Welcome!

@CloudExpo Authors: Pat Romanski, Elizabeth White, Liz McMillan, Yeshim Deniz, Zakia Bouachraoui

News Feed Item

Trend Micro and Androider Enhance Application Developer Support System

First in the Industry to Adopt Trend Micro's Evaluation System for Application Pre-Screening

CUPERTINO, Calif., Dec. 10, 2012 /PRNewswire/ -- Japanese Android application review and information website Androider.JP, recently announced that it is working with Trend Micro, the global leader in cloud security, to integrate the company's Mobile App Reputation Solution to pre-screen applications for irregularities and security problems. This will increase the overall quality of applications available through the site helping to prevent the spread of illegitimate applications.

In the recent security report roundup for the third quarter of 2012, Trend Micro found that high-risk and malicious applications targeting users of Google's Android platform increased from nearly 30,000 in June to almost 175,000 in September. In response to this escalating number, Androider has intensified its efforts to prevent the spread of dangerous applications.

In order for an application to be released as certified and safe via the Androider website, it must pass Androider's proprietary security check which includes verification by Trend Micro. In the event a developer registers a faulty or malicious application with the service, the developer will receive feedback and have the opportunity to correct any issues before the application is released to the public.

Trend Micro's mobile application evaluation system independently collects, scans and rates more than 10,000 mobile applications in a single day.  Each application is subject to an automatic rating and analysis system. These applications are evaluated in three areas: malware and security risks, privacy risks, and system resource consumption. The information gathered by this system is used by the Android phone security software Trend Micro™ Mobile Security.

Currently, both companies are working towards a screening process aimed at evaluating not only irregularities and security faults, but also the treatment of personal information by applications, the consumption of system resources, and other related issues. Through this partnership, Androider and Trend Micro hope to eliminate a wide range of concerns for both developers and users.

"We are dedicated to providing developers and users with the safest and most secure way to create and obtain applications for their Android devices. By integrating Trend Micro's Mobile App Reputation Solution, we're taking one step further in preventing the spread of malicious applications," said Takeshi Ikeda CEO, Androider & Co.

"All mobile ecosystems and devices are increasingly at risk from threats. The fact that the Android ecosystem allows users to install apps from independent sources means that businesses who offer these download services have a duty of care to ensure their product is as risk free as possible. Androider is leading the way in providing a safe and trustworthy service to users, and we are very proud to be supporting efforts to keep mobile users safe and happy," said Eva Chen, Founder and CEO, Trend Micro.

Following the system below, only safe Android applications will be introduced to the users of Androider.

Developer background checks:

Users can see the profiles of application developers which discourages the participation of developers who intentionally produce harmful applications.

Proprietary security checks:

Androider conducts comprehensive security checks and evaluations, including testing by Trend Micro Mobile Application Reputation Service. After thorough automated security checks each application is finally vetted by a researcher.

Requirements for certification as a safe and fun Android application:

  1. Developed by a certified developer
  2. Pass Androider's proprietary security check
  3. Recommended by registered users

Once all three conditions are met, the developer will receive official authorization that the application has been certified by Androider and the application will be introduced to users via the website.

* TREND MICRO and Trend Micro Mobile Security are registered trademarks of Trend Micro Incorporated. Androider® is the registered trademark of LECRE Inc. Android is the trademark of Google, Inc. All company names, service names, and product names are the trademarks or registered trademarks of their respective companies.

About Trend Micro
Trend Micro Incorporated (TYO: 4704; TSE: 4704), the global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers.  A pioneer in server security with over 20 years' experience, we deliver top-ranked client, server and cloud-based security that fits our customers' and partners' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro™ Smart Protection Network™ global threat intelligence data mining framework, our products and services stop threats where they emerge – from the Internet. They are supported by 1,000+ threat intelligence experts around the globe. 

Additional information about Trend Micro Incorporated and the products and services are available at Trend Micro.com. This Trend Micro news release and other announcements are available at http://newsroom.trendmicro.com/  and as part of an RSS feed at www.trendmicro.com/rss.   Or follow our news on Twitter at @TrendMicro.

SOURCE Trend Micro

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

CloudEXPO Stories
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addressed the challenges of scaling document repositories to this level; architectural approaches for coordinating data; search and storage technologies, Solr, and Amazon storage and database technologies; the breadth of use cases that modern content systems need to support; how to support user applications that require subsecond response times.
A valuable conference experience generates new contacts, sales leads, potential strategic partners and potential investors; helps gather competitive intelligence and even provides inspiration for new products and services. Conference Guru works with conference organizers to pass great deals to great conferences, helping you discover new conferences and increase your return on investment.
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
With more than 30 Kubernetes solutions in the marketplace, it's tempting to think Kubernetes and the vendor ecosystem has solved the problem of operationalizing containers at scale or of automatically managing the elasticity of the underlying infrastructure that these solutions need to be truly scalable. Far from it. There are at least six major pain points that companies experience when they try to deploy and run Kubernetes in their complex environments. In this presentation, the speaker will detail these pain points and explain how cloud can address them.
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portability. In this session we'll describe best practices for "configuration as code" in a Kubernetes environment. We will demonstrate how a properly constructed containerized app can be deployed to both Amazon and Azure using the Kublr platform, and how Kubernetes objects, such as persistent volumes, ingress rules, and services, can be used to abstract from the infrastructure.