Welcome!

Open Source Cloud Authors: Elizabeth White, Liz McMillan, Pat Romanski, Ed Featherston, Roger Strukhoff

News Feed Item

Trend Micro Cloud Security Solutions Optimized for Amazon Web Services

Support for the newly released AWS Storage Gateway further demonstrates Trend Micro's commitment to cloud security

CUPERTINO, Calif. and LAS VEGAS, Nov. 28, 2012 /PRNewswire/ -- Trend Micro Incorporated (TYO: 4704; TSE: 4704), the global leader in cloud security, and platinum sponsor of the AWS re:Invent Conference at the Venetian in Las Vegas, Nevada from November 27th- 29th, is announcing that global customers of Amazon Web Services (AWS) are able to take advantage of highly optimized security solutions from Trend Micro for their AWS deployments, including the newly announced AWS Storage Gateway. Customers deploying on AWS are now able to take advantage of newly listed Trend Micro security solutions available in the AWS Marketplace, providing a streamlined path to securing their cloud deployment. Global customers are leveraging Trend Micro security solutions today to shield their AWS cloud-based applications from threats, meet strict compliance regulations, and protect the privacy of their customer data stored in the cloud – all in a way that is easy to deploy and manage.

Trend Micro cloud security solutions are optimized for AWS, automating the protection for new AWS instances, automating the encryption of sensitive data stored in the cloud, and centralizing the management across hybrid cloud environments. Amazon Web Services is amongst the first public cloud service providers to be certified as part of the newly launched "Trend Ready for Cloud Service Providers" program, easing deployment for joint customers.

Wipro is a leading IT services firm that has combined AWS and Trend Micro together for rapid delivery of secure, reliable deployments in the cloud for multiple global customers.

"Wipro is actively deploying solutions on the Amazon cloud for leading global organizations," states Sheetal Metha, Global Head – Enterprise Security Services at Wipro. "As more and more of our customers are taking advantage of the cloud benefits by moving to AWS, they are demanding that we deliver solutions that include protection.  With Trend Micro cloud security solutions we confidently deliver protection for customers' critical servers, applications, and sensitive data."

Virtualizing and pooling IT resources in the cloud enables organizations to realize significant cost savings and tremendous business agility – including the ability to deploy new cloud-based applications in a matter of minutes, and scale up and down instantly as demand changes. However, those valuable business benefits cannot be sustained without addressing the unique security challenges posed by cloud computing. While AWS provides secure facilities and hardware, customers are responsible for maintaining and protecting their operating systems, applications and data against malware attacks, zero-day vulnerabilities and data breach. 

According to IDG Research's 2012 Cloud Computing Study (January 2012), 70 percent of enterprises have security concerns about security/privacy issues in virtualization or cloud environments. Corroborating this concern, Trend Micro's annual global cloud security survey* found that 43 percent of the respondents using a cloud service have experienced a data security lapse/issue in the last 12 months.

Recognizing that security concerns continue to deter enterprises from widespread deployments of business-critical applications in their reliable and cost-effective cloud service programs, Amazon has worked with Trend Micro to be certified in the Trend Ready for Cloud Service Provider program. The program helps to expedite a company's journey to the cloud by giving assurances that the journey is safe and protected through the use of Trend Micro security products in conjunction with leading service providers like AWS.

"Trend Micro has focused a significant amount of time and energy on delivering highly optimized security solutions for AWS deployments," said Dave Asprey, Vice President, Cloud Security, Trend Micro.  "Trend Micro delivers proven threat protection and data security capabilities that help businesses address security needs when deploying on AWS, all in an automated and consistent way."

Protect Against Threats

Trend Micro has focused on innovating and enhancing security for virtualized and cloud deployments since 2005, providing customers with proven application and server protection for cloud workloads. Deep Security includes even more innovation, enabling customers to automate and simplify security operations on and across AWS deployments. Tightly integrated modules easily expand the platform to ensure server, application, and data security across Amazon EC2 instances. Security can be highly customized with any combination of anti-malware, firewall, IDS/IPS, web application protection, integrity monitoring, log inspection and reporting. Customers can access the latest version of Deep Security through the newly listed Amazon Web Services Marketplace listing.

Protecting Sensitive Data

Trend Micro helps to protect sensitive data through automated encryption and key management, enabling AWS users to protect the privacy of their data and make sure that only authorized servers access encryption keys. Trend Micro™ SecureCloud™ enables organizations to define the policies that determine where and when encrypted data can be accessed. In addition, server validation applies identity and integrity rules when servers request access to secure storage volumes. SecureCloud's elegant and highly automated approach safely delivers encryption keys to valid devices without the need to deploy an entire file system and management infrastructure.

Architected for cloud from the ground up, Trend Micro security products seamlessly support deployments on AWS, not only providing industry leading security capabilities but also including key integration points like:

  • Seamless ability to perform inventory synchronization of AWS environment into Trend Micro security solutions, giving administrators an instant and complete view of security deployments and any gaps in protection.
  • Automatic protection of newly deployed instances and automatic deletion of terminated instances in AWS, ensuring consistent security and management in the elastic cloud environment.
  • Visibility into critical troubleshooting data for all protected instances, removing barriers often found in security organizations and enabling successful and timely resolution.
  • Protection for AWS Storage Gateway, a new service connecting an on-premises software appliance with cloud-based storage to provide seamless and secure integration between an organization's on-premises IT environment and AWS's storage infrastructure.
  • Support for AWS Linux kernels in addition to leading platforms like Microsoft Windows and various other Linux distributions (RedHat, SUSE, Ubuntu, CentOS), giving customers the flexibility to fully leverage a complete AWS environment for any instance they deploy.
  • AWS has been tested and certified under the Trend Ready for Cloud Service Providers program.

To learn more about Trend Micro's Cloud Security Solutions, join a hands-on boot camp, or listen to a breakout session. Visit Trend Micro at Booth 201 during the AWS re:Invent Conference.  Trend Micro will also be participating in the following speaking sessions:

SPR203: Cloud Security is a Shared Responsibility
Allan Macphee, Sr. Product Specialist, Trend Micro
Wednesday, November 28th, 2012
4:30 p.m.5:20 p.m.

SPR204: Securing Your Applications Across On-Premises IT and the AWS Cloud
Dave Asprey, Vice President, Cloud Security, Trend Micro
Wednesday, November 28th, 2012
3:25 p.m.4:15 p.m.

*Survey methodology

1,400 IT professionals from the U.S., the U.K., Germany, Canada, India, Japan and Brazil (200 respondents from each of the seven countries) were invited to participate in a survey on cloud computing. These professionals, from enterprises with over 500 employees, make purchase decisions for cloud computing services, server virtualization or Virtual Desktop Infrastructure (VDI) solutions.

About Trend Micro

Trend Micro Incorporated (TYO: 4704; TSE: 4704), the global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers.  A pioneer in server security with over 20 years' experience, we deliver top-ranked client, server and cloud-based security that fits our customers' and partners' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro™ Smart Protection Network™ global threat intelligence data mining framework, our products and services stop threats where they emerge – from the Internet. They are supported by 1,000+ threat intelligence experts around the globe. 

Additional information about Trend Micro Incorporated and the products and services are available at Trend Micro.com. This Trend Micro news release and other announcements are available at http://newsroom.trendmicro.com/ . Or follow our news on Twitter at @TrendMicro.

SOURCE Trend Micro Incorporated

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm ...
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
"There's a growing demand from users for things to be faster. When you think about all the transactions or interactions users will have with your product and everything that is between those transactions and interactions - what drives us at Catchpoint Systems is the idea to measure that and to analyze it," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York Ci...
Apixio Inc. has raised $19.3 million in Series D venture capital funding led by SSM Partners with participation from First Analysis, Bain Capital Ventures and Apixio’s largest angel investor. Apixio will dedicate the proceeds toward advancing and scaling products powered by its cognitive computing platform, further enabling insights for optimal patient care. The Series D funding comes as Apixio experiences strong momentum and increasing demand for its HCC Profiler solution, which mines unstruc...
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2016 Silicon Valley. The 19th Cloud Expo and 6th @ThingsExpo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Interne...
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to imp...
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ...
The IoT is changing the way enterprises conduct business. In his session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, discussed how businesses can gain an edge over competitors by empowering consumers to take control through IoT. He cited examples such as a Washington, D.C.-based sports club that leveraged IoT and the cloud to develop a comprehensive booking system. He also highlighted how IoT can revitalize and restore outdated business models, making them profitable ...
IoT offers a value of almost $4 trillion to the manufacturing industry through platforms that can improve margins, optimize operations & drive high performance work teams. By using IoT technologies as a foundation, manufacturing customers are integrating worker safety with manufacturing systems, driving deep collaboration and utilizing analytics to exponentially increased per-unit margins. However, as Benoit Lheureux, the VP for Research at Gartner points out, “IoT project implementers often ...
When people aren’t talking about VMs and containers, they’re talking about serverless architecture. Serverless is about no maintenance. It means you are not worried about low-level infrastructural and operational details. An event-driven serverless platform is a great use case for IoT. In his session at @ThingsExpo, Animesh Singh, an STSM and Lead for IBM Cloud Platform and Infrastructure, will detail how to build a distributed serverless, polyglot, microservices framework using open source tec...
The idea of comparing data in motion (at the sensor level) to data at rest (in a Big Data server warehouse) with predictive analytics in the cloud is very appealing to the industrial IoT sector. The problem Big Data vendors have, however, is access to that data in motion at the sensor location. In his session at @ThingsExpo, Scott Allen, CMO of FreeWave, discussed how as IoT is increasingly adopted by industrial markets, there is going to be an increased demand for sensor data from the outermos...
CenturyLink has announced that application server solutions from GENBAND are now available as part of CenturyLink’s Networx contracts. The General Services Administration (GSA)’s Networx program includes the largest telecommunications contract vehicles ever awarded by the federal government. CenturyLink recently secured an extension through spring 2020 of its offerings available to federal government agencies via GSA’s Networx Universal and Enterprise contracts. GENBAND’s EXPERiUS™ Application...
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
"delaPlex is a software development company. We do team-based outsourcing development," explained Mark Rivers, COO and Co-founder of delaPlex Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
"We work in the area of Big Data analytics and Big Data analytics is a very crowded space - you have Hadoop, ETL, warehousing, visualization and there's a lot of effort trying to get these tools to talk to each other," explained Mukund Deshpande, head of the Analytics practice at Accelerite, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Cloud Expo, Inc. has announced today that Andi Mann returns to 'DevOps at Cloud Expo 2016' as Conference Chair The @DevOpsSummit at Cloud Expo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "DevOps is set to be one of the most profound disruptions to hit IT in decades," said Andi Mann. "It is a natural extension of cloud computing, and I have seen both firsthand and in independent research the fantastic results DevOps delivers. So I am excited t...