Exclusive: Trend Micro aims for cloud top spot

By
Page 2 of 2  |  Single page

SC Magazine: Are you still involved in product development. 

Exclusive: Trend Micro aims for cloud top spot
Trend Micro's Eva Chen.

EC: Yes, that' s the technical geek inside me. 

SC Magazine: What about competitors such as Kaspersky are they competing directly with you?

EC: We are always competitive with Kaspersky in the consumer space. They are very aggressive in the consumer and retail market also with pricing and rebates. But our new initiatives, such as server and data centre security, we don't see competition for them from traditional anti-virus providers.

SC Magazine: What threats will dominate this year? 

EC: The targeted attack. Nasdaq's trading desk was recently infected. They belive it was somebody targeting them to get insider information. Stuxnet was a targeted attack against [Iran's nuclear] infrastructure. There's a need to understand a customer's environment, to match our knowledge [to their needs] and understand the patch levels, the network behaviour. You need to know the network connection and you need to know [what is] inside the content.

SC Magazine: You have an Android security product what's the mobile smartphone threat?
EC: Actually, it's not a really popular threat but we usually see an indication that if the hacker has a business model that means they're starting to write [that attack]. We're starting to see the business model. 

Previous Page 1 2 Single page
Got a news tip for our journalists? Share it with us anonymously here.
Copyright © nextmedia Pty Ltd. All rights reserved.
Tags:

Most Read Articles

India's alarm over Chinese spying rocks CCTV makers

India's alarm over Chinese spying rocks CCTV makers

Hackers abuse modified Salesforce app to steal data, extort companies

Hackers abuse modified Salesforce app to steal data, extort companies

Victoria's Secret pulls down website amid security incident

Victoria's Secret pulls down website amid security incident

Cyber companies hope to untangle weird hacker codenames

Cyber companies hope to untangle weird hacker codenames

Log In

  |  Forgot your password?