Louis Vuitton handbag Monogram Multicolore M40253 Trends CEO Eva Chen do a full-service security softwareEva Chen micro interviews shot SAN FRANCISCO Aug. 1 news, Trend Micro co-founder and global CEO Eva Chen (microblogging) Micro-Sina interview guest today, and users of security software on the cloud age for the profit model exchange. have played in many security software free strategy today, Eva Chen believes that free is not really free, is to use antivirus software to sell other products. And she pointed out that Trend Micro is a full service security software business model, rather than anti-virus software, free patterns to sell other products. following micro-Record interview: Question: In the majority of personal security software market in China are free, personal version of Trend Micro security product has a clear idea of the development ? Products from individual products to the enterprise will use the cloud is to provide SaaS-based marketing model? Eva Chen EvaChen: Like many other security products,Louis Vuitton handbag Monogram Multicolore M40253, products,Chanel Purse A165, people want to be the most basic and cheapest. For example, free of charge. Some people want to be a secure, more advanced services and are willing to pay. Question: In the majority of personal security software market in China are free, personal version of Trend Micro security product has been developed with a clear idea? Products from individual products to the enterprise will use the cloud is to provide SaaS-based marketing model? Eva Chen EvaChen: Trend Micro have two different business models, with different vendors that we, PC manufacturers, carriers, community websites, provide free service to consumers, but we also have to pay costs of products, providing more professional security services with the products. This aspect of our personal products in both ends of the above strategy. questions: Eva total, foggy long time, cloud computing, cloud computing, especially safe, you think how the ground in the enterprise? How to reflect the customer's Benefit? Eva Chen EvaChen: a virtual environment where security is most important to pay attention to performance ratio. Trend Micro's free agent safety, in a virtual environment that enables a computer to play to the highest performance, than the traditional security products up to three times more. So many of our customers choose products free agent. Question: You mentioned the cloud era security software profit model, whether it is from selling products to selling services change? Eva Chen EvaChen: not just from selling products to selling services, products coverage is sometimes different, such as cloud computing security, the product is designed for cloud computing platform. For example the computer center or virtualized servers. Therefore,Louis Vuitton bag Monogram Canvas M54532, cloud computing security products, but also different products, but also a profitable model. question: read the From a small security software, to the present, the growth of Trend Micro said that? Eva Chen EvaChen: road to growth is to focus, globalization. These two things, let Trend Micro share of the global information security in place. And can use different resources around the world, to get both the advantages of globalization, there are localized experience. Question: In the the proportion of investment is? Eva Chen EvaChen: Cloud Computing Security accounts for capital investment accounted for about 60% of the company for more than one foot in mind, we as security vendors, but that is a challenge, but also the largest opportunities. Question: Most of the security vendors are talking about migration to the cloud, the cloud security concerns, vendors cloud security planning in fact, there are big differences, how do you think of this trend? Compared with other vendors, Trend Micro's cloud what is safe and main idea? Eva Chen EvaChen: Cloud computing security is everyone's attention, is a very good thing, Trend Micro in this most important point of focus is the safety of cloud computing,Gucci bag Classic 170206 9643, cloud computing platform at the top to provide security,Gucci bag Classic 162895 1058, Let the cloud itself can be very safe. The first step is to virtualization security, and the second is the total cloud data security. questions: security vendors to follow suit in the Eva Chen EvaChen: so-called free, but a disguised form free, free is not necessarily true, there is no free lunch. You have seen any commercial company is really free and to survive it? questions: Eva Hello, cloud computing era, many people say the future of IT resources at all times with the same water use, I do enterprise IT management, that the future of our profession, will also like companies in the plumbing the same? That some cups. Eva Chen EvaChen: information is not the same with water. Water and electricity,Gucci Wallets 141411 8571, each person with the water and electricity are the same,Louis Vuitton handbag M95985_4906, there is no differentiation. Information, and not everyone with the same information,Gucci bag Classic 145851 9761, but the more you use the more valuable. Therefore, IT managers, the value of the future will be increasingly high, especially when information security management needs to be done when. The company is definiy the most important core positions. question: in China's complex network environment, the cloud security to adapt to these complex network environment? Cloud security is a one for all the solutions it? Eva Chen EvaChen: Cloud security is both scalable and can be customized computer environment. So this is why the functionality and performance is very strong. Question: At present, the emergence of a wave of mobile Internet, the major handset manufacturers are smart layout, Trend Micro, what to consider in this regard? Mobile Internet security than the traditional Internet, which also appear in the new security features? How to deal with Eva Chen EvaChen: cloud is a cloud with the end of security on both sides. Cloud is virtualization and data center security. The most important concept in the side, next to the so-called fire, adverse impacts, the data can be each other's isolation. Side is the mobile client or audience side. The most important concept, though-the-box information was, but be careful of pickpockets. Question: At present, the emergence of a wave of mobile Internet, the major handset manufacturers are smart layout, Trend Micro, what to consider in this regard? Mobile Internet security than the traditional Internet, which also appear in the new security features? How to deal with Eva Chen EvaChen: Because there are a lot of mobile data terminal can also easily mix with personal information, is likely to be mobile equipment information will be stolen by others. So for the present mobile terminal should be encrypted to protect the information. questions: Eva hello, we all know that Trend Micro is a professional anti-virus and content security software provider, but for this global company's internal culture, but little is known, would like to ask you, What your company is a business? What is corporate culture? Eva Chen EvaChen: Trend Micro is a global security server security with virtualization, companies with the highest market share, the company's culture is very important that glocalization (globalization), although there are five thousand employees worldwide scattered in 38 different countries, but are able to cooperate. And understand each other with respect, which is the most important within the company culture. questions: Eva Chen EvaChen questions to @: pm Well [Oh], some time ago and Duba 360 user data leaks have occurred events, their origins are also collecting the user's URL. Trend Micro also do cloud security is not also collect user information? If you collect it, what protection your company does not disclose this information to make it? [Oh] Eva Chen EvaChen: Trend Micro is not a safe way to do clouds gather information from users. The user's habits are absoluy unable to connect to the users themselves. Therefore, there is hardly any Trend Micro user-based information. Question: With the continuous development of the private cloud business, trends, what to consider in this regard? Eva Chen EvaChen: Let the private cloud safe and efficient operation. For example,Gucci Wallets 181651, the development of cloud-based agentless security products is to make the virtual environment to improve performance. Secure Cloud, a data privacy of product,Balenciaga handbag 084328, so that the private cloud to reduce the risk of information leakage. Question: Hello President Chen, antivirus and content security protection in science and technology is more mature and a very competitive industry, I do not know how to understand your innovation? Eva Chen EvaChen: antivirus and content security, although there is a long time,Gucci Wallets 181672 9791, but in a different IT infrastructure, there must be a different innovation,Louis Vuitton wallet M92987, it can really solve the problem. For example,Louis Vuitton handbag 92103_5220, in cloud computing platform, antivirus and content security practices on and within stand-alone and network era, very different. So, in it there should be many innovations do. questions: Eva Hello, IT consumption of very hot recently,Gucci bag New arrival 223952, security software and how do you think of the relationship between IT spending? The two related? Eva Chen EvaChen: have a great relationship between the two,Gucci bag New arrival 131230, because the previous management of IT in the company, they can strict management. Now, because of personal information with the company on the same appear on the mobile device, so the security software settings with the design of IT must be able to meet the consumer trend: the ability to give users enough freedom, but it can give the company adequate protection. questions: Eva Hello, IT consumption of very hot recently, security software and how do you think of the relationship between IT spending? The two related? Eva Chen EvaChen: so there must be wisdom in nature, can determine when this information is part of the company's information or personal information, and given different treatment. Question: Hi, Eva, remember that you have made or Trend Micro's cloud-computing era, the network boundaries are confused, thus, the CIO in IT security strategy and protection, the need for new thinking and positioning, can not elaborate on how it should be thinking and positioning? Thank you.
Commentaires