to secure data in an accelerating cloud-dominated world."

For the presentation on this vision please visit our media room.

About Trend Micro

Trend Micro Incorporated (TYO: 4704;TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years' experience, we deliver top-ranked client, server and cloud-based security that fits our customers' and partners' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro(TM) Smart Protection Network(TM) cloud computing security infrastructure, our products and services stop threats where they emerge - from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.

Additional information about Trend Micro Incorporated and the products and services are available at Trend Micro.com. This Trend Micro news release and other announcements are available at http://trendmicro.mediaroom.com/ and as part of an RSS feed at www.trendmicro.com/rss. Or follow our news on Twitter at @TrendMicro.

SOURCE Trend Micro Incorporated

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@MicroservicesExpo Stories
"We started a Master of Science in business analytics - that's the hot topic. We serve the business community around San Francisco so we educate the working professionals and this is where they all want to be," explained Judy Lee, Associate Professor and Department Chair at Golden Gate University, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
For over a decade, Application Programming Interface or APIs have been used to exchange data between multiple platforms. From social media to news and media sites, most websites depend on APIs to provide a dynamic and real-time digital experience. APIs have made its way into almost every device and service available today and it continues to spur innovations in every field of technology. There are multiple programming languages used to build and run applications in the online world. And just li...
There is a huge demand for responsive, real-time mobile and web experiences, but current architectural patterns do not easily accommodate applications that respond to events in real time. Common solutions using message queues or HTTP long-polling quickly lead to resiliency, scalability and development velocity challenges. In his session at 21st Cloud Expo, Ryland Degnan, a Senior Software Engineer on the Netflix Edge Platform team, will discuss how by leveraging a reactive stream-based protocol,...
The general concepts of DevOps have played a central role advancing the modern software delivery industry. With the library of DevOps best practices, tips and guides expanding quickly, it can be difficult to track down the best and most accurate resources and information. In order to help the software development community, and to further our own learning, we reached out to leading industry analysts and asked them about an increasingly popular tenet of a DevOps transformation: collaboration.
We call it DevOps but much of the time there’s a lot more discussion about the needs and concerns of developers than there is about other groups. There’s a focus on improved and less isolated developer workflows. There are many discussions around collaboration, continuous integration and delivery, issue tracking, source code control, code review, IDEs, and xPaaS – and all the tools that enable those things. Changes in developer practices may come up – such as developers taking ownership of code ...
The dynamic nature of the cloud means that change is a constant when it comes to modern cloud-based infrastructure. Delivering modern applications to end users, therefore, is a constantly shifting challenge. Delivery automation helps IT Ops teams ensure that apps are providing an optimal end user experience over hybrid-cloud and multi-cloud environments, no matter what the current state of the infrastructure is. To employ a delivery automation strategy that reflects your business rules, making r...
Cloud Governance means many things to many people. Heck, just the word cloud means different things depending on who you are talking to. While definitions can vary, controlling access to cloud resources is invariably a central piece of any governance program. Enterprise cloud computing has transformed IT. Cloud computing decreases time-to-market, improves agility by allowing businesses to adapt quickly to changing market demands, and, ultimately, drives down costs.
Modern software design has fundamentally changed how we manage applications, causing many to turn to containers as the new virtual machine for resource management. As container adoption grows beyond stateless applications to stateful workloads, the need for persistent storage is foundational - something customers routinely cite as a top pain point. In his session at @DevOpsSummit at 21st Cloud Expo, Bill Borsari, Head of Systems Engineering at Datera, explored how organizations can reap the bene...
How is DevOps going within your organization? If you need some help measuring just how well it is going, we have prepared a list of some key DevOps metrics to track. These metrics can help you understand how your team is doing over time. The word DevOps means different things to different people. Some say it a culture and every vendor in the industry claims that their tools help with DevOps. Depending on how you define DevOps, some of these metrics may matter more or less to you and your team.
"CA has been doing a lot of things in the area of DevOps. Now we have a complete set of tool sets in order to enable customers to go all the way from planning to development to testing down to release into the operations," explained Aruna Ravichandran, Vice President of Global Marketing and Strategy at CA Technologies, in this SYS-CON.tv interview at DevOps Summit at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"We are an integrator of carrier ethernet and bandwidth to get people to connect to the cloud, to the SaaS providers, and the IaaS providers all on ethernet," explained Paul Mako, CEO & CTO of Massive Networks, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"Grape Up leverages Cloud Native technologies and helps companies build software using microservices, and work the DevOps agile way. We've been doing digital innovation for the last 12 years," explained Daniel Heckman, of Grape Up in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"NetApp's vision is how we help organizations manage data - delivering the right data in the right place, in the right time, to the people who need it, and doing it agnostic to what the platform is," explained Josh Atwell, Developer Advocate for NetApp, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
"Outscale was founded in 2010, is based in France, is a strategic partner to Dassault Systémes and has done quite a bit of work with divisions of Dassault," explained Jackie Funk, Digital Marketing exec at Outscale, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
"I focus on what we are calling CAST Highlight, which is our SaaS application portfolio analysis tool. It is an extremely lightweight tool that can integrate with pretty much any build process right now," explained Andrew Siegmund, Application Migration Specialist for CAST, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Let's do a visualization exercise. Imagine it's December 31, 2018, and you're ringing in the New Year with your friends and family. You think back on everything that you accomplished in the last year: your company's revenue is through the roof thanks to the success of your product, and you were promoted to Lead Developer. 2019 is poised to be an even bigger year for your company because you have the tools and insight to scale as quickly as demand requires. You're a happy human, and it's not just...
The enterprise data storage marketplace is poised to become a battlefield. No longer the quiet backwater of cloud computing services, the focus of this global transition is now going from compute to storage. An overview of recent storage market history is needed to understand why this transition is important. Before 2007 and the birth of the cloud computing market we are witnessing today, the on-premise model hosted in large local data centers dominated enterprise storage. Key marketplace play...
Cavirin Systems has just announced C2, a SaaS offering designed to bring continuous security assessment and remediation to hybrid environments, containers, and data centers. Cavirin C2 is deployed within Amazon Web Services (AWS) and features a flexible licensing model for easy scalability and clear pay-as-you-go pricing. Although native to AWS, it also supports assessment and remediation of virtual or container instances within Microsoft Azure, Google Cloud Platform (GCP), or on-premise. By dr...
With continuous delivery (CD) almost always in the spotlight, continuous integration (CI) is often left out in the cold. Indeed, it's been in use for so long and so widely, we often take the model for granted. So what is CI and how can you make the most of it? This blog is intended to answer those questions. Before we step into examining CI, we need to look back. Software developers often work in small teams and modularity, and need to integrate their changes with the rest of the project code b...
Kubernetes is an open source system for automating deployment, scaling, and management of containerized applications. Kubernetes was originally built by Google, leveraging years of experience with managing container workloads, and is now a Cloud Native Compute Foundation (CNCF) project. Kubernetes has been widely adopted by the community, supported on all major public and private cloud providers, and is gaining rapid adoption in enterprises. However, Kubernetes may seem intimidating and complex ...