Cloud Summit: Trend Micro Warns About Security Hazards
The company's Smart Protection Network represents an attempt to counter the vast computational capacity of cybercriminals and their botnets.
Cloud computing may be a tough sell among enterprise IT managers, but at least one group has bought into the hype without reservation: cybercriminals.
What's a botnet after all but pay-as-you-go, on-demand computing infrastructure?
At the Cloud Summit Executive conference on Tuesday, at the Computer History Museum in Mountain View, Calif., John Maddison, VP of core technology solutions at Trend Micro, described his company's move to cloud computing as a necessity.
The bad guys got cloud computing long ago and are using it against organizations, said Maddison.
Scanning the audience, Maddison said to the crowd of several hundred, "There are probably 10 of you here today who are part of a botnet who don't even realize it," he said.
Maddison made no apologies about fear-based marketing. "Every day is Halloween for antivirus companies, because we like to scare everyone," he said.
But that's not just self-serving posturing; there really are threats out there, they're multiplying, and they're expensive. The average data leak costs an organization $500,000, he said, adding that incidents at computers or network endpoints cost $350,000 on average.
Trend Micro, he said, processes about 50,000 malware patterns per day now. Within a few years, he expects that his company will process 50,000 patterns an hour. That would be about 25 MB of security data per day, if you had to download it.
The Trend Micro Smart Protection Network represents an attempt to counter the vast computational capacity of cybercriminals and their botnets. It aims to handle malware defense in the cloud rather than at network endpoints.
"We're betting the whole company on cloud computing," Maddison said. "It's the only way to deal with the new threat environment."
To further understand how companies large and small are approaching cloud computing, InformationWeek has published an independent report on the subject. Download the report here (registration required).
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
2017 State of IT ReportIn today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.