{"id":10343,"date":"2017-11-08T06:00:04","date_gmt":"2017-11-08T14:00:04","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/11\/08\/news-4116\/"},"modified":"2017-11-08T06:00:04","modified_gmt":"2017-11-08T14:00:04","slug":"news-4116","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/11\/08\/news-4116\/","title":{"rendered":"Customer-driven Rapid Innovation for Hybrid Cloud Security"},"content":{"rendered":"<p><strong>Credit to Author: Justin Foster| Date: Wed, 08 Nov 2017 13:00:42 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10-300x200.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10-300x200.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10-768x512.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10-1024x683.jpg 1024w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10-640x427.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10-900x600.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10-440x293.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10-380x253.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10.jpg 1200w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Cyber threats have no boundaries; they come in new and evolving forms, capable of striking at any time \u2026 so it becomes important that your threat protection extends beyond conventional boundaries as well. In the past, on premise versions of security solutions were held up by long development cycles and significant regression periods. These delays prevented customers from getting improved methods of defense quickly and deployed to a data center, leaving them vulnerable to attacks.<\/p>\n<p>As we discussed in <a href=\"http:\/\/blog.trendmicro.com\/bringing-data-center-security-cloud-speed\/\">bringing data center security to cloud speed<\/a>, continuous delivery of security and functionality enhancements is much easier in SaaS-only offerings. For various reasons including privacy and compliance, some customers require on premise management and local storage of security data. Trend Micro&#8217;s Deep Security team remains committed to bringing continuous improvements to your on-premise environments while meeting compliance and performance requirements. <strong>I\u2019m excited to share that the Deep Security team is indeed on top of their game! For a 3<sup>rd<\/sup> time this year, they are releasing major functionality to our customers deploying on premise.<\/strong><strong>\u00a0<\/strong><\/p>\n<p>Deep Security 10.2 elevates our XGen\u2122 security, adding high-fidelity machine learning and enhanced application control to our cross-generational blend of threat defense techniques. <strong>The machine learning helps defend cloud and data center servers<\/strong> from unknown advanced threats including ransomware attacks like WannaCry and Bad Rabbit across the hybrid cloud.<\/p>\n<p>Organizations are already taking the steps to collect lists of known bad hashes, gathered from threat sharing sources or internally generated from targeted attacks. <strong>With 10.2 you can now block hashes globally throughout the organization<\/strong>. Application Control allows users to automate both white and black list protection, through APIs across the hybrid cloud. In addition, it proactively detects and allows updates from trusted installers and reduces the management overhead associated with whitelisting.<\/p>\n<p>This release includes support for the latest platforms and a new money saving feature of PostgreSQL support for the manager component,<strong> reducing the overall TCO of the on premise Deep Security solution<\/strong>. Always striving to provide a good user experience with Deep Security, we\u2019ve delivered on our customers\u2019 requests for features like detailed billing reporting for consumption visibility of paid-by-the-hour security for agile environments.<\/p>\n<p>When I talked to <a href=\"https:\/\/twitter.com\/boyle_adam\">Adam Boyle<\/a>, Director of Product Management for Deep Security he shared that the Deep Security team is focused on continuous delivery of<strong> critical features and functionality and works closely with customers across multiple industries for optimized protection requirements<\/strong>. This continuous delivery model provides enhancements packaged in smaller feature releases and released often to improve the time to protection for our clients. This ensures customers have rapid access to innovations, no matter the deployment model and new forms of threat defense to evolve with the threat landscape.<\/p>\n<p>For the future of the Deep Security platform, our goal is to provide <strong>frictionless automated security across the hybrid cloud<\/strong>, thereby helping customers to manage and license as few tools as possible. We are committed to improving security, operations, and integrations across the data center landscape. Not only does this include platforms like VMware and cloud providers, but also continuous integration and delivery platforms like <a href=\"https:\/\/jenkins.io\/\">Jenkins<\/a>, <a href=\"https:\/\/github.com\/\">GitHub<\/a>, <a href=\"https:\/\/www.ansible.com\/\">Ansible<\/a>, <a href=\"https:\/\/www.chef.io\/chef\/\">Chef<\/a> and <a href=\"https:\/\/puppet.com\/\">Puppet<\/a>. With Deep Security, threat protection is a cohesive part the CI\/CD pipeline so security is aware of trusted updates.<\/p>\n<p>A complete solution that is smart, connected, and optimized for today\u2019s vulnerabilities is critical in establishing the protection of your business environments, data, and people for the best possible outcomes against an evolving threat landscape. <strong>The Deep Security team continues to work with customers to innovate and deliver across SaaS, Marketplace and on premise environments to bring organizations a solution that works for modern security teams. \u00a0<\/strong><\/p>\n<p><strong>Find out more at <\/strong><a href=\"http:\/\/www.trendmicro.com\/hybridcloud\">www.trendmicro.com\/hybridcloud<\/a><\/p>\n<p>If you have questions or comments, please post them below or follow me on Twitter:\u00a0<a href=\"https:\/\/twitter.com\/justin_foster\">@justin_foster<\/a>.<\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/customer-driven-rapid-innovation-hybrid-cloud-security\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Justin Foster| Date: Wed, 08 Nov 2017 13:00:42 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10-300x200.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10-300x200.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10-768x512.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10-1024x683.jpg 1024w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10-640x427.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10-900x600.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10-440x293.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10-380x253.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/10\/ds10.jpg 1200w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Cyber threats have no boundaries; they come in new and evolving forms, capable of striking at any time \u2026 so it becomes important that your threat protection extends beyond conventional boundaries as well. In the past, on premise versions of security solutions were held up by long development cycles and significant regression periods. These delays&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[11146,714],"class_list":["post-10343","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-cloud-security","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10343","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10343"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10343\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10343"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10343"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}