SecurityBrief Asia logo
Story image

Trend Micro introduces cloud and container workload security offering

22 May 2019

Cybersecurity company Trend Micro has announced the availability of a solution that protects data across cloud and container workloads.

This has been achieved through newly launched container security capabilities added to Trend Micro Deep Security to elevate protection across the entire DevOps lifecycle and runtime stack.

From virtual servers and data centres to public and private cloud workloads, containers are increasingly used and demand protection.

Enterprises are bringing together their application development teams, IT operations and their security team to help the business deliver automated, secured applications to market quicker.

Trend Micro connects teams with technology tools that bake security into the process while meeting compliance needs and reducing risk.

“While customers have been securing their containers with our technology for a couple of years now, we are proud to expand our offering,” says Trend Micro A/NZ technical director Mick McCluney.

“Unlike many of the one-off point solutions crowding the market, our offering provides automated build-pipeline container image scanning, and runtime protection providing full visibility and control.” 

Enterprise Strategy Group senior analyst and group director Doug Cahill says, “Developers might be surprised by the scope of this new offering. The ongoing deployment of application containers into production environments requires that the entire build-ship-run continuum be secured.

“As such, protection across the CI/CD pipeline for container environments must include the ability to the detect vulnerabilities, secrets, malware, and misconfigurations for early protection at build time, while delivering critical threat protection across on-prem and cloud host, orchestration and container layers at runtime.”

The new features available now in Trend Micro's container security solution include:

Securing across the complete DevOps lifecycle

Within the software build-pipeline, Trend Micro has extended its container image scanning to include pre-registry scanning, providing earlier detection of vulnerabilities and malware over and above scanning the trusted registry for any future threats.

Deep Security will now also scan for embedded secrets such as passwords and private keys and provide compliance and configuration validation checks, along with image assertion for digitally signed images.

Securing across the entire stack

At runtime of the container, Trend Micro has boosted container platform protection across Docker and Kubernetes.
Deep Security has long ensured protection for the host and containers at runtime.
This includes intrusion prevention system (IPS) rules, integrity monitoring to detect compromised instances of the platform, as well as log inspection.

To ensure complete protection, Trend Micro inspects all lateral and horizontal traffic movement (east, west, north, south) between containers and platform layers like Kubernetes and Docker. 

Securing while granting full control

To increase automation and decrease manual tasks, security and operations teams using Trend Micro can now use any command shell to execute the application program interfaces (APIs).

This option ensures full control of deploying policies, automation of monitoring, reporting and more.

This new set of representational state transfer APIs have been written to automate security for application development and operations teams across the container orchestration tools and runtime environments.

Story image
Users becoming more savvy with COVID phishing scams
“With COVID-19 being around for over a year now and employees becoming more aware of the types of scams that have come out related to the pandemic, cyber criminals are having less success with related phishing attacks."More
Story image
Attivo Networks expands Active Directory suite for greater protection
"We see Active Directory exploitation used in the majority of ransomware, insider and advanced attacks. We are pleased to now offer our customers early and efficient solutions for preventing the misuse of Active Directory.”More
Story image
Video: 10 Minute IT Jams - SonicWall VP on the cybersecurity lessons learned from the last 12 months
This is our seventh IT Jam with SonicWall, the cybersecurity company specialising in firewall, network security, cloud security and more.More
Story image
Need for greater understanding of data security responsibility as cloud adoption grows - report
Despite the accelerated adoption of cloud services, there was a lack of clarity and confidence regarding the protection and recovery of data stored in public clouds.More
Story image
ThreatQuotient hits $22.5m in new financing, continues growth streak
“Since we first invested in ThreatQuotient in 2017, their team has continued to prove to the market that there is a critical need for cybersecurity solutions aimed at security operations."More
Link image
Sophos solution steps up the MDR game
Other Managed Detection and Response services simply notify you of attacks. With Sophos Managed Threat Response, a team of threat hunters take targeted actions to neutralise advanced threats.More