Trend Micro launches 'industry first' cloud encryption

With Trend Micro SecureCloud, users are handed the keys to their cloud encryption.

Cloud

Trend Micro has launched the public beta of a new cloud encryption product, claiming an industry first in the process.

SecureCloud provides users with sole control over the encryption keys, meaning they decide when and where these keys are deployed.

This allows for what Trend Micro has labeled "separation of duties," giving customers the ability to get the benefits of cloud computing while keeping authority over their data.

Rik Ferguson, senior security advisor at Trend Micro, told IT PRO this is the first product on the market that hands over cloud encryption to the customer in this way.

"Without control you don't have security that's a given," he said.

"We need to make sure we offer technologies to businesses that allow them to retain control of their data, because when you take on board a cloud service provider you will, by definition, outsource a lot of control. But you can't outsource accountability."

The beta is available now and the product, which supports the Amazon EC2, Eucalyptus and VMware platforms, is expected to be released generally in the fourth quarter of 2010.

Trend Micro is looking to expand the encryption offering to a wider array of cloud environments, Ferguson said.

The solution, which combines industry-standard encryption and virtual-server authentication, can be used for private, public or hybrid cloud environments.

SecureCloud can also be placed alongside other Trend Micro protection products to maintain corporate security policy in the cloud, rather than the "lowest common denominator" service providers will supply, Ferguson added.

"Enterprises want assurance that their data and applications are secure before they move critical processes into the cloud," said Steve Quane, chief product officer of Trend Micro.

"Trend Micro SecureCloud gives confidence to enterprises, who can rest assured that their data is secure and fully within their control."

Featured Resources

Humility in AI: Building trustworthy and ethical AI systems

How humble AI can help safeguard your business

Download now

Future of video conferencing

Optimising video conferencing features to achieve business goals

Download now

Leadership compass: Privileged Access Management

Securing privileged accounts in a high-risk environment

Download now

Why you need to include the cloud in your disaster recovery plan

Preserving data for business success

Download now

Recommended

IBM: Hackers are targeting COVID-19 vaccine 'cold chain'
Security

IBM: Hackers are targeting COVID-19 vaccine 'cold chain'

3 Dec 2020
GitHub: Open source vulnerabilities can go undetected for four years
Security

GitHub: Open source vulnerabilities can go undetected for four years

3 Dec 2020
What is shoulder surfing?
Security

What is shoulder surfing?

2 Dec 2020
Security benefits of open virtualised RAN
Whitepaper

Security benefits of open virtualised RAN

2 Dec 2020

Most Popular

Samsung Galaxy Note might be discontinued in 2021
Mobile Phones

Samsung Galaxy Note might be discontinued in 2021

1 Dec 2020
Microsoft Teams no longer works on Internet Explorer
Microsoft Office

Microsoft Teams no longer works on Internet Explorer

30 Nov 2020
Sopra Steria cyber attack costs to hit €50 million
Security

Sopra Steria cyber attack costs to hit €50 million

26 Nov 2020