• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   hosted security

Savings with Cloud Security — A Look at the Numbers

  • Posted on:January 19, 2012
  • Posted in:Cloud
  • Posted by:
    Trend Micro
7

When people talk about cloud security it can mean either 1) security for the cloud—security that protects your cloud initiatives, like protection for virtual machines or data stored in the cloud; or 2) security from the cloud such as Security as a Service that uses the cloud to deliver some aspect of protection, like hosted…

Read More
Tags: Cloud Securitycloud-based securityhosted securitysaassecuritySecurity as a ServiceSmart Protection Networkthreats

The State of Cloud and Virtualization Security

  • Posted on:June 5, 2011
  • Posted in:Cybercrime, Virtualization
  • Posted by:
    Dave Asprey
1

For the last few months, we’ve been conducting a cloud, virtualization, and VDI security survey of 1200 IT professionals from larger companies in 6 countries around the world. Not only did I get to help shape the questions on the survey, I’ve also been on the team interpreting the results. We’ve learned more than a…

Read More
Tags: cloud computingCloud Securitycloud-based securityDeep SecurityEncryptionhosted securityin-the-cloud scanningmalwaremobile devicesPrivacyPrivate CloudPublic CloudSecureCloudsecuritySmart Protection NetworkthreatsVulnerabilities

Open Source Clouds Become Enterprise-Grade: Citrix and OpenStack

  • Posted on:May 25, 2011
  • Posted in:Virtualization
  • Posted by:
    Dave Asprey
0

Today at Synergy, Citrix announced “Project Olympus,” effectively making open source clouds a more viable option for enterprises. In the past, it was cloud providers like Rackspace who tended to focus on open source cloud infrastructure, while enterprises tended to make more conservative choices where support contracts were available.

Read More
Tags: CitrixCitrix OpenStackcloud computingCloud InfrastructureCloud Securitycloud-based securityDeep SecurityEncryptionhosted securityHyper-Vhypervisorsiaasopen source cloudsOpenStackpaasPrivate CloudProject OlympusPublic CloudSecureCloudsecurityTrend Deep SecurityTrend Micro Deep SecurityVMsVMwareVMware vSpherevSphereXenServer

A Tale: The Snack Supplier, the Vending Machine, and the Cloud

  • Posted on:May 23, 2011
  • Posted in:Cybercrime, Virtualization
  • Posted by:
    Greg Boyle
2

I recently had an interesting chat with the operator of our snack vending machine while making a coffee in the kitchen. She was restocking our machine and had her iPad sitting on the table. In their 2 person company they now have 2 iPads and a PC. They do their inventory control and tracking while onsite at customer premises via the iPad.

Read More
Tags: cloud computingCloud Securitycloud-based securitycybercrimecybercriminalshosted securitymobile devicesportabilityPrivate CloudPublic CloudthreatsVMsVulnerabilities

Encryption in the Public Cloud: Advice for Security Techniques

  • Posted on:March 23, 2011
  • Posted in:Virtualization
  • Posted by:
    Dave Asprey
0

Surveys indicate that security is the number 1 challenge about the cloud.  Using encrypted, self-defending hosts mitigates many security-in-the-cloud issues.  Dave Asprey, VP-Cloud Security for Trend Micro, presented to the SD Forum these 16 valuable points of advice regarding data privacy in the cloud.  PLEASE CLICK ON THE “READ MORE” BUTTON TO ADVANCE DIRECTLY TO THE PRESENTATION….

Read More
Tags: cloud computingCloud Securitycloud-based securityEC2Encryptionhosted securityhypervisorsPublic CloudSecureCloudsecurity

STILL Got Cloud Confusion? Check out these resources…

  • Posted on:February 14, 2011
  • Posted in:Virtualization
  • Posted by:
    Trend Micro
1

A year ago we posted a compendium of Cloud and Cloud Security resources. This posting has been consistently among the top hits to the Cloud Security Blog proving that, when it comes to Cloud the one thing we all need is clarity!

Two of the most useful resources…

Read More
Tags: cloud computingCloud Securitycloud-based securityCSAEC2Googlehosted securityiaasin-the-cloud scanningpaasPrivacyPublic CloudSecureCloudSmart Protection Networkvirtualization

Cloud-based Protection Networks Improve Threat Protection

  • Posted on:January 17, 2011
  • Posted in:Cybercrime
  • Posted by:
    Jon Oliver
2

Today’s threat landscape has required security vendors to change their approach to protecting customer data. TrendLabs℠, Trend Micro’s threat research arm, states there are now 3.5 new threats released every second by cybercriminals. Traditional approaches to security just cannot keep up with this. Enter cloud computing and the subsequent development of cloud-based protection networks. Customers who utilize a security vendor who has a robust cloud-based protection network will see significant advantages over those customers who still use more traditional methods. Not only can cloud-based protection networks use cloud computing methods to manage this security process more effectively, but also they are able to scale with the certain increase in threats in the future.

Read More
Tags: cloud computingCloud Securitycloud-based securitycybercrimecybercriminalshosted securityin-the-cloud scanningmalwaremobile devicesSecureCloudSecurity as a ServiceSmart Protection Networkthreats

Why Identity Matters More in the Cloud Than the Enterprise

  • Posted on:December 6, 2010
  • Posted in:Cloud
  • Posted by:
    Dave Asprey
0

The cloud is putting so much pressure on the old device-centric security model that it’s forcing a change to an identity-centric security model, where it matters far more who a person is than what device or network they are using. In a single day, one person might access cloud applications from his iPhone, home, main office, and Peet’s Coffee, and he may use his home PC, his work laptop, his phone, or even his Xbox. Trying to identify and secure what that person does based on a device IP address or network address is simply a lost cause.

Read More
Tags: cloud computingCloud Securitycloud-based securitydatacenterhosted securityin-the-cloud scanningPrivate CloudPublic CloudSecureCloudsecuritySmart Protection Networksocial networking

Did you know… In the Cloud, your data can get up and move on its own

  • Posted on:October 28, 2010
  • Posted in:Virtualization
  • Posted by:
    Dan Crowe
1

Data just isn’t portable in the cloud — it can get up and move on its own. Your information placed in the cloud will be available when you want it; you just won’t know where it’s living from one moment to the next.

Read More
Tags: cloud computingCloud Securitycloud-based securitydatacenterEncryptionhosted securityiaasPrivate CloudPublic Cloudsecurityvirtualization

Trend Micro announces SecureCloud public beta at VMWorld Conference

  • Posted on:September 8, 2010
  • Posted in:Virtualization
  • Posted by:
    Dave Asprey
0

SecureCloud enables enterprises to govern and control cloud data using encryption and sophisticated encryption key management. The encryption used in SecureCloud is standard AES 128 bit encryption, but the brilliance of the technology lies in key management functionality that validates the identity and integrity of the cloud server.

Read More
Tags: cloud computingCloud Securitycloud-based securityhosted securityin-the-cloud scanningPrivate CloudPublic Cloudsecurityvirtualization
Page 1 of 212

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.