Trend Micro to be the Main Security Provider for UAE AWS Region, to Further Strengthen the Nation’s Digital Process


Trend Micro welcomes the launch of AWS Middle East (UAE) Region, which will support the acceleration of innovation and digital transformation in the United Arab Emirates (UAE). The new AWS Middle East (UAE) Region consists of three Availability Zones (AZs) and becomes AWS’s second region in the Middle East with the existing AWS Region in Bahrain. The new AWS Region gives organizations even greater choice for running their applications and serving end users from data centers located in the UAE, using advanced AWS technologies to drive innovation.

Trend Micro, a global leader in cybersecurity solutions, is set to reinforce its partnership with AWS by providing best-in-class cybersecurity strategies and practices for the cloud leader’s forthcoming data centers in the United Arab Emirates. The step is aimed at further enhancing operations and innovations and protecting the data of communities and organizations across the country and throughout the wider Middle East and North Africa region. With Trend Micro security solutions and AWS services, customers in the UAE will be able to safely migrate to the cloud with the added assurance that they will remain compliant with local and international regulations.

“Cybersecurity has become an increasingly important component of a country’s stability and growth, as organizations navigate through an accelerated hybrid world,” said Majd Sinan, Country Manager, Trend Micro UAE.

As organizations increase their reliance on cloud operations, the establishment of the AWS data center will enable firms to use state-of-the-art cybersecurity solutions to protect cloud migration and workloads. Trend Micro’s Cloud One – a security-service platform for cloud builders – provides workload, network, and file storage protection measures, as well as cloud security and compliance management. Organizations can also protect against, detect, and respond to network attacks, vulnerabilities, malware, ransomware, and unauthorized system changes.