Posts Tagged ‘ Trend Micro ’

A Tale of Two Clouds

December 5, 2013
By
CloudComputing

Recently I have had the pleasure of discussing security with a number of cloud providers. Specifically, we talked about what security they implement and how they inform their tenants of security-related issues. In other words, do they provide transparency? I have come to an early conclusion that there are two types of clouds out there:…

Read more »

End User Computing within the Secure Hybrid Cloud

July 15, 2013
By
End User Computing within the Secure Hybrid Cloud

When we look at the secure hybrid cloud, the entry point to the hybrid cloud is the end user computing device, whether that device is a tablet, smart phone, desktop, laptop, google glass, watch, etc. We enter our hybrid cloud from this device. From there we spread out to other clouds within our control, clouds…

Read more »

Securing the Hybrid Cloud

July 10, 2013
By
Securing the Hybrid Cloud

The secure hybrid cloud encompasses a complex environment with a complex set of security requirements spanning the data center (or data closet), end user computing devices, and various cloud services. The entry point to the entire hybrid cloud is some form of End User Computing device whether that is a smart phone, tablet, laptop, or…

Read more »

Public Cloud Reality: Reinforced at CSA Summit

March 5, 2013
By
CloudComputing

I have written about the Public Cloud Reality and the need to bring your own security, monitoring, support. This was reinforced by Dave Asprey of Trend Micro at the last Cloud Security Alliance Summit held at this years RSA Conference. The gist of Dave Asprey's talk was that YOU are responsible for the security of…

Read more »

RSA Conference: What was Interesting

March 4, 2013
By
RSA Conference: What was Interesting

As I met with people at RSA Conference last week, the common question was: What was interesting and new? My view was from the world of virtualization and cloud security, which often differs from general or mobile security. This show was more about general and mobile security than it was about virtualization and cloud security…

Read more »

Virtualizing Business Critical Applications – Integrity & Confidentiality

January 14, 2013
By
VirtualizationSecurity

Recently I discussed Virtualizing Business Critical Applications and security, which includes availability, confidentiality, and integrity. However, that discussion was more about visibility into the environment for security operations. I purposely left off the discussion of gaining integrity and confidentiality of the data housed within those business critical applications.

Read more »

A Secure Cloud Framework for Non-Clouds

November 23, 2012
By
DataCenterVirtualization

Is it possible to use a Cloud Framework to better secure your datacenter? Does cloud technologies provide a secure framework for building more than just clouds? We all know that virtualization is a building block to the cloud, but there may be a way to use cloud frameworks to first secure your datacenter before you…

Read more »

Defense in Depth: Storage Security in a Hybrid Cloud

July 11, 2012
By
StorageNetworking

Storage Security is not only about Encryption, which is just one aspect of Storage Security requirements for the virtual and cloud environments. It is also about increasing defense in depth and knowledge of what is touching your storage environment. As well as providing security around those touch points and to a great extent auditing and…

Read more »

Defense in Depth: Firewalls within the Virtual Environment

June 18, 2012
By
VirtualizationSecurity

The 6/14 Virtualization Security Podcast we spoke about firewall placement within the virtual environment as well as storage based defense in depth. While we covered Encryption on the 5/31 podcast, in the 6/14 podcast we covered other measures when dealing with storage (which will be part of a followup post). This conversation was slightly different…

Read more »

Featured Solutions