Trend Micro launches 'industry first' cloud encryption
With Trend Micro SecureCloud, users are handed the keys to their cloud encryption.
Trend Micro has launched the public beta of a new cloud encryption product, claiming an industry first in the process.
SecureCloud provides users with sole control over the encryption keys, meaning they decide when and where these keys are deployed.
This allows for what Trend Micro has labeled "separation of duties," giving customers the ability to get the benefits of cloud computing while keeping authority over their data.
Rik Ferguson, senior security advisor at Trend Micro, told IT PRO this is the first product on the market that hands over cloud encryption to the customer in this way.
"Without control you don't have security that's a given," he said.
"We need to make sure we offer technologies to businesses that allow them to retain control of their data, because when you take on board a cloud service provider you will, by definition, outsource a lot of control. But you can't outsource accountability."
The beta is available now and the product, which supports the Amazon EC2, Eucalyptus and VMware platforms, is expected to be released generally in the fourth quarter of 2010.
Trend Micro is looking to expand the encryption offering to a wider array of cloud environments, Ferguson said.
The solution, which combines industry-standard encryption and virtual-server authentication, can be used for private, public or hybrid cloud environments.
SecureCloud can also be placed alongside other Trend Micro protection products to maintain corporate security policy in the cloud, rather than the "lowest common denominator" service providers will supply, Ferguson added.
"Enterprises want assurance that their data and applications are secure before they move critical processes into the cloud," said Steve Quane, chief product officer of Trend Micro.
"Trend Micro SecureCloud gives confidence to enterprises, who can rest assured that their data is secure and fully within their control."
Humility in AI: Building trustworthy and ethical AI systems
How humble AI can help safeguard your businessDownload now
Future of video conferencing
Optimising video conferencing features to achieve business goalsDownload now
Leadership compass: Privileged Access Management
Securing privileged accounts in a high-risk environmentDownload now
Why you need to include the cloud in your disaster recovery plan
Preserving data for business successDownload now