All resources sponsored by:

Trend Micro

1 - 25 of 62 Matches
Trend Micro Vulnerability Protection Overview
sponsored by Trend Micro
WHITE PAPER:This document outlines the process behind IDS/IPS rule creation and answers common questions about vulnerability coverage and security controls across Trend Micro’s various offerings. Read on to learn more about rule creation, quality assurance testing, hybrid cloud workload security, and more.
Posted: 11 Sep 2020 | Published: 30 Jun 2020
Get This Now


The Hacker Infrastructure and Underground Hosting
sponsored by Trend Micro
RESOURCE:How are criminals able to host service and infrastructure on the internet without a takedown or an arrest? What makes them hard to track down? Read this research paper to learn how criminal forums have evolved to adapt to the demands of the underground market and the ways they have enabled easier access to underground hosting.
Posted: 11 Sep 2020 | Published: 11 Sep 2020
Get This Now


Worldwide Hybrid Cloud Workload Security Market Shares
sponsored by Trend Micro
ANALYST REPORT:This IDC study presents the worldwide hybrid cloud workload security market shares for 2019 (updated in June 2020.) Download the report to uncover the leaders and those who own the rest of the market.
Posted: 10 Sep 2020 | Published: 10 Sep 2020
Get This Now


Apex One solution brief
sponsored by Trend Micro
PRODUCT OVERVIEW:The modern organization consists of distributed endpoints and mobile devices – as such, these new environments require threat detection capabilities that go beyond the scope of traditional threat management. Read this solution brief to learn more about Trend Micro’s Apex One, a modern endpoint threat detection & management offering.
Posted: 03 Sep 2020 | Published: 03 Sep 2020
Get This Now


Apex One Datasheet
sponsored by Trend Micro
DATA SHEET:The scales have almost fully tipped toward remote work. This means that endpoints need to be more secure than ever before. Malware and ransomware are rampant, and without state-of-the-art vulnerability defense and even features such as encryption, you could be at a major risk. Take a look at this data sheet to discover modern endpoint security.
Posted: 02 Sep 2020 | Published: 02 Sep 2020
Get This Now


Securing the Pandemic-Disrupted Workplace
sponsored by Trend Micro
ANALYST REPORT:COVID-19 has granted threat actors the permission to get their hands as dirty as possible. A spike in remote work has given them a larger attack surface than ever, and although the number of new cases is decreasing, these attacks show no signs of going away. To get the numbers behind the danger, jump into this in-depth report.
Posted: 02 Sep 2020 | Published: 02 Sep 2020
Get This Now


Cloud Migration: Achieve More Together with Four Security Considerations
sponsored by Trend Micro
WHITE PAPER:Take a look at this white paper to find four security considerations that will help keep you prepared and empowered to properly secure your cloud migration and future cloud projects – without slowing down the process.
Posted: 31 Aug 2020 | Published: 31 Aug 2020
Get This Now

TOPICS:  Cloud Computing

Four Ways to Get Cloud-Native Smart and Secure
sponsored by Trend Micro
WHITE PAPER:Check out this white paper to learn about a security services platform for organizations developing apps in the cloud, making cloud-native application security simple.
Posted: 31 Aug 2020 | Published: 31 Aug 2020
Get This Now


Cloud Operational Excellence Guardrails to Avoid Cloud Misconfigurations
sponsored by Trend Micro
WHITE PAPER:Check out this guide to learn about a solution for cloud operational excellence, and how it can provide continuous security, compliance, and governance for your cloud workloads.
Posted: 31 Aug 2020 | Published: 31 Aug 2020
Get This Now

TOPICS:  Cloud Computing

Shifts in Underground Markets: Past, Present, and Future
sponsored by Trend Micro
WHITE PAPER:This research paper presents a wide-ranging view of dark web marketplaces and underground cybercriminal forums. It delves into notable trends and market movements within these selling environments. Read on to uncover predictions on the goods and services Trend Micro expects to be on the rise in the next three years.
Posted: 25 Jun 2020 | Published: 25 Jun 2020
Get This Now


Innovation Insight for Extended Detection and Response
sponsored by Trend Micro
WHITE PAPER:Access this white paper for an overview of XDR and weigh its pros and cons to decide whether it could be an effective solution for your organization.
Posted: 25 Jun 2020 | Published: 24 Jun 2020
Get This Now


Hybrid Cloud Security & Cloud One Overview
sponsored by Trend Micro
VIDEO:Cloud security needs to be simplified in order to be effective. In this video, learn all about Trend Micro Cloud One and how it can automatically secure all of your different environments within one streamlined platform.
Posted: 22 Jun 2020 | Premiered: 22 Jun 2020
Get This Now


MITRE ATT&CK Evaluations — APT29
sponsored by Trend Micro
WHITE PAPER:In addition to their framework enabling organizations to learn about common cyberattacks, MITRE ATT&CK also offers an evaluation service in which they assess an organization’s security posture against simulated versions of known attacks. Download this white paper for an in-depth look at Trend Micro’s evaluation results.
Posted: 22 Jun 2020 | Published: 21 Apr 2020
Get This Now


Build in the Cloud with Confidence
sponsored by Trend Micro
DATA SHEET:Download this brief to learn how Trend Micro can help you map to the AWS Well-Architected Framework so you can build viable cloud architectures and meet ongoing compliance requirements, keeping your environment secure and scalable.
Posted: 19 Jun 2020 | Published: 19 Jun 2020
Get This Now


The Secure DevOps Imperative
sponsored by Trend Micro
VIDEO:In this webinar, join experts from ESG and Trend Micro as they discuss, the composition of cloud-native applications, the challenges that come with securing cloud-native environments and Secure DevOps best practices.
Posted: 28 May 2020 | Premiered: 28 May 2020
Get This Now


Trend Micro Cloud One: Cloud Native Application Security
sponsored by Trend Micro
WEBCAST:In this Trend Micro cloud One webinar, join Kyle Klassen, Product Manager of Cloud Native Application Security solutions and Mike Milner Director of Application security as they discuss the Cloud Native Applications framework.
Posted: 27 May 2020 | Premiered: May 27, 2020
Get This Now


Principles to Make your Cloud Migration Journey Secure
sponsored by Trend Micro
WEBCAST:View this webinar to gain the tools to smooth out your transition to the cloud.Hear from Trend Micro’s Principal Engineer and Cloud Advisor, Jason Dablow, about the art of migrating applications to the cloud—utilizing the scalability and agility of these hyper-dynamic environments.
Posted: 27 May 2020 | Premiered: May 27, 2020
Get This Now


Threats Using Coronavirus as a Lure
sponsored by Trend Micro
WEBCAST:As the coronavirus continues to spread, so too does the wave of cyberattacks and campaigns that leverage the pandemic as their entry point. In this webinar, join Jon Clay, Director of Global Threat Communications at Trend Micro, as he highlights current threat trends and common tactics being used by hackers.
Posted: 26 May 2020 | Premiered: May 26, 2020
Get This Now


Cloud Misconfiguration Causes Breaches – How to Avoid It
sponsored by Trend Micro
WEBCAST:The common security challenges faced in the cloud stem from misconfiguration, compliance, and an exploding set of cloud infrastructure services. How do you avoid these challenges? View this webinar from Trend Micro to find out.
Posted: 26 May 2020 | Premiered: May 26, 2020
Get This Now


FilelessThreats 101
sponsored by Trend Micro
RESOURCE:This infographic provides a high-level overview of fileless threats: What they are, how they operate, where the vulnerabilities lie and how to protect against them. Read on to equip yourself with the knowledge to identify and prevent fileless attacks.
Posted: 21 May 2020 | Published: 21 May 2020
Get This Now


Trend Micro: Cloud One Conformity
sponsored by Trend Micro
DATA SHEET:In this product overview, learn about the key capabilities and benefits of Trend Micro Cloud One – Conformity and how it can help you manage misconfigurations of cloud resources (security posture) in a multi-cloud environment.
Posted: 21 May 2020 | Published: 21 May 2020
Get This Now


Untangling the Web of Cloud Security Threats
sponsored by Trend Micro
WHITE PAPER:Understanding how security is a shared responsibility is critical. Download this white paper for examples of threats and risks that organizations can face if they make mistakes in configuring cloud services, and how they could address potential security issues as part of the shared-responsibility model.
Posted: 21 May 2020 | Published: 21 May 2020
Get This Now


XDR For Users
sponsored by Trend Micro
DATA SHEET:Given that 94% of malware incidents come from email, combining email with endpoint detection and response is a powerful capability. Learn about the key capabilities and benefits of Trend Micro XDR for Users, a complete SaaS offering that includes protection, detection, and response across endpoints and email.
Posted: 21 May 2020 | Published: 21 May 2020
Get This Now


Smart Protection Complete
sponsored by Trend Micro
DATA SHEET:In this brief, learn about Trend Micro Smart Protection Complete, powered by XGen security, a connected suite of security capabilities that protects your users no matter where they go or what they do.
Posted: 20 May 2020 | Published: 20 May 2020
Get This Now


COVID-19 Related Data Security Threats
sponsored by Trend Micro
RESOURCE:The global health crisis is dangerous enough as it is which makes the added concern of cyber threats almost overwhelming. Access this resource from Trend Micro to learn what they have observed from studying this type of attack in order to explain how to effectively fight back against them.
Posted: 20 May 2020 | Published: 20 May 2020
Get This Now


1 - 25 of 62 Matches
Page: 2 3 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info