Tag Archives: Deep Security

Cloud security has reached a tipping point, but there’s still plenty to do

by Bharat Mistry

Cybersecurity has long been the number one barrier to the manifold benefits offered by cloud computing deployments. But a new report from .uk registry Nominet out this week seems to indicate that security leaders have turned a corner in terms of their perception of related risk. In fact, nearly two-thirds (61%) of UK and US CISOs said they now feel that cloud breaches are just as likely or less likely than on-premises breaches. This is great news, but it’s not the end of the story.

IT security leaders still face multiple challenges securing their cloud data, and there’s a persistent awareness issue around the shared responsibility model. This is where Trend Micro’s CLOUDSEC conference can help: offering help, advice and war stories from a range of global industry experts.

A more secure cloud
Nominet’s report offers a much-needed riposte to the doom-and-gloom cloud threat research that often dominates the news headlines. Aside from the shifting perceptions around the security of cloud deployments, there was welcome news in that the vast majority (92%) of responding organisations use cloud-based security tools, and the fact that over half (57%) expect to increase their budgets for this next year.

However, other findings remind us that securing the cloud is an ongoing challenge for many. Multi-cloud deployments are particularly vulnerable: over half (52%) of responding organisations running multiple clouds said they’d suffered a breach in the past year, versus a quarter of hybrid and single-cloud users. What’s more, 69% of these compromised multi-cloud organisations said they suffered 11-30 breaches — significantly more than those running just one cloud (19%) or hybrid-cloud businesses (13%).

Multiple clouds, often from different vendors, introduces extra complexity which in turn can create additional security gaps that hackers are only too ready and willing to take advantage of. It doesn’t help that in some organisations, different security tools are used to secure different environments. And in others, there’s still confusion over exactly how much of the cloud security model the provider is responsible for (answer: not as much as you might think).

CLOUDSEC returns
Fortunately, Trend Micro’s popular CLOUDSEC conference is back again this year to answer all your questions about cloud security. We’ve got a host of international experts including a former White House CIO, and the current cybersecurity advisor to the UN to add their perspective. Plus, there are Trend Micro’s own VP of Security Research and Director of Forward-Looking Threat Research to take a look at what’s coming down the road over the coming decade.

This year we’ve also listened to feedback by featuring more industry case studies. That’s why you’ll be able to hear from Thomson Reuters Senior Director of Security Platforms and Engineering, Frank Thomas, on Lessons Learned From My Journey To The Cloud. Also featured are Oxford University global CISO, Marko Jung, in a keynote entitled “Threat Hunting – The Journey to the Cloud”. And there’s insight from Stena AB CISO, Magnus Carling, in his presentation: From Titanic Safety to Cybersecurity.

All that, and there’ll be ample opportunity to chat to keynote speakers and peers in an informal setting during the day and well into the evening. Places are going fast so book your spot to avoid disappointment.

What: CLOUDSEC 2019
When: 13 September 2019
Where: Old Billingsgate Market, London

Five Things We Learned at VMWorld Europe

by Matt Poulton

It’s been a fantastic few days in sunny Barcelona where the Trend Micro team made the most of VMWorld Europe. It always offers a great opportunity to talk to customers, partners and prospects and this year was no different. On the event’s last day today, we reflect on some insight into what’s working, and where organisations feel there are still challenges to address.

A big thanks goes to all those hardy souls who manned the Trend Micro stand from morning till early evening, delivering over 130 demoes in eight languages on just the first day, as well as our spokespeople who spent countless hours talking to the press and presenting the Trend Micro vision to keynote attendees. Continue reading

Securing Cloud Workloads: Making DevSecOps a Reality at VMworld Europe

by Bharat Mistry

You might have noticed new official ONS figures claiming a 30% drop in cybercrime in the UK over the past year. But don’t be misled by the headline stats: the truth is that threats, especially against organisations, are on the rise. Trend Micro blocked over 20.4 billion of them in the first half of the year alone. The risks are especially pronounced during the app development lifecycle when the focus can sometimes fall too heavily on time-to-market, at the expense of security. That’s why cloud workload security is one of the top two IT budget priorities for 2019, according to a new study.

As organisations increasingly look to DevOps to drive innovation and growth, the need to seamlessly integrate security controls pre-deployment and at runtime becomes more urgent. Join us at VMworld Europe next month to find out how Trend Micro is helping global organisations manage these challenges. Continue reading

Securing the Cloud and Driving Digital Transformation with BT

Guest blog by Ian Humphreys

Increasing numbers of UK firms are looking to harness the power of Infrastructure-as-a-Service (IaaS) cloud providers and integrators to improve agility, cut hardware expenditure and take advantage of improved scalability. The same is happening all over the world. In fact, an IDC survey of over 6,000 IT organisations last year revealed that nearly two-thirds are already using or planning to use public cloud IaaS by the end of 2016. Security has always been a major barrier to such adoption plans, with many organisations unaware of just how much responsibility for this they must take in an IaaS set-up.

That’s why Trend Micro last week announced a major new partnership with BT which will see our flagship Deep Security platform offered to all BT Cloud Compute customers. It will help organisations meet their share cloud responsibilities with one of the most comprehensive security solutions around.

Pros and cons
The benefits of cloud IaaS are undeniable. It’s being seen in an increasing range of use cases including website hosting; proof-of-concept testing; adding extra capacity at peak times; batch computing and much more. But there are risks. Cybercriminals are becoming increasingly adept at exploiting any gaps organisations might leave in their cloud infrastructure to go after sensitive customer data and IP. The shared resources of a multi-tenant environment may raise fears of inter-VM attacks, for example. And unpatched systems continue to represent a major risk.

Yet many struggle because they’re running IaaS in a hybrid cloud environment, but aren’t able to consolidate their security across physical, virtual and cloud. This can create management headaches for IT and even lead to further security gaps for the black hats to exploit. Performance issues may also occur if their security hasn’t been designed with cloud infrastructure in mind.

Protecting the ecosystem
Cloud IaaS may be owned built and managed by the provider, but as a rough rule of thumb everything above the hypervisor is the responsibility of the customer. Fortunately for BT Cloud Compute customers, our award-winning Deep Security platform is now available to secure their cloud workloads.

Deep Security is one of the most comprehensive cloud security products on the market, including:

Anti-malware: protects cloud servers
Web reputation: blocks access to malicious URLs
Intrusion prevention: vulnerability shielding protects servers and apps from any known and zero-day threats
Stateful firewall: decreases attack surface by ensuring only pre-approved ports, protocols and IP addresses access VMs
File and system integrity monitoring: Helps spot covert targeted attacks by detecting suspicious changes to files, directories, registry keys etc.
Log inspection: collects OS and app logs to detect suspicious behaviour and support compliance efforts

What’s more, Deep Security runs across physical, virtual and cloud servers, minimising operational costs and ensuring all policies are centrally managed. It’s also been designed in close co-operation with some of the world’s biggest cloud providers for tight integration and high performance.

The major DDoS outage at DNS firm Dyn last year reminded us of the potential disruption to the cloud ‘ecosystem’ that can occur when a provider high up the stack is compromised. This new partnership will therefore benefit BT’s direct customers, helping them to drive digital transformation and profits while staying secure. But it will also have the knock-on effect of ensuring maximum uptime and security for any customers of theirs accessing their services via the cloud: a win-win all round.