Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Trend Micro Targets AWS Cloud Security

Trend Micro is looking to bolster its cloud security offerings for enterprises with a new set of services to improve security for users of Amazon Web Services [AWS] and an updated version of its cloud encryption technology.

Trend Micro is looking to bolster its cloud security offerings for enterprises with a new set of services to improve security for users of Amazon Web Services [AWS] and an updated version of its cloud encryption technology.

AWS is one of the most popular cloud services on the Web. With the launch of Trend Micro Deep Security as a Service offers a suite security tools designed to strengthen AWS’ existing security capabilities. According to Trend Micro, the service includes host-based intrusion detection, as well as anti-malware and Web reputation. The service is built on AWS, and can be set up and deployed in minutes.

Trend Micro“Ensuring the security of our customers’ data is our top priority,” said Terry Wise, head of worldwide partner ecosystem for Amazon Web Services, in a statement. “We work closely with our partners like Trend Micro to help them provide security solutions that complement the existing Amazon Web Services security features. We see Trend Micro’s latest innovations and offerings as valuable capabilities for organizations to easily and effectively extend proven security practices to their cloud deployments.”

In addition the AWS announcement, Trend Micro also talked up the upcoming release of SecureCloud 3.5, the latest version of its cloud encryption and key management product. With it, organizations can deploy automatically with the launch of a cloud instance and implement security policy based on dynamic detection of “instant type,” for example the operating system. The latest version also offers enhanced boot and volume protection based on policy. SecureCloud 3.5 works with major cloud deployment tools such as AWS CloudFormation, RightScale and Puppet.

“In the cloud world, proliferation is the enemy of protection,” said Wendy Nather, research director of the Enterprise Security Practice at 451 Research, in a statement. “Enterprises need to be able to add essential security controls in an agile manner; they have to support cloud operations, not slow them down. Trend Micro’s Deep Security as a Service offering has been designed with these needs in mind.”

Organizations take on a shared responsibility for their security with their cloud or infrastructure-as-a-service provider as they move to the cloud, explained Kevin Simzer, vice president, business development and global alliances at Trend Micro.

“While cloud providers take on responsibility for things like physical access control and hypervisor security, responsibility to protect the environment from the guest operating system and above remains a customer driven activity,” he said in a statement. “At Trend Micro, we want to make it easy to add the required security that fits into the agile nature of how organizations are using the cloud.”

Trend Micro Deep Security as a Service is available today, while Trend Micro SecureCloud 3.5 will be available in May.

Written By

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Cloud Security

Orca Security published details on four server-side request forgery (SSRF) vulnerabilities impacting different Azure services.

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.

Cloud Security

Cloud Disaster Recovery - Ingredients for a Recipe that Saves Money and Offers a Safe, More Secure Situation with Greater Accessibility