Cloud Summit: Trend Micro Warns About Security Hazards - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IT Leadership // IT Strategy
07:20 PM
Connect Directly

Cloud Summit: Trend Micro Warns About Security Hazards

The company's Smart Protection Network represents an attempt to counter the vast computational capacity of cybercriminals and their botnets.

Cloud computing may be a tough sell among enterprise IT managers, but at least one group has bought into the hype without reservation: cybercriminals.

What's a botnet after all but pay-as-you-go, on-demand computing infrastructure?

At the Cloud Summit Executive conference on Tuesday, at the Computer History Museum in Mountain View, Calif., John Maddison, VP of core technology solutions at Trend Micro, described his company's move to cloud computing as a necessity.

The bad guys got cloud computing long ago and are using it against organizations, said Maddison.

Scanning the audience, Maddison said to the crowd of several hundred, "There are probably 10 of you here today who are part of a botnet who don't even realize it," he said.

Maddison made no apologies about fear-based marketing. "Every day is Halloween for antivirus companies, because we like to scare everyone," he said.

But that's not just self-serving posturing; there really are threats out there, they're multiplying, and they're expensive. The average data leak costs an organization $500,000, he said, adding that incidents at computers or network endpoints cost $350,000 on average.

Trend Micro, he said, processes about 50,000 malware patterns per day now. Within a few years, he expects that his company will process 50,000 patterns an hour. That would be about 25 MB of security data per day, if you had to download it.

The Trend Micro Smart Protection Network represents an attempt to counter the vast computational capacity of cybercriminals and their botnets. It aims to handle malware defense in the cloud rather than at network endpoints.

"We're betting the whole company on cloud computing," Maddison said. "It's the only way to deal with the new threat environment."

To further understand how companies large and small are approaching cloud computing, InformationWeek has published an independent report on the subject. Download the report here (registration required).

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
InformationWeek Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the InformationWeek site in the coming months.

Becoming a Self-Taught Cybersecurity Pro
Jessica Davis, Senior Editor, Enterprise Apps,  6/9/2021
Ancestry's DevOps Strategy to Control Its CI/CD Pipeline
Joao-Pierre S. Ruth, Senior Writer,  6/4/2021
IT Leadership: 10 Ways to Unleash Enterprise Innovation
Lisa Morgan, Freelance Writer,  6/8/2021
White Papers
Register for InformationWeek Newsletters
Current Issue
Planning Your Digital Transformation Roadmap
Download this report to learn about the latest technologies and best practices or ensuring a successful transition from outdated business transformation tactics.
Flash Poll