Trend Micro Showcases Comprehensive Security Solution for Amazon Web Services at re:Invent 2013

Trend Micro Showcases Comprehensive Security Solution for Amazon Web Services
                              at re:Invent 2013

Innovative offering simplifies cloud security as a part of the AWS shared
security model

PR Newswire

DALLAS and LAS VEGAS, Nov. 12, 2013

DALLAS and LAS VEGAS, Nov. 12, 2013 /PRNewswire/ --At AWS re:Invent 2013,
Trend Micro Incorporated (TYO: 4704; TSE: 4704) is showcasing a comprehensive,
automated security solution for deployments on Amazon Web Services (AWS).
Including key security capabilities such as anti-malware, firewall, intrusion
prevention, encryption, and application scanning, this optimized solution
empowers organizations to address their responsibilities under the AWS shared
security model and keeps corporate applications and data safe. In addition,
its first-of-its-kind licensing model is aligned to the way organizations
purchase AWS instances, revolutionizing how security is purchased for cloud

Ranked number one^1 in cloud security, the solution is powered by the Trend
Micro™ Deep Security platform, which secures cloud instances, Web applications
and sensitive enterprise data. Unlike traditional offerings with a singular
focus on capabilities like anti-malware, the Deep Security platform is
full-featured and easily deployed based on each customer's needs. As an AWS
Advanced Technology Partner, Trend Micro is also the only security provider
leveraging the new AWS Test Drive Program, equipping customers to evaluate a
broad range of security capabilities for their deployment—in minutes and at no

"We were required to obtain PCI-DSS certification, in a short time, due to a
requirement of one of our biggest customers," said Renato Giuliana, cloud
project manager, Vayon, an insurance solutions provider. "We chose Trend
Micro™ SecureCloud™ service and Deep Security because, with these solutions,
we have been able to meet various requirements of the PCI-DSS in a modular,
fully integrated way. Other major differentiators we found were the fast
implementation of the project and the affordable cost."

AWS's shared responsibility security model establishes distinct roles to
protect deployments. While AWS is responsible for infrastructure security,
end-users are obligated to protect the operating system and beyond. Trend
Micro's solution encompasses a variety of capabilities to ensure deployments
remain secure on AWS:

Operating systems
Deployed as a service or on premise, Deep Security protects and secures
physical and virtual servers, and public and private cloud deployments. It
matches the elasticity and flexibility of AWS with the full support of leading
operating systems and is optimized for autoscaling using action-based

Web applications
Application vulnerability scanning with expert false positive removal combined
with Web reputation management provides a holistic view of application
security for any Web app.

Sophisticated encryption and key management capabilities have been optimized
for the AWS environment to seamlessly protect data across private and public
cloud deployments. Trend Micro also offers a groundbreaking approach to
protecting data in transit with unlimited SSL certificates, empowering
customers to deploy the right security without concerns over extra costs. 

Trend Micro is the only security provider that allows organizations to align
the purchase of their security solution with the way they purchase cloud
services on AWS. Organizations can purchase security in two ways: in advance,
similar to purchasing a reserved instance; or pay-as-you go, comparable to an
on-demand instance, which bills only for the security used at a fraction of
what customers pay AWS.

At re:Invent 2013, Trend Micro and customer cloud security experts will be on
hand at booth 607 for demos, and discussions about security's role in the
overall cloud strategy of global companies. Thought leaders will also speak at
multiple sessions and boot camps, including:

  o"Securing Your AWS Deployment: Expert Advice & Stories from the Trenches,"
    featuring JD Sherry, Trend Micro's VP, technology and solutions. This
    session will highlight considerations for implementing comprehensive
    security for AWS. (SEC309 Wed., Nov. 13, 1:30 p.m. - 2:30 p.m.)
  o"How to Meet Strict Security & Compliance Requirements in the Cloud"
    featuring JD Sherry, Trend Micro's VP, technology and solutions, who will
    discuss the shared security model and best practices for deployment and
    compliance. (SEC208 Wed., Nov. 13, 4:15 p.m. - 5:15 p.m.)
  oMark Nunnikhoven, Trend Micro's principal engineer of cloud & emerging
    technologies, will detail how the company leveraged AWS to develop its own
    cloud-based offering, Deep Security as a Service. (SEC307 Thurs., Nov. 14,
    11 a.m. - 12 p.m.)
  oA hands-on full day boot camp on Tues., Nov. 12, "Architecting Highly
    Secure Applications on AWS" will utilize real world scenarios and hands-on
    instruction to demonstrate how to design and operate secure applications
    within AWS.

"We are excited to be a part of the AWS ecosystem and firmly believe that
Trend Micro's cloud security offering is second to none," said Nunnikhoven.
"Our team has put together a comprehensive approach to help you meet your
security responsibilities in the AWS cloud. We've made it simple to deploy
security that fits your business needs by developing context awareness within
our products – helping you automate security by making it more reliable,
allowing you to focus on the business at hand."

Find out more at:

About Trend Micro
Trend Micro Incorporated, a global leader in security software, rated number
one in server security (IDC, 2013), strives to make the world safe for
exchanging digital information. Built on 25 years of experience, our solutions
for consumers, businesses and governments provide layered data security to
protect information on mobile devices, endpoints, gateways, servers and the
cloud. Trend Micro enables the smart protection of information, with
innovative security technology that is simple to deploy and manage, and fits
an evolving ecosystem. All of our solutions are powered by cloud-based global
threat intelligence, the Trend Micro™ Smart Protection Network™
infrastructure, and are supported by over 1,200 threat experts around the
globe. For more information, visit

^1 Experton Group - 2013 Cloud Vendor Benchmark report

SOURCE Trend Micro Incorporated

Contact: Thomas Moore,, 972-499-6648
Press spacebar to pause and continue. Press esc to stop.