I’m constantly annoyed by how broad the term “cloud” can be, and I try to use IaaS, PaaS, and SaaS instead, but even these categories are blurring at the edges. The bottom line is that if it’s hooked up to the internet, it can be controlled from a central location, and it scales up and down on demand, it’s in the cloud.Read More
It’s exciting to see that the GSA is leading the way to modernize the federal government’s IT by moving to “the cloud.” However, in the rush to save money, the GSA may be repeating some mistakes that company IT departments have already made. Until cloud vendors step up to guarantee that their security is on par with enterprise security, they will be a poor choice for our government agencies. We don’t need another WikiLeaks.
Recently I sat down with Steve Kwan, Trend Micro’s Senior Director of SaaS Operations, to discuss the challenges he faces as he moves Trend’s datacenter operations into the cloud. Steve has a great deal of experience with both traditional and virtualized datacenters. Most recently he helped guide product strategy for 3Leaf Systems, a developer of…Read More
As we started building out the Trend Micro Smart Protection Network four or five years ago, we realized that the shift to the cloud was going to be a major platform shift for the datacenter. We wondered if other datacenter operators were encountering the same types of issues that we were encountering. So we went…Read More
At the beginning of February Trend Micro tightened its relationship with Wipro, one of the world’s top providers of IT services. I feel very strongly about this announcement because it is being driven by the needs of some of the world’s largest datacenters which are Wipro customers. Last week, I had the chance to sit…Read More
OSSEC is an Open Source Host-based Intrusion Detection System project that has been around since 2003. It was acquired by Third Brigade in 2008, and then Third Brigade was acquired by Trend Micro in 2009. Trend Micro recently completed a global survey of the OSSEC installed base that yielded some interesting results. OSSEC performs log…Read More
Hypervisors bring new capabilities to us, but they also bring new computing risks. Understanding this new environment is important. As virtualization becomes mainstream, we need to find ways to identify risks and protect these new infrastructures. Hypervisors, while central to all virtualization methods, are a core risk area. Hypervisors are a “meta” operating system in…Read More