Trend Micro: Cloud Security Strategy for 2010 By Eva Chen, CEO and co-founder

ข่าวเทคโนโลยี Friday April 2, 2010 14:53 —PRESS RELEASE LOCAL

Bangkok--2 Apr--Core & Peak Regardless of what you’re hearing, cloud computing is here to stay because it provides a real business value: It streamlines hardware and software while simultaneously giving IT budgets some breathing room; it fundamentally changes the IT infrastructure and, as a result, is changing the way we secure data. In short, it opens computing power and resources to businesses of all sizes. Yesterday’s security threats used to damage computers and networks. Today’s threats want to steal data and information — credit card numbers, social security numbers, financial information, etc. To confound things, businesses and consumers alike are inundated with data. The amount of data running through today’s global networks is currently being measured in petabytes. Not only is there a lot of data, but it’s now mobile. We have multiple devices on the client side — laptops, netbooks, tablet PCs, smartphones — all capable of receiving data and using applications that reside in the cloud. Data no longer resides on just one server or device. So how can we ensure that such vast amounts of information are secure? How do we continue and further our mission of ensuring a world where people can safely exchange data and information? Trend Micro believes the answer is in the cloud — that is, the Internet cloud. To protect customers against threats coming from the cloud, Trend Micro turned to the cloud itself to deliver the Trend Micro Smart Protection Network. We needed to overcome two challenges: 1) the explosion in the sheer volume of malware and 2) the proliferation of different network devices in the workplace. The cloud allowed us to block threats in the cloud rather than at the device level where giant-sized pattern files would have choked emerging net-based devices. Our Smart Protection Network would not have been possible without the cloud, since the real-time correlation of threats requires high-performance computing and the goal now is to block threats before they hit the computer. Some in the industry argue that cloud computing will result in security consolidation but I don’t see this happening. When every layer is decoupling, how can security possibly consolidate? Security needs to be present at every layer to be effective. And what matters most is the protection of data. Businesses don’t care where their data is coming from, but they do care how it’s protected. Businesses today need to ask their cloud providers the following key questions: Where is my data? Who is accessing my data? Is my data being modified? This new environment requires security innovation — and that’s what Trend Micro is focused on. Solutions will need to address the issue of protecting the cloud infrastructure itself. Trend Micro understands that innovation has to be evolutionary rather than revolutionary. IT departments want to leverage the cloud, but security that “fits” their needs has to exist before they can make this jump. They also realize that if they don’t make a “secure cloud” available to their internal customers, those customers will go around them and get access to the cloud without them, and perhaps without the security that’s required to ensure adequate protection. Thailand Media Contact: Public Relations Consultant, Core & Peak Co.,Ltd. Bussakorn Sonthikorn Tel +66 (0) 2439 4600 ext. 8202 e-mail [email protected] Srisuput Siangyen Tel +66 (0) 2439 4600 ext.8303 e-mail [email protected]

เว็บไซต์นี้มีการใช้งานคุกกี้ ศึกษารายละเอียดเพิ่มเติมได้ที่ นโยบายความเป็นส่วนตัว และ ข้อตกลงการใช้บริการ รับทราบ