Filter Resources

Data Sheet
Security vulnerabilities and the devastating effect they can have on your organization doesn’t just impact in-house code, they also occur in open source components and libraries. Checkmarx Open Source Analysis (CxOSA) is an open source analysis solution that extends our CxSAST solution to detect, aggregate and manage open source components as part of the CI/CD toolchain.
Data Sheet
CxIAST is an application security testing solution that detects vulnerabilities in running applications under test. By extending its portfolio into dynamic and continuous security testing, Checkmarx provides broader coverage, and improves time-to-market without compromising security.
Data Sheet
CxCodebashing is an interactive AppSec training platform built by developers for developers. CxCodebashing sharpens the skills developers need to avoid security issues, fix vulnerabilities, and write secure code in the first place. With CxCodebashing, access to engaging secure coding training is one click away – for the entire development team.
Publication
Checkmarx delivers a platform for all aspects of DevOps including development and CI/CD environments by redefining security’s role in the SDLC, all while operating at the speed of DevOps. The fast feedback loop makes security testing of new or edited code fragments quick, allowing speedy remediation by developers.
Data Sheet
Checkmarx CxSAST is part of the Checkmarx Software Exposure Platform addressing software security risk across the entire SDLC. CxSAST is a flexible and accurate static analysis solution used to identify hundreds of types of security vulnerabilities in both custom code and open source components. It is used by development, DevOps, and security teams to scan source code early in the SDLC across over 25 coding and scripting languages.
Whitepaper
Federal agencies are using multiple public clouds in addition to on-premises private and non-cloud infrastructures. This mutli-cloud adoption is creating increasingly complex environments and making it difficult to manage and protect data. Without proper data management, hybrid and multi-cloud environments can quickly become just another series of expensive and risky silos. All cloud migration strategies should encompass data management best practices to maximize cloud adoption benefits while minimizing risk.
Webinar
​Managing and Protecting your Data in the Cloud and on Prem
Webinar
The "National Cyber Strategy", released recently by the White House, offers a broad blueprint for America's approach to cybersecurity. The four pillars provided, set out noble and worthwhile goals.
Data Sheet
Targeted attacks and advanced threats are customized to evade your conventional security defenses, and remain hidden while stealing your corporate data, intellectual property, and communications, or encrypt critical data until ransom demands are met. To detect targeted attacks and advanced threats, analysts and security experts agree that organizations should utilize advanced detection technology as part of an expanded strategy. Deep Discovery Inspector is a physical or virtual network appliance that monitors.
Data Sheet
Targeted attacks and advanced threats are customized to evade your conventional security defenses and remain hidden, while stealing your sensitive data or encrypting critical data until ransom demands are met. To detect targeted attacks and advanced threats, analysts and security experts agree that organizations should utilize advanced detection technology as part of an expanded strategy to address today’s evasive threats.
Data Sheet
DataWalk is a commercial-grade Big Data software platform for connecting numerous large data sets, into a single repository for fast visual analysis.
Data Sheet
Virtualization has already transformed the data center and now, organizations are moving some or all of their workloads to private and public clouds. If you’re interested in taking advantage of the benefits of hybrid cloud computing, you need to ensure you have security built to protect all of your servers, whether physical, virtual, or cloud. &nsbp; In addition, your security should not hinder host performance and virtual machine (VM) density or the return on investment (ROI) of virtualization and cloud computing. Trend Micro™ Deep Security™ provides comprehensive security in one solution that is purpose-built for virtualized and cloud environments so there are no security gaps or performance impacts.
Data Sheet
Trend Micro™ Deep Security™ makes it easier to meet many of the key security controls required for federal information systems moving to Azure.
Publication
As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, hybrid environments, and containers effectively. If you neglect any aspect of security, you leave gaps that open the door to threats and serious data breaches. And, to comply with data privacy and industry regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment.
Publication
NSS Labs performed an independent test of the Trend Micro Deep Discovery Inspector Model 4000 (Hardware model 4100) v5.0 & OfficeScan XG SP1. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Breach Detection Systems (BDS) Test Methodology v5.0 and the NSS Labs Evasions Test Methodology v1.1, both available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Trend Micro’s participation.

Pages