Cloud security usability will skyrocket with new innovation from Trend Micro

0

Single deployment adds visibility and guided protection for AWS account in minutes

DALLAS , November 28, 2022 /PRNewswire/ — Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity, today announced a new protection deployment model that delivers great value to security and development teams. Unlike competitors, Trend Micro identifies threats in minutes and delivers security results without impacting performance or deleting data from the customer’s environment.

To learn more about Trend Micro Cloud Sentry, please visit: https://www.trendmicro.com/en_us/business/products/hybrid-cloud/cloud-sentry.html

“Trend Micro is the largest player in the cloud workload security market,” said Philippe Bues, Research Manager, Cloud Security at IDC. “Security teams are struggling to keep up with the rapid pace of development as business-critical cloud infrastructure and applications are deployed in complex hybrid cloud environments. Not only do organizations need visibility, they have also need real ways to address threats and reduce risk. Trend Micro delivers that with Cloud Sentry.”

This new offering is a direct response to security teams sharing how they often struggle to keep up with the rate of application change in public cloud environments. Developers deploy new and updated application resources quickly, and security controls must be deployed effectively for all resources.

Jason CreditCIO/CTO, Summit Carbon Solutions said, “Working with Trend Micro allows us to protect data at scale with no servers to manage while keeping all of our data in our account. Introducing additional security controls and resource types into this style of security is a game-changer for us across hundreds of distributed teams.”

With the new protection model, organizations get one-click contextual insights into legacy and cloud-native workload environments, freeing security teams to focus on more critical issues. This innovation, called Trend Micro Cloud Sentry, allows security teams to manage a single deployment per AWS account, regardless of how resources are deployed or updated.

Kevin SimzerCOO, Trend Micro said, “Changing the game for cloud security is just a byproduct of working so closely with our customers throughout their cloud transformation journeys, which drives our innovation. product continues. Visibility decreases and friction increases as enterprises adopt new cloud technologies. Customers asked us to level the playing field, so we provided a visibility solution that didn’t impact production.”

Additionally, security teams are better able to work seamlessly with developer teams by using risk management and threat intelligence data to inform security priorities and explain the need for changes.

Cloud Sentry is available to customers today in preview with health monitoring and anti-malware security controls, protecting EC2 instances, ECR images, and Lambda functions. Vulnerability scanning, log inspection, and additional storage support are planned for the near future.

Additional Resources:

– Access to preview features can be requested from the Cloud One console
– Join us at AWS re:Invent booth #1311 to speak with an expert and learn more

About Trend Micro

Trend Micro, a global leader in cybersecurity, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, Trend Micro’s cybersecurity platform protects hundreds of thousands of organizations and millions of individuals across clouds , networks, devices and terminals. As a leader in cloud and enterprise cybersecurity, the platform offers a powerful suite of advanced threat defense techniques optimized for environments such as AWS, Microsoft and Google, and central visibility for detection and response. better and faster. With 7,000 employees in 65 countries, Trend Micro enables businesses to simplify and secure their connected world. www.TrendMicro.com.

SOURCE Trend Micro Incorporated

T
WRITTEN BY

Related posts