Printer Friendly

Multiple Mobile Platforms Make Mobile a Security Nightmare.

India, Feb. 28 -- Hackers are now using JVM based malware to execute a malware across multiple platforms, making the Mac platform as insecure as Windows, for example. How would such developments impact the security on Linux and Mac platforms? What are your plans to safeguard these platforms?

Couple of years back we had predicted the possible threat using JVM based malware. We have a strong product line like Security for Mac and ServerProtect for Linux to protect our customer effectively against such attacks. In addition, we had also predicted JVM based threats on Mobile devices as well and to shield the mobile devices we also have a product called Security for Smartphones.

What according to you should be the key elements of an organisation's mobile security policy? How does one manage the security on different smartphone platforms (Apple iOS, Blackberry, Android, Symbian, Windows)?

This is one of the most critical aspects of security. Today's smartphones ensure high productivity and come with their own inherent risks. The phones today allow almost similar levels of applications and access as that of PCs. That is the reason they need something similar to PCs to protect them against malware. Moreover, the varied nature of mobile devices and mobile Operating Systems make it a Security Administrator's nightmare to manage it. A solution that comes with antimalware, Intrusion Prevention, Web Protection modules having the capability to encrypt data is the ideal one. Trend Micro Mobile Security not only offers all these features, but also works on different platforms like Windows, Symbian and Android. To make it easy for the administrators, the solution helps to manage all the different platforms centrally using a console that integrates into our Flagship OfficeScan console. In the near future, we are planning to launch a similar security solution for Blackberries as well.

What according to Trend Micro will be the key security trends in 2011?

Our focus this year will evolve from being focused on physical infrastructure to virtual infrastructure and more importantly data. Traditional security mechanisms will no longer be successful in handling the new challenges that come with Virtualization and cloud. The recent Tolly Group report confirms the same. Tolly group tested the traditional security products on Virtual Platforms and the report's conclusion confirms that traditional security is a major factor that prevents desired density of Virtual Machines. Since the last two years, Trend Micro has been working very closely with VMware and has developed security solutions that not only enable high densities of Virtual Machines, but also protects the Hypervisor layer of virtualization. Secondly, with the cloud being embraced like never before, the focus is shifting from protection of infrastructure to protection of data. A customer using a cloud application today has no control over the security of his data except for relying on his service provider. The service providers need to take steps and deploy products like Trend Micro Secure Cloud that helps the customers control the security and encryption of their data in a seamless manner.

How does Trend Micro plan to fight against malware such as Zeus that prevent any sort of detection from almost every anti-virus software?

To prevent detection, Malware either deactivates the security solution or uses stealth technologies. Trend Micro security solutions help in preventing deactivation by protecting critical system areas like the registry and system files. In addition, our 'Smart Protection Network' allows reacting more quickly to the new and evolving threats and allows our customers to use the latest updates without actually downloading them completely on the end points. It is because of our technology prowess, we have successfully protected our clients from dangerous Malware like Zeus or stealth viruses like Stuxnet.

What would be the key focus areas for Trend Micro in the enterprise security space for 2011?

In 2011, virtualization and cloud data security are our key focus areas. We already have virtualization solution for VMware that works in a completely agentless manner. In addition to that we have also rolled out agent based 'virtualization-aware' security solution for Microsoft and Citrix virtualization platforms. Going forward we will have some exciting new developments in this space as well.

As far as our Cloud Data security solution is concerned, it currently works with VMware offerings. We are planning to have similar solutions for other cloud platforms as well. Our Data Leak Prevention solution, which is already quite popular, will also have some interesting features like detection of data stealing malware and prevention of data leaks. In fact, in this year's RSA Conference, we showcased the pre-release of the solution, which generated lot of interests amongst the visitors.

For any query with respect to this article or any other content requirement, please contact Editor at htsyndication@hindustantimes.com

Copyright HT Media Ltd.

Provided by Syndigate.info an Albawaba.com company
COPYRIGHT 2011 SyndiGate Media Inc.
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2011 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Publication:The CTO Forum
Date:Feb 28, 2011
Words:799
Previous Article:Do innovations die with people?
Next Article:Internet Security for Netbooks for Indian Market.
Topics:

Terms of use | Privacy policy | Copyright © 2019 Farlex, Inc. | Feedback | For webmasters