Menu
AWS is safe, but it can be safer: Trend Micro

AWS is safe, but it can be safer: Trend Micro

Security vendor uses its Deep Security product to strengthen the security of Amazon’s Cloud service

Cloud services such as Amazon Web Services (AWS) are already secure, though Trend Micro would like to make them safer.

The is the security vendor’s stance with its Deep Security product, which was recently adopted by Melbourne IT for its managed AWS offering.

A/NZ strategic business and alliances director, Greg Boyle, is the first to admit AWS is a secure Cloud platform.

“It provides a secure, robust and highly available infrastructure, and adopt what they call a shared security model,” he said.

However, Boyle said the Cloud user is also responsible for securing the workloads they run on top of the already secure AWS infrastructure.

This typically includes maintaining operating system and software patches, protecting the data they load into their applications, and maintaining user access control.

Local support

Melbourne IT has adopted Deep Security for its 24x7 operation to provide additional layers of security to the Cloud environments of its customers.

Boyle cites the ability to protect virtualised and Cloud environments as the attraction of Deep Security for the Internet provider.

“It gives providers like Melbourne IT a platform to provide robust services to clients while improving performance and ROI,” he said.

Read more: Private Cloud goes beyond commodity compute and storage: F5 Networks

Some of the features include anti-malware, firewalling, intrusion prevention, log inspection and integrity monitoring in a single agent that can be managed from a central location across multiple customer environments.

Cloud know-how

Trend Micro is one of several of AWS’ Advanced Technology Partners in place to strengthen the Cloud offering.

By relying on Trend Micro to bolster the security component, Boyle said this enables AWS users to have more protection and control than they do in their own datacentre.

“With the fast paced adoption of Cloud computing, traditional security solutions may not be able to scale,” he said.

Boyle said this notion is particularly true as “networks evolve and servers move between locations.”

Read more: MPA to distribute Good Tech's solutions in NZ

Patrick Budmar covers consumer and enterprise technology breaking news for IDG Communications. Follow Patrick on Twitter at @patrick_budmar.

Read More:

Follow Us

Join the ARN newsletter!

Error: Please check your email address.

Tags amazontrend microAWSCloudsecurity

Upcoming

Slideshows

In Pictures: Houston, we have a bug - 9 famous software glitches in space

In Pictures: Houston, we have a bug - 9 famous software glitches in space

There’s never a good time to run into software bugs, but some times are worse than others - like during a mission to space. Spacecraft of all shapes and sizes rely heavily on software to complete their objectives. But those missions can be quickly ended by the simplest of human errors when writing code. The omission of an overbar here or overflow error checking code there can mean the difference between success or failure, not to mention the loss of hundreds of millions of dollars, years of work and, on manned missions, human life. Use the arrows above to read about 9 examples that show that, despite the care with which these systems are built, bugs have occurred in spacecraft software since we started to fling rockets into space - and will, no doubt, continue to crop up.

In Pictures: Houston, we have a bug - 9 famous software glitches in space
IN PICTURES: Windows 10 Sydney launch

IN PICTURES: Windows 10 Sydney launch

Tech lovers and party-goers alike headed down to Mrs Macquarie's Chair to be part of the world-first Windows 10 Launch Party. The night featured a presentation by Microsoft Australia managing director, Pip Marlow, DJs, live demonstrations and digital artistry by Lister.

IN PICTURES: Windows 10 Sydney launch

iasset.com is a channel management ecosystem that automates all major aspects of the entire sales, marketing and service process, including data tracking, integrated learning, knowledge management and product lifecycle management.

Show Comments