Welcome!

Microservices Expo Authors: APM Blog, Elizabeth White, Liz McMillan, Pat Romanski, XebiaLabs Blog

News Feed Item

Trend Micro Envisions Smart, Data-centric Security for the Post-PC Era

Consumerization, cloud adoption and targeted attacks drive the need for a new security model.

CUPERTINO, Calif., Oct. 5, 2011 /PRNewswire/ -- As part of its annual Insight event for the analyst community, Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cloud security leader, today unveiled the company's vision for a smarter security model inspired by a changing security landscape now marked by data breaches, and the opportunities and challenges generated by mobile devices, cloud implementations and targeted attacks.

Trend Micro CEO, Eva Chen, outlined her vision of the new model, the core of which centers on a data-centric, anti-hacker framework:

  • The security industry is at a crossroads, facing a complicated horizon that covers an escalation of targeted attacks against companies; growth in the use of unsecured personal mobile devices; and cloud implementations where data can be accessed anytime, anywhere. A bolder approach to security is needed within this new environment where users don't know who or what to trust.
  • Unlike traditional, perimeter-centric security, which assumed protectable boundaries surround critical data, the new model recognizes the level to which data is exposed and aims to rebuild lost confidence by shifting focus to the data itself.
  • Trend Micro plans to build trust within the post-PC landscape where data and devices are exposed and ubiquitous. The new security model puts the spotlight on data by integrating threat and data protection capabilities within a unified framework, ensuring visibility into who is accessing what data, when, where and how.
  • This new model updates and adds to the power of the Trend Micro(TM) Smart Protection Network(TM) infrastructure, which correlates data from more than 70 billion daily queries and has protected more than 130 million users since it was first unveiled in 2008. Customers of all sizes will continue to benefit from this real-time, cloud-based protection.
  • Under this vision, the company will build upon the cloud-based security of the Smart Protection Network by adding two essential capabilities developed with the underlying principle that data needs to be protected wherever it travels and wherever it resides:
    • Smarter threat protection brings the power of Trend Micro's global, cloud-based detection and correlation technologies inside a customer's environment with newly-developed local threat intelligence throughout their network to identify and protect against targeted attacks.
    • Smarter data protection enables integrated data protection and contextual awareness throughout the organization to ensure the confidentiality and protection of valuable data across physical, virtual and cloud environments.
  • Trend Micro is delivering more adaptive and contextually-aware security that protects the data itself - whether on a device or server; at home or on the road; in physical, virtual or cloud environments -- and provides the intelligent integration and coordination required to manage, control and defend that data in real time.

Benefits for both businesses and consumers

  • For businesses, the realization of Trend Micro's vision will mean better, faster threat protection; adaptive security that enables rather than hinders business productivity; and increased efficiency and manageability of their security, which leads to lower TCO. It means they can embrace the opportunities and advantages of cloud computing and consumerization with new confidence.
  • For consumers, Trend Micro will be better equipped to protect their digital lives located on computers, smartphones, or smartpads. With security threats becoming more pervasive and cybercriminals targeting consumers on mobile devices or engaging with friends on social networking sites, consumers of all ages need smarter, more complete protection.

Roadmap

During 2012 and beyond, this smarter new security model will be integrated into select Trend Micro security solutions already powered by the Smart Protection Network, serving customers who are especially concerned about their journey into the cloud, the growth of consumerization of IT within their companies, and the spread of targeted attacks. The model will manifest itself across four main Trend Micro cloud solution "pillars" of: data, infrastructure, mobile devices, and applications.

Supporting quotes:

Eva Chen, CEO, Trend Micro

"Stagnation is not an option in an industry where a multi-billion dollar cybercriminal enterprise works relentlessly to steal customers' data - and their trust. We need to continually innovate to stay ahead, and help our customers regain confidence as we deliver better security. Three years ago, Trend Micro led the industry with the Smart Protection Network, which delivered security from the cloud. Now, we are moving even further ahead in the face of advanced, multi-faceted, targeted attacks by leveraging our scalable cloud security advantage and customizing it for the data, infrastructure, devices and applications supporting the cloud journey."

Steve Quane, Chief Product Officer, Trend Micro

"This is a fundamental change in the approach to security for organizations who have relied on a perimeter-based network security model, and for consumers whose digital lives are increasingly mobile. Our new data-centric framework takes into account the changes required to secure data in an accelerating cloud-dominated world."

For the presentation on this vision please visit our media room.

About Trend Micro

Trend Micro Incorporated (TYO: 4704;TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years' experience, we deliver top-ranked client, server and cloud-based security that fits our customers' and partners' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro(TM) Smart Protection Network(TM) cloud computing security infrastructure, our products and services stop threats where they emerge - from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.

Additional information about Trend Micro Incorporated and the products and services are available at Trend Micro.com. This Trend Micro news release and other announcements are available at http://trendmicro.mediaroom.com/ and as part of an RSS feed at www.trendmicro.com/rss. Or follow our news on Twitter at @TrendMicro.

SOURCE Trend Micro Incorporated

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@MicroservicesExpo Stories
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.
While DevOps promises a better and tighter integration among an organization’s development and operation teams and transforms an application life cycle into a continual deployment, Chef and Azure together provides a speedy, cost-effective and highly scalable vehicle for realizing the business values of this transformation. In his session at @DevOpsSummit at 19th Cloud Expo, Yung Chou, a Technology Evangelist at Microsoft, will present a unique opportunity to witness how Chef and Azure work tog...
When scaling agile / Scrum, we invariable run into the alignment vs autonomy problem. In short: you cannot have autonomous self directing teams if they have no clue in what direction they should go, or even shorter: Alignment breeds autonomy. But how do we create alignment? and what tools can we use to quickly evaluate if what we want to do is part of the mission or better left out? Niel Nickolaisen created the Purpose Alignment model and I use it with innovation labs in large enterprises to de...
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...
SYS-CON Events announced today that Numerex Corp, a leading provider of managed enterprise solutions enabling the Internet of Things (IoT), will exhibit at the 19th International Cloud Expo | @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Numerex Corp. (NASDAQ:NMRX) is a leading provider of managed enterprise solutions enabling the Internet of Things (IoT). The Company's solutions produce new revenue streams or create operating...
Analysis of 25,000 applications reveals 6.8% of packages/components used included known defects. Organizations standardizing on components between 2 - 3 years of age can decrease defect rates substantially. Open source and third-party packages/components live at the heart of high velocity software development organizations. Today, an average of 106 packages/components comprise 80 - 90% of a modern application, yet few organizations have visibility into what components are used where.
SYS-CON Events announced today that Tintri Inc., a leading producer of VM-aware storage (VAS) for virtualization and cloud environments, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Tintri VM-aware storage is the simplest for virtualized applications and cloud. Organizations including GE, Toyota, United Healthcare, NASA and 6 of the Fortune 15 have said “No to LUNs.” With Tintri they mana...
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, will compare the Jevons Paradox to modern-day enterprise IT, e...
Throughout history, various leaders have risen up and tried to unify the world by conquest. Fortunately, none of their plans have succeeded. The world goes on just fine with each country ruling itself; no single ruler is necessary. That’s how it is with the container platform ecosystem, as well. There’s no need for one all-powerful, all-encompassing container platform. Think about any other technology sector out there – there are always multiple solutions in every space. The same goes for conta...
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Let's recap what we learned from the previous chapters in the series: episode 1 and episode 2. We learned that a good rollback mechanism cannot be designed without having an intimate knowledge of the application architecture, the nature of your components and their dependencies. Now that we know what we have to restore and in which order, the question is how?
Whether they’re located in a public, private, or hybrid cloud environment, cloud technologies are constantly evolving. While the innovation is exciting, the end mission of delivering business value and rapidly producing incremental product features is paramount. In his session at @DevOpsSummit at 19th Cloud Expo, Kiran Chitturi, CTO Architect at Sungard AS, will discuss DevOps culture, its evolution of frameworks and technologies, and how it is achieving maturity. He will also cover various st...
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes ho...
SYS-CON Events announced today that eCube Systems, a leading provider of middleware modernization, integration, and management solutions, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. eCube Systems offers a family of middleware evolution products and services that maximize return on technology investment by leveraging existing technical equity to meet evolving business needs. ...
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the protocols that communicate data and the emerging data analy...
Large enterprises today are juggling an enormous variety of network equipment. Business users are asking for specific network throughput guarantees when it comes to their critical applications, legal departments require compliance with mandated regulatory frameworks, and operations are asked to do more with shrinking budgets. All these requirements do not easily align with existing network architectures; hence, network operators are continuously faced with a slew of granular parameter change req...