{"id":6598,"date":"2017-02-13T06:21:30","date_gmt":"2017-02-13T14:21:30","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/02\/13\/news-417\/"},"modified":"2017-02-13T06:21:30","modified_gmt":"2017-02-13T14:21:30","slug":"news-417","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/02\/13\/news-417\/","title":{"rendered":"The Server Compute Evolution Continues\u2026as does Trend Micro\u2019s Market Leadership in Server Security"},"content":{"rendered":"<p><strong>Credit to Author: Steve Neville| Date: Mon, 13 Feb 2017 13:00:42 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"225\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/blog-300x225.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/blog-300x225.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/blog-640x480.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/blog-440x330.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/blog-380x285.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/blog.jpg 651w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>IDC, a leading global market intelligence firm, believes that organizations need to have access to security that moves at the speed of business. In fact, one of IDC\u2019s leading security practice analysts had this to say about securing workloads across the hybrid cloud:<\/p>\n<blockquote>\n<p><em>\u201cMultiple techniques are essential to defend against the sophistication of today\u2019s threats. But companies need to conduct security at the speed of business, and security must support the agility and flexibility of modern architectures that include virtualization and cloud,\u201d said Duncan Brown, associate vice president, security practice for IDC. \u00a0<\/em><\/p>\n<\/blockquote>\n<p>At Trend Micro, we agree whole-heartedly. Servers are the workhorses of IT, and the compute evolution has changed the definition of what a server workload is. Recognizing this, we\u2019ve been working hard to provide security that can consistently protect servers across physical, virtual, cloud, and now <a href=\"http:\/\/newsroom.trendmicro.com\/press-release\/commercial\/trend-micro-announces-deep-security-10-protecting-servers-across-hybrid-clo\">containers<\/a>, helping thousands of organizations around the world secure millions of servers. We believe that combined with our focus on securing workloads from advanced threats, including particularly malicious forms like ransomware, that this is the reason that we have once again \u2013 7<sup>th<\/sup> year in a row\u2014 been named the market share leader by IDC.\u00a0<sup>1<br \/> <\/sup><\/p>\n<p>&nbsp;<\/p>\n<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-538435 alignleft\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/blog-1-300x297.jpg\" alt=\"\" width=\"300\" height=\"297\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/blog-1-300x297.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/blog-1-440x435.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/blog-1-380x376.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/blog-1.jpg 562w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/strong><\/p>\n<p><strong>Server Security: No Silver Bullets<\/strong><\/p>\n<p>In a market as large as server security\u2014touted by IDC to be over $760M in 2015<a href=\"#_edn1\" name=\"_ednref1\">[i]<\/a>, there are going to be many players vying for the privilege of addressing your security needs. Included in competitive discussion are vendors touting single technique solutions to server security, which is far from reality. As described by IDC, protecting workloads across the hybrid cloud (and beyond) requires multiple techniques, ranging from proven anti-malware and application control approaches, to network protection like intrusion prevention (IPS) that can shield a server from attack. Security needs to deliver a cross-generational blend of techniques that can deal with attacks, including newer varieties of threats that can only be identified with techniques like machine learning. Dealing with unknowns is a requirement, but the ability to deal with known threats at the same time is the only effective and performance-centric way to secure servers.<\/p>\n<p><strong>Fitting into the Server Compute Evolution<\/strong><\/p>\n<p>Having the right techniques is a critical part of solving the security equation. The other important element is the ability to apply security in ways that fit the environment. For example, leveraging legacy security in a virtualized environment blocks many of the benefits, dragging down performance and making management harder. Similarly, trying to apply data center techniques, like perimeter IPS, in the cloud simply don\u2019t enable organizations to gain the benefits of dynamic workload management and high performance computing.<\/p>\n<p><strong>Trend Micro: Leading the Server Security Market<\/strong><\/p>\n<p>Based on our ability to help organizations effectively deal with the server compute evolution, we have been the market share leader in server security since IDC began tracking the market in 2009. \u00a0And we\u2019ve extended that lead to now command 30% of the market today. How?\u00a0 With Trend Micro Deep Security, we\u2019ve focused on innovating along with market leaders like VMware, AWS, and Microsoft Azure to meet the security needs of our customers, enabling them to get the benefits of virtualization and cloud without compromising on security. And now with <a href=\"http:\/\/blog.trendmicro.com\/server-security-stands-test-time\/\">Deep Security 10<\/a>, we\u2019ve evolved with our customers to also include protection for Docker Containers.<\/p>\n<p>Deep Security protects virtual desktops (VDI) and servers, cloud workloads, containers, and hybrid deployments against zero-day attacks and other threats while minimizing the operational impact of security and emergency patching.\u00a0<a href=\"http:\/\/www.trendmicro.com\/hybridcloud\">Learn more<\/a> about our Hybrid Cloud Security solution and why more businesses than ever are choosing Trend Micro.<\/p>\n<p>To read IDC\u2019s latest report, and why we\u2019re number one for the seventh year in a row for corporate server security worldwide,\u00a0read the\u00a0<a href=\"https:\/\/resources.trendmicro.com\/2016-CDC-IDC-Tech-Spotlight.html\">IDC Technology Spotlight<\/a>.<\/p>\n<h5><a href=\"#_ednref1\" name=\"_edn1\"><\/a><sub>1 <\/sub>IDC Research, \u201cWorldwide Endpoint Security Market Share, 2015\u201d #US41867116, November 2016<\/h5>\n<p><a href=\"http:\/\/blog.trendmicro.com\/server-compute-evolution-continuesas-trend-micros-market-leadership-server-security\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Steve Neville| Date: Mon, 13 Feb 2017 13:00:42 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"225\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/blog-300x225.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/blog-300x225.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/blog-640x480.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/blog-440x330.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/blog-380x285.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/01\/blog.jpg 651w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>IDC, a leading global market intelligence firm, believes that organizations need to have access to security that moves at the speed of business. In fact, one of IDC\u2019s leading security practice analysts had this to say about securing workloads across the hybrid cloud: \u201cMultiple techniques are essential to defend against the sophistication of today\u2019s threats&#8230;.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[1001,11146,714],"class_list":["post-6598","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-business","tag-cloud-security","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6598","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6598"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6598\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6598"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6598"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6598"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}