Story image

Trend Micro announces security products for Google Cloud Platform, Kubernetes and Gmail

10 Apr 2019

Cybersecurity solutions provider Trend Micro has announced enhancements to it'is Deep Security and Cloud App Security products designed to extend protection to virtual machines on the Google Cloud Platform, Kubernetes platform protection, container image scanning integration with the Google Kubernetes Engine (GKE) and Gmail on the G Suite.

Trend Micro A/NZ managing director Ashley Watkins says, “An increasing number of businesses are investing in Google Cloud and Kubernetes to drive efficiencies and business agility.

“It is critical for enterprises to remember that they share in the responsibility of what they put in the cloud.

“Customers count on us to ease the implementation and automation of security earlier in the development process and to ensure the safe migration between the data centre, hybrid cloud and even multi-cloud environments.”

To address this need, Trend Micro has created a Google Cloud Platform (GCP) Connector that enables automated discovery, visibility and protection of GCP virtual machine instances.

This eases the management by giving an instant view of all GCP workloads while also showing any virtual machines that might have been deployed outside of security purview or under shadow IT projects.

This feature of Trend Micro Deep Security has the ability to automatically deploy policy via automated workflows, combat advanced malware, enhance network and system security and capture workload telemetry for threat investigations.

Container users can benefit from Kubernetes platform protection at runtime with Deep Security intrusion prevention (IPS) rules, integrity monitoring and log inspection.

Trend Micro’s IPS approach allows users to inspect both east-west and north-south traffic between containers and platform layers like Kubernetes.

Additionally, Trend Micro’s Deep Security provides container image scanning in the build pipeline for vulnerabilities, malware, embedded secrets/ keys and compliance checks.

Deployed as a Kubernetes Helm Chart, this container image scanning simplifies security deployment on popular services like Google Kubernetes Engine (GKE), Azure Kubernetes Service (AKS) and Amazon Elastic Container Service for Kubernetes (EKS).

Research continues to show that email remains one of the most popular threat vectors which drove Trend Micro to expand its popular Cloud App Security platform to support Gmail users within G Suite.

Organisations are increasingly looking to cloud email services to boost productivity and agility.

Tech Data to distribute Nutanix backup solution in A/NZ
Tech Data will distribute HYCU Data Protection for Nutanix backup and recovery software to their network of partners across Australia and New Zealand.
Veeam releases v3 of its MS Office backup solution
One of Veeam’s most popular solutions, Backup for Office 365, has been upgraded again with greater speed, security and analytics.
Too many 'critical' vulnerabilities to patch? Tenable opts for a different approach
Tenable is hedging all of its security bets on the power of predictive, as the company announced general available of its Predictive Prioritisation solution within Tenable.io.
Safety solutions startup wins ‘radical generosity’ funding
Guardian Angel Security was one of five New Zealand businesses selected by 500 women (SheEO Activators) who contributed $1100 each.
Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
Why AI and behaviour analytics should be essential to enterprises
Cyber threats continue to increase in number and severity, prompting cybersecurity experts to seek new ways to stop malicious actors.
Scammers targeting more countries in sextortion scam - ESET
The attacker in the email claims they have hacked the intended victim's device, and have recorded the person while watching pornographic content.