Best Practices around Multi-Cloud Governance and Achieving Operational Excellence

preview_player
Показать описание
Fernando Cardozo, Trend Micro

Whether you are using cloud providers such as AWS, Azure or GCP to host your sensitive applications and data, or taking advantage of the speed that Dropbox and other cloud software-as-a-service (SaaS) providers offer, you have a role to play in cloud security. These services and SaaS providers work hard to deliver a secure environment, but you are ultimately responsible for your data and workloads.

Whether it’s with additional security controls to meet internal or external compliance (e.g., PCI, HIPAA, NIST) requirements or protection against ransomware attacks (WannaCry and beyond), zero-day vulnerabilities, and other sophisticated attacks, Trend Micro can help by using a blend of cross-generational threat defense techniques to protect cloud workloads from breaches and accelerates compliance with:
-IDS/IPS, anti-malware, integrity monitoring, application control, and more in a single lightweight agent
-Deep API integration with AWS, Azure and GCP
-Protection for Docker containers and tools like AWS ECS, Swarm & Kubernetes
-Automation templates (GitHub, AWS Quick Start) and deployment scripts

Trend Micro will provide case studies, across multiple industries, that specifically outline the capabilities of security services provided by AWS, Azure and GCP, and when/where end users and third party vendors such as Trend Micro must assume responsibility for security.
Рекомендации по теме