Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Trend Micro Cloud App Security provides protection against ransomware, phishing, Business Email Compromise (BEC), zero-day and hidden malware, and unauthorized transmission of sensitive data. It it integrates cloud-to-cloud with the protected applications and services to maintain high availability and administrative functionality.Here are the steps to follow for the ingestion of events to Seceon SIEM to have a Comprehensive visibility and Proactive Threat Detection in your Environment.

...

  • Enter the name of the device.

  • Enter the CCE IP.

  • Access ID/username: Not required.

  • To generate the Secret Key/Authentication Token, please follow the steps provided in the link below.refer the below link:

Link- Generating an Authentication Token

...