Trend Technology releases cloud ERA new strategy pilot cloud computing Security tour

Source: Internet
Author: User
Keywords Trend technology security we

April 24, 2012, Trend Technology announced in Taipei's "Cloud Next-2012 Asia-Pacific Media conference" on the new cloud Era strategy: "3C" cloud Computing (Cloud), it consumption (consumerization) and risk control Over disorientated), designed to help customers deal with the security challenges of cloud security, mobile device protection from IT consumerism, and the emergence of new technology trends such as advanced persistent threats (APT).

Trend Technology Global CEO Chen Yihua said: "By the end of 2010, some countries and regions of the use of virtualization technology has reached 80%, the global mobile device manufacturing also exceeds the number of PC manufacturing." Along with the trend of mobility, persistent security vulnerabilities are emerging. Therefore, the trend of science and technology insight into the industry situation, timely adjustment of our solutions and services to help customers meet these new security challenges. ”

Cloud computing: Trend technology deep security accelerates data center transformation

Cloud computing is transforming traditional data centers, including public and private clouds. Businesses virtualize data centers and extend workloads and data to the public cloud, and the perimeter of the data center shrinks. As data centers are converted from physical to virtual and may eventually be converted to the cloud, the business faces new challenges of security, management, and ROI.

"The idea of building a moat outside the castle to protect the facilities in the fort is far from satisfying demand." Since server data and mission-critical business virtualization and mobility, security and protection measures need to be followed and immediately in place, "Chen Yihua said," Our cloud provider partners, such as Dell, NTT America and Taiwan Telecom, have long recognized this, Trend technology has been chosen to provide security and data protection for their public and private cloud platforms. ”

In 2011, the virtualization security of trend technology and cloud computing security related business grew by 131% in year-on-year growth of more than 100% in all regions of the world. In the first quarter of 2012 (as of March 31, 2012), the business continued to grow by 129% per cent year-on-year.

Trend technology deep security and Securecloud as data Center safety insurance, provides a deep protection barrier to servers and data in physical, virtual or cloud environments, helping many companies accelerate data center conversion processes, achieve greater security, and higher virtualization ROI and simpler management models.

IT consumption: BYOD (with own equipment office), to achieve security and demand "balance"

According to IDC, it consumption will be the most influential trend in science and technology in the next ten years. BYOD, VDI (virtual desktops), and SaaS are changing the enterprise endpoint pattern: As more and more enterprise data and resources are accessed through mobile devices that are not owned by the company or are not controlled by the enterprise IT security Policy, the likelihood of security breaches or data loss will inevitably increase dramatically.

"Corporate IT is losing control over BYOD. We recently surveyed 78% of companies that allow employees to use their own private equipment for work-related activities, and the company is very concerned about the risks and problems associated with it, "said Chen Yihua, Global CEO of Trend Technology," and the infection on the Android platform has increased by 400% over the past three months. Our customers quickly realized that the need to simply manage mobile devices was not enough to protect the data on the device, and to ensure that the devices were "clean" before they could enter the corporate network. ”

To meet customers ' mobile device protection needs, trend technology integrates mobile security Solutions Tmms (Trend Micro Mobile) with mobile device management MDM (Mobile Device Management) and data protection capabilities, A unified security policy deployment and management of mobile devices within an enterprise makes it easy for businesses to implement secure BYOD.

Control risk: Detection apt is just a start ...

As data centers and endpoints evolve, the threat situation is changing. Trend technology in 2010 predicted the 2011 "Data leakage Year", under the impact of high-level targeted attacks, many organizations around the world have not been spared. Many companies have invested billions of of dollars in safety, compliance and risk management, but the results have been minimal, and data leaks have not been eradicated and have become increasingly

"In the face of advanced sustainability threats, companies should assume that they are under threat." Companies must have the ability to detect, prevent, and remediate to minimize the risk and impact of threats, "Chen Yihua said." In addition, if we can keep track of these attacks, rather than a single isolated trace, we can get more comprehensive threat intelligence, just like in twist Ghost Click In the incident, we helped the FBI and the Estonian police to uncover one of the largest botnet in history. ”

Trend technology is committed to building a secure digital information exchange world. To this end, we work with governments and security agencies around the world to address the new security challenges facing the cloud era, including:

Cloud Security Alliance (CSA): a non-profit organization designed to promote the best practices for providing security for cloud computing. Trend technology is CSA Asia-Pacific headquarters of the board members and founding partners.

National Network Security Alliance (NCSA): Nonprofit Public-private partnership, focusing on the network security awareness and education of all digital users. Trend Technology is a board member that assists in the development and promotion of online security products.

The International Multilateral Cooperation Organization (IMPACT): A non-profit global public-private partnership against cyber threats, on behalf of the ITU (the UN's exclusive agency), oversees cybersecurity. Trend Technology has formed a strategic partnership with governments around the world to help build a secure ICT infrastructure.

"icon" trend Technology data protection

Grawa, director of Trend Technology and executive vice president of global consumer Affairs, said: "For consumer-side business strategy, trend technology focuses on the following three points:" Protect my equipment, "protect my staff" and "protect me and my family." We hope that through these three points, our users can easily enjoy the digital life, no longer need to be afraid of data leakage. ”

In response to the regional user strategy, trend technology will increase investment in potential markets, particularly in Europe and the Asia-Pacific, while continuing to maintain existing user groups and revenues in Japan, North America and Australia. "With the continued growth of existing solutions and future plans in the user environment, trend Technology expects to achieve more than 20% per cent of the revenue growth in the Asia-Pacific region, while doubling the existing channel coverage by the end of 2012," said the junior. ”

Speaking of mission and Vision, Oscar, director of global Research and Development and executive vice president of Greater China, said: "The trend of technology to provide security products can provide users with a full range of digital Life protection." Today's cyber crime, its scope and malicious degree is expanding, where it all carry extremely complex threat attack information. In order to combat the increasingly complex and mature threat, trend technology will always uphold the concept of technological innovation, to provide users around the world with leading solutions and services to protect the user digital activities and equipment information and property security. ”

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.