Story image

Trend Micro extends container security solution to work at the speed of DevOps

14 Jun 2018

Cybersecurity solutions company Trend Micro has announced the expansion of its security solution for containers with Deep Security Smart Check.

This component provides continuous container image scanning to complement the existing Deep Security runtime container protection.

To spot malware and vulnerabilities most effectively, Trend Micro built Deep Security Smart Check to scan container images before deployment.

The result is that security issues often can be resolved in the development cycle as opposed to after the release of the application.

"A key to increasing security for applications starts with building security into the continuous integration and development (CI/CD) pipeline," says TRC Companies, Inc technology senior director Jason Cradit.

"Trend Micro has met the requirements of development with tools that fit their environment and do not slow them down."

Additionally, Trend Micro is launching an extensive new suite of APIs and an automation centre with resources to help enable security automation through better integrations.

Trend Micro Deep Security customers use product APIs to enable continuous delivery, status monitoring, IT service management and orchestration tools integration, such as the newly launched Amazon Elastic Container Service for Kubernetes. 

"Container platforms are enabling organisations to achieve faster software development release cycles, and they do not accept slowing down for additional security measures," says Trend Micro SVP hybrid cloud security GM Bill McGee.

"All workload environments require security -- container environments are no different.

“Their sheer volume and temporary nature can create security gaps for attackers to exploit,” McGee says.  

“We can also expect that attackers who attack live server application environments will move their focus to the software build cycle, trying to deploy malware from within the build environment."

Organisations are increasingly shifting their workloads into hybrid cloud services.

Deep Security Smart Check supports the DevOps demands to continuously build secure, ship fast and run anywhere.

It is another example of how Trend Micro Deep Security continues to provide advanced protection and adapt to customer infrastructure change, from virtualisation, to public cloud, and now container environments.

Opinion: Moving applications between cloud and data centre
OpsRamp's Bhanu Singh discusses the process of moving legacy systems and applications to the cloud, as well as pitfalls to avoid.
Global server market maintains healthy growth in Q4 2018
New data from Gartner reveals that while there was growth in the market as a whole, some of the big vendors actually declined.
Cloud application attacks in Q1 up by 65% - Proofpoint
Proofpoint found that the education sector was the most targeted of both brute-force and sophisticated phishing attempts.
Huawei to deploy Open Rack in all its public cloud data centres
Tech giant Huawei has unveiled plans to adopt Open Rack proposed by the Open Compute Project in its new public cloud data centres across the globe.
Beyond renewables: Emerging technologies for “greening” the data centre
Park Place Technologies’ CEO shares his views on innovations aside from renewable energy that can slim a data centre’s footprint.
Opinion: 5G’s imminent impact on data centre infrastructure
Digital Realty’s Joseph Badaoui shares his thoughts on how 5G will transform data centre infrastructure now and beyond.
SolarWinds extends database anomaly detection
As organisations continue their transition from purely on-premises operations into both private and public cloud infrastructures, adapting their IT monitoring and management capabilities can pose a significant challenge.
Was Citrix unaware of its own data breach until the FBI got involved?
According to a blog post from Citrix’s CSIO Stan Black, the FBI contacted Citrix on March 6 and advised that international cybercriminals had allegedly gained access to Citrix’s internal network.