Protecting Microsoft cloud environments

1 May 2019 Information Security, Integrated Solutions

Trend Micro Southern Africa announced the local launch of its Trend Micro Cloud App Security point of presence, designed to provide customers added security and protection of their Microsoft Office 365 environments.

With Trend Micro Cloud App Security, local customers can now fully embrace Office 365 with the knowledge that their investment, email and data are secure. Not only does the service protect Office 365 environments, including advanced email protection, but it also enforces compliance on third-party cloud file sharing services that include: Box, Dropbox, Google Drive, Microsoft SharePoint Online, and OneDrive for Business.

Notably, the success of Cloud App Security in underpinned by its direct integration with Office 365 and other services via APIs. The local release of the service is coupled with the announcement of a Cloud App Security point of presence in the region providing direct and local integration to customer’s cloud services. This will in turn will provide customers with data residency and reduced latency as the service will be hosted in South Africa.

“It is of critical importance that customers understand that cloud security is a shared responsibility between their cloud service providers and themselves. They can’t simply put their data in the cloud and walk away from the security responsibility, they have to take measures to also secure their investments, which is where Cloud App Security comes into play,” states Indi Siriniwasa, vice president at Trend Micro sub-Saharan Africa. “Our announcement that we will be hosting a local point of presence for the service is testimony to our commitment to local customers and answers a growing need by clients to better secure their cloud investments.”

The Sub-Saharan Africa Cloud App Security service will be available through Trend Micro’s partner network in the region, as well as on the Microsoft Azure Marketplace. Furthermore, the service will initially service customers in South Africa and SADC, while WECA customers will have the option of continuing to use the service through the data centres hosted in both Amsterdam and Ireland – dependant on where they experience the best latency.

The Cloud App Security service will help customers address the following concerns:

Provides added security to the Microsoft stack and complements and adds to both Azure and Office 365 security controls.

• Is able to assist a customer with identifying Business Email Compromise (whaling) attacks using artificial intelligence built into the Trend Micro threat intelligence network.

• Protects a customer’s internal email and allows on-demand scanning of the mail storage.

• Provides visibility into sensitive data use with cloud file-sharing services, ensuring a customer can better monitor and manage risk and compliance. Furthermore, with the presence of an integrated DLP solution customers can better comply with GDPR and POPI.

• Ensures all user functionality is preserved on any device, with simple API integration, and that ultimately granular security policies follow the user and their devices.

• Helps customers detect and stop known and unknown threats, protect applications, stop suspicious and unauthorised changes and harden the Azure environment.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
From QR code to compromise
Information Security News & Events
A new attack vector involves threat actors using fraudulent QR codes emailed in PDF attachments to bypass companies' phishing security measures by requiring users to scan the code with their mobile phones.

Read more...
Organisations fear AI-driven cyberattacks, but lack key defences
Kaspersky Information Security News & Events Training & Education
A recent Kaspersky study reveals that businesses are increasingly worried about the growing use of artificial intelligence in cyberattacks, with 56% of surveyed companies in South Africa reporting a rise in cyber incidents over the past year.

Read more...
Vodacom Business unveils new cybersecurity report
Information Security IoT & Automation
Cybersecurity as an Imperative for Growth offers insights into the state of cybersecurity in South Africa, the importance of security frameworks in digital resilience and the latest attack methods adopted by cyberattackers.

Read more...
Smart surveillance and cyber resilience
Axis Communications SA Surveillance Information Security Government and Parastatal (Industry) Facilities & Building Management
South Africa’s critical infrastructure sector has to step up its game regarding cybersecurity and the evolving risk landscape. The sector has become a prime target for cybercriminals on top of physical threat actors, and the consequences of an incident can be far-reaching.

Read more...
NIS2 compliance amplifies skills shortages and resource strain
Information Security Security Services & Risk Management
A new Censuswide survey, commissioned by Veeam Software reveals the significant impact on businesses as they adapt to this key cybersecurity directive, with 95% of EMEA businesses siphoning other budgets to try and meet compliance deadline.

Read more...
Know who’s spying on you
Kaspersky Information Security Products & Solutions
According to the latest State of Stalkerware report, 40% of the people surveyed worldwide stated they have experienced stalking or suspect they are being spied on. A solution for Android is now available.

Read more...
Cybersecurity needs 4,7 million professionals
Information Security
Despite all the efforts organisations worldwide put into preventing cyberattacks, global cybercrime has snowballed to $9,2 trillion in 2024 and is expected to grow by another 70% to $15,6 trillion by the end of a decade.

Read more...
Autonomous healing systems are the future
Infrastructure Information Security AI & Data Analytics
Autonomous healing software, an emerging technology, is gaining traction for its potential to transform how organisations manage software maintenance, security, and system performance.

Read more...
Understanding South Africa’s Cybercrimes Act
Information Security Security Services & Risk Management
The Cybercrimes Act No.19 of 2020 is a comprehensive legislative response to the evolving landscape of cyberthreats in South Africa. Its effectiveness, however, relies on enforcement, which relies on implementation, international cooperation, and collaboration between the public and private sectors.

Read more...