Tuesday, 4 February, 2025

Subscribe to Newsletter

HOME
  NEWS
  Knowledge Center
 
News

Trend Micro Supports Region’s Paradigm Shift Towards Virtualisation and Cloud Computing

Published Feb 1, 2012

Trend Micro Incorporated (TSE: 4704), a global leader in Internet content security, supports the region’s paradigm shift toward virtualisation and cloud computing as organizations reorganize the myriad of business benefits, including IT flexibility, scalability, efficiency, cost reduction, and competitive advantage.

“Regional business are increasingly looking to adopt cloud computing and virtualisation, and this is the right step forward. But business must also secure their virtual environment. Today, the major threat of theft is not cash at gunpoint in a bank, but identity theft, theft of corporate secrets left in unsecured machines and in taxicabs, and a broad range of sophisticated cyber threats,” commented Chris Moore, General Manager, Middle East & Africa, Trend Micro.

Traditional network security, which addressed sets of computing power such as machines and data storage as a guarded walled garden, will no longer apply in a virtual environment. A new generation of security practices, which emphasize the dynamic aspect of computing power and data, is challenging the status quo. Each organization will move forward at its own pace as a function of the requirements that it faces and various other interacting factors. Hence, solutions must be sufficiently flexible to accommodate this diversity.

As regional businesses begin to implement virtualisation, they typically add virtual machines (VMs) initially alongside traditional physical machines in a hybrid arrangement. To provide the needed security, enterprises need a virtual appliance – a software image designed to run on a virtual machine. The introduction of this appliance allows organizations to bring security into the hypervisor itself to provide more effective protection. This also allows visibility to inter-VM traffic and provides other security benefits specific to virtualisation, such as inter-VM security, virtual patching for hosts that are created, and efficiency of anti-malware module performance.

Virtualisation is a catalyst to cloud computing; for example, it is accelerating transformation of data centers into private clouds. As organizations move toward cloud computing, they are able to move applications from their resources to cloud resources and back, to achieve business benefits.

However, taking advantage of this computing power further strains the security model. Agents are needed, that move with the workload, which includes the operating system, applications, and data. Yet business requirements such as stringent regulatory compliance require more sophisticated “smart” agents that can adjust the level of protection to suit various tasks.

To provide effective security in the virtualisation and cloud computing age, next generation security should include an optimal combination of approaches that protects traditional physical resources, virtual resources, and workloads wherever they may be, including in the cloud. The Trend Micro Smart Protection Network™ provides oversight and ensures that all resource and workload agent protection is resilient and up-to-date. Security moves with workloads, as needed, and security is deployed on the hypervisor to protect all guest operating systems from a single location.

CHARACTERISTICS OF NEXT GENERATION SECURITY STRATEGY
Trend Micro delivers on the promise of a next generation security strategy – one that will enable enterprises to fully realize the substantial business benefits and cost savings of virtualisation and cloud computing – with the following commercially available elements today:
• Cloud architecture: Security should be architected from the ground up to integrate with and leverage virtualisation and cloud computing technologies and models.

• Mobility: In a world driven by increasing mobility, such as 3G networks, vMotion, and cloud computing, and the consumerization of IT such as smartphones and tablets, security must be mobile too. It must travel with the data, applications, and devices it is entrusted to protect.

• Thin endpoint: The endpoint protection presence must be as small as possible to fit on smaller/thinner devices such as virtual machines, smartphones, and USB-based devices, and consume fewer resources such as memory, CPU time, and I/O.

• Speed: Security must be fast to provision, quick to update – given the pace of discovery of new threats and vulnerabilities, and the speed with which virtual machines can be provisioned or moved from a dormant to active state – and impose a minimal impact on system performance.

• Simplicity: Security should be simple to operate; easy to integrate with existing solutions and IT infrastructure; and include automation, notifications, reporting and other features that reduce management and maintenance time.

• Breadth of protection: A broad range of fundamental security controls – including anti-virus, encryption, data loss prevention (DLP), firewalls, IDS/IPS, file integrity monitoring, and log inspection – should be virtualized and operate seamlessly in virtualized and cloud computing environments. Point security solutions are not sufficient.

• Effective, accessible, supported, and compliant protection: Given the trend towards consumerization, and buy-your-own-computer provisioning models, security solutions should be both globally available and readily accessible to consumers, provide effective protection, be aligned with corporate IT standards, and be backed by global support.

About Trend Micro
Trend Micro Incorporated, a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years' experience, we deliver top-ranked client, server and cloud-based security that fits our customers' and partners' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro™ Smart Protection Network™ cloud computing security infrastructure, our products and services stop threats where they emerge – from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.
Additional information about Trend Micro Incorporated and the products and services are available at Trend Micro.com. This Trend Micro news release and other announcements are available at http://trendmicro.mediaroom.com/ and as part of an RSS feed at www.trendmicro.com/rss. Or follow our news on Twitter at @TrendMicro.



Rate This:

Posted by VMD - [Virtual Marketing Department]


Poll
What is your favourite search engine?
Google
Yahoo
Bing

Most Viewed
  Riverbed Launches Industry’s Most Complete Digital Experience Management Solution

  Credence Security to Address Growing Market for GRC Solutions in Middle East Through Partnership with Rsam

  New Mimecast Archive Cloud Capability Streamlines GDPR Management for Email

  Planning and Scheduling Software–Helping Manufacturers Keep Their Customers Happy

  Farsight Security and Infoblox Provide Zero-Hour Protection Against Cyberattacks Due to New Domains

  Fujitsu Launches High-Security Biometric Authentication Solution for Active Directory IT Environments

  Rackspace Wins 2017 Red Hat Innovator of the Year Award

  ServiceNow Survey Shows 2018 as the Year of Automation for Routine Enterprise Work

  4 Tech Hacks to Faster Customer Onboarding

  New Mimecast Report Detects 400% Increase in Impersonation Attacks