Cloud-ready and Channel-first

For over 30 years, we've worked hand in hand with the channel to make the digital world a safer place. So we're delighted to receive more recognition of the value we're adding for partners and customers with the release of the latest CRN Cloud 100 list. This comes on the heels of another great recognition as Trend Micro was recently awarded the AWS Marketplace Partner of the year during AWS re:Invent 2022 in reflection of our long-standing strategic partnership. It's difficult to find an organization today that isn't ramping up its cloud migration strategy. Gartner forecasts total global spending on public cloud services to hit nearly $592bn this year, up 21% on last year. As more business-critical services are pushed out to third-party data centers, the corporate attack surface of countless organizations expands. In-house skills and know-how are struggling to keep pace with the rate of migration and the speed at which cloud providers innovate with new features. Developer teams are exposed via their insatiable use of open-source components, while account misconfigurations are commonplace. Visibility and control are harder for security teams in the cloud, thanks to dynamic and ephemeral assets like containers and virtual machines which need protecting wherever they appear. The market needs cloud vendors it can trust, to simplify the complex without compromising on security. CRN's "Coolest cloud security companies" list is designed to highlight vendors which have "Demonstrated innovation in cloud-based technology development." Well, with over 3,000 global engineers researching the latest threats, innovation is not something we're short of at Trend Micro. We were among the very first vendors to spot the promise of cloud computing and the need to secure workloads. That's why we're one of AWS's oldest technology partners and work closely with all the leading cloud platform providers today. Our focus is on streamlining and automating security as much as possible to deliver a continuous risk management and take the pressure off IT teams. With the launch of Trend Cloud One, this approach took another leap forward with platform-based security designed to help organizations gain continuous visibility into their attack surface and manage risk across it. Research shows that over two-fifths of global organizations feel their attack surface is "Spiraling out of control," with cloud cited as the biggest potential blind spot. With Trend Cloud One, customers and partners get security built for the hybrid cloud world - protecting cloud networks, workloads, containers, and endpoints, as well as delivering security for serverless architectures, file storage, and open source components, and security and compliance posture management. The CRN list also recognizes vendors for their commitment to channel partners and provides solution providers with a list of those vendors best positioned to support their cloud product and service needs. As a CRN 5-star rated vendor, we are one of the few security companies judged to have a truly world-class channel program. It's got even better in recent years after a refresh delivered new incentives and discounts and a new focus on cloud-first flexibility, profitability, and success. "Trend Micro has a top-down culture that emphasizes collaboration with customers and their partner ecosystem to deliver results. Their Cloud One platform is much more than a set of security tools. It is the guardrails we put in place that allow our customers to securely build and innovate as fast as they can go." - Kevin Mead, VP of Business Development at Kinect Consulting. "It is no surprise that Trend Micro has been recognized by CRN as a Cloud 100 company. Their Cloud One platform has been leading the pack for quite some time. Trend is open to our concept and willing to collaborate to meet our customers' needs, including developing a usage-based licensing for our joint customers, showing they are as forward-thinking and customer-centric as we are." - MJ DiBerardino, CEO, Cloudnexa. That's why Trend Micro was recently placed at the apex of the Canalys Global Cybersecurity Leadership Matrix after an outstanding year for our channel-first engagement model. 88% of revenue conducted through the channel 58% of partners selling SaaS 17% MSP partner growth, to over 8,500 partners 295% AWS CPPO growth Enrolment of 29,000+ partners in training for Trend Cloud One and Vision One. Cool vendor or not, we'll continue building on this unstoppable momentum, for all of our global partners and customers.

This Cyber News was published on www.trendmicro.com. Publication date: Tue, 07 Feb 2023 01:07:03 +0000


Cyber News related to Cloud-ready and Channel-first

Multi-Cloud vs. Hybrid Cloud: The Main Difference - The proliferation of cloud technologies is particularly confusing to businesses new to cloud adoption, and they're sometimes baffled by the distinction between multi-cloud and hybrid cloud. Although the public cloud infrastructure and public cloud ...
11 months ago Techtarget.com
What is a Cloud Architect and How Do You Become One? - A cloud architect is an IT professional who is responsible for overseeing a company's cloud computing strategy. This includes cloud adoption plans, cloud application design, and cloud management and monitoring. Cloud architects oversee application ...
8 months ago Techtarget.com
2023 Cloud Security Report - Security concerns remain a critical barrier to cloud adoption, showing little signs of improvement in the perception of cloud security professionals. Cloud adoption is further inhibited by a number of related challenges that prevent the faster and ...
11 months ago Cybersecurity-insiders.com
The 10 Best Cloud Security Certifications for IT Pros in 2024 - Many professionals seeking a career in cloud security turn to certifications to advance their learning and prove.... their knowledge to potential employers. The number of cloud security certifications has increased in recent years making it difficult ...
10 months ago Techtarget.com
Cloud Security: Stats and Strategies - An interesting aspect in O'Reilly's latest Cloud Adoption report based on a global survey conducted is that 90% of the responders are using the cloud to support their business. One of the key takeaways from the State of the Cloud report from Flexera ...
10 months ago Feeds.dzone.com
Top Cloud Security Issues: Threats, Risks, Challenges & Solutions - Cloud security issues refer to the threats, risks, and challenges in the cloud environment. To combat these cloud security issues, develop a robust cloud security strategy that addresses all three to provide comprehensive protection. Cloud security ...
5 months ago Esecurityplanet.com
What Is Cloud Security Management? Types & Strategies - Cloud security management is the process of safeguarding cloud data and operations from attacks and vulnerabilities through a set of cloud strategies, tools, and practices. The cloud security manager and the IT team are generally responsible for ...
5 months ago Esecurityplanet.com
6 Best Cloud Security Companies & Vendors in 2024 - Cloud security companies specialize in protecting cloud-based assets, data, and applications against cyberattacks. To help you choose, we've analyzed a range of cybersecurity companies offering cloud security products and threat protection services. ...
9 months ago Esecurityplanet.com
Cloud-ready and Channel-first - For over 30 years, we've worked hand in hand with the channel to make the digital world a safer place. So we're delighted to receive more recognition of the value we're adding for partners and customers with the release of the latest CRN Cloud 100 ...
1 year ago Trendmicro.com
What Is Cloud Workload Security? Ultimate Guide - Cloud workload security, or cloud workload protection, refers to the tools and policies used to protect apps, services, and resources that run on cloud infrastructure. Your organization can manage cloud workload security through coordination across ...
4 months ago Esecurityplanet.com
7 Considerations for Multi-Cluster Kubernetes - A hybrid cloud is a cloud computing environment that combines public and private clouds, allowing organizations to utilize the benefits of both. In a hybrid cloud, an organization can store and process critical data and applications in its private ...
10 months ago Feeds.dzone.com
CrowdStrike Enhances Cloud Asset Visualization to Accelerate Risk Prioritization - The massive increase in cloud adoption has driven adversaries to focus their efforts on cloud environments - a shift that led to cloud intrusions increasing by 75% in 2023, emphasizing the need for stronger cloud security. As organizations increase ...
6 months ago Crowdstrike.com
7 Keys to an Effective Hybrid Cloud Migration Strategy - Not very long ago, a hybrid cloud migration strategy amounted to a business extending its internal workloads into an environment it doesn't own. A hybrid cloud strategy was relatively simple - a combination of on-site resources and some type of cloud ...
10 months ago Techtarget.com
What is cloud load balancing? - Cloud load balancing is the process of distributing workloads across computing resources in a cloud computing environment and carefully balancing the network traffic accessing those resources. Cloud load balancing helps enterprises achieve ...
8 months ago Techtarget.com
3 benefits of going cloud native - Since the start of Microsoft Intune in 2010, we have been working on and iterating toward simplified Windows management, in part by moving infrastructure from on-premises to the cloud. As the capabilities of our customers and Intune grew, a pure ...
11 months ago Microsoft.com
Managing the Requirements of a MultiCloud System - The use of digital technology has advanced to include cloud computing in the delivery of services, cost reduction, increased agility, and improved security. The emergence of various cloud solutions has led organizations to move their assets from ...
1 year ago Blog.isc2.org
4 types of cloud security tools organizations need in 2024 - By now, organizations know which on-premises security tools they need, but when it comes to securing the cloud, they don't always understand which cloud security tools to implement. While many traditional on-premises tools and controls work in the ...
7 months ago Techtarget.com
Cloud Security: Ensuring Data Protection in the Cloud - Data Encryption: Protecting sensitive data is a top priority in cloud security. Cloud security is of utmost importance when it comes to protecting and ensuring the confidentiality of data stored and transmitted in the cloud. Data protection in the ...
9 months ago Securityzap.com
What is a cloud application? - A cloud application, or cloud app, is a software program where cloud-based and local components work together. Cloud application servers are typically located in a remote data center operated by a third-party cloud services infrastructure provider. ...
8 months ago Techtarget.com
Falcon Cloud Security Supports Google Cloud Run to Strengthen Serverless Application Security - We're thrilled to share that the CrowdStrike Falcon® sensor now fully supports Google Cloud Run, bringing advanced security capabilities to your serverless applications. While we announced this at Google Cloud Next in April 2024, this blog goes ...
4 months ago Crowdstrike.com
Comprehensive Cloud Monitoring Platforms: Ensuring - Platforms for comprehensive cloud monitoring come into play in this situation. In this article, we will explore the significance of comprehensive cloud monitoring platforms and delve into some leading solutions available in the market today. ...
11 months ago Feeds.dzone.com
Cloud Security Best Practices for Businesses - In today's digital landscape, ensuring robust cloud security is a crucial priority for businesses. The increasing reliance on cloud services to store and process sensitive data necessitates organizations to adopt best practices to safeguard their ...
10 months ago Securityzap.com
REVIEW: ISC2 CERTIFIED CLOUD SECURITY PROFESSIONAL CERTIFICATION - The Certified Cloud Security Professional is a highly respected cybersecurity certification that addresses the needs of professionals and employers for robust and adaptable cloud security expertise. As cyber threats continue to escalate, the demand ...
10 months ago Cybersecurity-insiders.com
Master Cloud Computing Risks with a Proactive, End-to-End Approach - These guiding principles have provided a foundation for Accenture's public cloud security offerings since they were introduced in 2018. With the release of the Prisma® Cloud Darwin update, Palo Alto Networks dramatically simplifies risk mitigation ...
11 months ago Paloaltonetworks.com
Middle East CISOs Fear Disruptive Cloud Breach - As organizations in the Middle East increasingly adopt cloud services, business leaders worry that their cloud-security measures are falling short. Running in the Cloud The worries arise as organizations in the Middle East accelerate their cloud ...
11 months ago Darkreading.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)