SlideShare a Scribd company logo
1 of 2
Download to read offline
We investigated a number of vendors and products. Trend Mi-
cro’s Deep Security stood out because it was host-based instead
of guest-based, so the integration with VMware was simple.
Gavin Gustling, IT Manager, Grenda Transit
Australian Transit Company Secures Merged IT Environments
Trend Micro™ Deep Security Provides Cloud-based Protection for Grenda Transit
Overview
Grenda Transit is a 67-year-old family business that provides transportation services for
Melbourne’s general public. In 2011, Grenda was purchased by the Ventura Group, which
also operated public transportation services in Melbourne. With more than 1500 employees
servicing 60% of Melbourne’s public transport market, Grenda Transit delivers 8.6 million
passengers to their destinations yearly with a fleet of 650 vehicles and buses. Today, Grenda
operates buses and transit systems that focus on passenger safety, cutting-edge technology,
and exceptional customer service.
Challenges
With the 2011 merger of Grenda Transit and the Ventura Group, IT security concerns surfaced
as the companies began combining their IT resources. With two different IT systems, Grenda
Transit needed a security solution that was compatible with both Citrix XenServer and
VMware vSphere Hypervisor technology. To secure their entire IT environment, Grenda
Transit needed flexible, lightweight, and robust anti-malware protection that could be easily
managed from a single console.
SUMMARY
Company: Grenda Transit
Region: Victoria, Australia
Sector: Transportation
Trend Solution: Deep Security
Trend Micro Customer Success Story, page 1 of 2 | Australian Transit Company Secures Merged IT Environments
Whether it’s to do with maintenance or bus dispatch, we cannot
afford to have downtime due to security issues. Now we no
longer have to worry about it thanks to Deep Security.
Gavin Gusling, IT Manager, Grenda Transit
Customer Success Story, Continued:
Australian Transit Company Secures Merged IT Environments
Solutions
After reviewing several competing solutions, Grenda chose Trend Micro Deep Security. Deep
Security offers comprehensive, adaptive protection for Grenda’s physical, virtual, and cloud
IT environments. Deep Security combines anti-malware, intrusion detection and prevention,
web application protection, integrity monitoring, and log inspection that is compatible with
VMware and Citrix systems—and does not hinder the company’s IT performance. Deep Security
also enables real-time updates and feedback loops that prevent future threats—maintaining
Grenda’s data integrity.
Results
Today, Deep Security protects Grenda Transit and the Ventura Group IT environments from
malware and other threats. With agentless security, servers are protected as soon as they are
switched on, providing a cost-effective solution with clear efficiency gains. By securing Grenda’s
VMware and Citrix environments with a single architecture to manage both physical and virtual
servers, Deep Security reduces management requirements by up to 75%. The Trend Micro™
Smart Protection Network™ infrastructure stops threats before they reach the IT environment
and provides a private cloud infrastructure without affecting performance. Deep Security also
enables the provision of revenue-generating cloud services for the company.
SOLUTION BENEFITS
Deep Security
•	Accelerates virtualization and cloud ROI
•	Prevents data breaches and business
disruptions
•	Maximizes operational cost reductions
•	Achieves cost-effective compliance
Trend Micro Customer Success Story, page 2 of 2 | Australian Transit Company Secures Merged IT Environments
©2013 by Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo and Smart Protection Network are trademarks or registered trademarks of Trend Micro Incorporated.
All other company and/or product names may be trademarks or registered trademarks of their owners. Information contained in this document is subject to change without notice.

More Related Content

What's hot

Cloud Backup Overview
Cloud Backup OverviewCloud Backup Overview
Cloud Backup Overviewddaragh
 
Challenges of Cloud Computing
Challenges of Cloud ComputingChallenges of Cloud Computing
Challenges of Cloud Computinglavanyamohan45
 
Security as a Service Model for Cloud Environment
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud EnvironmentKaashivInfoTech Company
 
IT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business ProblemsIT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business ProblemsBrooke Bordelon
 
Cloud makelaar Cloud trends - the impact of cloud
Cloud makelaar   Cloud trends - the impact of cloudCloud makelaar   Cloud trends - the impact of cloud
Cloud makelaar Cloud trends - the impact of cloudPeter Witsenburg
 
Space efficient verifiable secret sharing using polynomial interpolation
Space efficient verifiable secret sharing using polynomial interpolationSpace efficient verifiable secret sharing using polynomial interpolation
Space efficient verifiable secret sharing using polynomial interpolationLeMeniz Infotech
 
The Private Cloud - What Is It and Why Use It?
The Private Cloud - What Is It and Why Use It?The Private Cloud - What Is It and Why Use It?
The Private Cloud - What Is It and Why Use It?Chant Vartanian
 
Latest 2018 innovations in cloud computing
Latest 2018 innovations in cloud computingLatest 2018 innovations in cloud computing
Latest 2018 innovations in cloud computingPivIT Global
 
Serverless Security Workflows - cyber talks - 19th nov 2019
Serverless  Security Workflows - cyber talks - 19th nov 2019Serverless  Security Workflows - cyber talks - 19th nov 2019
Serverless Security Workflows - cyber talks - 19th nov 2019Dinis Cruz
 
Hybrid Cloud - A Brief Intro
Hybrid Cloud - A Brief IntroHybrid Cloud - A Brief Intro
Hybrid Cloud - A Brief IntroTyrone Systems
 
Cloud security training, certified cloud security professional
Cloud security training, certified cloud security professionalCloud security training, certified cloud security professional
Cloud security training, certified cloud security professionalBryan Len
 
Cloud Computing Trends 2019
Cloud Computing Trends 2019Cloud Computing Trends 2019
Cloud Computing Trends 2019Intelebee
 
SaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsSaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsKannan Subbiah
 
Cloud security ely kahn
Cloud security   ely kahnCloud security   ely kahn
Cloud security ely kahnEly Kahn
 
Brink sanders cisco architecture keynote
Brink sanders   cisco architecture keynoteBrink sanders   cisco architecture keynote
Brink sanders cisco architecture keynoteNur Shiqim Chok
 
5 IT Predictions for Digital Business in 2019
5 IT Predictions for Digital Business in 20195 IT Predictions for Digital Business in 2019
5 IT Predictions for Digital Business in 2019Equinix
 

What's hot (20)

Cloud Backup Overview
Cloud Backup OverviewCloud Backup Overview
Cloud Backup Overview
 
Challenges of Cloud Computing
Challenges of Cloud ComputingChallenges of Cloud Computing
Challenges of Cloud Computing
 
Security as a Service Model for Cloud Environment
Security as   a Service Model   for   Cloud   EnvironmentSecurity as   a Service Model   for   Cloud   Environment
Security as a Service Model for Cloud Environment
 
Cloud computing for SMBs
Cloud computing for SMBsCloud computing for SMBs
Cloud computing for SMBs
 
Cloud servers
Cloud serversCloud servers
Cloud servers
 
IT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business ProblemsIT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business Problems
 
Cloud makelaar Cloud trends - the impact of cloud
Cloud makelaar   Cloud trends - the impact of cloudCloud makelaar   Cloud trends - the impact of cloud
Cloud makelaar Cloud trends - the impact of cloud
 
Cloud security
Cloud securityCloud security
Cloud security
 
Space efficient verifiable secret sharing using polynomial interpolation
Space efficient verifiable secret sharing using polynomial interpolationSpace efficient verifiable secret sharing using polynomial interpolation
Space efficient verifiable secret sharing using polynomial interpolation
 
CloudWALL Profile ENG
CloudWALL Profile ENGCloudWALL Profile ENG
CloudWALL Profile ENG
 
The Private Cloud - What Is It and Why Use It?
The Private Cloud - What Is It and Why Use It?The Private Cloud - What Is It and Why Use It?
The Private Cloud - What Is It and Why Use It?
 
Latest 2018 innovations in cloud computing
Latest 2018 innovations in cloud computingLatest 2018 innovations in cloud computing
Latest 2018 innovations in cloud computing
 
Serverless Security Workflows - cyber talks - 19th nov 2019
Serverless  Security Workflows - cyber talks - 19th nov 2019Serverless  Security Workflows - cyber talks - 19th nov 2019
Serverless Security Workflows - cyber talks - 19th nov 2019
 
Hybrid Cloud - A Brief Intro
Hybrid Cloud - A Brief IntroHybrid Cloud - A Brief Intro
Hybrid Cloud - A Brief Intro
 
Cloud security training, certified cloud security professional
Cloud security training, certified cloud security professionalCloud security training, certified cloud security professional
Cloud security training, certified cloud security professional
 
Cloud Computing Trends 2019
Cloud Computing Trends 2019Cloud Computing Trends 2019
Cloud Computing Trends 2019
 
SaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsSaaS Challenges & Security Concerns
SaaS Challenges & Security Concerns
 
Cloud security ely kahn
Cloud security   ely kahnCloud security   ely kahn
Cloud security ely kahn
 
Brink sanders cisco architecture keynote
Brink sanders   cisco architecture keynoteBrink sanders   cisco architecture keynote
Brink sanders cisco architecture keynote
 
5 IT Predictions for Digital Business in 2019
5 IT Predictions for Digital Business in 20195 IT Predictions for Digital Business in 2019
5 IT Predictions for Digital Business in 2019
 

Viewers also liked

Hilda Tabar-Cleofe - CNDR’s disaster monitoring, coordination and response sy...
Hilda Tabar-Cleofe - CNDR’s disaster monitoring, coordination and response sy...Hilda Tabar-Cleofe - CNDR’s disaster monitoring, coordination and response sy...
Hilda Tabar-Cleofe - CNDR’s disaster monitoring, coordination and response sy...MSCitizenshipAPAC
 
Appointment alarm system
Appointment alarm  systemAppointment alarm  system
Appointment alarm systemVarad Krish
 
Oracle Cloud Transformation_ABE Slides_FINAL
Oracle Cloud Transformation_ABE Slides_FINALOracle Cloud Transformation_ABE Slides_FINAL
Oracle Cloud Transformation_ABE Slides_FINALAhmed Sayed
 
CMPE2960ElisaHimaCapstonePresentation
CMPE2960ElisaHimaCapstonePresentationCMPE2960ElisaHimaCapstonePresentation
CMPE2960ElisaHimaCapstonePresentationHima Panchal
 
Exponential edtechs and makerspaces at schools
Exponential edtechs and makerspaces at schoolsExponential edtechs and makerspaces at schools
Exponential edtechs and makerspaces at schoolsDavid Vidal
 
PowerLogistics Asia 2013- "The Future of Project Cargo Movement by Air" - Mic...
PowerLogistics Asia 2013- "The Future of Project Cargo Movement by Air" - Mic...PowerLogistics Asia 2013- "The Future of Project Cargo Movement by Air" - Mic...
PowerLogistics Asia 2013- "The Future of Project Cargo Movement by Air" - Mic...PowerLift Events
 
Sap erp logistics materials management
Sap erp   logistics materials managementSap erp   logistics materials management
Sap erp logistics materials managementVincenzo Sacco
 

Viewers also liked (13)

Pmr 2013
Pmr  2013Pmr  2013
Pmr 2013
 
Hilda Tabar-Cleofe - CNDR’s disaster monitoring, coordination and response sy...
Hilda Tabar-Cleofe - CNDR’s disaster monitoring, coordination and response sy...Hilda Tabar-Cleofe - CNDR’s disaster monitoring, coordination and response sy...
Hilda Tabar-Cleofe - CNDR’s disaster monitoring, coordination and response sy...
 
Appointment alarm system
Appointment alarm  systemAppointment alarm  system
Appointment alarm system
 
Oracle Cloud Transformation_ABE Slides_FINAL
Oracle Cloud Transformation_ABE Slides_FINALOracle Cloud Transformation_ABE Slides_FINAL
Oracle Cloud Transformation_ABE Slides_FINAL
 
Management vs Leadership
Management vs LeadershipManagement vs Leadership
Management vs Leadership
 
Fear appeal
Fear appealFear appeal
Fear appeal
 
CMPE2960ElisaHimaCapstonePresentation
CMPE2960ElisaHimaCapstonePresentationCMPE2960ElisaHimaCapstonePresentation
CMPE2960ElisaHimaCapstonePresentation
 
First Coast Final
First Coast FinalFirst Coast Final
First Coast Final
 
Exponential edtechs and makerspaces at schools
Exponential edtechs and makerspaces at schoolsExponential edtechs and makerspaces at schools
Exponential edtechs and makerspaces at schools
 
Oracle Management Cloud
Oracle Management Cloud Oracle Management Cloud
Oracle Management Cloud
 
PowerLogistics Asia 2013- "The Future of Project Cargo Movement by Air" - Mic...
PowerLogistics Asia 2013- "The Future of Project Cargo Movement by Air" - Mic...PowerLogistics Asia 2013- "The Future of Project Cargo Movement by Air" - Mic...
PowerLogistics Asia 2013- "The Future of Project Cargo Movement by Air" - Mic...
 
Rumusan SPM
Rumusan SPMRumusan SPM
Rumusan SPM
 
Sap erp logistics materials management
Sap erp   logistics materials managementSap erp   logistics materials management
Sap erp logistics materials management
 

Similar to Trend_Micro_Collateral_Australian_Transit

Unlocking the Power of Cloud-Based Insurance Software
Unlocking the Power of Cloud-Based Insurance SoftwareUnlocking the Power of Cloud-Based Insurance Software
Unlocking the Power of Cloud-Based Insurance SoftwareInsurance Tech Services
 
Why Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business WorldWhy Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business WorldCiente
 
TrendMicro DeepSecurity CASE - Testimonal
TrendMicro DeepSecurity CASE - TestimonalTrendMicro DeepSecurity CASE - Testimonal
TrendMicro DeepSecurity CASE - TestimonalEduardo Alves
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security Cristian Garcia G.
 
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Khiro Mishra
 
dinCloud q2 pr highlights
dinCloud q2 pr highlightsdinCloud q2 pr highlights
dinCloud q2 pr highlightsdinCloud Inc.
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microTheInevitableCloud
 
Citrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature BriefCitrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature BriefNuno Alves
 
Advanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – NetmagicAdvanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – NetmagicNetmagic Solutions Pvt. Ltd.
 
GDMS Presentation CFA Laos
GDMS Presentation CFA LaosGDMS Presentation CFA Laos
GDMS Presentation CFA LaosMathieu71
 
Windstream Managed Network Security Ebook
Windstream Managed Network Security EbookWindstream Managed Network Security Ebook
Windstream Managed Network Security EbookIdeba
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeSysfore Technologies
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mwaresolarisyourep
 
Benefits Of Cloud Computing.pdf
Benefits Of Cloud Computing.pdfBenefits Of Cloud Computing.pdf
Benefits Of Cloud Computing.pdfPriyaMaurya52
 
Top 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptxTop 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptxSonaliG6
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceTrend Micro
 
Cloud Service Brief - dinCloud Hosted Virtual Desktop
Cloud Service Brief - dinCloud Hosted Virtual DesktopCloud Service Brief - dinCloud Hosted Virtual Desktop
Cloud Service Brief - dinCloud Hosted Virtual DesktopdinCloud Inc.
 

Similar to Trend_Micro_Collateral_Australian_Transit (20)

Unlocking the Power of Cloud-Based Insurance Software
Unlocking the Power of Cloud-Based Insurance SoftwareUnlocking the Power of Cloud-Based Insurance Software
Unlocking the Power of Cloud-Based Insurance Software
 
Why Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business WorldWhy Cloud Security Matters in Today's Business World
Why Cloud Security Matters in Today's Business World
 
TrendMicro DeepSecurity CASE - Testimonal
TrendMicro DeepSecurity CASE - TestimonalTrendMicro DeepSecurity CASE - Testimonal
TrendMicro DeepSecurity CASE - Testimonal
 
Value Journal - September 2020
Value Journal - September 2020Value Journal - September 2020
Value Journal - September 2020
 
Accenture & Commvault
Accenture  & CommvaultAccenture  & Commvault
Accenture & Commvault
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security
 
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)
 
dinCloud q2 pr highlights
dinCloud q2 pr highlightsdinCloud q2 pr highlights
dinCloud q2 pr highlights
 
Cw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend microCw13 securing your journey to the cloud by rami naccache-trend micro
Cw13 securing your journey to the cloud by rami naccache-trend micro
 
Citrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature BriefCitrix MDX Technologies Feature Brief
Citrix MDX Technologies Feature Brief
 
Advanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – NetmagicAdvanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – Netmagic
 
GDMS Presentation CFA Laos
GDMS Presentation CFA LaosGDMS Presentation CFA Laos
GDMS Presentation CFA Laos
 
Windstream Managed Network Security Ebook
Windstream Managed Network Security EbookWindstream Managed Network Security Ebook
Windstream Managed Network Security Ebook
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | Sysfore
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
 
Benefits Of Cloud Computing.pdf
Benefits Of Cloud Computing.pdfBenefits Of Cloud Computing.pdf
Benefits Of Cloud Computing.pdf
 
Top 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptxTop 10 Cybersecurity Companies Software 2022.pptx
Top 10 Cybersecurity Companies Software 2022.pptx
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS Compliance
 
What the future holds for the hybrid cloud
What the future holds for the hybrid cloudWhat the future holds for the hybrid cloud
What the future holds for the hybrid cloud
 
Cloud Service Brief - dinCloud Hosted Virtual Desktop
Cloud Service Brief - dinCloud Hosted Virtual DesktopCloud Service Brief - dinCloud Hosted Virtual Desktop
Cloud Service Brief - dinCloud Hosted Virtual Desktop
 

Trend_Micro_Collateral_Australian_Transit

  • 1. We investigated a number of vendors and products. Trend Mi- cro’s Deep Security stood out because it was host-based instead of guest-based, so the integration with VMware was simple. Gavin Gustling, IT Manager, Grenda Transit Australian Transit Company Secures Merged IT Environments Trend Micro™ Deep Security Provides Cloud-based Protection for Grenda Transit Overview Grenda Transit is a 67-year-old family business that provides transportation services for Melbourne’s general public. In 2011, Grenda was purchased by the Ventura Group, which also operated public transportation services in Melbourne. With more than 1500 employees servicing 60% of Melbourne’s public transport market, Grenda Transit delivers 8.6 million passengers to their destinations yearly with a fleet of 650 vehicles and buses. Today, Grenda operates buses and transit systems that focus on passenger safety, cutting-edge technology, and exceptional customer service. Challenges With the 2011 merger of Grenda Transit and the Ventura Group, IT security concerns surfaced as the companies began combining their IT resources. With two different IT systems, Grenda Transit needed a security solution that was compatible with both Citrix XenServer and VMware vSphere Hypervisor technology. To secure their entire IT environment, Grenda Transit needed flexible, lightweight, and robust anti-malware protection that could be easily managed from a single console. SUMMARY Company: Grenda Transit Region: Victoria, Australia Sector: Transportation Trend Solution: Deep Security Trend Micro Customer Success Story, page 1 of 2 | Australian Transit Company Secures Merged IT Environments
  • 2. Whether it’s to do with maintenance or bus dispatch, we cannot afford to have downtime due to security issues. Now we no longer have to worry about it thanks to Deep Security. Gavin Gusling, IT Manager, Grenda Transit Customer Success Story, Continued: Australian Transit Company Secures Merged IT Environments Solutions After reviewing several competing solutions, Grenda chose Trend Micro Deep Security. Deep Security offers comprehensive, adaptive protection for Grenda’s physical, virtual, and cloud IT environments. Deep Security combines anti-malware, intrusion detection and prevention, web application protection, integrity monitoring, and log inspection that is compatible with VMware and Citrix systems—and does not hinder the company’s IT performance. Deep Security also enables real-time updates and feedback loops that prevent future threats—maintaining Grenda’s data integrity. Results Today, Deep Security protects Grenda Transit and the Ventura Group IT environments from malware and other threats. With agentless security, servers are protected as soon as they are switched on, providing a cost-effective solution with clear efficiency gains. By securing Grenda’s VMware and Citrix environments with a single architecture to manage both physical and virtual servers, Deep Security reduces management requirements by up to 75%. The Trend Micro™ Smart Protection Network™ infrastructure stops threats before they reach the IT environment and provides a private cloud infrastructure without affecting performance. Deep Security also enables the provision of revenue-generating cloud services for the company. SOLUTION BENEFITS Deep Security • Accelerates virtualization and cloud ROI • Prevents data breaches and business disruptions • Maximizes operational cost reductions • Achieves cost-effective compliance Trend Micro Customer Success Story, page 2 of 2 | Australian Transit Company Secures Merged IT Environments ©2013 by Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo and Smart Protection Network are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their owners. Information contained in this document is subject to change without notice.