Skip to content


Hosted or Managed Service for Cloud Data Encryption
and Key Management

Offer your customers additional security from data theft or compromise in cloud computing environments. Whether you package Trend Micro™ SecureCloud™ as a managed or hosted service, this efficient, easy-to-use data encryption and key management solution secures your customers’ data in the cloud.

How It Works

  1. Deploy the SecureCloud key server as an on-premise software appliance or as a managed service hosted by Trend Micro.
  2. Your customers then provision a volume in your cloud offering and encrypt this with the SecureCloud Agent—installed within the virtual machine that is accessing the storage.
  3. Customers register the encryption key used to secure the volume with a unique virtual machine image under their account in the SecureCloud key server. Registration includes specific information about the machine that will be used by the key server to positively identify it in the future.
  4. Virtual machines attempting to gain access to encryption keys will have to contact the key server and pass security inspections before access to keys and sensitive data is allowed.
  5. Key servers can be conveniently located within your data center or at a third-party site.


View SecureCloud intro

Read more about securing data in the cloud

Benefits for Your Customers


  • Enables data protection in private and public clouds and virtual environments
  • Promotes safe storage recycling by rendering any data remnants indecipherable
  • Facilitates compliance and supports internal governance



  • Specifies when and where information is accessed through policy-based key management
  • Offers unique server authentication to ensure only authorized virtual machines receive keys
  • Provides remote management of cipher keys to enhance data security and control

Benefits for You


  • Provides your customers with security options that help overcome their barriers to cloud adoption
  • Increases security offerings to help you differentiate from your competition
  • Improves your security offerings with additional management and maintenance
  • Creates clear separation of duties and roles


Revenue Potential

  • Provides the ability to write plug-ins for a Cloud Service Provider (CSP) that is not currently supported in a standard release available via the
    Trend Micro Community
  • Plug-in communicates with the API of the CSP; presents uniform interface between CSPs
  • CSP-specific implementation handles all logic specific to CSP such that the rest of the Runtime Agent is CSP agnostic

Offering the Right IaaS Security?

Whitepaper icon

Gartner tells you how different IaaS clouds offer different levels of security. Find out how you can offer the best protection for each.
Get the Gartner Research Note

Who’s Securing the Cloud?

Document icon

85% said they encrypt their data stored in the cloud. Discover more about barriers to adoption in a Trend Micro
global survey and infographic.

Use SecureCloud to Protect Your Own Data

Connect with us on