PLATFORM SECURITY

Trend Micro Unites Industry With Most Powerful and Complete Security Platform

Trend Micro | April 26, 2022

Trend Micro
Trend Micro Incorporated , a global cybersecurity leader, announced the launch of Trend Micro One, a unified cybersecurity platform with a growing list of ecosystem technology partners that enables customers to better understand, communicate, and lower their cyber risk.

Organizations are battling on all fronts to face mounting cyber risks from their complex and growing attack surface with stretched teams and siloed security products. The unified security platform approach delivers a continuous lifecycle of risk and threat assessment with attack surface discovery, cyber risk analysis, and threat mitigation and response. 

Inaugural partners of the Trend Micro One technology ecosystem include: Bit Discovery, Google Cloud, Microsoft, Okta, Palo Alto Networks, ServiceNow, Slack, Qualys, Rapid7, Splunk, and Tenable.

"We are so proud that ecosystem partners value integrating into our platform. Collectively we help enterprises fight the bad guys known as cybercriminals. Alone we are strong, but together our industry is unstoppable in helping customers eliminate security gaps anywhere, identify internal and external enterprise assets, and take critical steps to mitigate them.
Kevin Simzer, COO of Trend Micro

According to Gartner®, "vendors are increasingly acquiring or developing these adjacent technologies and integrating them into a single platform. The benefits are best realized when this integration minimizes consoles and configuration planes and reuses components (e.g., endpoint agents) and information.1"

"We all know that digital transformation is table stakes for the post-pandemic enterprise. But this comes with additional risks: a bigger target for threat actors to aim at and more visibility and security coverage gaps for them to hide in," said Jeremiah Grossman, CEO of Bit Discovery. "Trend Micro's approach stands out from the crowd — notably with its blend of multiple sources of asset and risk visibility, including external attack surface visibility powered by Bit Discovery. Trend Micro's platform helps customers quickly get a prioritized and comprehensive understanding of their attack surface."

As a unified platform, Trend Micro One delivers powerful risk assessment capabilities, but the ecosystem partners extend that to make it the most complete in the industry. Joint customers benefit from truly connected visibility, better detection and response capabilities, and comprehensive protection across security layers and systems.

Trend Micro One supports this approach by enabling customers to:
  • Discover the attack surface: Identify, monitor, and profile cyber assets in customers' environments.
  • Understand and continuously assess risk: Analyze risk exposure, the status of vulnerabilities, the configuration of security controls, and types of threat activity.
  • Effectively mitigate risk: Ensure the right preventative controls and take swift action to mitigate risk and remediate attacks across the enterprise by leveraging Trend Micro's threat and risk intelligence.

About Trend Micro
Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, Trend Micro's cybersecurity platform protects hundreds of thousands of organizations and millions of individuals across clouds, networks, devices, and endpoints. As a leader in cloud and enterprise cybersecurity, the platform delivers a powerful range of advanced threat defense techniques optimized for environments like AWS, Microsoft, and Google, and central visibility for better, faster detection and response.

Spotlight

As organizations consider their future of work and the technologies that will make them successful, understanding the value of their investments will be crucial. Download this whitepaper, IDC created in conjunction with VMware, to learn how organizations have realized a return on investment (ROI) by supporting their employees an

Spotlight

As organizations consider their future of work and the technologies that will make them successful, understanding the value of their investments will be crucial. Download this whitepaper, IDC created in conjunction with VMware, to learn how organizations have realized a return on investment (ROI) by supporting their employees an

Related News

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Forcepoint Delivers Data Security Everywhere, Extending DLP Policies from Endpoints to the Cloud

Businesswire | April 27, 2023

Global security leader Forcepoint today extended the depth and breadth of its Data-first SASE (Secure Access Service Edge) offering with the launch of Forcepoint Data Security Everywhere. Forcepoint is simplifying enterprise DLP management across cloud, web and private apps and streamlining compliance wherever hybrid workers store, access and use confidential information. The company is also bringing to market Forcepoint ONE Insights that enables users to quickly visualize and quantify the financial value of security efficacy delivered by Forcepoint solutions. Forcepoint ONE Insights’ visualization console presents key performance indicators such as adoption, data and threat protection, policy violations, performance, and risk. “Data isn’t the new oil; it is the new air. Literally everything runs on data today and our lives and livelihoods depend on it. Before today, securing data required a mishmash of point solutions. Forcepoint is taking the lead in solving this problem with Forcepoint Data Security Everywhere,” said Manny Rivelo, CEO of Forcepoint. “We’re delivering enterprise-wide data security plus the power and flexibility of Forcepoint ONE SSE to keep data safe at all times, even after it is accessed. Comprehensive data security is a critical capability within our Data-first SASE solution, providing the visibility and control organizations need to protect their data and simplify Zero Trust security.” In two years, humanity's collective data will reach 175 billion terabytes -- the number 175 followed by 21 zeros. This data includes everything that powers business and consumers’ day-to-day lives. It is accessed and used by hybrid workforces on corporate endpoints and personal devices such as phones and tablets to do their jobs. Forcepoint Data Security Everywhere is a direct response to the reality that business productivity depends upon people having the ability to safely and efficiently use data anywhere. By connecting Forcepoint Enterprise DLP to the Forcepoint ONE Security Service Edge (SSE) platform, customers can extend a new or existing enterprise DLP policy, including its advanced classifiers, data fingerprinting, and enforcement settings, to the web and cloud. A unified security policy from Forcepoint protects sensitive data across all channels, including endpoints, websites, cloud services, networks, email and private apps. Forcepoint’s data-first approach goes far beyond basic data protection that is often built into SASE solutions. By classifying data and organizing it into different groups rather than relying on hardcoded patterns, Forcepoint data security policies can be written once and enforced everywhere to automatically handle new instances and types of sensitive data. This end-to-end enforcement is ideal for organizations with cloud-based applications or distributed workforces. Key Benefits of Enforcing Data Security Everywhere Adds Forcepoint ONE SSE channels to Forcepoint Enterprise DLP, protecting data across any website, cloud application, and web-based private applications. Applies new or existing DLP policies across CASB, SWG, and ZTNA channels. Simplifies DLP management by leveraging over 1,600 out-of-the-box classifiers, policies and templates enabling granular enforcement for files. Gives security operations center (SOC) and IT teams complete incident reporting and forensic information from a single management console. Forcepoint Data Security Everywhere is immediately available direct from Forcepoint and through the company’s global network of channel partners. AI-powered Data Visualization with Forcepoint ONE Insights Further extending the value-added capabilities of Forcepoint ONE, in late Q2 2023 the company will unveil Forcepoint ONE Insights, formerly code-named Symphony, which provides economic value and advanced security analytics for real-time insights into an organization's security status. Forcepoint ONE Insights technology, included with all Forcepoint ONE subscriptions, uses machine learning and artificial intelligence to analyze security data from multiple sources, such as network traffic, endpoint devices, and cloud applications. Using the at-a-glance visualization, security teams can identify potential threats more quickly, reducing the risk of data breaches. They can also see in real-time dashboards showing the economic value of their use of Forcepoint ONE. Meet Forcepoint Experts at RSA 2023 During the week of RSA, April 25-27, the company will provide hands-on opportunities with Forcepoint Data Security Everywhere and Forcepoint ONE Insights at the Forcepoint Experience Center on the fourth floor of the St. Regis San Francisco. Organizations that want to learn more and get demos can request a meeting. About Forcepoint Forcepoint simplifies security for global businesses and governments. Forcepoint’s all-in-one, truly cloud-native platform makes it easy to adopt Zero Trust and prevent the theft or loss of sensitive data and intellectual property no matter where people are working. Based in Austin, Texas, Forcepoint creates safe, trusted environments for customers and their employees in more than 150 countries. Engage with Forcepoint on www.forcepoint.com, Twitter, and LinkedIn.

Read More

PLATFORM SECURITY, SOFTWARE SECURITY, CLOUD SECURITY

Uptycs Integrates with Amazon Security Lake to Enable the Correlation of its CNAPP and XDR Security Telemetry with a Vast Ecosystem of Security Tools

Prnewswire | June 01, 2023

Uptycs, provider of the first unified CNAPP and XDR platform, today announced an integration with Amazon Security Lake from Amazon Web Services (AWS). Amazon Security Lake automatically centralizes security data from across AWS environments, leading SaaS providers, on-premises, and cloud sources into a purpose-built data lake. Amazon Security Lake manages data throughout its lifecycle with customizable data retention settings and converts and conforms incoming security data to the Open Cybersecurity Schema Framework (OCSF) open standard, making it easier to automatically collect, combine, and analyze security data from AWS, security partners, and analytics providers. The integration with Uptycs helps organizations speed up threat detection and incident response by correlating Uptycs telemetry and events with data from a vast number of other security tools. With the proliferation of technologies and environments, security teams need to spend time setting up one-to-one integrations between their tools to correlate threat activity. This is expensive and delays response to security threats. In contrast, a shift up approach to cybersecurity does not need complex integrations and intermediary systems to connect the dots. The premise involves getting the data in a standardized format right out of the gate, and streaming it up into a data lake so security teams can do cross-correlations that speed up threat detection and response. The OCSF project offers a consistent approach towards cybersecurity telemetry by providing a standard schema for common security events, defining versioning criteria to facilitate schema evolution, and including a self-governance process for security log producers and consumers. This enables organizations to easily bring together data from multiple security tools. "We are excited to bring the security telemetry from Uptycs into Amazon Security Lake," says Ganesh Pai, CEO and co-founder of Uptycs. "A key tenet of the shift up approach to cybersecurity is to stream normalized security telemetry into a data lake, moving security analytics processing power to the cloud. Uptycs and AWS customers can now enjoy enhanced protection and faster reaction time as they benefit from standardized OCSF-based telemetry across their on-prem and cloud workloads." Using the OCSF format, Uptycs and Amazon Security Lake allow organizations to have a consistent telemetry, enabling them to easily correlate data from a variety of security, SIEM, and SOAR tools. Uptycs, an AWS Security Competency Partner, will send a wealth of OCSF-formatted data from on-premises and cloud assets to Amazon Security Lake, including behavioral threat detections from endpoints and cloud workloads, anomaly detections, policy violations, risky policies, misconfigurations, and vulnerabilities. Uptycs prospects and customers can get started with the Amazon Security Lake integration by contacting Uptycs. About Uptycs Your developer's laptop is just a hop away from cloud infrastructure. Attackers don't think in silos, so why would you have siloed solutions protecting public cloud, private cloud, containers, laptops, and servers? Uptycs reduces risk by prioritizing your responses to threats, vulnerabilities, misconfigurations, sensitive data exposure, and compliance mandates across your modern attack surface—all from a single platform, UI, and data model. This includes the ability to tie together threat activity as it traverses on-prem and cloud boundaries, thus delivering a more cohesive enterprise-wide security posture.

Read More

PLATFORM SECURITY, SOFTWARE SECURITY, CLOUD SECURITY

Deepwatch and Lacework Partner to Deliver Unrivaled Cloud Security Solutions

Businesswire | June 09, 2023

Deepwatch, the leader in advanced managed detection and response (MDR) security, today announced a global strategic partnership with Lacework, the data-driven cloud security platform, to offer organizations comprehensive and proactive security solutions. This strategic partnership combines Deepwatch's MDR expertise with Lacework's advanced cloud security analytics, providing enterprises with an unmatched level of protection against modern cyber threats. With the increasing adoption of cloud technology, organizations face unique security challenges that require robust solutions. "This partnership allows us to deliver a best-in-class cloud security solution that addresses the unique challenges faced by organizations in today's cloud-centric landscape," said Wes Mullins, CTO at Deepwatch. "By combining our MDR capabilities with Lacework's advanced cloud security analytics, we empower organizations to confidently embrace the cloud while maintaining robust cybersecurity posture." Deepwatch and Lacework address these challenges head-on, offering: Complete Cloud Security: Deepwatch and Lacework deliver end-to-end cloud security solutions that cover the entire attack surface within cloud environments, including workloads, containers, Kubernetes, and serverless architectures. This partnership ensures that critical assets remain secure while organizations leverage the benefits of cloud technology. Proactive Cloud Threat Detection: By combining expert security analysts and advanced threat detection capabilities, the partnership empowers organizations with proactive identification and swift response to emerging threats targeting cloud workloads. This proactive approach mitigates potential risks, safeguarding sensitive data and critical infrastructure. Advanced Security Analytics: Deepwatch's MDR services are enhanced by Lacework's powerful cloud-native application protection platform. This integration allows for extensive cloud security telemetry collection and correlation, enabling organizations to gain deep insights into their cloud environments. With holistic visibility, organizations can enhance threat hunting, incident investigation, and overall security posture. Efficient Incident Response: In the event of a security incident, Deepwatch and Lacework streamline the incident response process. The seamless integration between the platforms facilitates quick and effective incident containment, eradication, and recovery of threats targeting cloud workloads. This minimizes disruption to business operations and mitigates potential financial and reputational damages. Industry Expertise: Deepwatch's team of experienced security analysts, supported by their SOC-as-a-Service model, provides round-the-clock monitoring and actionable insights. Lacework's cloud security expertise, complemented by their machine learning capabilities, delivers unparalleled cloud threat intelligence. Together, they offer organizations the combined strength of their specialized knowledge to combat evolving cyber threats effectively. “The new partnership of Lacework and Deepwatch empowers customers by taking the cloud security burdens off of organizations and allowing them to instead focus on innovating and achieving their business outcomes,” said Brian Lanigan, VP of World Wide Channels and Alliances from Lacework. “The combination of Lacework’s best-in-class cloud security offerings and Deepwatch’s skilled personnel and industry-leading expertise allows us to provide our customers with solutions that continue to provide greater fidelity to help manage risk and further drive our focus on simplifying security for our customers.” Deepwatch and Lacework's collaboration enables organizations to proactively detect and respond to cyber threats, ensuring the protection of critical assets within cloud environments. With this partnership, enterprises can confidently navigate their digital future while minimizing risk and safeguarding their valuable data. About Deepwatch Deepwatch is the leader in managed detection and response, protecting organizations from ever-increasing cyber threats. Powered by Deepwatch’s cloud security platform, Deepwatch provides the industry’s fastest, most comprehensive detection and automated response to cyber threats together with tailored guidance from dedicated experts 24/7/365 to reduce risk and improve security posture. The world’s leading companies, from the Fortune 100 to mid-sized enterprises, trust Deepwatch to protect their business. Visit www.deepwatch.com to learn more. About Lacework Lacework offers the data-driven security platform for the cloud and is the leading cloud-native application protection platform (CNAPP) solution. Only Lacework can collect, analyze, and accurately correlate data — without requiring manually written rules — across an organization’s cloud and Kubernetes environments, and narrow it down to the handful of security events that matter. Security and DevOps teams around the world trust Lacework to secure cloud-native applications across the full lifecycle from code to cloud. Get started at www.lacework.com.

Read More