Cloud Security

Trend Micro: TM named CWS “Strong Performer” in Forrester Wave 2022

Trend Micro: TM named CWS “Strong Performer” in Forrester Wave 2022
Written by ga_dahmani
Trend Micro: TM named CWS “Strong Performer” in Forrester Wave 2022

If organizations weren’t committed to the cloud before the pandemic, they certainly are now. Two years of sometimes gale-force commercial headwinds, market uncertainty, and operational adversity have confirmed the critical importance of the cloud for boardroom leaders. By April 2021, a third of global organizations said they were running more than 50% of their workloads in the cloud. for this fall, it is estimated that more than half (56%) of companies worldwide will be. That’s why Trend Micro has made cloud security a priority and offers a wide range of solutions. from a single integrated platform of security services.

Forrester recognized us as a strong player in Cloud Workload Security (CWS) in its recent report, The Forrester Wave™: Cloud Workload Security, Q1 2022. The good news for Cloud Workload Security customers is Trend Micro is that our capabilities go even beyond the limits. of this evaluation.

Securing the cloud

There is no secret to cloud success. Offering businesses the flexibility, scale, and agility of IT to support remote work, streamline processes, and deliver innovative new services, it quickly became invaluable during the pandemic. From an infrastructure-as-a-service (IaaS) perspective, cloud service provider (CSP) platforms have enabled DevOps teams to accelerate time-to-value, enabling your organization to continue delivering innovative services amid of rapidly evolving market demand.

But this evolution brings challenges. The same cloud systems that provide so much can also create new complexities for IT to navigate. An overabundance of functionality makes misconfiguration commonplace, potentially exposing critical assets. Most organizations invest in multivendor cloud security platforms and mix public cloud with private cloud and on-premises environments, adding further complexity and silos.

Keeping all of this secure requires a skill set that even the largest organizations struggle to achieve, and point-of-security products that work in these environments leave plenty of coverage gaps for bad guys to hide. It all adds up to a perfect storm of cloud risk.

These are the challenges Trend Micro Cloud One was built to address. In fact, the opening of Forrester’s report, The Forrester Wave™: Cloud Workload Security, Q1 2022, states:

“Forrester sees end-user organizations increasingly preferring package providers. Instead of disparate tools, package providers offer cloud workload protection (CWP), runtime container security, and pre-runtime, and cloud security posture management (CSPM). CSPM covers not only configurations but also cloud platform administrative identities.”

delivery value

To compile the report, Forrester rigorously evaluated 12 security vendors across 33 criteria in three distinct categories: current offering, strategy, and market presence. Trend Micro is rated “Strong Performer” and tied for the second highest score in the strategy category. Trend Micro was also the only vendor to receive the highest possible score in the market presence category.

Other notes in the report included:

  • “Cloud Security Posture Management (CSPM) features are above average for AWS and Azure.”
  • “In its current CWS offering, the vendor offers a robust implementation of agents, malware, and memory integrity protection, along with file integrity monitoring and host-based firewalls.”
  • “The solution is a perfect fit for organizations that require strong CWP features, have an on-premises and hybrid cloud installed base, and a skill set to operate Trend Micro’s Deep Security.”

In reality, of course, Trend Micro Cloud One is much more than workload protection, CSPM, and runtime/before-runtime container security. It also allows cloud developers to securely manage:

  • File and object storage
  • Functions, APIs and serverless applications
  • cloud networking
  • Open source vulnerabilities and license risks

Most importantly, we secure your journey to the public cloud, no matter where you are on that journey. For most organizations, that means a hybrid deployment. Delivering these capabilities from a single user interface reduces administrative overhead for IT professionals and provides connected security that leaves nowhere for threat actors to hide.

If you’re interested in learning more, check out these other industry assessments of our cloud security capabilities:

Hybrid cloud is just one part of the larger enterprise IT environment that Trend Micro can help you protect. Find out why we are leaders across the company as determined by industry experts.

About the author


Leave a Comment