All resources sponsored by:

Trend Micro, Inc.

1 - 25 of 37 Matches
Automated Security at the Speed of DevOps
sponsored by Trend Micro, Inc.
WHITE PAPER:As organizations implement DevOps on AWS, they need to understand the security implications. In this white paper, explore the main challenges businesses face at the intersection of DevOps and security. Also, learn best practices for integrating security within your development process from the start.
Posted: 01 Aug 2019 | Published: 01 Aug 2019
Get This Now


Addressing Challenges in Hybrid Cloud Security
sponsored by Trend Micro, Inc.
WHITE PAPER:Enterprises are increasingly using hybrid environments, but this move can come with risks and challenges especially for organizations adopting DevOps. How can hybrid environment security fit naturally into development processes? Download this white paper to learn more.
Posted: 31 Jul 2019 | Published: 31 Jul 2019
Get This Now


6 Steps to Container Security
sponsored by Trend Micro, Inc.
WHITE PAPER:Container security is challenging, as it covers so many aspects of the development process and supporting infrastructure. The overall strategy can be simply put as "secure outside in". In this white paper, discover 6 steps to implementing the "secure outside in" approach.
Posted: 31 Jul 2019 | Published: 31 Mar 2019
Get This Now


What Makes a Standalone IPS so Effective?
sponsored by Trend Micro, Inc.
WHITE PAPER:In this white paper, explore the guiding principles security researchers need to follow when designing and developing effective vulnerability filters, with examples of how these filters can be used by an IPS to detect and block the latest threats.
Posted: 11 Jul 2019 | Published: 01 Mar 2019
Get This Now


Go Beyond Next-Gen IPS
sponsored by Trend Micro, Inc.
WHITE PAPER:Organizations have relied on next-gen IPS to detect and block threats at wire speed. But with the first next-gen IPS arriving on the scene more than a decade ago, at what point does "next generation" become "current generation"? In this white paper, learn why enterprises can no longer solely rely on a next-gen IPS to protect their networks.
Posted: 11 Jul 2019 | Published: 31 May 2018
Get This Now


Stay Protected with a Layered Network Defense
sponsored by Trend Micro, Inc.
WHITE PAPER:Learn why standalone next-generation intrusion prevention systems (NGIPS) are still an enterprise requirement.
Posted: 10 Jul 2019 | Published: 10 Jul 2019
Get This Now


Breach Detection Systems Test Report
sponsored by Trend Micro, Inc.
ANALYST REPORT:NSS Labs performed an independent test of the Trend Micro Deep Discovery Inspector Model 4000. In this Breach Detection System Test Report, explore the Deep Discover Inspector's security effectiveness, network performance and more.
Posted: 10 Jul 2019 | Published: 11 Oct 2018
Get This Now


Threat Protection System Assessment
sponsored by Trend Micro, Inc.
DATA SHEET:In this paper, learn how TippingPoint TPS can increase the security posture of an organization as well as assist users in meeting certain requirements of the Payment Card Industry Data Security Standard (PCI DSS).
Posted: 09 Jul 2019 | Published: 09 Jul 2019
Get This Now


The Critical Role of Endpoint Detection and Response
sponsored by Trend Micro, Inc.
RESEARCH CONTENT:Conventional security solutions are useful and provide some level of protection. However, surveys find that the current level of protection is simply not adequate. In this Osterman Research report, explore why many organizations are deploying endpoint detection and response technologies as a supplement to their existing security defenses.
Posted: 24 May 2019 | Published: 30 Apr 2019
Get This Now


Enterprise Email Security, Q2 2019: The 12 Providers That Matter Most And How They Stack Up
sponsored by Trend Micro, Inc.
RESEARCH CONTENT:Email is a critical business function deeply embedded in business processes. Its ubiquity makes email a platform for credential phishing attempts, malware, spam, and business email compromise. This research report suggests 3 key considerations to look for when choosing an email content security provider.
Posted: 21 May 2019 | Published: 16 May 2019
Get This Now


Five Myths of Network Security in a Hybrid Infrastructure
sponsored by Trend Micro, Inc.
WHITE PAPER:Not surprisingly, the transition to a hybrid infrastructure is creating confusion among both security professionals and vendors regarding where security controls should be deployed. In this white paper, explore 5 myths about the need for traditional network security in a hybrid infrastructure.
Posted: 13 May 2019 | Published: 31 Mar 2019
Get This Now


Advice and Tips About DevOps for Beginners
sponsored by Trend Micro, Inc.
EGUIDE:Being brand new to DevOps is intimidating. After all, its methodology alters the traditional definitions of software development, deployment, and even security. Jump into this E-Guide to build a rock-solid foundation for your first forays into the DevOps world.
Posted: 09 May 2019 | Published: 09 May 2019
Get This Now


Why Security Matters in DevOps
sponsored by Trend Micro, Inc.
EGUIDE:DevSecOps has become an essential component to the way we develop, ship, and maintain code, but without proper security practices in place, the DevOps pipeline can lead developers to deploy compromised code. Discover why security for DevOps is so important, as well as tools that can help you build security into your DevOps pipeline.
Posted: 09 May 2019 | Published: 07 May 2019
Get This Now


A Guide to Joining DevOps and Security
sponsored by Trend Micro, Inc.
EGUIDE:If you want to build out your DevOps and security programs in order to improve your application security initiatives, vulnerability testing has to be baked into your day-to-day processes. In this e-guide, explore tips for blending DevOps and security in order to help your organization catch vulnerabilities and resolve them quickly.
Posted: 09 May 2019 | Published: 03 May 2019
Get This Now


Shipping Fast
sponsored by Trend Micro, Inc.
WEBCAST:In the security world, you don't normally hear people talking about moving fast. However, a modern and resilient security strategy is just as fast as the rest of your business. In this webcast, listen as Mark Nunnikhoven, VP of Cloud Research at Trend Micro discusses the benefits of reducing the number of security tools your team uses.
Posted: 05 Apr 2019 | Premiered: Apr 5, 2019
Get This Now


Servers, Servers, Everywhere: How the Hybrid Cloud is a Game Changer for Security
sponsored by Trend Micro, Inc.
WHITE PAPER:While the hybrid cloud offers many benefits, it is important that existing architectures are maintained and secured. In this white paper, learn more about the dynamics of the hybrid cloud and the security challenges introduced at both the business and technical levels.
Posted: 05 Apr 2019 | Published: 31 Mar 2019
Get This Now


6 Steps to Comprehensive Container Security
sponsored by Trend Micro, Inc.
WHITE PAPER:Container security is challenging, as it covers so many aspects of the development process and supporting infrastructure. The overall strategy can be simply put as "secure outside in". In this white paper, discover 6 steps to implementing the "secure outside in" approach.
Posted: 04 Apr 2019 | Published: 31 Mar 2019
Get This Now


Addressing Security Challenges in Hybrid Cloud Environments
sponsored by Trend Micro, Inc.
WHITE PAPER:Enterprises are increasingly using hybrid environments, but this move can come with risks and challenges especially for organizations adopting DevOps. How can hybrid environment security fit naturally into development processes? Download this white paper to learn more.
Posted: 04 Apr 2019 | Published: 04 Apr 2019
Get This Now


Run Applications Anywhere
sponsored by Trend Micro, Inc.
WEBCAST:In this webcast, listen as Mark Nunnikhoven, VP of Cloud Research at Trend Micro discusses how you can implement a simpler strategy for maintaining security while running your applications in any environment.
Posted: 04 Apr 2019 | Premiered: Apr 4, 2019
Get This Now


Building Secure Software
sponsored by Trend Micro, Inc.
WEBCAST:Building securely doesn't just mean the code you are creating is high quality and doesn't have any obvious security vulnerabilities; it's more complicated than that. You have to account for that complexity when checking for vulnerabilities. In this webcast, listen as Mark Nunnikhoven of Trend Micro discusses how to build securely.
Posted: 03 Apr 2019 | Premiered: Apr 3, 2019
Get This Now


Orion Health Automates Security on AWS and Gains Centralized Management
sponsored by Trend Micro, Inc.
CASE STUDY:Orion Health embarked on a journey to build a SOC to support the deployment of Amadeus on AWS. They wanted everything on AWS to be automated. Having consistent, automated policies and processes would help to ensure that their customers' data was protected. In this case study, learn about Orion Health's experience using Trend Micro's Deep Security.
Posted: 03 Apr 2019 | Published: 03 Apr 2019
Get This Now


10 Must Knows For Architecting Your Multi-Cloud Security Strategy
sponsored by Trend Micro, Inc.
WHITE PAPER:Security should be an integral part of your cloud strategy. Designing and implementing security controls for your public cloud environment, requires a thorough understanding of the division of responsibilities between the cloud service provider and you as a customer. In this white paper, explore 10 things you should know about multi-cloud security.
Posted: 03 Apr 2019 | Published: 03 Apr 2019
Get This Now


Leveraging the Agility of DevOps Processes to Secure Hybrid Clouds
sponsored by Trend Micro, Inc.
WHITE PAPER:In this white paper, explore how hybrid clouds bring changes to business models, methodologies, and technologies, the intersection of which represents an opportunity to efficiently improve an organization's cybersecurity while also enabling the speed of business.
Posted: 02 Apr 2019 | Published: 30 Apr 2018
Get This Now


Market Guide for Cloud Workload Protection Platforms: Assessment
sponsored by Trend Micro, Inc.
RESOURCE:With the rise of cloud adoption, there is a fast-moving shift from traditional signature-based end-user security to a much more tactful and strategic approach to protecting cloud servers and workloads. In this resource, explore 5 buyer recommendations to address security and compliance risks inherent in public cloud environments.
Posted: 02 Apr 2019 | Published: 02 Apr 2019
Get This Now


Using Trend Micro's Hybrid Cloud Security Solution to Meet PCI DSS 3.2 Compliance
sponsored by Trend Micro, Inc.
WHITE PAPER:This white paper examines the applicability of Trend Micro's Hybrid Cloud Security Solution, specifically Trend Micro Deep Security, to secure Payment Card Industry (PCI) data in accordance with the PCI DSS when used in physical, virtual, cloud, or container environments.
Posted: 27 Feb 2019 | Published: 31 Aug 2017
Get This Now


1 - 25 of 37 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement