Riding High as the Number One Global Server Security Vendor

by Raimund Genes

Once considered something of an afterthought for CISOs, server security is finally getting the attention it deserves. Driven by cloud, virtual, social and mobile trends, these workhorses of the datacentre must be protected at all costs, without degrading performance. But that’s not always easy given the complexity of modern day computing environments. Years ago Trend Micro anticipated these burgeoning IT trends and developed Deep Security – our flagship datacentre product which now protects millions of servers for thousands of global customers.

So it’s fantastic to hear that analyst IDC has just reaffirmed our leadership in this market. For the sixth year in a row, we’re in top spot for server security globally. In fact, we’ve even increased our revenue share to over 30%.

IT at a crossroads
There’s no doubt that the future of IT lies with virtualisation and cloud computing. But as IDC notes in a new Technology Spotlight reportServer Security: Virtualization and Cloud Changes Everything – most organisations will be running hybrid environments in the foreseeable future. This can leave security gaps cybercriminals have become adept at exploiting.

“Instant-On” gaps, for example, take advantage of the fact that existing VMs can come back online after lying dormant, without suitable protection – as can new VMs with no security yet installed. Inter-VM attacks are another constant threat – made even more pronounced if your VMs are co-located with those of different trust levels. Both can be exploited in targeted attacks designed to fly under the radar of traditional signature based defences.

Aside from the security threat to these hybrid infrastructures, IT buyers also need to think about the hit to operational performance. Fail to install “virtual-ready” security tools designed specifically for those environments and simple tasks like running a scan or update could cause so-called security “storms”, bringing systems to a crashing halt.

The Deep Security difference
So CISOs are finally beginning to take server security seriously, and not a moment too soon given the level of threats out there. According to IDC, the market was worth $800m in 2014 and will hit a staggering $1bn in three years’ time. But with so many products and vendors out there it can be challenging for IT buyers to wade through the FUD and marketing hype to find the most effective products.

That’s why we’re thrilled with IDC’s recognition of our leadership position. Our revenue share stands at 30.3% today – more than 10% higher than the nearest rival.

Here are just some of the reasons why more and more global businesses are choosing Deep Security:

  • Agentless architecture option (VMware environments) means low resource consumption. Resource intensive tasks are handed off to a virtual security appliance
  • In cloud and non-VMware environments, Deep Security is deployed agent-based but with just one lightweight, multi-function agent to minimise resource consumption. This saves costs and improves IT efficiency
  • Advanced anti-malware and web reputation to protect against sophisticated malware-borne threats
  • File and system integrity monitoring and log inspection to help spot targeted attack compromises and improve compliance
  • IDS/IPS ensures virtual patching, shielding any vulnerabilities from attackers
  • Virtual-ready: monitors and shuts down inter-VM attacks; protects each VM in a secure shell to prevent “instant-on” gaps
  • Automated server scanning ensures policies are applied based on context
  • Tight integration with CSPs – eg Amazon EC2, Microsoft Azure, VMware vCloud Air – for improved efficiency
  • Offered as-a-service and on AWS and Azure Marketplaces for greater purchasing and deployment flexibility
  • Single management console for cloud, hybrid and on-premise workloads. High degree of automation for security tasks, which boosts efficiency and reduces management burden
  • Backed by Smart Protection Network, delivering data and protection rules from 150 million endpoints, and our team of 1,200+ global threat researchers


Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.