- Workload Security for Cloud | On-demand
- Container Security and “Shifting-Left” | On-demand
- Cyber Risk Exposure Management (CREM) for Cloud | On-demand
-
XDR for Cloud | On-demand
- File Security in the Cloud | On-demand
- Virtual Network Security | On-demand
More information on each session is listed below.
More about the upcoming sessions:
Session #1The presentation will be hosted by
Richard Werner Cybersecurity Platform Lead,
Trend Micro Markus Winkler Raf Hoogstijns |
Workload Security for Cloud
On-demand
Servers and cloud workloads have a greater attack surface than endpoints and can expose critical data if not protected properly. We’ll cover the fundamental approach to workload security in Trend Vision One so you can embrace this highly technical area with confidence. We’ll cover:
|
Session #2The presentation will be hosted by
Udo Schneider Governance, Risk & Compliance Lead, Trend Micro
![]() Markus Winkler Solution Architect Cloud Customer Success, Trend Micro Luca De Fassi Sales Engineer |
Container Security and “Shifting-Left”
On-demand Trend Vision One enables you to take control of the security of your Containers. We’ll discuss applying security controls from development all the way up to production. We’ll explore how you can balance the security needs with the concerns of your developers and operations personnel from start to finish. We'll show you how to use Trend Vision One to achieve:
|
Session #3The presentation will be hosted by
Richard Werner Cybersecurity Platform Lead,
Trend Micro James McCarthy Markus Winkler |
Cyber Risk Exposure Management (CREM) for Cloud
On-demand We'll show you how to use Trend Vision One to achieve:
|
Session #4The presentation will be hosted by
Udo Schneider Governance, Risk & Compliance Lead,
Trend Micro Markus Winkler Thomas Engelberg |
Extended Detection & Response (XDR) for Cloud
On-demand
Traditional EDR only tells part of the story. Who's watching your workloads, containers, K8s clusters, and VMs? We’ll cover how to get real effective visibility across your full Cloud environment and beyond. We’ll over how to use Trend Vision One to achieve:
|
Session #5The presentation will be hosted by
Udo Schneider Governance, Risk & Compliance Lead,
Trend Micro Markus Winkler Fiona Griffin |
File Security in the Cloud
3rd April 13.00 BST/14.00 CEST We’ll cover:
|
Session #6The presentation will be hosted by
Markus Winkler Product Manager, Trend Micro
![]()
|
Virtual Network Security17th April 13.00 BST/14.00 CESTThe growth of virtual networks provides another item to the long list of attack vectors. We’ll demo how to use Trend Vision One to get control over your Virtual Network.
|
Speaker 2 name
Speaker 2 title
Speaker 2 bio
Speaker 3 name
Speaker 3 title
Speaker 3 bio
Section 1 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Further content
Trend Vision One Demo Series
Watch our previous demo series where we cover some of the most commonly used features and how to get the most out of them. All sessions available on demand.
Trend Vision One User Group
Our product team and tech experts run regular online updates on new features, changes to the product and any new information you need to know to get the most out of Trend Vision One.
Read more
Capture-the-Flag (CTFs)
CTF events offer a unique, fun and engaging way to learn security concepts and gain new skills. Our (online) games last a few hours and are accessible from any computer with a browser.
Our challenges will introduce you to tactics & techniques used by hackers in targeted attacks: spear-phishing, drive-by-download, persistence, fileless payload and more.
Section 2 - Column 2. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Section 2 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Section 2 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.