All resources sponsored by:

Trend Micro

1 - 25 of 53 Matches
The Secure DevOps Imperative
sponsored by Trend Micro
VIDEO:In this webinar, join experts from ESG and Trend Micro as they discuss, the composition of cloud-native applications, the challenges that come with securing cloud-native environments and Secure DevOps best practices.
Posted: 28 May 2020 | Premiered: 28 May 2020
Get This Now


Trend Micro Cloud One: Cloud Native Application Security
sponsored by Trend Micro
WEBCAST:In this Trend Micro cloud One webinar, join Kyle Klassen, Product Manager of Cloud Native Application Security solutions and Mike Milner Director of Application security as they discuss the Cloud Native Applications framework.
Posted: 27 May 2020 | Premiered: May 27, 2020
Get This Now


Principles to Make your Cloud Migration Journey Secure
sponsored by Trend Micro
WEBCAST:View this webinar to gain the tools to smooth out your transition to the cloud.Hear from Trend Micro’s Principal Engineer and Cloud Advisor, Jason Dablow, about the art of migrating applications to the cloud—utilizing the scalability and agility of these hyper-dynamic environments.
Posted: 27 May 2020 | Premiered: May 27, 2020
Get This Now


Threats Using Coronavirus as a Lure
sponsored by Trend Micro
WEBCAST:As the coronavirus continues to spread, so too does the wave of cyberattacks and campaigns that leverage the pandemic as their entry point. In this webinar, join Jon Clay, Director of Global Threat Communications at Trend Micro, as he highlights current threat trends and common tactics being used by hackers.
Posted: 26 May 2020 | Premiered: May 26, 2020
Get This Now


Cloud Misconfiguration Causes Breaches – How to Avoid It
sponsored by Trend Micro
WEBCAST:The common security challenges faced in the cloud stem from misconfiguration, compliance, and an exploding set of cloud infrastructure services. How do you avoid these challenges? View this webinar from Trend Micro to find out.
Posted: 26 May 2020 | Premiered: May 26, 2020
Get This Now


FilelessThreats 101
sponsored by Trend Micro
RESOURCE:This infographic provides a high-level overview of fileless threats: What they are, how they operate, where the vulnerabilities lie and how to protect against them. Read on to equip yourself with the knowledge to identify and prevent fileless attacks.
Posted: 21 May 2020 | Published: 21 May 2020
Get This Now


Trend Micro: Cloud One Conformity
sponsored by Trend Micro
DATA SHEET:In this product overview, learn about the key capabilities and benefits of Trend Micro Cloud One – Conformity and how it can help you manage misconfigurations of cloud resources (security posture) in a multi-cloud environment.
Posted: 21 May 2020 | Published: 21 May 2020
Get This Now


Untangling the Web of Cloud Security Threats
sponsored by Trend Micro
WHITE PAPER:Understanding how security is a shared responsibility is critical. Download this white paper for examples of threats and risks that organizations can face if they make mistakes in configuring cloud services, and how they could address potential security issues as part of the shared-responsibility model.
Posted: 21 May 2020 | Published: 21 May 2020
Get This Now


XDR For Users
sponsored by Trend Micro
DATA SHEET:Given that 94% of malware incidents come from email, combining email with endpoint detection and response is a powerful capability. Learn about the key capabilities and benefits of Trend Micro XDR for Users, a complete SaaS offering that includes protection, detection, and response across endpoints and email.
Posted: 21 May 2020 | Published: 21 May 2020
Get This Now


Smart Protection Complete
sponsored by Trend Micro
DATA SHEET:In this brief, learn about Trend Micro Smart Protection Complete, powered by XGen security, a connected suite of security capabilities that protects your users no matter where they go or what they do.
Posted: 20 May 2020 | Published: 20 May 2020
Get This Now


COVID-19 Related Data Security Threats
sponsored by Trend Micro
RESOURCE:The global health crisis is dangerous enough as it is which makes the added concern of cyber threats almost overwhelming. Access this resource from Trend Micro to learn what they have observed from studying this type of attack in order to explain how to effectively fight back against them.
Posted: 20 May 2020 | Published: 20 May 2020
Get This Now


AppSec Trend Report
sponsored by Trend Micro
RESEARCH CONTENT:Dive into Trend Micro’s AppSec Trend Report to uncover key research findings on the role of application developers in the fight against vulnerabilities, growing AppSec testing techniques, AppSec policies, and more.
Posted: 19 May 2020 | Published: 19 May 2020
Get This Now


Cloud One File Storage Security datasheet
sponsored by Trend Micro
DATA SHEET:In this data sheet, learn how Trend Micro Cloud One – File Storage Security protects your cloud-native application architectures through malware scanning, integration into your custom workflows, and broad cloud storage platform support—freeing you to go further and do more.
Posted: 16 Apr 2020 | Published: 16 Apr 2020
Get This Now


Cloud One™ — Container Security
sponsored by Trend Micro
WHITE PAPER:As cloud-first application development strategies become more of the norm, organizations must focus on container security. The Trend Micro Cloud One Container Security platform, designed for DevOps, protects your organization with rapid detection of malware, compliance violations, and vulnerabilities. Download the data sheet to learn more.
Posted: 16 Apr 2020 | Published: 16 Apr 2020
Get This Now


Cloud One Network Security Datasheet
sponsored by Trend Micro
DATA SHEET:In this data sheet, get a glimpse at some of the key features & capabilities of Trend Micro Cloud One, designed to provide network layer security for your hybrid cloud capabilities. Read on to learn more about the offering and discover if it’s a good fit for your organization’s needs.
Posted: 14 Apr 2020 | Published: 14 Apr 2020
Get This Now


The Future is Misconfigured
sponsored by Trend Micro
WHITE PAPER:Traditional security practices aren’t cutting it for containers. Organizations are adopting DevSecOps principles to mediate container security risks and minimize third-party vulnerabilities. Learn more about the demands of container security and how to meet them in this guide.
Posted: 14 Apr 2020 | Published: 14 Apr 2020
Get This Now


Cloud One Overview Solution Brief
sponsored by Trend Micro
PRODUCT OVERVIEW:In order to fully realize the benefits of cloud technologies, adequate cloud security is a critical pillar. In this solution brief, explore some of the key features and capabilities of Trend Micro Cloud One, a security services platform designed to provide the flexibility you need without slowing down your business or application delivery.
Posted: 13 Apr 2020 | Published: 13 Apr 2020
Get This Now


Cloud App Security Report Infographic
sponsored by Trend Micro
RESOURCE:Although less than 400,000 business email compromise (BEC) attacks were recorded in 2019, they accounted for half of all cybercrime losses in 2019 ($1.7 billion). Download this email security threats infographic to learn more about the prevalence of BEC attacks in 2019, as well as phishing and other malware attacks.
Posted: 13 Apr 2020 | Published: 13 Apr 2020
Get This Now


Pawn Storm in 2019: A Year of Scanning and Credential Phishing on High-Profile Targets
sponsored by Trend Micro
WHITE PAPER:Over the years, Trend Micro has unraveled how the threat actor group, Pawn Storm has employed spear-phishing emails, and phishing sites, and how it targeted entities ranging from the defense industry to political parties. Tap into Trend Micro’s recent report to see what the threat group is up to now.
Posted: 10 Apr 2020 | Published: 10 Apr 2020
Get This Now


Cloud One™ - Application Security
sponsored by Trend Micro
DATA SHEET:As businesses realign to cloud-native application architectures, it’s imperative to keep security at the top of the list of priorities. To learn how application security can integrate into your application delivery and customer satisfaction, download this data sheet now.
Posted: 09 Apr 2020 | Published: 09 Apr 2020
Get This Now


Seeping Through the Gaps
sponsored by Trend Micro
WHITE PAPER:Without the proper security measures in place, threats can seep in through the gaps in supply chains and software development pipelines. In this guide, learn about the rise of supply chain attacks and what your organization can do to prevent these vulnerabilities.
Posted: 09 Apr 2020 | Published: 09 Apr 2020
Get This Now


Cloud One™ – Workload Security
sponsored by Trend Micro
DATA SHEET:In this data sheet, learn how your DevOps team can utilize a security platform that is automated, flexible, and provides an all-in-one solution—while still upgrading your technology and teams with the most up-to-date tools. Download the data sheet here to learn more about the platform.
Posted: 09 Apr 2020 | Published: 09 Apr 2020
Get This Now


Six Steps to Comprehensive Container Security in AWS
sponsored by Trend Micro
WHITE PAPER:Containers grant developers the power to create and deliver applications faster and more consistently. But, as with any technology, there’s a catch. Containers can also increase infrastructure complexity, which in turn leads to overlooked security gaps. In this guide, find 6 steps you can take toward comprehensive container security in AWS.
Posted: 08 Apr 2020 | Published: 08 Apr 2020
Get This Now


How Can Trend Micro XDR Solve Your Detection and Response Challenges
sponsored by Trend Micro
RESOURCE:In the last 5 years, there’s been a 67% increase in security breaches. Disconnected security layers make analyzing and investigating threats a challenge. Additionally, slow and inadequate response increases the impact of the attack. In this infographic, learn how Trend Micro XDR can help solve your detection and response challenges.
Posted: 13 Mar 2020 | Published: 13 Mar 2020
Get This Now


Build Secure for DevOps - Whiteboarding Video
sponsored by Trend Micro
VIDEO:View this whiteboarding video to hear from a security strategist at Trend Micro about why we need to start thinking about security automation and how smart controls can be used to help meet compliance and security requirements.
Posted: 12 Mar 2020 | Premiered: 12 Mar 2020
Get This Now


1 - 25 of 53 Matches
Page: 2 3 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info