• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Dell

Need to Know Now: Cloud Economics

  • Posted on:February 1, 2013
  • Posted in:Cloud
  • Posted by:
    Trend Micro
0

Is your cloud economic strategy a little…foggy? In this recent webcast from Dell, Trend Micro VP of Cloud Security Dave Asprey talks with Matthew Mikell, Cloud Evangelist at Dell, and David Linthicum, CTO and founder of Blue Mountain Labs to help business discover how to create the best financial model for their cloud computing strategy: Video…

Read More
Tags: Blue Mountain Labscloud computingcloud economicscloud financial modelingcloud financial modellingcloud financial modelsDave AspreyDavid LinthicumDellhow toMatthew Mikellpractical IT

What does the Oracle at Delphi say about IaaS cloud offerings?

  • Posted on:December 17, 2012
  • Posted in:Cloud
  • Posted by:
    Trend Micro
0

Referencing Wikipedia: The Pythia , commonly known as the Oracle of Delphi, was the priestess at the Temple of Apollo at Delphi, located on the slopes of Mount Parnassus. The Pythia was widely credited for her prophecies inspired by Apollo. Amazon Web Service’s (AWS) first user conference in November 2012 was over-subscribed and sold out. Given that the company offers all the infrastructure you need…

Read More
Tags: Cloud InfrastructureCloud SecuritycloudburstingCloudSynDellhybrid-cloudiaasinfrastructure as a serviceMicrosoftOpenStackPublic CloudvCloudvirtualizationVMware

It Gets Cloudy at Dell World

  • Posted on:December 13, 2012
  • Posted in:Cloud
  • Posted by:
    Dave Asprey
2

Dell World this week was huge. In addition to turning up the cloud strategy to full volume, Dell had Bill Clinton as a guest speaker. Very worthwhile conference, especially the Dell World Social Think Tank: IT Innovation, where I joined about 10 senior cloud thought leaders and another dozen execs from Dell for an invitation-only…

Read More
Tags: AustinBill ClintonCloud SecurityCloudFoundryDellDell World 2012DellWorldiaasIBMOpenStackpaasPrivate CloudVMware

TweetChat: Approaching Tomorrow’s Cloud

  • Posted on:December 3, 2012
  • Posted in:Cloud
  • Posted by:
    Trend Micro
3

Ready to join the conversation? We’re hosting a LIVE TweetChat on December 4, 2012, at 9am PST, to discuss new approaches to the cloud for businesses and how companies can prepare for the next generation of secure cloud computing. Participants: Dave Asprey, Vice President, Cloud Security at Trend Micro (@daveasprey) Stephen Spector, Dell cloud evangelist (@SpectorAtDell) Erica…

Read More
Tags: #TrendChatcloudcloud computingCloud SecurityDellfuture of cloudPrivate CloudPublic Cloudtwittertwitter chat

Webcast: Understanding the value of employee-led innovation & BYOD

  • Posted on:September 18, 2012
  • Posted in:Mobility
  • Posted by:
    Trend Micro
0

As the SMB landscape evolves, companies are changing the way they operate and providing new opportunities for employees. The end user’s consumer preferences are increasingly driving the adoption of technology and policies within the workplace. The implementation of BYOD provides greater flexibility and personal choice for individual workers. It has also been proven to increase…

Read More
Tags: BYODDellELIIT solutions

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • New Report: Top Three Ways to Drive Boardroom Engagement around Cybersecurity Strategy
  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.