Organizations benefit from direct access to their own data and threat insights
Trend Micro Incorporated, a global cybersecurity leader, is a launch partner of an innovative new security data lake technology from Amazon Web Services (AWS), Amazon Security Lake.
Many organizations struggle to unlock the value of log and event data sitting in disparate silos across cloud and on-premises tools. Trend Micro contributes the data feeds that help security teams drive greater visibility into threat data to minimize security risk, cost and complexity.
Amazon Security Lake removes barriers and makes critical data available to 3rd party security and analytics solutions.
Mike Milner, VP of cloud technology for Trend Micro: “Another critical customer challenge is now removed. This latest milestone alleviates critical security operation challenges in cloud environments by empowering security teams to maximize their efficiency in managing data at scale.”
Amazon Security Lake puts the customer in control by removing these barriers and making critical data available to the third-party security and analytics solutions of their choice. Support for OCSF accelerates data ingestion and analysis work performed by these solutions.
“With Amazon Security Lake, analysts and engineers can now easily build and use a centralized data lake to drive the visibility into log and event data needed to enhance protection of critical workloads, applications and data,” said Rod Wallace, General Manager for Amazon Security Lake. “It offers major new opportunities to optimize key security tasks. We’re delighted to have Trend Micro on board right from the start.”
Amazon Security Lake automatically centralizes an organization’s security data from cloud and on-premises sources into a purpose-built data lake in a customer’s AWS account. Security data in Amazon Security Lake can then be used to power third-party analytics tools for threat detection, investigation and incident response. It supports the Open Cybersecurity Schema Framework (OCSF) standard for seamless normalization and ingestion of threat data.*
SOURCE: PR Newswire