Comprehensive cloud security services optimize protection without slowing DevOps

HONG KONG SAR - Media OutReach - 20 January 2021 - Trend Micro Incorporated (TYO: 4704; TSE: 4704), the leader in cloud security, today announced its advanced container security solution Cloud One -- Container Security. Designed to ease the security of container builds, deployments and runtime workflows, the new service helps developers accelerate innovation and minimize application downtime across their Kubernetes environments, from a single tool.

 

This new service is an important addition to Trend Micro's Cloud One services platform that was introduced last year. As IDC stated, "Trend Micro launched Cloud One, its integrated cloud security services (SaaS) platform that addresses customers' security challenges around datacenter servers and virtual machines, IaaS workloads, containers and containers services, cloud security posture management, cloud file and object storage services, and serverless." 1

 

Global organizations are increasingly leveraging containers to accelerate cloud migration, rearchitect monolithic applications and build and integrate seamless cloud native applications. This can create security gaps that traditional network and endpoint tools are not capable of addressing.

 

"Containers are helping teams innovate faster by simplifying development and deployment. To safely keep this pace, teams needs to integrate security practices more easily in the container lifecycle," said Mark Nunnikhoven, vice president of Cloud Research at Trend Micro. "That's where this new service comes into play perfectly. It provides automated continuous protection at three critical stages of the container lifecycle; build, deploy, and run."

 

Trend Micro Cloud One - Container Security offers three main elements:

 

Container image scanning

This scans at build time for the earliest possible detection and lowest cost remediation. In addition, through partnership with Snyk there is a scan against the market leading open source vulnerability database. This provides early detection and mitigation of vulnerabilities in third-party code dependencies. Cloud One -- Container Security will:

  • Look for vulnerabilities in the packages included in the container
  • Detect malware using signatures and advanced machine learning techniques
  • Find embedded secrets such as passwords, API tokens, or license keys
  • Sweep for IoCs using industry-standard Yara rules

Policy-based deployment control

Container security enables you to create policies that allow or block deployments based on set rules. Native integration with Kubernetes ensures that all deployments run in a production environment are safe.

 

Cloud-native runtime security

Once an image has been deemed safe and is deployed into production, Cloud One Container Security will protect the container in the runtime environment. This offers ongoing vulnerability detection for the containerized application and provides relevant feedback to security and DevOps teams in case further action is needed.

 

1IDC Worldwide Hybrid Cloud Workload Security Market Shares, 2019: Vendor Growth Comes in All Shapes and Sizes, Doc # US46398420, June 2020

Talk to Media OutReach today

Let Media OutReach help you achieve your communication goals. Send an email to info@media-outreach.com or click below. You will receive a response within 24 hours.

Contact us now