Ryan Delany in
Apr 15th, 2013 |
As a Product Marketing Manager for Trend Micro™ Worry-Free™ Business Security Services, I hear a lot of objections about the product, and in particular, a lot of cloud-related fears. Some examples of things I hear from customers and partners are:
“I wouldn’t be secure if my Internet connection went down.”
“I don’t want to put all my data in the cloud.”
“I don’t want to waste all my bandwidth, uploading everything to the cloud to be scanned.”
The cloud is becoming better understood by the average person these days, thanks to companies like Google, Apple, Netflix, and other...
Erica Benton in
Feb 1st, 2013 |
Is your cloud economic strategy a little…foggy? In this recent webcast from Dell, Trend Micro VP of Cloud Security Dave Asprey talks with Matthew Mikell, Cloud Evangelist at Dell, and David Linthicum, CTO and founder of Blue Mountain Labs to help business discover how to create the best financial model for their cloud computing strategy:
Video streaming by Ustream
What cloud financial model fits your company?
Dave Asprey in
Jan 7th, 2013 |
On a whirlwind tour of Asia, I spoke at several virtual and in-person conferences, including Cloudsec2012. I met with dozens of IT executives responsible for security for cloud infrastructures in Japan and Singapore as well as many other countries in the region. The tour gave me the opportunity to really dig in on cloud security in that area, enough so that I wrote a new report titled The State of Cloud Computing Security in Asia.
This report goes into detail on how the development of cloud computing is impacting the Asia-Pacific region. Specifically, we compare Japan, Australia, Singapore, Malaysia,...
Dave Asprey in
Dec 18th, 2012 |
Cyber criminals go to where the data is. More and more data is moving to the cloud, so more attacks are moving to the cloud. That’s not to say that mobile devices aren’t a great way to attack the cloud…they are. However, since more critical data is moving to the cloud, we will see a lot of developments in terms of cloud security.
As businesses become better at identifying the strengths and weaknesses of public clouds, private clouds (or just plain virtualization) will continue to be the cost-effective choice for large enterprise stable workloads, with new, variable usage, public...
Erica Benton in
Dec 3rd, 2012 |
Ready to join the conversation? We’re hosting a LIVE TweetChat on December 4, 2012, at 9am PST, to discuss new approaches to the cloud for businesses and how companies can prepare for the next generation of secure cloud computing.
Dave Asprey, Vice President, Cloud Security at Trend Micro (@daveasprey)
Stephen Spector, Dell cloud evangelist (@SpectorAtDell)
Erica Benton (moderating as @TrendMicro)
How you can participate – and WIN!
Please use the hashtag #TrendChat on Twitter to send your questions to Dave and Stephen. We’ll be accepting questions...
Jonathan Gershater in
Nov 30th, 2012 |
In his 90 minute keynote address at the AWS re:Invent conference, Andy Jassy quite unabashedly gave these reasons for using AWS versus a private cloud, (at the 32 minute mark) :
So public cloud adoption should be a no-brainer, right? Oh wait, but Andy omitted security in the public cloud – how can I trust that my customers’ sensitive data is secure in the public cloud?
Been there, heard that before.
I agree, the message wears thin that enterprise businesses are apprehensive to store sensitive customer data in the public cloud, and thus hesitant to adopt the cloud at all. (By...
Amy Luby in
Cloud, Cloud-based Security, Consumerization of IT
Nov 13th, 2012 |
The benefits of the cloud have been proven for businesses of all sizes – every small business owner can save time and money while increasing their employees’ productivity by leveraging cloud technologies. Cloud technologies are faster to deploy, require minimal technical know how to manage, and cost less than on-premise technologies. These benefits let the small business owner focus on what’s most important: growing their business.
But data breaches, social security card theft, credit card number theft, and identity theft: we hear about these things every day. What does the small business...
Dave Asprey in
Nov 1st, 2012 |
If you haven’t seen this fantastic video about online security and mind reading, it’s totally worth 2.5 minutes of your time. Brought to you by a Safe Internet Banking initiative out of Belgium, my ancestral homeland-home of waffles, lace doilies, and diamonds.
The bottom line of the video is that if you put your personal data in social networking and cloud-based services, it’s going to be visible…and not just to marketers. This is why every machine in my house is protected (yes, by Trend Micro Titanium; I do work there…and it’s got the best detection rate)....
Dave Asprey in
Ambient Cloud, Cloud
Aug 8th, 2012 |
Cloud computing has meant managing servers or virtual machines or software as a service in a data center somewhere. IT executives have come to understand that provisioning on-demand IT software and infrastructure services via the internet provides huge benefits in efficiencies, cost savings and scalability. The rise of mobile devices more powerful than pcs from a few generations ago, combined with consumerization and the rise of a decentralized workforce has created what we now know as the Ambient Cloud.
Ambient Cloud is the set of network connected devices an IT department must manage.
Christine Drake in
Cloud, Cyber crime, Privacy, Compliance and Identity, Securing the Cloud, Security, Threats
Feb 2nd, 2012 |
Recently I became a victim of identity theft. Criminals gained access to my name, address, date of birth, driver’s license number, social security number, and bank account number. I’ve spent the last 10 years marketing Internet security solutions, but now I know firsthand how painful it can be to individuals when a data breach occurs.
How did they get my personal information? Working in the security industry, I’m pretty careful. I’m good at recognizing phishing scams; emails that use various ploys to get you to reveal your personal information (see this paper I co-authored on the...