Trend Micro Showcases Comprehensive Security Solution for Amazon Web Services at re:Invent 2013

Innovative offering simplifies cloud security as a part of the AWS shared security model

Nov 12, 2013, 10:22 ET from Trend Micro Incorporated

DALLAS and LAS VEGAS, Nov. 12, 2013 /PRNewswire/ -- At AWS re:Invent 2013, Trend Micro Incorporated (TYO: 4704; TSE: 4704) is showcasing a comprehensive, automated security solution for deployments on Amazon Web Services (AWS). Including key security capabilities such as anti-malware, firewall, intrusion prevention, encryption, and application scanning, this optimized solution empowers organizations to address their responsibilities under the AWS shared security model and keeps corporate applications and data safe. In addition, its first-of-its-kind licensing model is aligned to the way organizations purchase AWS instances, revolutionizing how security is purchased for cloud services.

Ranked number one1 in cloud security, the solution is powered by the Trend Micro™ Deep Security platform, which secures cloud instances, Web applications and sensitive enterprise data. Unlike traditional offerings with a singular focus on capabilities like anti-malware, the Deep Security platform is full-featured and easily deployed based on each customer's needs. As an AWS Advanced Technology Partner, Trend Micro is also the only security provider leveraging the new AWS Test Drive Program, equipping customers to evaluate a broad range of security capabilities for their deployment—in minutes and at no charge.

"We were required to obtain PCI-DSS certification, in a short time, due to a requirement of one of our biggest customers," said Renato Giuliana, cloud project manager, Vayon, an insurance solutions provider. "We chose Trend Micro™ SecureCloud™ service and Deep Security because, with these solutions, we have been able to meet various requirements of the PCI-DSS in a modular, fully integrated way. Other major differentiators we found were the fast implementation of the project and the affordable cost."

AWS's shared responsibility security model establishes distinct roles to protect deployments. While AWS is responsible for infrastructure security, end-users are obligated to protect the operating system and beyond.  Trend Micro's solution encompasses a variety of capabilities to ensure deployments remain secure on AWS:

Operating systems
Deployed as a service or on premise, Deep Security protects and secures physical and virtual servers, and public and private cloud deployments. It matches the elasticity and flexibility of AWS with the full support of leading operating systems and is optimized for autoscaling using action-based metadata.

Web applications
Application vulnerability scanning with expert false positive removal combined with Web reputation management provides a holistic view of application security for any Web app.

Sophisticated encryption and key management capabilities have been optimized for the AWS environment to seamlessly protect data across private and public cloud deployments. Trend Micro also offers a groundbreaking approach to protecting data in transit with unlimited SSL certificates, empowering customers to deploy the right security without concerns over extra costs.  

Trend Micro is the only security provider that allows organizations to align the purchase of their security solution with the way they purchase cloud services on AWS. Organizations can purchase security in two ways: in advance, similar to purchasing a reserved instance; or pay-as-you go, comparable to an on-demand instance, which bills only for the security used at a fraction of what customers pay AWS.

At re:Invent 2013, Trend Micro and customer cloud security experts will be on hand at booth 607 for demos, and discussions about security's role in the overall cloud strategy of global companies. Thought leaders will also speak at multiple sessions and boot camps, including: 

  • "Securing Your AWS Deployment: Expert Advice & Stories from the Trenches," featuring JD Sherry, Trend Micro's VP, technology and solutions. This session will highlight considerations for implementing comprehensive security for AWS. (SEC309 Wed., Nov. 13, 1:30 p.m. - 2:30 p.m.)
  • "How to Meet Strict Security & Compliance Requirements in the Cloud" featuring JD Sherry, Trend Micro's VP, technology and solutions, who will discuss the shared security model and best practices for deployment and compliance. (SEC208 Wed., Nov. 13, 4:15 p.m. - 5:15 p.m.)
  • Mark Nunnikhoven, Trend Micro's principal engineer of cloud & emerging technologies, will detail how the company leveraged AWS to develop its own cloud-based offering, Deep Security as a Service. (SEC307 Thurs., Nov. 14, 11 a.m. - 12 p.m.)
  • A hands-on full day boot camp on Tues., Nov. 12, "Architecting Highly Secure Applications on AWS" will utilize real world scenarios and hands-on instruction to demonstrate how to design and operate secure applications within AWS.

"We are excited to be a part of the AWS ecosystem and firmly believe that Trend Micro's cloud security offering is second to none," said Nunnikhoven. "Our team has put together a comprehensive approach to help you meet your security responsibilities in the AWS cloud. We've made it simple to deploy security that fits your business needs by developing context awareness within our products – helping you automate security by making it more reliable, allowing you to focus on the business at hand." 

Find out more at:

About Trend Micro
Trend Micro Incorporated, a global leader in security software, rated number one in server security (IDC, 2013), strives to make the world safe for exchanging digital information. Built on 25 years of experience, our solutions for consumers, businesses and governments provide layered data security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative security technology that is simple to deploy and manage, and fits an evolving ecosystem. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™ infrastructure, and are supported by over 1,200 threat experts around the globe.  For more information, visit

1 Experton Group - 2013 Cloud Vendor Benchmark report

SOURCE Trend Micro Incorporated