Trend Micro is expanding its protection by expanding its cybersecurity platform to include Cloud Risk Management and XDR. With this, companies can consolidate their cybersecurity landscape and gain a complete overview of cloud security risks in hybrid IT environments.
Although resilient security requires an understanding of the risks across all systems and applications that form the attack surface, only 9 percent of organizations actively monitor them. Digital transformation and cloud migration have significantly increased the attack surface of organizations. As a result, enterprises and governments have adopted isolated security technologies for on-premises and multi-cloud environments, including AWS, Azure, GCP, Kubernetes, and other cloud service providers.
Expansion with new, secure functions
- Agentless and cloud-native vulnerability scanning
- Cloud Security Posture Management (CSPM)
- Cloud Infrastructure Entitlement Management (CIEM)
- Comprehensive risk visibility across hybrid clouds
- Container security risk visibility for clusters and images
Trend Micro identifies unknown risks by extending External Attack Surface Management (EASM) to identify an organization's public assets across different cloud providers. This leads to improved cloud security and governance. The Trend Vision One cybersecurity platform now enables this functionality through a unified approach to risk management, threat detection and incident response, leveraging data from multiple sources including cloud metadata, containers, workloads, endpoints, identities, networks and emails. This includes capabilities to understand cloud asset inventory and cloud security posture, prioritize risks, search for threats and vulnerabilities, and assess risk profiles and attack vectors.
CNAPP plus Attack Surface Risk Management
These enhancements extend the platform beyond the components of a Cloud Native Application Protection Platform (CNAPP) and help organizations consolidate their cybersecurity landscape and gain a holistic view of their cloud security risks. Specifically, Trend Vision One – Attack Surface Risk Management (ASRM) offers:
- Attack Surface Detection: Improves enterprise security by actively mapping the cloud attack surface in real-time and providing a comprehensive inventory of internal and external cloud resources to protect against potential threats.
Risk Assessment and Prioritization: Continuously assesses resources to prioritize and execute defensive actions, proactively reduce risk, and prevent security breaches. This includes prioritizing vulnerabilities in running containers and strengthening company resilience. - Attack path analysis: Assesses risk profiles and uncovers potential attack vectors to guide implementation of countermeasures and strengthen organizational resilience against cyber threats.
Risk measurement and reporting: Shows overall security performance to support investment decisions, effectively communicate cyber risk status to senior leadership, and provide a clear understanding of the security posture and its impact on business performance. - Compliance optimization: Improves compliance by identifying and resolving violations and misconfigurations and aligning security operations with industry standards and frameworks.
“Our offering is fully available, including in the AWS Marketplace. “Trend Vision One natively connects customers’ threat surfaces, driving cyber risk reduction, strengthening security posture, streamlining compliance processes, and minimizing cost and complexity,” said Kevin Simzer, COO at Trend Micro. “This gives our customers a precise roadmap to optimize their resource allocation and best strengthen their defense capabilities.”
More at TrendMicro.com
About Trend Micro As one of the world's leading providers of IT security, Trend Micro helps create a secure world for digital data exchange. With over 30 years of security expertise, global threat research, and constant innovation, Trend Micro offers protection for businesses, government agencies, and consumers. Thanks to our XGen™ security strategy, our solutions benefit from a cross-generational combination of defense techniques optimized for leading-edge environments. Networked threat information enables better and faster protection. Optimized for cloud workloads, endpoints, email, the IIoT and networks, our connected solutions provide centralized visibility across the entire enterprise for faster threat detection and response.