The solution provides more information about threats, vulnerabilities, and the server host with the agent. If a user file is compromised while using an application, Trend Vision One provides the baseline for the attack compared with MITRE. The system director or analyst can then make decisions.
Network Security Engineer at a comms service provider with 51-200 employees
Real User
Top 20
2024-05-13T09:48:00Z
May 13, 2024
Our company has around 50 critical servers that need advanced security beyond our existing endpoint protection. We were looking for a dedicated server security solution that could protect against attacks specific to server operating systems and MITRE ATT&CK techniques, while also being lightweight so it wouldn't impact the performance of other applications running on the servers. Trend Micro Vision One - Cloud Security seemed to meet all these requirements. Our previous security solution struggled to identify and resolve malware, leaving our production servers vulnerable. Frequent reboot requests, high memory usage, and increased BCP utilization choked system performance. To address these issues, we deployed Trend Micro Vision One - Cloud Security. This solution effectively protects against malware, ransomware, and other threats.
Information Security Specialist at a tech services company with 501-1,000 employees
Real User
Top 10
2024-03-12T20:05:00Z
Mar 12, 2024
I use Vision One for security monitoring. We monitor any alerts triggered in the console and detections based on the rules we've set. We analyze those and raise tickets when we find something suspicious that needs to be escalated. We deploy and configure the solution based on the client's needs. Some clients are multinational companies with many locations we monitor throughout various regions. It might require different frameworks for privacy laws and regulatory compliance.
We deploy Trend Micro Cloud One on all systems as part of the standard package. When rolling out new devices, it allows me to monitor East-West traffic between our endpoints. Previously, I had no visibility into communication between Trend user A and end user B within the network. XDR now grants me this insight, while also sending alerts for suspicious activity. I can click on these alerts, investigate in Trend Micro Cloud One, and visualize the communication flow in a user-friendly diagram. This helps me distinguish genuine threats from warnings or false positives. For example, one day I saw an alert indicating someone attempting to reinstall Chrome on a PC. Trend Micro Cloud One confirmed this activity. Additionally, XDR enables me to directly block malicious attempts from the workbench. Trend Micro Cloud One operates entirely in the cloud, enabling remote access to user devices for necessary changes, virus removal, and patch implementation.
We use Cloud One for workload and application security. The company also uses AWS Cloud Conformity. Cloud One protects us from application-delivered attacks. The solution is protecting our private services, internal customers, and security account holders.
Learn what your peers think about Trend Vision One - Cloud Security. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
We use Cloud One for our cloud security, but we especially love it because we're multi-cloud. We want a single solution that can help us protect, inspect, and gain information about all of our cloud assets, regardless of whether they're in Microsoft Online, Office 365, Azure, or AWS, where we have most of our workload. We also love that Cloud One is not just an endpoint solution or a DevSecOps add-on. It also has a source code repository, which allows us to put things in our DevOps pipeline to protect them. Additionally, we can use Cloud Conformity, which is part of Cloud One, to monitor our posture management. This means that Cloud One is not just a reactive solution that runs software on virtual machines or in containers. It can stop problems in the development process before they even happen, even if the code is still on someone's machine or in the pipeline or repository. This helps us protect ourselves in a way that many other solutions cannot. Before implementing Cloud One, we were facing all sorts of unknown threats, including third-party vulnerabilities and misconfigurations. We need to protect ourselves from bad actors, but that's only half of it. We also have to protect our infrastructure from ourselves. No one on our team is going to intentionally do anything malicious, but they can make mistakes. And I can't monitor every piece of code or infrastructure that my team writes or has. I need a solution that can monitor our infrastructure continuously and notify us of any misconfigurations or mistakes so that we can fix them before they become major problems. We deployed Cloud One 100 percent on the cloud and we use AWS and Azure.
Senior Manager for IT and Security at a tech services company with 1,001-5,000 employees
Real User
Top 10
2023-09-26T15:47:00Z
Sep 26, 2023
My organization uses Trend Micro Cloud One for cloud security and to get information based on business-critical applications running on the cloud environment. We get information on workload security, vulnerabilities, or third-party package issues. We also focus on configuration management changes that are suspicious. Four teams in our organization use the tool across multiple regions. Since my team is an information security team, we have visibility into all the different teams and how they use it. We support the teams with alerts and issues. If an alert comes up, someone from my team will respond. If we need more information, we work with the team impacted because of the alert to understand the issue and do the remediation with them.
Trend Vision One- Cloud Security Security provides comprehensive cloud security, threat protection, and compliance monitoring. Users commend its advanced features, ease of use, and strong performance in keeping digital assets safe. The platform improves efficiency and productivity for organizations while offering excellent customer support.
The solution provides more information about threats, vulnerabilities, and the server host with the agent. If a user file is compromised while using an application, Trend Vision One provides the baseline for the attack compared with MITRE. The system director or analyst can then make decisions.
I use the tool for security solutions. It's a leader in Gartner and Forrester Wave reports. Customers rely on these reports.
Our company has around 50 critical servers that need advanced security beyond our existing endpoint protection. We were looking for a dedicated server security solution that could protect against attacks specific to server operating systems and MITRE ATT&CK techniques, while also being lightweight so it wouldn't impact the performance of other applications running on the servers. Trend Micro Vision One - Cloud Security seemed to meet all these requirements. Our previous security solution struggled to identify and resolve malware, leaving our production servers vulnerable. Frequent reboot requests, high memory usage, and increased BCP utilization choked system performance. To address these issues, we deployed Trend Micro Vision One - Cloud Security. This solution effectively protects against malware, ransomware, and other threats.
I use Vision One for security monitoring. We monitor any alerts triggered in the console and detections based on the rules we've set. We analyze those and raise tickets when we find something suspicious that needs to be escalated. We deploy and configure the solution based on the client's needs. Some clients are multinational companies with many locations we monitor throughout various regions. It might require different frameworks for privacy laws and regulatory compliance.
We deploy Trend Micro Cloud One on all systems as part of the standard package. When rolling out new devices, it allows me to monitor East-West traffic between our endpoints. Previously, I had no visibility into communication between Trend user A and end user B within the network. XDR now grants me this insight, while also sending alerts for suspicious activity. I can click on these alerts, investigate in Trend Micro Cloud One, and visualize the communication flow in a user-friendly diagram. This helps me distinguish genuine threats from warnings or false positives. For example, one day I saw an alert indicating someone attempting to reinstall Chrome on a PC. Trend Micro Cloud One confirmed this activity. Additionally, XDR enables me to directly block malicious attempts from the workbench. Trend Micro Cloud One operates entirely in the cloud, enabling remote access to user devices for necessary changes, virus removal, and patch implementation.
We use Cloud One for workload and application security. The company also uses AWS Cloud Conformity. Cloud One protects us from application-delivered attacks. The solution is protecting our private services, internal customers, and security account holders.
We use Cloud One for our cloud security, but we especially love it because we're multi-cloud. We want a single solution that can help us protect, inspect, and gain information about all of our cloud assets, regardless of whether they're in Microsoft Online, Office 365, Azure, or AWS, where we have most of our workload. We also love that Cloud One is not just an endpoint solution or a DevSecOps add-on. It also has a source code repository, which allows us to put things in our DevOps pipeline to protect them. Additionally, we can use Cloud Conformity, which is part of Cloud One, to monitor our posture management. This means that Cloud One is not just a reactive solution that runs software on virtual machines or in containers. It can stop problems in the development process before they even happen, even if the code is still on someone's machine or in the pipeline or repository. This helps us protect ourselves in a way that many other solutions cannot. Before implementing Cloud One, we were facing all sorts of unknown threats, including third-party vulnerabilities and misconfigurations. We need to protect ourselves from bad actors, but that's only half of it. We also have to protect our infrastructure from ourselves. No one on our team is going to intentionally do anything malicious, but they can make mistakes. And I can't monitor every piece of code or infrastructure that my team writes or has. I need a solution that can monitor our infrastructure continuously and notify us of any misconfigurations or mistakes so that we can fix them before they become major problems. We deployed Cloud One 100 percent on the cloud and we use AWS and Azure.
My organization uses Trend Micro Cloud One for cloud security and to get information based on business-critical applications running on the cloud environment. We get information on workload security, vulnerabilities, or third-party package issues. We also focus on configuration management changes that are suspicious. Four teams in our organization use the tool across multiple regions. Since my team is an information security team, we have visibility into all the different teams and how they use it. We support the teams with alerts and issues. If an alert comes up, someone from my team will respond. If we need more information, we work with the team impacted because of the alert to understand the issue and do the remediation with them.
We are mostly using it for cloud workload security, that is endpoint and workload security.
We use this solution to protect our physical servers and cloud workloads.
Most clients use Trend Micro Cloud One Container Security to protect endpoints. The solution is also utilized in VMs.
The primary use case for Trend Micro Cloud One Container Security is protecting microservices architecture.