Story image

Trend Micro extends container security solution to work at the speed of DevOps

14 Jun 2018

Cybersecurity solutions company Trend Micro has announced the expansion of its security solution for containers with Deep Security Smart Check.

This component provides continuous container image scanning to complement the existing Deep Security runtime container protection.

To spot malware and vulnerabilities most effectively, Trend Micro built Deep Security Smart Check to scan container images before deployment.

The result is that security issues often can be resolved in the development cycle as opposed to after the release of the application.

"A key to increasing security for applications starts with building security into the continuous integration and development (CI/CD) pipeline," says TRC Companies, Inc technology senior director Jason Cradit.

"Trend Micro has met the requirements of development with tools that fit their environment and do not slow them down."

Additionally, Trend Micro is launching an extensive new suite of APIs and an automation centre with resources to help enable security automation through better integrations.

Trend Micro Deep Security customers use product APIs to enable continuous delivery, status monitoring, IT service management and orchestration tools integration, such as the newly launched Amazon Elastic Container Service for Kubernetes. 

"Container platforms are enabling organisations to achieve faster software development release cycles, and they do not accept slowing down for additional security measures," says Trend Micro SVP hybrid cloud security GM Bill McGee.

"All workload environments require security -- container environments are no different.

“Their sheer volume and temporary nature can create security gaps for attackers to exploit,” McGee says.  

“We can also expect that attackers who attack live server application environments will move their focus to the software build cycle, trying to deploy malware from within the build environment."

Organisations are increasingly shifting their workloads into hybrid cloud services.

Deep Security Smart Check supports the DevOps demands to continuously build secure, ship fast and run anywhere.

It is another example of how Trend Micro Deep Security continues to provide advanced protection and adapt to customer infrastructure change, from virtualisation, to public cloud, and now container environments.

Singapore firm to launch borderless open data sharing platform
Singapore-based Ocean Protocol, a decentralised data exchange that promotes data sharing, has revealed details of what could be the kickstart to a global and borderless data economy.
Huawei picks up accolades for software-defined camera ecosystem
"The company's software defined capabilities enable it to future-proof its camera ecosystem and greatly lower the total cost of ownership (TCO), as its single camera system is applicable to a variety of application use cases."
Aussies too lax about IoT security - McAfee
Aussie consumers are at a loss when it comes to securing the increasing number of connected devices in their homes and are often opting to take no action at all.
Barracuda expands MSP security offerings with RMM acquisition
Managed Workplace delivers an RMM platform with security tools and services, such as site security assessments, Office 365 account management, and integrated third-party antivirus.
Flashpoint: APAC companies must factor geopolitics in cyber strategies
The diverse geopolitical and economic interests of the states in the region play a significant role in driving and shaping cyber threat activity against entities operating in APAC.
Expert offers password tips to aid a stress-free sleep
For many cybersecurity professionals, the worries of the day often crawl into night-time routines - LogMeIn says better password practices can help.
SolarWinds extends database anomaly detection
As organisations continue their transition from purely on-premises operations into both private and public cloud infrastructures, adapting their IT monitoring and management capabilities can pose a significant challenge.
NATO picks BlackBerry's encrypted voice technology to secure calls
The NCI Agency acquires, deploys and defends communication systems for NATO's political decision-makers and command centres