View all >

All Resources

AutomationProduct DemoVideo

Cloud Security Built for Microsoft Azure

See how Deep Security is built for Microsoft Azure.

Product Blog

Bringing Data Center Security to Cloud Speed

Big changes are coming with Deep Security 10.1, giving you the opportunity to move at cloud speed

Security tipsTechnical Resources Blog

Application Control for CI-CD and Other Server Environments

Enable your development team to create and deploy their software without the roadblocks of a security tool

Shared Responsibility White paper

Linux Servers: Why Native Security is Not Enough

Blue Green Deployments Blog

Blue Green Deployments on Azure

Hybrid CloudShared Responsibility BlogWebinar

Webinar: Microsoft Ignite Recap & Hybrid Cloud Security in Azure

Learn how Trend Micro Deep Security is working hand in hand with Microsoft to provide customers a secure cloud to meet their hybrid cloud security needs.

Shared Responsibility White paper

10 Steps to Meeting your Shared Security Responsibility in Azure

Don't let traditional security slow down your Azure deployments, learn what makes cloud security different.

Security tips Video

Video: Vulnerability Shielding for Heartbleed Demo

See how you can virtually patch for vulnerabilities like Heartbleed using Deep Security.

ProductShared Responsibility Webinar

Webinar: Accelerating Azure Deployments

Hear from Microsoft and Trend Micro experts on safely maximizing the benefits of the cloud.

AutomationProduct DemoWebinar

Webinar: Cloud Automation with Azure + CHEF + Deep Security

Join cloud automation experts as they highlight how you can craft a cloud automation strategy in Azure.

Hybrid CloudSecurity tips Guide

Azure Hybrid Architecture

Azure MarketplaceProduct Video

Microsoft Launchpad

Shared Responsibility White paper

Trusted Cloud: Microsoft Azure Security, Privacy, and Compliance

Download this white paper about Microsoft Azure security, privacy, and compliance.

Security tips Blog

Security Can Make or Break Your Azure Project

Learn why it’s important to bake security into your project right from the start.

Security tips Blog

Deep Security Tip 1: Disable monitor responses from web server

Find out how to disable monitor responses from web server.

Best PracticesResearch White paper

Best Practices for Public Cloud Security

In the last part of this three-part series, you’ll learn about best practices for public cloud security.