Trend Micro and Snyk cooperate

Trend Micro News

Share post

Trend Micro and Snyk develop joint solutions against open source vulnerabilities. The expansion of the partnership is intended to close the gap between DevOps and IT security.

Trend Micro is working with Snyk to develop a new solution for vulnerability management in open source code. This enables security teams to minimize the risk of security gaps in open source code as soon as it is integrated - without interrupting the delivery process. The Japanese IT security provider and the leading developer-first open source security company are thus expanding their strategic partnership

Vulnerabilities increased 3 times in 2,5 years

"Vulnerabilities in open source software, which is used more and more by developers, have increased 2,5 times over the past three years," explains Geva Solomonovich, CTO Global Alliances at Snyk. “Our partnership with Trend Micro is forward-looking because it gives security operations teams their first insight into open source code, one of the fundamental building blocks for cloud-native applications, and its risks. Through this cooperation, we will help to close the technological, procedural and organizational gap between IT security and the DevOps teams. "

According to Gartner, open source libraries can contain significant vulnerabilities. In addition, the fact that developers may not even know that a component is embedded in a library exposes these invisible vulnerabilities.

Open source virtual cybersecurity expert

"DevOps are at the center of innovative companies and nobody knows these teams as well as Snyk, especially when it comes to preventing threats from open source vulnerabilities," said Kevin Simzer, COO of Trend Micro. “What we're bringing into play is essentially an open source virtual cybersecurity expert for teams using our Cloud One platform. Together we can solve security problems before they occur, including full coverage from code creation to runtime and in any type of development environment. "

The new capabilities, provided by a combination of the strengths of both companies, enable teams to automatically and instantly find vulnerabilities in open source code. They provide significant benefits for security and development teams, including helping them comply with ISO 27001, SOC 2, and other key frameworks and standards.

The joint solution is intended to help promote closer coordination between security and development teams and thus bring about a fundamental change in awareness of the cooperation. It will be available as part of the Trend Micro Cloud One platform.

 

More about Cloudone at Trendmicro.com

 


About Trend Micro

As one of the world's leading providers of IT security, Trend Micro helps create a secure world for digital data exchange. With over 30 years of security expertise, global threat research, and constant innovation, Trend Micro offers protection for businesses, government agencies, and consumers. Thanks to our XGen™ security strategy, our solutions benefit from a cross-generational combination of defense techniques optimized for leading-edge environments. Networked threat information enables better and faster protection. Optimized for cloud workloads, endpoints, email, the IIoT and networks, our connected solutions provide centralized visibility across the entire enterprise for faster threat detection and response.


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more