Trend Micro Tightens Container Security Integration in Cloud Platform - Container Journal

2022-07-25 20:17:37 By : Ms. Angela Feng

Trend Micro today extended its Trend Micro Cloud One platform to more tightly integrate its container security offering.

Mike Milner, vice president of cloud technology for Trend Micro, said the latest edition of Trend Micro Cloud One eliminates the need to separately deploy a container security platform. Instead, the company’s container security capabilities are now deployed as part of the larger Trend Micro Cloud One platform—making container security administration simpler at a time when the number of container applications running in production environments that need to be secured continues to steadily increase.

In addition, Trend Micro has simplified the deployment and management of its cloud intrusion prevention system.

In general, Trend Micro is moving to streamline the deployment of a wider range of cloud security services as part of an overall effort to make it simpler to consume them, said Milner.

The shift to the cloud has made it easier for more organizations to invoke a wider range of security capabilities. In on-premises environments, most organizations deploy firewalls and endpoint security, but little else; they lacked the ability to manage much else. Organizations continue to be even more short-handed as more workloads are deployed in the cloud. A cloud cybersecurity service eliminates the need for organizations to manage the deployment of the underlying platforms, many of which are now features of a larger service that makes them more accessible to a wider range of organizations.

Trend Micro is making it simpler to deploy container security as an integrated extension of Trend Micro Cloud One. That’s critical because while application development teams are exercising more influence over cybersecurity, responsibility for managing it still primarily lies with cybersecurity teams. Those teams need to secure both existing monolithic applications and emerging microservices-based applications built using containers, says Milner. Application development teams, however, do exercise veto power over any security platform that they feel slows down the rate at which applications are being built and deployed, he adds.

The challenge is that cloud applications deployed by developers are prone to misconfigurations. Those misconfigurations can be easily exploited by cybercriminals using scanning tools that make discovery of vulnerabilities relatively trivial. While the underlying cloud platforms tend to be more secure than on-premises environments, the processes used to build and deploy those applications are often deeply flawed.

The Trend Micro Cloud One service is also already available on the three major cloud platforms as part of an effort to make it simpler for organizations to secure multi-cloud computing environments. The company holds a 17.7% share of the cloud workload security market, which is nearly three times the size of its next largest competitor, according to the market research firm International Data Corp (IDC).

It’s still relatively early days as far as the adoption of cloud security platforms is concerned. As they continue to evolve, it’s become increasingly apparent that some level of container security will be built in. The issue now is determining which of those platforms disrupts the application development process the least without compromising security.

Mike Vizard is a seasoned IT journalist with over 25 years of experience. He also contributed to IT Business Edge, Channel Insider, Baseline and a variety of other IT titles. Previously, Vizard was the editorial director for Ziff-Davis Enterprise as well as Editor-in-Chief for CRN and InfoWorld.

Mike Vizard has 1353 posts and counting. See all posts by Mike Vizard

 A single site reliability engineer (SRE) can do the same amount of work as multiple IT administrators by automating processes using various DevOps tools rather than relying on traditional graphical tools. However, SREs are hard to find and retain. It’s also not always apparent what level of automation needs to be obtained to qualify to […] The post The State of SRE appeared first on DevOps.com. [...]

There are many great tools that exist to track cloud spend. However, one persistent area of concern is containers and Kubernetes: The “black hole” of FinOps. In this session, we review what that means and how to manage it. The post Why Kubernetes is the Black Hole of FinOps appeared first on DevOps.com. [...]

Modernize your development pipeline in this hands-on workshop with AWS and CircleCI. Attendees will build a continuous delivery pipeline that demonstrates continuous integration and continuous deployment (CI/CD) while learning how CircleCI can instrument and solve numerous roadblocks across their teams and organizations. The post LIVE WORKSHOP – AWS Modernization Workshop With CircleCI appeared first on DevOps.com. [...]

Amazon Elastic Kubernetes Service (EKS) is a managed container service designed to deploy and scale cloud-based or on-premises Kubernetes applications. To help automate Kubernetes deployments like EKS, organizations are increasingly turning to popular infrastructure-as-code (IaC) frameworks like HashiCorp Terraform and AWS Cloud Development Kit (AWS CDK). However, setting up an IaC-based infrastructure with EKS needs […] The post Monitor EKS Blueprints With Datadog and AWS appeared first on DevOps.com. [...]

Though we hope they won’t happen, disasters are inevitable—especially in today’s unstable world. Because your customers, your revenue and your reputation depend on your applications’ availability, it is essential to have a strong disaster recovery (DR) strategy in place. But because many organizations are running containerized applications in distributed environments across multiple clouds and storage […] The post Creating a Proactive Disaster Recovery Plan for Cloud-Native Applications appeared first on DevOps.com. [...]

Join the CISO Talk Master Class live conversation. Part 6 brings all the elements into a cohesive, integrated strategy: continuous security strategy, leveraging frameworks, effective response strategies, growing next-gen security experts and communications that win and combat confusion. Join hosts Mitch Ashley and Mat Newfield and an elite panel of cybersecurity experts as they bring.. The post CISO Talk Master Class Episode: Catch Lightning in a Bottle – The Essentials: Bringing It All Together appeared first on Security Boulevard. [...]

Join us as we explore the rapidly evolving application and API landscape and offer concrete ways organizations can protect against threats to their application code, APIs and related components. The post API Security appeared first on Security Boulevard. [...]

This webinar examines code tampering risks, shares lessons learned from recent incidents and proposes a four-pillar approach to reducing code tampering risk through: Integrity validation: Confirming files and artifacts across each phase of the SDLC Anomaly detection: Connecting dots from disparate systems to identify breaches Critical code monitoring: Determining which code to monitor for any.. The post Code Tampering: Four Keys to Pipeline Integrity appeared first on Security Boulevard. [...]

Join us to learn how Bob has successfully worked with his development leaders to engineer software with security in mind along the pre-production software supply chain. Liav Caspi, CTO of Legit Security, will be joining Bob to share how new security methods and tools now enable teams to find security issues earlier in the development.. The post How to Shift Security Left: Best Practices From a Fortune 500 DevSecOps Leader appeared first on Security Boulevard. [...]

According to the 2022 Open Source Security and Risk Analysis (OSSRA) report, the overwhelming majority of software development organizations are leveraging open source to build their applications. However, the scale of use creates a growing management challenge. While development and risk management teams scramble to patch vulnerabilities, decipher complex license terms governing obligations associated with.. The post Applying the 2022 Open Source Findings to Software Supply Chain Risk Management appeared first on Security Boulevard. [...]