sb-eu logo
Story image

Trend Micro acquires Cloud Conformity to expand capabilities

22 Oct 2019

Trend Micro has acquired Cloud Conformity, a cloud security posture management (CSPM) company. 

The acquisition broadens the cloud services Trend Micro can secure and resolves often overlooked security issues caused by cloud infrastructure misconfiguration.

Trend Micro’s strategy is built to ensure cloud security without disrupting how customers need to do business. 

This acquisition builds upon Trend Micro’s capabilities in cloud security, adding complementary capabilities that automatically identify and fix a range of cloud infrastructure configuration issues. 

It also optimises costs and helps ensures compliance with leading industry regulatory standards such as PCI, GDPR, HIPAA and NIST.

“We have been laser-focused on building integrated security for the cloud since its birth over a decade ago,” says Trend Micro chief executive officer Eva Chen. 

“As more enterprises move to the cloud, our customers feel they’re operating amid a wild-west approach to cloud implementations that leave them with unmanaged risk. As an AWS technology partner of the year for 2019, Cloud Conformity understands these implementations and the risks. Their offering perfectly complements our own portfolio and provides immediate value to customers. Both the people and technology are a great fit for Trend Micro.”

In purposeful acquisitions, people matter as much as the technology, and Trend Micro will nurture and grow both as part of its market-leading cloud security strategy. 

The addition of all of Cloud Conformity’s employees brings valuable expertise and experience, along with the technology, to help businesses build in the cloud more effectively, not just build securely.

According to Gartner, “Through 2023, at least 99% of cloud security failures will be the customer’s fault.” 

Gartner also states, “Through 2024, organisations implementing a CSPM offering and extending this into development will reduce cloud-related security incidents due to misconfiguration by 80%.” 

Trend Micro’s comprehensive set of cloud security services provide assurance for businesses that their risk is effectively managed while simultaneously meeting compliance standards.

“We are excited for the opportunities that will come from being part of the leading cloud security provider – amplifying what we do best, while allowing our offerings to expand in ways we couldn’t have done on our own,” says Cloud Conformity chief executive officer Michael Watts. 

“We think customers will love this simplified approach to security and compliance across their entire cloud environment, including AWS, Azure and Google Cloud – providing security guardrails to let them go faster and do more.”

“Our research is clear that organisations of all sizes are adopting cloud-based delivery and, in doing so, are often using not only compute services, but also storage, messaging, and many other services”, adds 451 Research principal analyst Fernando Montenegro. 

“With this acquisition, Trend Micro is able to extend its security offerings to organisations looking for assistance with cloud security beyond securing compute workloads.”

Story image
Exabeam and Code42 partner up to launch insider threat solution
The solution will give customers a fuller picture of their environment, and will leverage automated incident response to obstruct insider threat before data loss occurs.More
Story image
APAC organisations struggle to find balance between digital adoption and cybersecurity
Organisations in the Asia Pacific (APAC) region are significantly concerned about security threats, but nevertheless are looking to advance operations through digital adoption.More
Story image
Kaspersky finds red tape biggest barrier against cybersecurity initiatives
The most common obstacles that inhibit or delay the implementation of industrial cybersecurity projects include the inability to stop production (34%), and bureaucratic steps, such as a lengthy approval process (31%) and having too many decision-makers (23%). More
Story image
Phishing scam imitates SharePoint & OneNote for nefarious clicks
Sophos researchers say that the attackers take a slightly different approach to the standard ‘fake login’ phishing email.More
Story image
Revealed: The behaviours exhibited by the most effective CISOs
As cyber-threats pile up, more is being asked of CISOs - and according to Gartner, only a precious few are 'excelling' by the standards of their CISO Effectiveness Index.More
Story image
Cryptomining trojan malware discovered by ESET researchers
The malware, primarily targeting victims in Czechia and Slovakia, prioritises subterfuge through deployment of multiple techniques to avoid detection, and leans heavily on the Tor network and BitTorrent protocol to achieve its goals.More