{"id":2748,"date":"2018-06-13T13:42:51","date_gmt":"2018-06-13T13:42:51","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=541478"},"modified":"2018-06-13T13:42:51","modified_gmt":"2018-06-13T13:42:51","slug":"extending-trend-micros-container-protection-with-deep-security-smart-check","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/extending-trend-micros-container-protection-with-deep-security-smart-check\/","title":{"rendered":"Extending Trend Micro\u2019s Container Protection with Deep Security Smart Check"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_93275161_XXXLARGE-300x200.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_93275161_XXXLARGE-300x200.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_93275161_XXXLARGE-768x513.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_93275161_XXXLARGE-1024x683.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_93275161_XXXLARGE-640x427.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_93275161_XXXLARGE-900x601.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_93275161_XXXLARGE-440x294.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/iStock_93275161_XXXLARGE-380x254.jpg 380w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"\/><\/p>\n<p>While DevOps is not a single person or business unit, it is a development philosophy that exists within many organizations.\u00a0 DevOps teams are prime to build new applications for business growth, and help facilitate the extension of critical monolithic applications into modern architectures. A key tenant of this philosophy is microservices which is an application architecture based on a series of loosely coupled services to make applications lightweight and easier to develop, test and deploy.<\/p>\n<p>InfoSec teams have found themselves trying to keep up with the rapid pace of DevOps without creating roadblocks or reducing the visibility and security controls they have come to trust across the organization.<\/p>\n<p>To get ahead of these challenges, security can be implement earlier in the development workflow. This will help identify vulnerabilities before they can be exploited in production environments. To do that, security needs to be a part of the culture and development lifecycle of the organization.<\/p>\n<p>Trend Micro is extending its container host protection with the launch of Deep Security Smart Check.<img loading=\"lazy\" decoding=\"async\" class=\" wp-image-541479 alignnone\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/log.jpg\" alt=\"\" width=\"430\" height=\"128\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/log.jpg 1514w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/log-300x89.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/log-768x228.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/log-1024x304.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/log-640x190.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/log-900x268.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/log-440x131.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/log-380x113.jpg 380w\" sizes=\"auto, (max-width: 430px) 100vw, 430px\"\/><\/p>\n<p>Smart Check delivers fully automated pre-runtime scanning of Docker container images at the registry, providing vulnerability assessment and malware detection. This ultimately shifts security sooner in the development lifecycle for extended protection prior to deployment.<\/p>\n<p>Trend Micro wants to help eliminate security roadblocks, and the best way to do that is to make security invisible through automation.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-541480\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/blog-2.jpg\" alt=\"\" width=\"317\" height=\"178\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/blog-2.jpg 1152w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/blog-2-300x168.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/blog-2-768x431.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/blog-2-1024x575.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/blog-2-640x359.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/blog-2-900x505.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/blog-2-440x247.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/blog-2-380x213.jpg 380w\" sizes=\"auto, (max-width: 317px) 100vw, 317px\"\/><\/p>\n<p>Trend Micro is delivering a full suite of RESTful APIs for integration with your organization\u2019s continuous delivery tools such as Jenkins, orchestration tools such as Chef, Puppet, and Kubernetes, and monitoring tools such as New Relic, and AWS CloudTrail.<\/p>\n<p>Monolithic applications are cumbersome and less agile. With a microservice architecture, security can be applied for specific needs sooner. As part of Trend Micro\u2019s full stack protection, Smart Check allows teams to call built-in security controls, identifying threats at first build and alleviating the need to do re-work after the fact. By helping to streamline operations, teams can reduce tool complexity and optimize application deployment across cloud, virtualization, container, datacenter and a broad range of platforms.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-541481 alignright\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/blog1-1.jpg\" alt=\"\" width=\"384\" height=\"296\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/blog1-1.jpg 1584w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/blog1-1-300x232.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/blog1-1-768x593.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/blog1-1-1024x791.jpg 1024w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/blog1-1-640x495.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/blog1-1-900x695.jpg 900w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/blog1-1-440x340.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/06\/blog1-1-380x294.jpg 380w\" sizes=\"auto, (max-width: 384px) 100vw, 384px\"\/>Smart Check compliments Deep Security\u2019s host-based protection, a critical requirement given the constant evolving threat landscape.<\/p>\n<p>With the rise of DevOps brings new sources of vulnerabilities and a greater segment of the business in need of protection.<\/p>\n<p>Forged alliances between IT security and DevOps teams help improve the security posture of your organization. Security controls found in Trend Micro Deep Security deliver needed protection earlier in the CI\/CD pipeline resulting in greater mitigation of vulnerabilities and malware, reducing the risk of cyber threats and leading to faster and more successful application protection and deployment.<\/p>\n<p>To learn more about Trend Micro container protection visit <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/hybrid-cloud\/container.html?cm_mmc=VURL:www.trendmicro.com-_-VURL-_-\/containers\/index.html-_-vanity\">trendmicro.com\/containers<\/a>.<\/p>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/extending-trend-micros-container-protection-with-deep-security-smart-check\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>While DevOps is not a single person or business unit, it is a development philosophy that exists within many organizations.\u00a0 DevOps teams are prime to build new applications for business growth, and help facilitate the extension of critical monolithic applications into modern architectures. A key tenant of this philosophy is microservices which is an application&#8230;<br \/>\nThe post Extending Trend Micro\u2019s Container Protection with Deep Security Smart Check appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":2749,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[127,1254,1255,198,307,1256],"class_list":["post-2748","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-aws","tag-devops","tag-docker-container","tag-infosec","tag-security","tag-smart-check"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Extending Trend Micro\u2019s Container Protection with Deep Security Smart Check 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/extending-trend-micros-container-protection-with-deep-security-smart-check\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Extending Trend Micro\u2019s Container Protection with Deep Security Smart Check 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/extending-trend-micros-container-protection-with-deep-security-smart-check\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-13T13:42:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/extending-trend-micros-container-protection-with-deep-security-smart-check.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/extending-trend-micros-container-protection-with-deep-security-smart-check\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/extending-trend-micros-container-protection-with-deep-security-smart-check\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Extending Trend Micro\u2019s Container Protection with Deep Security Smart Check\",\"datePublished\":\"2018-06-13T13:42:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/extending-trend-micros-container-protection-with-deep-security-smart-check\\\/\"},\"wordCount\":466,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/extending-trend-micros-container-protection-with-deep-security-smart-check\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/extending-trend-micros-container-protection-with-deep-security-smart-check.jpg\",\"keywords\":[\"AWS\",\"devops\",\"Docker container\",\"Infosec\",\"Security\",\"Smart Check\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/extending-trend-micros-container-protection-with-deep-security-smart-check\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/extending-trend-micros-container-protection-with-deep-security-smart-check\\\/\",\"name\":\"Extending Trend Micro\u2019s Container Protection with Deep Security Smart Check 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/extending-trend-micros-container-protection-with-deep-security-smart-check\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/extending-trend-micros-container-protection-with-deep-security-smart-check\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/extending-trend-micros-container-protection-with-deep-security-smart-check.jpg\",\"datePublished\":\"2018-06-13T13:42:51+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/extending-trend-micros-container-protection-with-deep-security-smart-check\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/extending-trend-micros-container-protection-with-deep-security-smart-check\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/extending-trend-micros-container-protection-with-deep-security-smart-check\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/extending-trend-micros-container-protection-with-deep-security-smart-check.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/extending-trend-micros-container-protection-with-deep-security-smart-check.jpg\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/extending-trend-micros-container-protection-with-deep-security-smart-check\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AWS\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/aws\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Extending Trend Micro\u2019s Container Protection with Deep Security Smart Check\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Extending Trend Micro\u2019s Container Protection with Deep Security Smart Check 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/extending-trend-micros-container-protection-with-deep-security-smart-check\/","og_locale":"en_US","og_type":"article","og_title":"Extending Trend Micro\u2019s Container Protection with Deep Security Smart Check 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/extending-trend-micros-container-protection-with-deep-security-smart-check\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-06-13T13:42:51+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/extending-trend-micros-container-protection-with-deep-security-smart-check.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/extending-trend-micros-container-protection-with-deep-security-smart-check\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/extending-trend-micros-container-protection-with-deep-security-smart-check\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Extending Trend Micro\u2019s Container Protection with Deep Security Smart Check","datePublished":"2018-06-13T13:42:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/extending-trend-micros-container-protection-with-deep-security-smart-check\/"},"wordCount":466,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/extending-trend-micros-container-protection-with-deep-security-smart-check\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/extending-trend-micros-container-protection-with-deep-security-smart-check.jpg","keywords":["AWS","devops","Docker container","Infosec","Security","Smart Check"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/extending-trend-micros-container-protection-with-deep-security-smart-check\/","url":"https:\/\/www.threatshub.org\/blog\/extending-trend-micros-container-protection-with-deep-security-smart-check\/","name":"Extending Trend Micro\u2019s Container Protection with Deep Security Smart Check 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/extending-trend-micros-container-protection-with-deep-security-smart-check\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/extending-trend-micros-container-protection-with-deep-security-smart-check\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/extending-trend-micros-container-protection-with-deep-security-smart-check.jpg","datePublished":"2018-06-13T13:42:51+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/extending-trend-micros-container-protection-with-deep-security-smart-check\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/extending-trend-micros-container-protection-with-deep-security-smart-check\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/extending-trend-micros-container-protection-with-deep-security-smart-check\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/extending-trend-micros-container-protection-with-deep-security-smart-check.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/extending-trend-micros-container-protection-with-deep-security-smart-check.jpg","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/extending-trend-micros-container-protection-with-deep-security-smart-check\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"AWS","item":"https:\/\/www.threatshub.org\/blog\/tag\/aws\/"},{"@type":"ListItem","position":3,"name":"Extending Trend Micro\u2019s Container Protection with Deep Security Smart Check"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/2748","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=2748"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/2748\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/2749"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=2748"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=2748"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=2748"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}