June 13, 2024

‘Role Played By Trend Micro In Securing Cloud Environment and Remote Workforce’-Assad Arabi, Managing Director of Gulf and Emerging Markets at Trend Micro

Assad Arabi, MD of Gulf and Emerging Markets at TM explains roles played by Trend Micro for mitigating Cloud Environment related issues.
Assad Arabi, Managing Director of Gulf and Emerging Markets at Trend Micro: - Image Credit-Trend Micro

Spokesperson – Assad Arabi, Managing Director of Gulf and Emerging Markets at Trend Micro.

Q.  Cybersecurity threats are constantly evolving. How is Trend Micro adopting to address the latest cybersecurity threats and vulnerabilities, And can you highlight some innovative approaches the company is taking to stay ahead in the cybersecurity landscape

So, you have rightly said that the threat landscape is continuously evolving. And we do see that attackers are using creative technologies to execute successful attacks. We have a team at Trend Micro called the FTR team. The job of this team is to predict what these people might think of in the future, allowing us to stay ahead of them.

From this perspective, we’re probably among the very first vendors to have adopted artificial intelligence as part of our solution. AI is now part of every single product that we offer. We have even been among the very first to adopt generative AI as part of our solutions, which helps our customers discover and respond to attacks quickly and addresses the shortage of cybersecurity skills in the market.

We have built a comprehensive cybersecurity platform that addresses multiple layers of security, which represents our philosophy. We always recommend multi-layered security. Through this platform, we can provide protection across servers, networks, email, cloud, IoT, and OT environments, as well as 5G. We can predict, prevent, detect, and analyze attacks whenever they happen, and we can automate responses to those attacks. So, our technology really gives peace of mind to our customers and helps them reduce the frequency of attacks.

Q.  What role does Trend Micro play in ensuring the security of the cloud environment and remote workforce? And how do you envision the future of cybersecurity in a more decentralized and digitally connected world? 

The modern business landscape has evolved. Now, everyone is working from various locations, using an array of devices. Protecting these devices and the dispersed data is a significant challenge for security specialists. That’s why we adopted a zero-trust philosophy in our cybersecurity platform ahead of others. Zero-trust technology enables organizations to protect machines, data, and users, regardless of their location or setup.

In addition, we have implemented attack surface risk management. By “attack surface,” we mean every potential point vulnerable to attack—be it email, mobile devices, notebooks, data center servers, or cloud storage. Security specialists often struggle to identify all these attack points, but our technologies assist in this crucial task. We help them locate and secure these vulnerable areas.

Regarding cloud security, the cloud presents its own set of challenges, with numerous attack surfaces. We offer a comprehensive portfolio—not just a single product—to secure various cloud components. This includes workloads, networks, storage, containers, serverless applications, and even cloud configurations. A staggering 99% of attacks occur due to misconfigurations. That’s why our system continuously scans cloud setups to ensure they adhere to best practices, automatically correcting any errors.

Q. Collaboration and information sharing with the cybersecurity industry are essential to combating cyber threats effectively. How does Trend Micro engage in information sharing and cooperate with other cybersecurity organizations both in the public and private sectors to strengthen global cybersecurity efforts?

This is a very good question because sharing information is something that is in our DNA. We believe that the more information we share and the more we collaborate with other entities, the better we can prevent and stop attacks. We compete with cybercriminals; those are our competitors. So, any help that we provide, or that others provide, is very much appreciated. That’s why we continuously collaborate with various private and public entities. For example, we collaborate extensively with Interpol. We have worked with them on an operation that spanned across 30 countries to catch a group of cybersecurity criminals in Africa. Locally, we also work with the Cyber Security Council. Just three days ago, we signed a MOU (Memorandum of Understanding) with them to further our collaboration. So, we are constantly working with them and sharing information.

Q. Trend Micro has a global presence and serves a wide range of customers across different sectors. Can you provide examples of recent success stories or notable challenges you’ve encountered with implementing cybersecurity solutions for specific industries? And what is Trend Micro’s strategy for continuous growth and innovation in the cybersecurity market? Like?

Yeah, good question. One of the main challenges that customers in the UAE have faced is their desire to adopt the latest SaaS technologies. However, UAE regulations prohibit the use of applications hosted outside the country. This has been a particular issue for government and financial industries, who wish to adopt these technologies but can’t due to regulatory constraints.

Trend Micro received an exception to this rule. Our security solution, usually hosted in the US or Europe, is now hosted inside the UAE itself. We are the first cybersecurity vendor to do so. The next step is to make our entire cybersecurity platform fully resident within the UAE. This will enable all government and financial organizations to use the latest technologies while still complying with UAE rules and regulations.

Responses Received Over Mail



Illustrative Image
Key CRM Considerations and Future Trends of the Global Real Estate Market
The rise of ECN trading in UAE
The rise of ECN trading in the UAE
Integration Pitfalls Key Mistakes to Avoid When Implementing a New Healthcare Device(Illustrative Image)
Integration Pitfalls: Key Mistakes to Avoid When Implementing a New Healthcare Device
  • Tamkeen Insurance banner
  • International Assurance


Looking for abandoned cart email best practices? We discuss 7 points you should keep in mind to craft compelling emails to recover lost sales in 2024.
FAB Boosts ExCo Team With Appointment of Two Global Bank Veterans. From L To R - Simon Thorn as Group Chief Compliance Officer of FAB And Neil Barrable, Group Chief Credit Officer
Moro Hub And SAPs Integrated Alliance To Bring Business AI In UAE. The Strategic Collaboration Announced at Dubai ‘AI Retreat’ to Integrate SAP’s Business AI into Moro Hub Data Center by 2025
Bridgestone MEA Stresses On The Vitality of Innovative Fleet And Telematics At Fleet And Mobility Summit wherein industry experts shed light on vital topics linked to the industry including sustainable practices, digital transformation and the evolving landscape of urban mobility