Trend Micro

  1. partners
  2. Trend Micro

Trend Micro provides internet content security software and cloud computing security. They focus on virtualization, endpoint protection, data security, cloud and web threats. Nowadays, it is extremely important to protect corporate data. After all, users have access everywhere and anytime: at the workplace, at home, on the road… 

At Orange Cyberdefense, we help our customers to protect themselves against threats on user endpoints and in the data center by using Trend Micro solutions. 

Trend Micro Solutions

Endpoint Protection 

Trend Micro’s high-performance endpoint security suite secures your virtual and your physical desktops against the current dynamic threat landscape. To do that,  it detects and responds to threats automatically at four important moments in the threat lifecycle: entry point (when malware arrives on the endpoint), pre-execution, at runtime, then at the exit point (when malware is attempting to exfiltrate data, spread laterally, etc.). 

Hybrid Cloud Security 

Server, cloud workloads and containers are subject to multiple forms of attack, including: 

  • Network and/or application attacks (PHP vulnerabilities) – these can be network and/or application based, including SQL injection, cross-site scripting (XSS), remote code execution (RCE), and more 
  • Vulnerabilities – servers may have multiple different kinds of vulnerabilities (including major ones such as Heartbleed and the Apache Struts vulnerability) at any given time 
  • Malware – including ransomware (such as WannaCry, GandCrab, and SynAck) and crypto-mining attacks 
  • Open-source – attackers are increasingly looking to the software build pipeline as an avenue for attack. As rapid development processes such as DevOps continue to gain widespread adoption, developers will continue to re-use public and open-source code which can contain embedded malware or vulnerabilities 

Deep Security provides a broad range of security capabilities to protect again vulnerabilities, malware and unauthorized change. 

Deep Security allows consistent protection optimized across their hybrid of cloud, multi-cloud, and datacenter even containers. 

Deep Security enables security to “go automated” by integrating into DevOps processes to ensure adoption of the security technology every time.