Trend Micro Acquires Immunio, Expands Cloud Security Capabilities

Add Your Comments

Trend Micro has announced an expansion of its Hybrid Cloud Security solution leveraging the capabilities it has gained through the acquisition of Montreal, Canada-based Immunio to provide improved container and DevOps security.

Immunio provides RASP (Runtime Application Self-Protection)-based application security. It brings early detection capabilities and protection against application vulnerabilities, as well as container image scanning technology which allows secure container images to be published and protected, according to the announcement.

See also: WordPress Issues Emergency Patch for SQL Injection Vulnerability

These capabilities and in-house development boost Trent Micro’s automation protection throughout the DevOps lifecycle.

“We are excited to acquire Immunio’s application protection technology, their team of application security experts and their customers,” said Bill McGee, SVP and GM of Hybrid Cloud Security at Trend Micro. “Technology changes, like cloud computing and container platforms, are enabling faster application development. Immunio’s run-time application security allows our customers to increase protection against software vulnerabilities within the applications they are building.”

Trend Micro notes that Gartner is predicting that the number of enterprise DevSecOps initiatives incorporating “automated security vulnerability and configuration scanning for open-source components and commercial packages” will leap from less than 10 percent last year to more than 70 percent by 2019. The company says in addition to security and resilience benefits to applications, the improvement improve run-time operations, on-premise or in the public cloud.

“Many of our advanced customers have adopted DevOps lifecycle practices and are using Trend Micro Deep Security in an automated way to provide server and application protection,” McGee continued. “These new advancements are extending the protection we provide and ensuring that organizations can continue to develop and deploy applications quickly while remaining secure.”

Add Your Comments

  • (will not be published)