Trend Micro launches 'industry first' cloud encryption

With Trend Micro SecureCloud, users are handed the keys to their cloud encryption.

Cloud

Trend Micro has launched the public beta of a new cloud encryption product, claiming an industry first in the process.

SecureCloud provides users with sole control over the encryption keys, meaning they decide when and where these keys are deployed.

This allows for what Trend Micro has labeled "separation of duties," giving customers the ability to get the benefits of cloud computing while keeping authority over their data.

Rik Ferguson, senior security advisor at Trend Micro, told IT PRO this is the first product on the market that hands over cloud encryption to the customer in this way.

"Without control you don't have security that's a given," he said.

"We need to make sure we offer technologies to businesses that allow them to retain control of their data, because when you take on board a cloud service provider you will, by definition, outsource a lot of control. But you can't outsource accountability."

The beta is available now and the product, which supports the Amazon EC2, Eucalyptus and VMware platforms, is expected to be released generally in the fourth quarter of 2010.

Trend Micro is looking to expand the encryption offering to a wider array of cloud environments, Ferguson said.

The solution, which combines industry-standard encryption and virtual-server authentication, can be used for private, public or hybrid cloud environments.

SecureCloud can also be placed alongside other Trend Micro protection products to maintain corporate security policy in the cloud, rather than the "lowest common denominator" service providers will supply, Ferguson added.

"Enterprises want assurance that their data and applications are secure before they move critical processes into the cloud," said Steve Quane, chief product officer of Trend Micro.

"Trend Micro SecureCloud gives confidence to enterprises, who can rest assured that their data is secure and fully within their control."

Featured Resources

2021 Thales cloud security study

The challenges of cloud data protection and access management in a hybrid and multi cloud world

Free download

IDC agility assessment

The competitive advantage in adaptability

Free Download

Digital transformation insights from CIOs for CIOs

Transformation pilotes, co-pilots, and engineers

Free download

What ITDMs did next - and what they should be doing now

Enable continued collaboration and communication for hybrid workers

Recommended

Access brokers are making it easier for ransomware operators to attack businesses
cyber security

Access brokers are making it easier for ransomware operators to attack businesses

1 Dec 2021
What is a botnet?
botnets

What is a botnet?

14 Jul 2021
Trend Micro home network security flaws could let hackers take over PCs
Security

Trend Micro home network security flaws could let hackers take over PCs

26 May 2021
The secure cloud configuration imperative
Whitepaper

The secure cloud configuration imperative

26 May 2021

Most Popular

What should you really be asking about your remote access software?
Sponsored

What should you really be asking about your remote access software?

17 Nov 2021
How to move Microsoft's Windows 11 from a hard drive to an SSD
Microsoft Windows

How to move Microsoft's Windows 11 from a hard drive to an SSD

24 Nov 2021
Nike to take customers into the metaverse with 'NIKELAND'
virtualisation

Nike to take customers into the metaverse with 'NIKELAND'

19 Nov 2021