In an ever-evolving threat landscape, cybersecurity is no longer just about safeguarding sensitive data and other digital assets by merely keeping cybercriminals and other threat actors out of networks, systems, devices, and underlying technologies. Now it is also about having to proactively stop them in their tracks before they even gain a foothold in their spheres of operation.

The notable threats in the first half of 2019 drove this point home, what with the prevalence of so-called fileless threats that “lived off the land” — abusing legitimate and typically whitelisted system tools to do their malicious bidding — and the presence of malware and phishing campaigns that took advantage of security lapses and diversified in the ways they counted on the still unpatched flaw that was human vulnerability.

Ransomware operators distinctly set their sights on organizations, with crippling ramifications: Their attacks proved they could strike with such severity that some victims were even strong-armed into acquiescing to the cybercriminals’ exorbitant demands. For many cryptocurrency-mining threats, servers and cloud-based environments, having far more computing resources than endpoints, became their new frontier. Messaging platform — the bedrock underpinning many business transactions — were inundated with a range of threats, including business email compromise scams, sextortion schemes, and phishing incidents that did not rely on hacking human behavior alone.

Read the entire report here.

Come meet us at booth 1435 during Microsoft Ignite 2019 in Orlando Florida November 4th-8th!

This year Trend Micro is excited to once again be a part of the incredible Microsoft Ignite conference in Orlando Florida.

Stop by to hear about our cloud server, endpoint and perimeter defense experts about Trend Micro’s Hybrid Cloud Security, and Cloud Application Security solutions that compliment Azure Cloud and Office 365, powered by XGen™ security.

XGen™ is new class security that powers all Trend Micro security solutions with a cross-generational blend of threat defense techniques that address the full range of ever-changing threats—now and in the future. Whether you are looking to secure your end points, hybrid cloud servers, or container images and applications across your CI/CD pipeline, we are the one solution you need to talk to at Microsoft Ignite. Come see our flagship booth and win great prizes.

Trend Micro is a top global Microsoft Security ISV. Join us to hear more about the great partnership solutions we are delivering with Trend Micro as the security vendor of choice. Our Microsoft channel and security experts will be there to answer all of your questions and show you how we can help you build security into your customer’s Azure cloud, container, and Microsoft Office 365 environments.

Come listen to Jeff Westphal, regional technical leader at Trend Micro, on Monday, November 4, 1:05PM – 1:25PM, Theater D. In this session, he will discuss how to automate build and runtime protection for Azure workloads and applications.

For more information about our products, visit trendmicro.com/azure, or email us at azure@trendmicro.com

Mark your calendar: The 2019 Azure Cloud Security Series is being held in a city near you!

Join us for lunch at a Microsoft Technology Center in your region and become Cloud Confident with Trend Micro and Microsoft

The Azure Cloud Security Series provides an opportunity for customers, partners, developers, influencers, and Azure enthusiasts to come together and learn about how Trend Micro and Azure provide security for your cloud investment.

Whether you are looking at cloud technologies for your workloads and container environments or interested in a deeper dive into Azure and your shared security responsibility, you will hear from Microsoft and Trend Micro on the importance of securing the cloud and the capabilities used to mitigate risk and improve compliance across your business.

While older applications may remain on premise or take time to lift and shift, your business is creating new applications, and moving to the cloud offers more tools and speed to deployment than security can keep up with. Security must be a consideration from your build pipeline to runtime, protecting not only your Azure cloud platform, but also your brand and reputation.

Trend Micro and Microsoft make it easy to migrate legacy servers, both physical and virtual, to the Azure Cloud with ultimate visibility into all your workloads at any given time. You can have complete confidence in the fact that you are protected through a holistic approach with advanced automated security. Furthermore, Trend Micro compliments the Azure Security Center.

So, come and meet Microsoft Azure and Trend Micro and see how easy it is to secure, monitor, and manage the protection of your Azure workloads. You’ll walk away with valuable insight on how Trend Micro™ Deep Security for Microsoft Azure empowers you to:

  • Increase application visibility and control – Ensure visibility into applications running on your Azure cloud while detecting and blocking unauthorized software with application control. Detect applications and lock down the system so no new applications can run without being whitelisted.
  • Expand security for hybrid and cloud environments – Keep malware off your Azure Cloud and Windows workloads by protecting against increasingly complex known and unknown threats.
  • Detect and protect against intrusions – Defend against hackers who can easily exploit vulnerabilities like Shellshock and Heartbleed to gain access to sensitive information. Immediately protect your instances from these and new serious vulnerabilities with intrusion detection and prevention (IDS/IPS).
  • Get valuable information – Identify and understand indicators of compromise and improve compliance using Integrity Monitoring and Log Inspection.
  • Improve security across your software build pipeline and deployment environment – Deliver an integrated security solution that provides a substantial set of APIs allowing DevSecOps to build security into your CI/CD pipeline using automation such as Jenkins for changing cloud or container environments.

Save the date! Join us for lunch at our next event in a city near you.

  • Detroit 3/5/2019 12:00 pm – 3:00 pm
  • Reston 3/11/2019 12:00 pm – 4:00 pm
  • Boston 3/20/2019 12:00 pm – 4:00 pm
  • New York City 3/20/2019 12:00 pm – 3:00 pm
  • St. Louis 3/20/2019 1:00 pm – 4:30 pm
  • Denver 4/3/2019 12:00 pm – 3:00 pm
  • Dallas 4/9/2019 12:00 pm – 4:00 pm
Improve your Azure deployments with a set of comprehensive security capabilities automated for Microsoft Azure workloads. Learn more about Trend Micro and Microsoft Azure.

Mark your calendar, we will see you at The Azure Cloud Security Series.

Register Today for the Azure Cloud Security Series in a city near you, don’t miss out! https://resources.trendmicro.com/2019-MTC-Roadshow.html

Technology advancements such as high-speed Internet connectivity, ability to create abstract layers in computing environments has allowed us to achieve things that were unthinkable ten years ago. I have personally experience these advancements in my professional life. At one point, I was happy to get my hands on virtualization and ability to run integrated solution from my laptop and an external portable storage device for my work. Now, with the eruption of cloud computing combined with the power of orchestration tools is mind blowing. We have entered into an-era where we are looking to automate everything aka Infrastructure as a Code.

Today, I’m happy to talk about our “Azure quickstart template”, let’s get started and get to the technical details.

What makes this quickstart template?

This integrated stack consists of Trend Micro Deep Security, Splunk Enterprise and Chef automation platform, all running on Azure.

Azure-quickstart-trend-chef-splunk

How is this quickstart template created?

This integrated stack is built using a JSON template, the template is based on Microsoft Azure Resource Manager (ARM) templates. With ARM templates, we can deploy topologies quickly, consistently with multiple services along with their dependencies. You do it once and consume it many times. It’s pretty powerful, since we by working with our Azure partner did for you already, you can simply consume.

What’s in it for me?

It saves you a lot of time that you can spend on things that matters to you, I don’t know perhaps watching a hockey game (yes, I’m Canadian and it’s our sport). Seriously, thing about it, if you are familiar with these solutions then you must be aware of it that each element has various components such as web based management application, database etc. and requires specific communication paths, database schema etc. To setup this type of environment where you have a fully functional integrated components would take you at least couple of hours and this estimate is by assuming your three-year-old daughter is not screaming in the background and you have your full attention and focused time to build this up.  I don’t know but I love when someone else can do part of my job and make it easy for me.

I’m with you tell me more.

Okay, if you are sill reading then I like to think I have your attention so let’s look at this diagram on what is involved here to give more technical details about this quick start;

To break it up, we have;

  • A storage account in the resource group.
  • A Virtual Network (vNet) with four subnets
  • Virtual Machines to host solution components
  • Network security groups to control what communication paths are allowed
  • Azure SQL DB to host Deep Security persistent data
  • Three test Virtual Machines; 2 VMs (Linux, Windows) with bootstrap scripts to install TrendMicro agents (through Azure VM extensions) and 1 VMs (Linux) with bootstrap scripts to install Chef Agents

There is a lot happening here as you can see and the only thing you need to do as part of consuming this is to provide some values for the template parameters such as;

  • Where you want to deploy this stack.
  • Web application administrators account and Virtual machine administrator account credentials for the various stack components.
  • Communication ports for Deep Security
  • Virtual machine size and number of test virtual machines

It takes roughly 30-45 minutes or so to have this environment fully functional. At the end, we will return the URL’s for each solution component (Trend Micro, Splunk and Chef) to you so that you can go ahead and simply login to these applications and do what ever you wanted to do e.g. protecting your Azure based workloads from various vulnerabilities, remember cloud security is a shared responsibility i.e. although cloud providers deliver an extremely secure environment but you need to protect what you put IN the cloud—your workloads.

quickstart-diagram

I’m sold, where can I get this template for quick start?

That was easy! The ARM template is available on the Azure website (here). You can simply click the “Deploy to Azure” button on or select Browse in GitHub repository. You can also use PowerShell, Azure CLI etc. to start the deployment, the GitHub link provides necessary documentation for it.

The Chef recipe for Deep Security Agent is available here.

Questions? Reach out to us by email at azure@trendmicro.com and we’ll be happy to help!

Trend Micro Deep Security enables you to manage a broad set of security capabilities across multiple environments from a single integrated console.

See which Hybrid architecture is right for you.

Download Poster

hybrid-architecture-small