Trend Vision One™
CNAPP Demo Series

Secure your Cloud with Trend Vision One

February - April 2025

It’s time to use Trend Vision One to its full potential!

The cloud allows organizations to innovate and scale applications, but its sheer size can exponentially expand the attack surface to sometimes unmanageable levels. In 2025 security must be embedded into everything you do without slowing your business growth.

Existing customers of Trend Vision One are uniquely positioned to leverage our leading platform to gain control of their attack surface and incorporate all components of an effective CNAPP model.

In our upcoming webinar series we’ll showcase through live demos of our platform how you can leverage Trend Vision One to accelerate and simplify your cloud-native security.

Schedule:
  • Workload Security for Cloud | 6th February 13.00 GMT/14.00 CET
  • Container Security and “Shifting-Left” | 20th February 13.00 GMT/14.00 CET
  • Attack Surface Risk Management for Cloud | 6th March 13.00 GMT/14.00 CET
  • XDR for Cloud | 20th March 13.00 GMT/14.00 CET
  • File Security in the Cloud | 3rd April 13.00 BST/14.00 CEST
  • Virtual Network Security | 17th April 13.00 BST/14.00 CEST

You can watch the series from start to finish or just select the sessions you’re interested in. Register on the form to the right to watch live or receive the recording.

More information on each session is listed below.

Register via the form below

Trend Micro respects your privacy. Read our privacy policy.

More about the upcoming sessions:


Session #1 

The presentation will be hosted by
Richard Werner
Cybersecurity Platform Lead,
Trend Micro

Markus Winkler
Solution Architect Cloud Customer Success,
Trend Micro

Raf Hoogstijns
Customer Service Manager 

Workload Security for Cloud 

6th February 13.00 GMT/14.00 CET

Servers and cloud workloads have a greater attack surface than endpoints and can expose critical data if not protected properly. We’ll cover the fundamental approach to workload security in Trend Vision One so you can embrace this highly technical area with confidence.

We’ll cover:

  • Endpoint Protection - the fundamentals to protecting endpoints on AWS and other Cloud services
  • Understanding agents - we’ll cover the various types of agents and how to enroll and manage these in Trend Vision One


Session #2

The presentation will be hosted by
Udo Schneider
Governance, Risk & Compliance Lead, Trend Micro

Markus Winkler

Solution Architect Cloud Customer Success, Trend Micro


Luca De Fassi

Sales Engineer 

Container Security and “Shifting-Left”


20th February 13.00 GMT/14.00 CET

Trend Vision One enables you to take control of the security of your Containers.

We’ll discuss applying security controls from development all the way up to production. We’ll explore how you can balance the security needs with the concerns of your developers and operations personnel from start to finish.

We'll show you how to use Trend Vision One to achieve:

  • Effective Scanning - how to scan at time of development and gain greater visibility on potential threats earlier and quicker
  • Image validation - leverage GitHub Actions with Trend Vision One to validate images quicker and easier than traditional methods
  • Admission control - utilize Trend Vision One to keep your clusters clean and ensure robust visibility
  • Secure file uploads - we’ll cover the fundamentals to ensure your file uploads are fully secure

Session #3 

The presentation will be hosted by
Richard Werner
Cybersecurity Platform Lead,
Trend Micro

James McCarthy
Customer Success Engineer,
Trend Micro

Attack Surface Risk Management (ASRM) for Cloud

6th March 13.00 GMT/14.00 CET

ASRM is a powerful step in any organization’s security posture. It allows you to adopt a proactive security approach. Something essential in today’s environment and often required by many compliance standards. Trend Vision One boasts a leading ASRM module that can transform your security posture when used right.

We'll show you how to use Trend Vision One to achieve:

  • Transformative visibility - how to obtain a high-level view of your organization’s overall security posture
  • Asset mapping - learn how to visualize your asset connections across your environment
  • Prioritize the risk - use Trend Vision One to identify, prioritize, and remediate high-risk violations of your policies
  • Compliance - Trend Vision One will show you your levels of compliance against 30 different regulations and best practices. We’ll cover how to leverage this powerful feature and put the results into action
  • IaC Scanning - use Trend Vision one to scan your code for potential vulnerabilities

Session #4 

The presentation will be hosted by
Udo Schneider
Governance, Risk & Compliance Lead,
Trend Micro

Markus Winkler
Solution Architect Cloud Customer Success,
Trend Micro

Thomas Engelberg
Sales Engineer

Extended Detection & Response (XDR) for Cloud

20th March 13.00 GMT/14.00 CET

Traditional EDR only tells part of the story. Who's watching your workloads, containers, K8s clusters, and VMs? We’ll cover how to get real effective visibility across your full Cloud environment and beyond.

We’ll over how to use Trend Vision One to achieve:

  • Detection and Response for Cloud - we’ll demo how to gain visibility of your attack surface in areas such as AWS CloudTrail, VPC FlowLogs and more
  • Attack path visibility - we’ll help you paint a picture of your attack path. See who or what took which action when and where so you can respond with confidence to incidents
  • Impact assessment - how to gain visibility on which resources were violated to properly assess the impact of a potential breach

Session #5 

The presentation will be hosted by
Udo Schneider
Governance, Risk & Compliance Lead,
Trend Micro

Markus Winkler
Solution Architect Cloud Customer Success,
Trend Micro

Fiona Griffin
Sales Engineer

File Security in the Cloud

3rd April 13.00 BST/14.00 CEST

Cloud-native applications rely primarily on cloud file/object services as part of their workflow, facilitating new attack vectors for cybercriminals. We’ll demo how to detect and remediate malware from Trend Vision One with protection that integrates into your workflows with support across all applications.

We’ll cover:

  • Anti-Malware in the Cloud - the latest variants and strategies needed to tackle this growing issue
  • Integration - we’ll demo how to integrate File Security into your applications for end-to-end protection
  • Cloud Sandboxing - how to leverage this simple but effective tactic in Trend Vision One to protect against unknown threats

Session #6

The presentation will be hosted by
Markus Winkler
Product Manager, Trend Micro


Richard Werner

Cybersecurity Platform Lead, Trend Micro


Herbert Tenhagen

Solutions Architect

Virtual Network Security

17th April 13.00 BST/14.00 CEST

The growth of virtual networks provides another item to the long list of attack vectors. We’ll demo how to use Trend Vision One to get control over your Virtual Network.

We’ll show you how:

  • Cover your attack surface - Trend Vision One supports multiple public and private cloud platforms. We’ll cover how to quickly gain visibility of your full attack surface
  • Visibility of your VMs - how best to monitor and inspect your virtual network traffic with detection and response
  • Gain control of unmanaged assets - we’ll demo how to gain visibility of unmanaged (no endpoint agent) assets and ensure you are including these in your security efforts.

Speaker 2 name

Speaker 2 title

Speaker 2 bio

Speaker 3 name

Speaker 3 title

Speaker 3 bio

Section 1 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Further content


Trend Vision One Demo Series

Watch our previous demo series where we cover some of the most commonly used features and how to get the most out of them. All sessions available on demand. 

Watch now






Trend Vision One User Group

Our product team and tech experts run regular online updates on new features, changes to the product and any new information you need to know to get the most out of Trend Vision One.

Read more







Capture-the-Flag (CTFs)

CTF events offer a unique, fun and engaging way to learn security concepts and gain new skills. Our (online) games last a few hours and are accessible from any computer with a browser.

Our challenges will introduce you to tactics & techniques used by hackers in targeted attacks: spear-phishing, drive-by-download, persistence, fileless payload and more.

Section 2 - Column 2. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 2 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 2 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.