Skip to content

2011 Press Releases

Trend Micro: A New Paradigm in Securing the Datacenter in the Cloud
Computing Era

Tokyo – July 27, 2011 – Trend Micro Inc. (TYO:4704;TSE:4704) a global cloud security leader, today with 2000+ customers, partners, industry leaders, and scholars at its annual security conference in Tokyo - Direction 2011, highlighted a new paradigm shift in enterprise data and infrastructure security in the cloud computing era. Trend Micro maps enterprise security needs across three stages of evolution: The cloud security journey starts with server consolidation, moves into expanded server and desktop virtualization, and opens a path to the cloud. To align with this IT evolution, Trend Micro announced its company position: Securing Your Journey to the Cloud.

Blurred Enterprise Perimeter

Enterprise perimeter security was under the spotlight. While it’s essential for enterprise security, it’s no longer enough when enterprises begin adoption of cloud computing and embrace consumerization of IT - allowing employees to connect their own mobile devices to access corporate network and retrieve company data. As enterprises adopt cloud computing - server workloads and data may shifted beyond their perimeter security, leaving them vulnerable. Who as access to those data, from where, and using what devices? With a projection of 50% CARG for public cloud adoption over the next three years, the wide-area-network (WAN) is the new local-area-network (LAN).

"In the old days, traditional perimeter security (network-based firewall, IDS/IPS) protected our data and assets inside our datacenter – sort of like having a moat around a castle, protecting those inside. However, with cloud computing, our critical workloads and data are no longer inside the castle –the traditional model along is no long sufficient” said Eva Chen, CEO, Trend Micro.

With enterprises also embracing cloud applications or software-as-a-service, employees are opting to connect with their own thin/mobile devices. The company data that once resided inside the perimeter or at least on company issued laptops are now scattered across multiple devices that are not within the control of enterprise IT, and can be backed up by employee’s personal online backup service. Data is now everywhere.

"In our recent enterprise customer survey, 62% of the respondents ranked ‘smartphones for business use’ as the top concern for new technologies in enterprises,” Oscar Chang, Executive Vice President, Trend Micro, Asia Pacific.

The New Paradigm

At today’s conference, Trend Micro unveiled the concept of elastic security which extends the traditional perimeter threat protection – keeping the bad stuff out, with an inside-out data protection approach – where a device-based model coupled with a context aware policy protects the workload and data no matter where it resides, physical or virtual, on-premise or in the cloud. The context aware policy provides enterprise the security of restricting who, when, where, and what can access your data.

Asia Pacific Cloud Computing Adoption Trends

In APAC, Trend Micro sales of server security for virtualization environment have surpassed physical environments in first half of 2011, with 116% YoY growth. Governments are leading the adoption of virtualization security, followed by health care and banking institution. Telecom sectors are actively piloting the integration of virtualization security into their infrastructure-as-a-service offerings.

"Today, 78% of our server security sales are for virtualization deployments, of which, 48% are contributed by the governments/public sector.” said Chang. "Customers who are further along with virtualization adoption, realizes our virtualization security solution helps them achieve higher virtualization ROI without compromising security.”

Already a global leader of server security (according to IDC WW Endpoint Security 2010-2014 Forecast), Trend Micro intends to become No.1 in cloud security in APAC, by

  1. Dominating server & desktop virtualization security,
  2. Securing the data & mobile device as part of consumerization of IT, and
  3. Leading data protection in the cloud.

 "Our strategy in APAC aligns with our company’s overall strategy of securing the cloud infrastructure, cloud data, cloud devices, and cloud application.” said Chang.


Connect with us on