Here at Trend Micro, we are definitely looking forward to joining you at VMworld 2013. It’s always interesting and exciting to hear about your successes with using virtualization and cloud to drive down costs and open new doors to responsiveness and agility.
A key question we have on our minds (and hopefully yours too!) is: Are you confident that your security practices have got you covered across your physical, virtual and cloud environments? Are you practicing the safest ESX you can?
Physical, Virtual and Cloud – so many environments, so little time
As we see companies invest more in virtual and private, public and hybrid cloud environments, the entire infrastructure is becoming more complex to manage. Customers are asking us to address the unique security requirements for each environment while making it easy to deploy and manage security…makes sense to us!
Leading the way in VMware integration
A few short years ago, Trend Micro and VMware co-developed a set of APIs in the VMware ecosystem to provide the integration required to address the unique world of virtualization. This is why we introduced an innovative agentless security approach (we were the first!) with virtual machine protection for VMware data centers and vCloud environments. The approach delivers best-of-breed security protection, including anti-malware and more, without compromising on the benefits driven by the use of virtual and cloud technologies.
Do I really need anything beyond anti-malware?
With a new threat created every second or so here (Trend Micro Smart Protection Network), stealing valuable information has become a business. It has its own underground economy, with most cybercriminals using toolkits that allow them to exploit know vulnerabilities with very little effort. Not surprisingly, through our Smart Protection Network, we have found that 90 percent of organizations have active malware, and shockingly more than half are not aware of intrusions.
With the elastic perimeter enabled with virtualization and cloud combined with sophisticated threats, you need smart protection for information—perimeter security only just doesn’t cut it anymore.
And, with new cloud and data center technologies, the benefits are amazing – but so are the potential security risks. So what do you need to think about when it comes to security? Our list includes:
- Block and remove malicious software
- Protect against known and zero-day vulnerabilities
- Achieve segmentation of systems and reduce the attack surface
- Identify expected and unexpected (malicious) system changes
- Gain additional visibility and correlation of system and application events
- Protect sensitive data and applications, especially in the cloud
Yes, that’s a lot to think about when it comes to securing your environment – but there is good news! Tomorrow we will cover why you don’t need to sacrifice security to get the benefits of virtualization and cloud.