--- title: "Conclusions and Results" chapter: true weight: 80 pre: "8. " --- # Conclusions and Results In this workshop, we learned how we can manually and automatically detect and secure your application code, repository, network and infrastructure in several steps and ways. Whether in the IDE, EC2, EKS or elsewhere in the cloud. --- Want to continue learning how to protect and improve your performance in the Cloud? Visit and follow our many other workshops: [**Workshops designed for your cloud security needs**](https://resources.trendmicro.com/aws-workshops.html)

via GIPHY

Get started with Cloud One Services and embrace the simplicity and protection of a single platform built for cloud builders, so you can secure your cloud infrastructure. Want to learn about the other valuable Trend Micro Cloud One solutions? please visit [Trend Micro Cloud Oneā„¢](https://www.trendmicro.com/cloudone)