Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

checkLoop 1checkLoop 2checkLoop 3
11/21/2019
12:40 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Trend Micro Debuts Security Services Platform for Organizations Building Apps in the Cloud

Trend Micro Cloud One automates and simplifies cloud security to give organizations the flexibility they need to meet their most strategic cloud priorities.

DALLAS, November 18, 2019 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), the global leader in cloud security, today announced the launch of Trend Micro Cloud One™, a security services platform for organizations building applications in the cloud. Cloud One allows developers to rapidly build applications using the cloud services they want, while managing their organization’s risk.

Cloud One delivers the industry’s broadest range of security capabilities in a single platform. Designed to help organizations meet their most strategic cloud priorities, it allows customers to migrate existing applications to the cloud, deliver new cloud-native applications and achieve cloud operational excellence. The first-of-its-kind platform has the flexibility to solve immediate customer challenges and the innovation to rapidly evolve with cloud services. At its heart, Cloud One includes the world’s leading workload security service that is already in use by thousands of organizations. It is complemented by enhanced container security and brand-new offerings for application security, network security, file storage security and cloud security posture management to ensure cloud infrastructure is optimally configured.

Many cloud security solutions are often hard to manage and deploy, inflexible and fail to provide the level of visibility IT teams need to manage fast-emerging risks.

Trend Micro’s all-in-one platform approach is designed to deliver simplified, automated and flexible protection, regardless of where an organization is on the journey to the cloud. Customers using the platform will benefit from a single-sign-on to all services, common user and cloud-service enrolment, visibility from a single console and a common pricing and billing model.

“We have been helping our customers with secure cloud transformation since the birth of the cloud, over a decade ago,” said Wendy Moore, vice president of product marketing for Trend Micro. “Customers have a mix of legacy servers, virtualized data centers and newer services such as containers and serverless applications, and all of which can be protected using Cloud One.”

Trend Micro’s new cloud security platform supports the leading cloud providers, including Amazon Web Services (AWS), Microsoft Azure and Google Cloud.

“As more companies move their infrastructure and applications to the cloud, and adopt a shared responsibility model, we want our customers to have the option of the broadest choice from the best products in the market,” said Dave McCann, Vice President, AWS Migration, Marketplace and Control Services at Amazon Web Services, Inc. “Trend Micro’s new cloud security platform represents another example of new innovation, that is available via AWS Marketplace. By leveraging AWS Marketplace features like SaaS Contract API, Private Offers, and Consulting Partner Private Offers, customers can contract directly from Trend Micro, or their consulting partners around the world. We are committed to empowering our shared customers with easy and fast procurement and provisioning.”

Organizations like Armor in Dallas, Texas, are relying on Trend Micro for strategic cloud security. 

“As a security-as-a-service provider, we need to deliver on the security and compliance outcomes our customers demand of Armor. We need powerful, scalable security tools which easily integrate into Armor’s cloud security product, Armor Anywhere, to protect our customers’ constantly evolving multi-cloud and virtual environments,” said Josh Bosquez, CTO for Armor. “Our company’s primary goal is to provide security in a dynamic multi-cloud world. We leverage Trend Micro to help us deliver that vision and promise to our customers.”

By considering cloud projects and objectives holistically, Trend Micro Cloud One is able to provide enterprise grade security, while leveraging the benefits and efficiencies of the cloud.

The Cloud One platform will be available in Q1 2020 with three services fully integrated: workload security, network security and application security. The other components will be available as stand-alone solutions in Q1 2020 and integrated into Cloud One by the end of 2020.

  • Trend Micro Cloud One – Workload Security
  • Trend Micro Cloud One – Container Image Security
  • Trend Micro Cloud One – File Storage Security
  • Trend Micro Cloud One  – Network Security
  • Trend Micro Cloud One – Cloud Posture Management
  • Trend Micro Cloud One – Application Security

To find out more about Cloud One, please visit https://www.trendmicro.com/cloudone.

About Trend Micro

Trend Micro Incorporated, a global leader in cybersecurity solutions, helps to make the world safe for exchanging digital information. Our innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud environments, networks, and endpoints. All our products work together to seamlessly share threat intelligence and provide a connected threat defense with centralized visibility and control, enabling better, faster protection. With over 6,000 employees in over 50 countries and the world’s most advanced global threat intelligence, Trend Micro enables organizations to secure their journey to the cloud. For more information, visit www.trendmicro.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19777
PUBLISHED: 2019-12-13
stb_image.h (aka the stb image loader) 2.23, as used in libsixel and other products, has a heap-based buffer over-read in stbi__load_main.
CVE-2019-19778
PUBLISHED: 2019-12-13
An issue was discovered in libsixel 1.8.2. There is a heap-based buffer over-read in the function load_sixel at loader.c.
CVE-2019-16777
PUBLISHED: 2019-12-13
Versions of the npm CLI prior to 6.13.4 are vulnerable to an Arbitrary File Overwrite. It fails to prevent existing globally-installed binaries to be overwritten by other package installations. For example, if a package was installed globally and created a serve binary, any subsequent installs of pa...
CVE-2019-16775
PUBLISHED: 2019-12-13
Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It is possible for packages to create symlinks to files outside of thenode_modules folder through the bin field upon installation. A properly constructed entry in the package.json bin field would allow a package publi...
CVE-2019-16776
PUBLISHED: 2019-12-13
Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It fails to prevent access to folders outside of the intended node_modules folder through the bin field. A properly constructed entry in the package.json bin field would allow a package publisher to modify and/or gain...
checkLoop 4