Trend Micro and Snyk team up to combat open source flaws
New solution monitors trends and prioritizes issues found in open source applications
Trend Micro and Snyk have announced a jointly developed SaaS solution called 'Trend Micro Cloud One - Open Source Security by Snyk'.
This industry-first solution, which targets security operations (SecOps) teams, provides real-time insight into open source vulnerabilities for enhanced risk management.
"Open source software is used in nearly all organizations. This introduces risks from readily exploitable vulnerabilities; an expanded attack surface through which malware and malicious code can gain access, compromising proprietary code and infrastructure; and legal and intellectual property exposures," stated Gartner in its market guide for software composition analysis.
Snyk stated the new Trend Micro Cloud One - Open Source Security by Snyk will help resolve the long-standing cultural barriers between security and development teams with a centralized solution that delivers unique visibility early in the software development lifecycle, further protecting the application stacks.
The new Trend Micro-Snyk SaaS proactively identifies vulnerabilities in licensing, so security teams can better monitor and prioritize risks within DevOps projects. It also corporates an integrated automation feature that helps security teams spot indirect dependencies in their applications.
Over 650 hours of development time can be saved per application through increased automation, according to Trend Micro.
RELATED RESOURCE
Address multi-cloud configuration risks
Cloud security challenges and how to overcome them
Trend Micro Cloud One - Open Source Security by Snyk is available as part of the Cloud One platform on the AWS Marketplace. Organizations have the option to integrate the service with standard source code platforms, including GitHub, GitLab, BitBucket, Jenkins, and more.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"Together Snyk and Trend Micro are investing in the future of the cybersecurity industry, where security and development teams effectively work together to make their organizations safer," said Geva Solomonovich, global alliances CTO at Snyk.
Solomonovich continued, "Adding Snyk's developer-first security technology to Trend Micro's Cloud One allows more customers to tackle open source risk on a single platform, minimizing the need to manage multiple vendors and tools. We look forward to our continued collaboration with Trend Micro to foster more innovative, effective ways to solve key security concerns for our customers."
-
Two Fortinet vulnerabilities are being exploited in the wild – patch nowNews Arctic Wolf and Rapid7 said security teams should act immediately to mitigate the Fortinet vulnerabilities
-
Everything you need to know about Google and Apple’s emergency zero-day patchesNews A serious zero-day bug was spotted in Chrome systems that impacts Apple users too, forcing both companies to issue emergency patches
-
Trend Micro issues warning over rise of 'vibe crime' as cyber criminals turn to agentic AI to automate attacksNews Trend Micro is warning of a boom in 'vibe crime' - the use of agentic AI to support fully-automated cyber criminal operations and accelerate attacks.
-
Security experts claim the CVE Program isn’t up to scratch anymore — inaccurate scores and lengthy delays mean the system needs updatedNews CVE data is vital in combating emerging threats, yet inaccurate ratings and lengthy wait times are placing enterprises at risk
-
IBM AIX users urged to patch immediately as researchers sound alarm on critical flawsNews Network administrators should patch the four IBM AIX flaws as soon as possible
-
Critical Dell Storage Manager flaws could let hackers access sensitive data – patch nowNews A trio of flaws in Dell Storage Manager has prompted a customer alert
-
Flaw in Lenovo’s customer service AI chatbot could let hackers run malicious code, breach networksNews Hackers abusing the Lenovo flaw could inject malicious code with just a single prompt
-
Industry welcomes the NCSC’s new Vulnerability Research Initiative – but does it go far enough?News The cybersecurity agency will work with external researchers to uncover potential security holes in hardware and software

