sb-nz logo
Story image

Trend Micro receives AWS Outposts Ready designation

24 Sep 2020

Trend Micro’s hybrid cloud security offerings have been designated as AWS Outposts Ready, meaning Trend Micro solutions are now fully and demonstrably capable of integrating with Outposts deployments.

AWS Outposts is part of the AWS Service Ready Program. It enables data centers, colocation spaces, and on-premise facilities to take advantage of AWD infrastructure, services, APIs, and tools.

The AWS Outposts Ready platform also helps customers to find products that integrate with Outposts.

Trend Micro’s Outposts Ready designation enables teams to integrate Trend Micro hybrid cloud security within AWS and highlights Trend Micro as an AWS Partner Network member with products that have been fully tested on Outposts.

"We have proven industry leadership for cloud workloads, and we have been a member of the AWS Partner Network since 2012, making Trend Micro an obvious choice for companies throughout their journey to the cloud," comments Trend Micro vice president of cloud research, Mark Nunnikhoven.

"Now with AWS Outposts, we offer full data security continuity to support customers adopting the cloud technology that best fits their business needs."

 Trend Micro adds that the availability of its protection for AWS Outposts allows verticals such as government and financial services to further their digital transformation securely, while maintaining any data residency requirements.

AWS Outposts general manager Joshua Burgin says that AWS understands the importance of helping organisations identify security threats so they can act. 

"With Trend Micro's products available to customers on AWS Outposts, we are able to provide a comprehensive view of (a customer's) security posture on their infrastructure, on AWS Outposts, and in AWS Regions both on premises and in the cloud for a truly consistent hybrid experience."

Recently Trend Micro released research that shows cloud servers and on-premise servers can be compromised, abused, and rented out by cybercriminals. The company states that cloud servers could be more vulnerable because they don’t have the same protections as on-premise servers often have.

Attackers can exploit vulnerabilities in server software or use phishing attacks to steal logins and deploy malware. Some attackers may also target cloud API keys, which allows them to create new instances of virtual machines or supply resources. Attackers can then sell the compromised server assets on the dark web so that others may also use them in future attacks.

Trend Micro’s director of forward-looking threat research, Bob McArdle, says that a good rule of thumb is that whatever is most exposed is the most likely target to be exploited.

Story image
CrowdStrike targets Zero Trust blind spot with new offering
CrowdStrike has officially launched CrowdStrike Falcon Zero Trust Assessment (ZTA), designed to aid in overall security posture by delivering continuous real-time assessments across all endpoints in an organisation regardless of the location, network or user. More
Story image
Microsoft takes legal action to disrupt botnet and combat ransomware
Microsoft has announced it took action to disrupt a botnet, Trickbot, one of the world's most infamous botnets and prolific distributors of malware and ransomware.More
Story image
BlackBerry, Microsoft enter partnership for Teams integration
"Integrating BlackBerry AtHoc will ensure that any organisation managing critical events using Teams is able to contact, alert, and account for everyone within the organisation directly."More
Story image
How to secure your business against DDoS Attacks
With the upward trend of DDoS attacks this year, and an increased dependency on online channels across all industries, businesses need to be prepared, so they don’t suffer any disruption. More
Link image
How to head off a rise in DDoS attacks
Many businesses invest in costly DDoS mitigation and protection solutions, but few test them. NCC Group tests all environments and is one of only two AWS DDoS Test Partners. Claim 10% off your next DDoS service today.More
Story image
Surfshark rolls out WireGuard open source VPN protocol
When there is less code in a VPN, it is less susceptible to security vulnerabilities due to easier configuration and management, according to Surfshark.More