Cloud services such as Amazon Web Services (AWS) are already secure, though Trend Micro would like to make them safer.
The is the security vendor’s stance with its Deep Security product, which was recently adopted by Melbourne IT for its managed AWS offering.
A/NZ strategic business and alliances director, Greg Boyle, is the first to admit AWS is a secure Cloud platform.
“It provides a secure, robust and highly available infrastructure, and adopt what they call a shared security model,” he said.
However, Boyle said the Cloud user is also responsible for securing the workloads they run on top of the already secure AWS infrastructure.
This typically includes maintaining operating system and software patches, protecting the data they load into their applications, and maintaining user access control.
Melbourne IT has adopted Deep Security for its 24x7 operation to provide additional layers of security to the Cloud environments of its customers.
Boyle cites the ability to protect virtualised and Cloud environments as the attraction of Deep Security for the Internet provider.
“It gives providers like Melbourne IT a platform to provide robust services to clients while improving performance and ROI,” he said.
Some of the features include anti-malware, firewalling, intrusion prevention, log inspection and integrity monitoring in a single agent that can be managed from a central location across multiple customer environments.
Trend Micro is one of several of AWS’ Advanced Technology Partners in place to strengthen the Cloud offering.
By relying on Trend Micro to bolster the security component, Boyle said this enables AWS users to have more protection and control than they do in their own datacentre.
“With the fast paced adoption of Cloud computing, traditional security solutions may not be able to scale,” he said.
Boyle said this notion is particularly true as “networks evolve and servers move between locations.”
Patrick Budmar covers consumer and enterprise technology breaking news for IDG Communications. Follow Patrick on Twitter at @patrick_budmar.