• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   in-the-cloud scanning

Beyond Perimeter Defense to Data-Centric Security

  • Posted on:October 7, 2011
  • Posted in:Cloud
  • Posted by:
    Trend Micro
1

Traditionally businesses have focused their IT security on perimeter defense—blocking threats before they enter the network. This protection is still important.  But with today’s cloud computing, mobile devices, and advanced persistent threats (APTs), businesses need security that protects their data wherever it travels and in whatever type of device it resides, requiring new data-centric security. …

Read More
Tags: cloud computingCloud Securitycloud-based securityin-the-cloud scanningmalwaremobile devicessecuritySmart Protection NetworkthreatsVMware

The State of Cloud and Virtualization Security

  • Posted on:June 5, 2011
  • Posted in:Cybercrime, Virtualization
  • Posted by:
    Dave Asprey
1

For the last few months, we’ve been conducting a cloud, virtualization, and VDI security survey of 1200 IT professionals from larger companies in 6 countries around the world. Not only did I get to help shape the questions on the survey, I’ve also been on the team interpreting the results. We’ve learned more than a…

Read More
Tags: cloud computingCloud Securitycloud-based securityDeep SecurityEncryptionhosted securityin-the-cloud scanningmalwaremobile devicesPrivacyPrivate CloudPublic CloudSecureCloudsecuritySmart Protection NetworkthreatsVulnerabilities

Scalability Testing In The Cloud

  • Posted on:April 18, 2011
  • Posted in:Virtualization
  • Posted by:
    Trend Micro
1

Not long ago, we set out on a mission to perform a full scalability test on one of our products (Trend Micro Deep Security). After some quick, back-of-the-napkin calculations we discovered that we needed somewhere in the order of 35 Dell 710’s with virtualization to complete our test. Finding that many available servers is a…

Read More
Tags: cloud computingCloud Securitycloud-based securitydatacenterEC2iaasin-the-cloud scanningpaasvirtualization

STILL Got Cloud Confusion? Check out these resources…

  • Posted on:February 14, 2011
  • Posted in:Virtualization
  • Posted by:
    Trend Micro
1

A year ago we posted a compendium of Cloud and Cloud Security resources. This posting has been consistently among the top hits to the Cloud Security Blog proving that, when it comes to Cloud the one thing we all need is clarity!

Two of the most useful resources…

Read More
Tags: cloud computingCloud Securitycloud-based securityCSAEC2Googlehosted securityiaasin-the-cloud scanningpaasPrivacyPublic CloudSecureCloudSmart Protection Networkvirtualization

The Virtualization Treadmill: The More Things Change, the More They Stay the Same

  • Posted on:February 10, 2011
  • Posted in:Virtualization
  • Posted by:
    Dave Asprey
0

Is Virtualization stupid? It forces guest VMs sharing a host to do the same things over and over, without sharing. It takes up countless hours of otherwise useful – and expensive – server time.

Read More
Tags: cloud computingCloud Securitycloud-based securitydatacenterEC2hypervisorsiaasin-the-cloud scanningmalwareMicrosoftpaasPrivate CloudPublic CloudSecureCloudvirtualizationVMs

Cloud-based Protection Networks Improve Threat Protection

  • Posted on:January 17, 2011
  • Posted in:Cybercrime
  • Posted by:
    Jon Oliver
2

Today’s threat landscape has required security vendors to change their approach to protecting customer data. TrendLabs℠, Trend Micro’s threat research arm, states there are now 3.5 new threats released every second by cybercriminals. Traditional approaches to security just cannot keep up with this. Enter cloud computing and the subsequent development of cloud-based protection networks. Customers who utilize a security vendor who has a robust cloud-based protection network will see significant advantages over those customers who still use more traditional methods. Not only can cloud-based protection networks use cloud computing methods to manage this security process more effectively, but also they are able to scale with the certain increase in threats in the future.

Read More
Tags: cloud computingCloud Securitycloud-based securitycybercrimecybercriminalshosted securityin-the-cloud scanningmalwaremobile devicesSecureCloudSecurity as a ServiceSmart Protection Networkthreats

VMware Kool-Aid: “There’s No Cloud Without Virtualization”

  • Posted on:January 4, 2011
  • Posted in:Virtualization
  • Posted by:
    Dave Asprey
0

I’m constantly annoyed by how broad the term “cloud” can be, and I try to use IaaS, PaaS, and SaaS instead, but even these categories are blurring at the edges. The bottom line is that if it’s hooked up to the internet, it can be controlled from a central location, and it scales up and down on demand, it’s in the cloud.

Read More
Tags: cloud computingcloud-based securitydatacenterGooglehypervisorsin-the-cloud scanningpaasPrivate CloudPublic CloudsaasvirtualizationVMs

Cloud Security Alliance Congress 2010 Summary – Part 4 of 4

  • Posted on:December 13, 2010
  • Posted in:Cybercrime, Virtualization
  • Posted by:
    Trend Micro
0

Cloud Security Alliance Congress 2010 Summary – Part 4 of 4   The Cloud Security Alliance kicked off its first major event November 16-17, 2010 in Orlando, Florida. The CSA Congress 2010 successfully hosted 370 people with talks covering all aspects of cloud security over two days. For those who were not in attendance at…

Read More
Tags: cloud computingCloud Securitycloud-based securityCSAdatacenterDDoSin-the-cloud scanningPrivate CloudPublic CloudSecureCloudSmart Protection Networkstandards

Why Identity Matters More in the Cloud Than the Enterprise

  • Posted on:December 6, 2010
  • Posted in:Cloud
  • Posted by:
    Dave Asprey
0

The cloud is putting so much pressure on the old device-centric security model that it’s forcing a change to an identity-centric security model, where it matters far more who a person is than what device or network they are using. In a single day, one person might access cloud applications from his iPhone, home, main office, and Peet’s Coffee, and he may use his home PC, his work laptop, his phone, or even his Xbox. Trying to identify and secure what that person does based on a device IP address or network address is simply a lost cause.

Read More
Tags: cloud computingCloud Securitycloud-based securitydatacenterhosted securityin-the-cloud scanningPrivate CloudPublic CloudSecureCloudsecuritySmart Protection Networksocial networking

Cloud Security Alliance Congress 2010 Summary – Part 1: Creating a Safer, More Trusted Internet

  • Posted on:November 29, 2010
  • Posted in:Cybercrime, Virtualization
  • Posted by:
    Trend Micro
0

The Cloud Security Alliance kicked off its first major event November 16-17, 2010 in Orlando, Florida. The CSA Congress 2010 successfully hosted 370 people with talks covering all aspects of cloud security over two days.

For those who were not in attendance at congress, this four-part series will summarize some of the most popular sessions at the event.

Read More
Tags: cloud computingCloud Securitycloud-based securitydatacenterin-the-cloud scanningPrivacyPrivate CloudPublic CloudsaasSecureCloudsecuritySmart Protection Networkvirtualization
Page 1 of 212

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.