Protecting Microsoft cloud environments

May 2019 Cyber Security, Integrated Solutions

Trend Micro Southern Africa announced the local launch of its Trend Micro Cloud App Security point of presence, designed to provide customers added security and protection of their Microsoft Office 365 environments.

With Trend Micro Cloud App Security, local customers can now fully embrace Office 365 with the knowledge that their investment, email and data are secure. Not only does the service protect Office 365 environments, including advanced email protection, but it also enforces compliance on third-party cloud file sharing services that include: Box, Dropbox, Google Drive, Microsoft SharePoint Online, and OneDrive for Business.

Notably, the success of Cloud App Security in underpinned by its direct integration with Office 365 and other services via APIs. The local release of the service is coupled with the announcement of a Cloud App Security point of presence in the region providing direct and local integration to customer’s cloud services. This will in turn will provide customers with data residency and reduced latency as the service will be hosted in South Africa.

“It is of critical importance that customers understand that cloud security is a shared responsibility between their cloud service providers and themselves. They can’t simply put their data in the cloud and walk away from the security responsibility, they have to take measures to also secure their investments, which is where Cloud App Security comes into play,” states Indi Siriniwasa, vice president at Trend Micro sub-Saharan Africa. “Our announcement that we will be hosting a local point of presence for the service is testimony to our commitment to local customers and answers a growing need by clients to better secure their cloud investments.”

The Sub-Saharan Africa Cloud App Security service will be available through Trend Micro’s partner network in the region, as well as on the Microsoft Azure Marketplace. Furthermore, the service will initially service customers in South Africa and SADC, while WECA customers will have the option of continuing to use the service through the data centres hosted in both Amsterdam and Ireland – dependant on where they experience the best latency.

The Cloud App Security service will help customers address the following concerns:

Provides added security to the Microsoft stack and complements and adds to both Azure and Office 365 security controls.

• Is able to assist a customer with identifying Business Email Compromise (whaling) attacks using artificial intelligence built into the Trend Micro threat intelligence network.

• Protects a customer’s internal email and allows on-demand scanning of the mail storage.

• Provides visibility into sensitive data use with cloud file-sharing services, ensuring a customer can better monitor and manage risk and compliance. Furthermore, with the presence of an integrated DLP solution customers can better comply with GDPR and POPI.

• Ensures all user functionality is preserved on any device, with simple API integration, and that ultimately granular security policies follow the user and their devices.

• Helps customers detect and stop known and unknown threats, protect applications, stop suspicious and unauthorised changes and harden the Azure environment.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Unintended consequences of ­technology
June 2019, Leaderware , CCTV, Surveillance & Remote Monitoring, Integrated Solutions
The development of general AI capabilities has seen an accompanying concern among some of the key players in the IT space as well as academics internationally.

Read more...
Where are your crown jewels?
June 2019, Wolfpack Information Risk , Commercial (Industry), Cyber Security, Security Services & Risk Management
Understanding what data they store and analyse is gaining increasing urgency for organisations that are now accountable to new(ish) privacy regulations such as the GDPR and our PoPIA.

Read more...
Changing of the guard, AI style
June 2019, Active Track, Technews Publishing , Integrated Solutions, Security Services & Risk Management
Active Track is launching a raft of new AI-based products and services with which it intends to turn the security world as we know it on its head.

Read more...
A platform to the future
June 2019, Genetec, Cathexis Technologies, Milestone Systems, Gijima Electronic and Security Systems (GESS) , Integrated Solutions, CCTV, Surveillance & Remote Monitoring, IT infrastructure
With AI, IoT and cloud changing the security technology landscape, will your security management platform be able to adapt to new demands?

Read more...
Axis 7th generation ARTPEC chip
June 2019, Axis Communications SA , Editor's Choice, CCTV, Surveillance & Remote Monitoring, Cyber Security
Axis has launched its 7th generation ARTPEC chip, optimised for network video, to improve all the signature Axis technologies created to address difficult light conditions.

Read more...
Proactive forensic intelligence
June 2019, Secutel Technologies , CCTV, Surveillance & Remote Monitoring, Integrated Solutions
Through its Safe City projects, AxxonSoft is assisting authorities in identifying unsolicited behaviour and potential human threats in public spaces.

Read more...
Protecting education campuses with AI
June 2019, Hikvision South Africa , CCTV, Surveillance & Remote Monitoring, Integrated Solutions, Education (Industry)
School security must also be designed in layers, or concentric circles of protection, starting at the school’s perimeter and working inward.

Read more...
Intrusion detection with visual ­verification
June 2019, Secutel Technologies , Perimeter Security, Alarms & Intruder Detection, Integrated Solutions, Products
Secutel Technologies’ Visual Verifier is an effective intrusion system designed specifically to accommodate for low bandwidth availability and low power usage.

Read more...
Critical vulnerability in Windows OS
June 2019 , Cyber Security
Vulnerability allows remote code execution by an attacker directly from the network using the Remote Desktop Protocol (RDP) in remote desktop services that affects older versions of Windows.

Read more...
Password awareness critical
June 2019, Kaspersky Lab , Cyber Security, Security Services & Risk Management
A recent study revealed that digital identity data and information holds significant value to cybercriminals – who craft ways of gaining this data and exploit it on the dark Web for as little as $50.

Read more...