CIO Magazine September CIO 100 Special Issue

Page 12

CUSTOM SOLUTIONS GROUP TREND MICRO

EXECUTIVE VIEWPOINT

HELPING CIOS SHRUG OFF MOBILE AND CLOUD WORRIES For CIOs, there’s only one road where the cloud and mobility are concerned and it’s straight ahead. So what about your security concerns? There are solutions, as Amit Nath, country manager, India and SAARC, Trend Micro, points out. AMIT NATH Country Manager, India and SAARC, Trend Micro Amit Nath has been spearheading the business growth of Trend Micro in India and the SAARC Region. He has been instrumental in Trend Micro’s emergence as an industry leader and success in a fiercely competitive market.

According to our global security survey, 66 percent of CIOs will increase their investments in mobile security nextyear. What’s driving so many of them to up their spends? Corporate data is increasingly being stored and accessed by devices that are not fully under the control of IT administrators. Hence, the likelihood of incidents of data loss that are directly attributable to the use of improperlysecured personal devices will rise. In addition, virtual and cloud platforms are just as easy to attack, but more difficult to protect. As more companies adopt these technologies, it falls on the shoulders of IT administrators to secure their company’s critical data. So, what can Trend Micro do for these CIOs in the area of mobile security? We have recently launched an upgraded version of Trend Micro Mobile Security (TMMS) 8.0. It’s a winner of the 2012 NWA Best Endpoint and Mobile Device Security Award. It enhances the enforcement of password and encryption policies, and provides more granular remote wipe capabilities. It also introduces a mobile application management system that allows IT staffers to automatically push corporate

apps to iOS, Blackberry and Android devices. TMMS 8.0 is available as a plug-in with the Trend Micro™ OfficeScan™ solution, and easily integrates into a company’s IT management infrastructure, greatly reducing the cost and complexity of deploying a mobile security and management solution. TMMS 8.0 provides advanced functionalities like selective wipes and encryption tools. It also covers device enrollment, provisioning, policy enforcement, and inventory detail. The features included in TMMS 8.0 are suitable for both personallyowned and company-owned devices, allowing protection to be tailored for different types of users. Moving to the cloud front, our survey points out that 54 percent CIOs believe cloud security is their top challenge. What’s really bothering them? Cloud computing may appear as the biggest challenge in terms of user authentication, data protection and data breach, damage and loss. Since cloud computing is usually done beyond a client’s firewall, there’s always the fear of putting data “out there”. User authentication is still one of the key points of apprehension despite the fact that cloud providers ensure data encryption besides employing necessary safeguards to monitor access. Then there’s the perceived threat of data loss, breach or damage. This has been countered by cloud data back-ups and multiple-server storage. The fact is data in the cloud is less prone to breaches and physical damage like fires or floods. How can Trend Micro help CIOs secure their clouds? We combine a virtualization security platform with encryption and key management to

secure servers, applications, and data in the cloud. Our offering, Deep Security, protects systems and applications deployed on private, public, and hybrid clouds with anti-malware, Web reputation, integrity monitoring, intrusion detection and prevention, firewall, and log inspection modules. This is available in agent-less and agent-based options that can all be managed through a single console across physical, virtual, and cloud server deployments. It delivers comprehensive, adaptive, highly-efficient agent-less and agent-based protection. Then there’s SecureCloud, which is designed to encrypt and protect data on public, private, and hybrid clouds while also securing data stored on physical and virtual servers. Easy-to-use, policy-based key management authenticates the identity and integrity of servers requesting encryption keys, and controls when and where your secure data can be accessed. It provides data protection for public and private clouds and VMware vSphere virtual environments. CIOs can deploy SecureCloud as a hosted service or as an on-premise software application. Either way, they control the keys, thereby enjoying the freedom to encrypt data in virtual datacenters or in the cloud, and even to move data between cloud vendors. This interview is brought to you by IDG Custom Solutions Group in association with


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.