Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Three forces fuel demand for security in 2014, Trend Micro says

AvantiKumar | Feb. 14, 2014
During a recent Chinese New Year briefing in Malaysia, Trend Micro's Southeast Asia MD Goh Chee Hoh accounts for some of the factors behind the company's continued growth.

Trend Micro Goh Chee Hoh 

Photo - Goh Chee Hoh, Managing Director, SEA Region, Trend Micro Inc. is based in Malaysia.


Trend Micro expects continued positive global growth in 2014, and points to three forces that are continuing to drive the demand for security solutions, said the security software provider.

During a Chinese New Year briefing in Kuala Lumpur, Malaysia, Trend Micro managing director, SEA Region, Goh Chee Hoh, said the company has continued to grow globally throughout 2013.

Goh said that in Malaysia, despite a softening for part of last year, due to uncertainty prior to the announcement of the general elections, growth bounced back to hit 50 percent in the fourth quarter of 2013, and the company expects double digit growth of about 35 percent to continue this year.

"The first force driving demand for Trend Micro's services and products is consumerisation,." he said. "One aspect of this is BYOD (bring-you-own-device) and all of its variants."

"People are choosing their platforms and devices and IT has to try and manage this behavioural change," said Goh. "Consumerisation is also causing a problem as people use social media and onliine shopping. Malaysians are among the most social** and the amount of information put out is frightening."

***He said Trend Micro's solutions have rapidly evolved to help meet this cultural change and in Malaysia we now annually run CSR programmes such as Tell Your Story and national campaigns such as the Trend Family in association with CyberSecurity Malaysia and IMPACT." 


Trend Micro CNY Image 2 modified 

Photo -  (From left)  Law Chee Wan, Manager, Technical Sales, Trend Micro;  Goh Chee Hoh, Managing Director, SEA Region, Trend Micro; Jean Lim, Director, Channel Management & Marketing, Trend Micro; and Victor Lo, Regional Consulting Director, SEA Region, Trend Micro.

 Social engineering: Not if, but when

Goh said the second force was the continued increase in sophistication and number of attacks against organisations, internet users and included state-sponsored attacks.

"It is near impossible to guard against certain cyber threats such as APT [advanced persistent threat]," he said, citing some of the recent headlines such as the theft of 40 million data sets from retailer Target in the US, and the cost of the RSA breach recently.

"With APT, it is just a question of when not if," said Goh. "A breach is achieved through many different ways. The most difficult to stop is human error. You may go on a holiday trip to a resort in Bali, for example. On returning home, you may find an email purporting to come from the hotel management with the header that you may have left a valuable personal item behind in the hotel room. Once you open that mail, your network has been breached and certain attacks may lie dormant for a while, working in the background."

He said attack kits with specific purposes, such as to by-pass the security solutions of specific vendors, are easily available from the underground market. "During 2013, we have made moves to develop an interconnected defence especially with training, research and alliances."

"The third force is the adoption of cloud computing and virtualisation," said Goh. "For instance, virtualisation and cloud has caused companies to seek single vendors to manage cloud such as VMware, Microsoft and AWS. We have also developed faster protection with next generation server security, which includes virtual patches to avoid rebooting systems. While waiting for a solution to a security issue, 'sensors' can also block unauthorised traffic entering security 'holes.'"

"Our research arm TrendLabs, which has research centres around the world, including the Philippines in this region, are committed to come up with solutions to new viruses (and there is one every two seconds) within two hours," he added.


Sign up for Computerworld eNewsletters.