Analytics
5/11/2012
02:39 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Trend Micro Plug-In Makes It Easy For Companies Using Apache CloudStack To Encrypt And Protect Their Cloud Data

SecureCloud plug-in for Apache CloudStack is a small module that automates process of synchronizing cloud assets into SecureCloud

SAN FRANCISCO, May 9, 2012 /PRNewswire/ -- Citrix Synergy -- Trend Micro Incorporated (TYO: 4704;TSE: 4704), a leader in cloud security, announced today at Citrix Synergy a product development initiative using Apache CloudStack currently in incubation at the Apache Software Foundation, giving Trend Micro first-mover advantage among those Apache CloudStack users searching for easy-to-deploy encryption solutions tailored to the Cloud.

Trend Micro delivers an innovative cloud encryption service, now available with a simple plug-in that makes it easier and quicker for CloudStack users to implement--rather than investing months in developing and deploying an encryption solution on their own.

Trend Micro SecureCloud is a patent-pending key management system that enables administrators to set policies that determine where and when encrypted data can be accessed. In addition, server validation applies identity and integrity rules when servers request access to secure storage volumes. SecureCloud's simple approach safely delivers encryption keys to valid devices without the need to deploy an entire file system and management infrastructure. With SecureCloud, one can protect sensitive information in cloud and virtual environments from theft, unauthorized exposure, or unapproved geographic migration to other data centers. This protection helps support internal governance and aids in complying with regulations like HIPAA, HITECH, Sarbanes-Oxley, GLB and PCI DSS.

In April 2012, Citrix moved CloudStack from the GPL to the Apache License 2.0 and contributed the CloudStack project to the Apache Software Foundation (ASF), thus turning CloudStack into a truly community run project with governance provided by the Apache Software Foundation rather than by Citrix alone. In addition, Citrix has stepped up its investment in the project and the open source community and decided to become a platinum sponsor of the Apache Software Foundation.

"Citrix just contributed CloudStack to the Apache Software Foundation in April," said Steve Quane, Chief Product Officer, at Trend Micro. "One month later, as one of the first companies to show its commitment to CloudStack since that announcement, Trend Micro has already developed an effective encryption plug-in for CloudStack, a testament to our 'Security that Fits' strategy."

The SecureCloud plug-in for Apache CloudStack is a small module that simplifies and automates the process of synchronizing cloud assets into SecureCloud as part of the encryption provisioning process enabling SecureCloud administrators to easily define encryption key release policies for the data volumes that will be encrypted.

"As the industry adoption of cloud technologies in the enterprise moves mainstream, there is an increased demand for technology solutions that help address the security and compliance needs of the enterprise," said Peder Ulander, vice president of marketing for cloud platforms, Citrix. "The SecureCloud plug in for Apache CloudStack makes it easy for our customers to integrate secure data protection capabilities into their cloud. We are excited to partner with Trend Micro around their Secure Cloud initiative and look forward to working with them on this initiative and others in the future."

Trend Micro is making the newly developed plug-in for Apache CloudStack available as a controlled beta to select customers on a limited basis. Those interested in joining this beta program should contact Dan Crowe at dan_crowe@trendmicro.com with "SecureCloud plug-in for CloudStack" in the subject line of their message.

About Trend Micro

Trend Micro Incorporated (TYO: 4704;TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years' experience, we deliver top-ranked client, server and cloud-based security that fits our customers' and partners' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro(TM) Smart Protection Network(TM) cloud computing security infrastructure, our products and services stop threats where they emerge - from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-0188
Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web