Transcript

You know, certainly with the acceleration of digital transformation that you talked about, of course accelerated by the pandemic. We’re seeing an environment now that is obviously extended, but more complex and challenging for everyone.

You’ve got more remote users that you have to get to work. You’ve got more cloud-native applications to deploy. You’ve got an extended network that’s more extended than ever before, even including operational technical. And of course with the deployment of things like SaaS applications, IOT, cloud-native applications and services, you’ve actually got a broadened attack surface. Cybercriminals are finding unpatched OSes in applications. They’re taking advantage of risky user behavior. They’re taking advantage maybe of getting into your corporate network through your OT devices. And of course, they’re looking for vulnerabilities in open source in the cloud or just cloud misconfigurations.

Now there’s no greater transformation than what’s happened in the cloud. You know, certainly a decade ago, people started moving workloads to the cloud, certainly for the cost and scale, but it has quickly become a strategic competitive advantage for most organizations. And at the speed of DevOps, we know that the pressure, that, pace is intense and we’ve heard from you, our cloud leaders, that the most important challenge that you have is that security cannot slow you down.

You want to have security that fits into your DevOps processes that is automated and fits with your workflow. That’s easy for DevOps people so that it’s not an afterthought. And ultimately that provides you with visibility across that entire environment. And of course, if you step back and look at that bigger environment, which of course has a larger, broader attack surface and with the increase in cyber threats and the impact of those threats, the job has never been more difficult for the CISO and the security operations leader.

And you’ve told us that your number one issue and your challenge is that you need faster detection response across the enterprise. Of course, as Eva talked about, you may be dealing with tens of thousands of alerts every single day. You might have 30 or 40 security tools across layers, which are disconnected, siloed so that you can’t gain visibility across them.

And of course you’re dealing with increased compliance pressures and data privacy laws, which makes everything that much more challenging. And often when you don’t have enough cybersecurity resources on your team. We know that there’s still about 3 million jobs posted for cybersecurity professionals around the world that are just unfilled.

And of course in this new environment, users and applications are everywhere. And that’s certainly one of the key reasons that we’re hearing from you, that you are already on your journey to Zero Trust, or you want to have that Zero Trust strategy in place. So we’re going to talk a lot today about these challenges in more detail.

And we’re also going to talk about our approach with a cybersecurity platform. We do have product portfolios that deal with the areas of transformation. For example, in the data center to cloud and hybrid cloud, we have Trend Micro Cloud One™, which is our cloud security services platform, which is really enabling you to shift left securely.

We’ve got (Trend Micro) Apex One™, which is all about protecting users and applications, wherever they are. And we’ve got (Trend Micro) Network One™, which provides you that breach prevention, breach detection, and even all the way out to OT, all of your networking environments, we have the protection.

And at the heart of our cybersecurity platform is (Trend Micro) Vision One™. This is really an intelligent, powerful cyber threat defense center designed specifically for you, the CISO and security operations leaders. It provides you with that centralized, connected visibility. It provides you with prioritized alerts, cross-layer detection and response, and new risk insights that really help you on your journey to Zero Trust.

So we’ll learn more about this throughout the day. I know the Trend Micro product experts are excited to show you demos and to talk further about these cases. So if I take a step back and I say, you know, “what are the three biggest dynamics and challenges that we’re all facing?” First of all, it’s that the pace is incredible.

We all dealing with this acceleration and job number one as a security person is to enable the business to go forward. Of course, we can’t take our eyes off that ever-changing threat landscape. And of course we need to manage and balance risk and compliance across our environment as well. 



Source link

Previous articleNew study available: Modernize with AIOps to maximize your impact
Next articleFake COVID vaccine cards seized in Memphis by U.S. customs officials

LEAVE A REPLY

Please enter your comment!
Please enter your name here