Analytics
8/28/2012
02:18 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Trend Micro Launches Trend Ready For Cloud Service Providers Program

Program will allow both Trend Micro and select Trend Ready partners to verify the compatibility of Trend Micro products within leading cloud service providers' infrastructures

SAN FRANCISCO, Aug. 28, 2012 /PRNewswire/ -- VMworld -- Trend Micro Inc. (TYO: 4704;TSE: 4704), the global leader in cloud security, today introduced the Trend Ready for Cloud Service Providers program, a new global initiative designed to make it possible for enterprises to confidently and securely move into the public cloud. Leading public cloud service providers that have worked closely with Trend Micro in achieving the Trend Ready status include: Amazon Web Services; Dell; HP Cloud Services; NTT Communications, U.S. and Singapore divisions; OpSource, Dimension Data company; Savvis, a CenturyLink Company; and Telefonica | Vivo.

The new program will allow both Trend Micro and select Trend Ready partners to verify the compatibility of Trend Micro products within leading cloud service providers' infrastructures. By participating in the program, cloud service providers are confirming to their customers that their cloud infrastructures will support and work with Trend Micro products.

According to IDC's 2011 Cloud Security Survey: Among organizations not considering cloud computing, more than one third (37 percent) agreed that that multi-tenant cloud architectures were too risky, from a security and privacy standpoint, to host their critical applications and data. What this means is that enterprises still need to understand and overcome the main adoption barrier of public cloud - security, which continues to deter enterprises from wide-spread deployments of business-critical applications in reliable cloud service programs.

The Trend Ready for Cloud Service Providers program educates, guides and delivers a proven compatible solution suite which helps customers understand cloud, overcome adoption inhibitors and safely adopt public cloud computing via verified Trend Ready partners and through the purchase and use of Trend Micro products and services. Currently, the program verifies the compatibility of Trend Micro(TM) Deep Security and Trend Micro(TM) SecureCloud(TM), two world-leading virtualization and cloud security solutions.

In addition to verification of product compatibility with identified Trend Micro products, participants in the Trend Ready program will also be provided with Implementation Guides to share with their customers describing the best practices and recommended configurations for deployment of specified Trend Micro products in their cloud infrastructures.

Current products verified in the Trend Ready for Cloud Service Providers program include:

-- Trend Micro(TM) Deep Security(TM), the industry's first agentless security platform, delivers comprehensive, adaptive, highly efficient agent-based protection, including anti-malware, web reputation, intrusion prevention, firewall, integrity monitoring, and log inspection. Deep Security 9, the newest version also announced today (see press release here), offers additional performance and ease-of-use enhancements to the agentless architecture. -- Trend Micro(TM) SecureCloud(TM), a hosted service or on-premise software application that provides data protection for public and private clouds using an efficient and easy-to-use encryption service that keeps data private and helps meet regulatory compliance requirements. More information on the Trend Ready program can be found here.

Supporting quotes

Nnamdi Orakwue, vice president, infrastructure cloud services for Dell "Customers consistently tell us that security is a primary requirement for deploying solutions in the cloud. Our work with Trend Micro, and now being a part of this Trend Ready program, are important additions to our security offerings that help customers realize the benefits of cloud computing."

Christian Christiansen, vice president of security products and services, IDC "Security is biggest obstacle to public cloud adoption because enterprises find it difficult to assess cloud security risks and approaches to mitigation. The Trend Ready for Cloud Service Providers program helps educate enterprises about the risks and benefits of cloud computing, and provides an approach to adopting public cloud services without compromising data security."

Craig Hurley, NTT America's director of product management for data center services , NTT Communications, U.S. division "Offering our customers the ability to safely access the economic and operational benefits offered by our cloud computing platforms is crucial to NTT America. The Trend Ready program adds another layer of assurance that NTT America can offer our customers who are intrigued by the benefits cloud computing can offer, yet are sensitive to the security issues involved."

Treb Ryan, CEO of OpSource, a Dimension Data company "OpSource's mission is to provide cloud and managed hosting solutions that enable businesses of all sizes to accelerate growth and scale operations, while controlling costs and reducing IT infrastructure support risks. That we are Trend Ready is another level of commitment we are able to offer our customers to ensure the security of their infrastructure."

Chris Richter, vice president of security products and services at Savvis, a CenturyLink company "As a global leader in cloud infrastructure and hosted IT solutions for enterprises, Savvis works with security vendors such as Trend Micro to strengthen the security position of enterprises that rely on our Symphony Virtual Private Data Center (VPDC) cloud computing services. The Trend Ready program allows us to broaden the suite of cloud security solutions we offer to our customers."

Steve Quane, CPO, Trend Micro "Though all software companies verify their solutions against leading hardware products, Trend Micro is the first software company to extend this verification to include cloud infrastructures. Hybrid cloud infrastructures are commonplace for our customers and we are proud to be working with this marquee group of cloud service providers to enable stronger security and greater cloud deployments."

About Trend Micro Trend Micro Incorporated (TYO: 4704;TSE: 4704), the global leader in cloud security, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years' experience, we deliver top-ranked client, server and cloud-based security that fits our customers' and partners' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro(TM) Smart Protection Network(TM) cloud computing security infrastructure, our products and services stop threats where they emerge - from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.