Cloud Summit: Trend Micro Warns About Security Hazards
The company's Smart Protection Network represents an attempt to counter the vast computational capacity of cybercriminals and their botnets.
Cloud computing may be a tough sell among enterprise IT managers, but at least one group has bought into the hype without reservation: cybercriminals.
What's a botnet after all but pay-as-you-go, on-demand computing infrastructure?
At the Cloud Summit Executive conference on Tuesday, at the Computer History Museum in Mountain View, Calif., John Maddison, VP of core technology solutions at Trend Micro, described his company's move to cloud computing as a necessity.
The bad guys got cloud computing long ago and are using it against organizations, said Maddison.
Scanning the audience, Maddison said to the crowd of several hundred, "There are probably 10 of you here today who are part of a botnet who don't even realize it," he said.
Maddison made no apologies about fear-based marketing. "Every day is Halloween for antivirus companies, because we like to scare everyone," he said.
But that's not just self-serving posturing; there really are threats out there, they're multiplying, and they're expensive. The average data leak costs an organization $500,000, he said, adding that incidents at computers or network endpoints cost $350,000 on average.
Trend Micro, he said, processes about 50,000 malware patterns per day now. Within a few years, he expects that his company will process 50,000 patterns an hour. That would be about 25 MB of security data per day, if you had to download it.
The Trend Micro Smart Protection Network represents an attempt to counter the vast computational capacity of cybercriminals and their botnets. It aims to handle malware defense in the cloud rather than at network endpoints.
"We're betting the whole company on cloud computing," Maddison said. "It's the only way to deal with the new threat environment."
To further understand how companies large and small are approaching cloud computing, InformationWeek has published an independent report on the subject. Download the report here (registration required).
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.