Total Product Catalogue

Size: px
Start display at page:

Download "Total Product Catalogue"

Transcription

1 September 2013 Total Product Catalogue Trademarks Notice Incorporated, InterScan, InterScan VirusWall, ScanMail, ServerProtect, VirusWall, and WebProtect are trademarks of, registered in the U.S. and are trademarks in other countries, and AppletTrap, ChipAwayVirus, Edoctor, Ehospital, Emanager, MacroTrap,, PC-Cillin,, Trend VCS, Web Trap and NeatSuite are trademarks of. All other trademarks are the property of their respective owners. Copyright Incorporated. All rights reserved. P/N TOPE-SE-0005

2 Our VISION Management Eva Chen A world safe for exchanging digital information CEO & Co-Founder Mahendra Negi COO& CFO The assurance of safety, for all people The Internet society has now become commonplace. However, a society that can use the Internet safely is certainly not commonplace. has extensive experience and advanced technology to protect individuals and companies from the threats of the information society. We will consolidate all our strengths to confront these threats and continue to provide a safe network society. Steve Chang Chairman & Founder Akihiko Omikawa Executive Vice President, General Manager Japan Region, Global Consumer Business Unit, Global Service Business Unit Traded Tokyo Stock Exchange 4704 ASIA-PACIFIC Providing the reassurance of security, across borders. responds to threats all around the world with threat analysis network spreading globally. is a multinational corporation from Japan that has reached beyond borders to become a transnational company. In 1988, was founded in California in the United States, and in Japan from Since then, has continued to grow steadily, and as a multinational corporation from Japan with activity bases located around the world, has built up a network which continuously monitors worldwide and regional threats to quickly provide solutions to customers. Global Network Ireland UK France Germany USA 11F, No.198 Sec. 2 Tun Hwa S. Road Taipei, Taiwan (106) Eva Chen CEO & Co-Founder Company Introduction & Global Map Company Introduction & Global Map Company Introduction & Global Map (California) Japan China USA (Head Office) (Texas) Taiwan Philippines (Headquarters) JAPAN Shinjuku MAYNDS Tower Yoyogi, Shibuya-ku Tokyo, Japan Brazil Development Sites Major Overseas Bases TrendLabs Philippine is granted the ISO for the adherence to IT service excellence of its malware information, detection cleanup and technical support services. Japan Our MISSION Innovate to provide the best content security that fits into the IT infrastructure Providing the optimal solution, with constant innovation. As the leader in content security, provides solutions enabling a safe information society. This is s mission. In addition to the changing trends in threats, the emergence of cloud computing, and the penetration of mobile PCs, there are also changes in the network environment. Developing innovative products and services in order to protect valuable information assets from unpredictable threats anytime, anywhere. Our job is to continue to quickly provide optimal solutions in response to this changing environment. Therefore we are committed to constant innovation. 2 NORTH AMERICA Head Office N. De Anza Blvd. Cupertino, CA USA TrendLabs Regional Trend Labs LATIN AMERICA Development Sites Insurgentes Sur 813, Pisoll Colonia Napoles C.P Mexico D.F Philippines Overseas Subsidiary EMEA Business and Technology Park Model Farm Road Cork, Ireland Major Overseas Bases (Headquarters) Japan USA USA Japan Canada Taiwan Germany UK Germany Taiwan Ireland China China India France Australia Germany China China (Beijing) (Shanghai) Taiwan France (Hong Kong) India Korea Italy UK Australia Canada Thailand Switzerland Malaysia Singapore Brazil New Zealand Austria Belgium Netherlands Denmark UAE(Dubai) Norway Poland Spain Sweden Turkey Vietnam Philippines Egypt USA Ireland Mexico China Ireland UK France Brazil Brazil Panama Russia Indonesia Saudi Arabia South Africa 3

3 Product Map Smart Protection Network ERS Reputation Services Virus Invade Product Map Web Reputation Service WRS FRS File Reputation Service From the Cloud Scalable from Physical server to Cloud environment Customer Datacenter For the Cloud Product Map Virus Virus Spyware Spam Invade Data Loss InterScan Messaging Security Virtual Appliance InterScan Web Security Virtual Appliance Virus ARM Spyware Web Threats URL Filtering Phishing Data Loss Phishing Router Medium Enterprise Environment Collaboration Security - ScanMail Suite for Microsoft Exchange - PortalProtect - IM Security Hosted Security Virus Spam Spyware Phishing Deep Discovery Virus Spyware Spam Web Threats Phishing Appliance for analyze suspicious behavior in network and respond to unknown threats Firewall ScanMail for Groupware - ScanMail Suite for Microsoft Exchange - ScanMail Suite for Lotus Domino Virus Spyware Spam Phishing Virus Spyware Spam Phishing Data Loss Small Medium Environment Switch Data Loss Enterprise Security for Endpoints - - ServerProtect for Windows/Linux - Control Manager - plug-in IDF - plug-in Macintosh Web Virus Spyware Threats Invade Data Loss Network VirusWall Enforcer Quarantine Network Virus Server Storage ServerProtect Series Virus Worry-Free Business Security Virus Spyware Spam Web Threats Phishing URL Filtering Data Loss Mobile Security Management Server Product Matrix Categories Products Antispam Antispam Antimalware For Web threats Antivirus Web reputation URL filtering Virtualization Encryption Encryption Data Loss Prevention Data Protection Mobile security Endpoint encryption encryption Firewall Vulnerability / Intrusion IDS / IPS FIM Log inspection VDI Categories Products Anti-malware Antivirus Web reputation For Web threats URL filtering Anti-Phishing Anti-spam Anti-spam Anti-Phishing Data Loss Prevention Data Loss Prevention Enterprise Security for Endpoints Advanced ScanMail Suite for Microsoft Exchange Enterprise Security for Endpoints Standard Collaboration Security ScanMail Suite for Lotus Domino Endpoint Security Worry Free Business Security Advanced PortalProtect Worry Free Business Security Standard InterScan Messaging Security Worry Free Business Security Services Gateway Security ( / Web) InterScan Web Security Enterprise Security for Gateways Server / Storage Security Security Suites ServerProtect NT/NW ServerProtect Linux ServerProtect NetApp ServerProtect EMC Enterprise Security for Enterprise and Mail Servers Enterprise Security Suite Categories Network Security Hosted Security Products Deep Discovery Network VirusWall Enforcer Unknown threats Known threats Restore Analysis report Quarantine infected sources Quarantine Behavior monitoring Cloud Security Enterprise Security and Data Protection SecureCloud Anti-malware For Web threats Data Loss Prevention Vulnerability / Intrusion Offline Security Portable Security Categories Products Antivirus Web reputation URL filtering Encryption Device control Remote lock Remote wipe Firewall Data Protection Enterprise Data Protection Mobile Security Mobile Security 4 5

4 Endpoint Security Endpoint and Suites Endpoint Security Enterprise Security for Endpoints Advanced Enterprise Security for Endpoints Standard Secure your endpoints, both on and off the network, with award-winning protection including: anti-malware, web reputation technology to block access to malicious websites, and HIPS protection. Powered by Smart Protection Network cloud-based security, pattern files are managed in the cloud and not on your endpoints to free computing resources and optimize performance. Further customize your protection with add-on options for data protection, mobile security, and desktop virtualization all coordinated through a single management console. CLIENTS Endpoint Security with plug-in modules: Intrusion Defense Firewall Security for Mac Virtual Desktop Infrastructure(VDI) SMART: Get consistent security that delivers proactive protection across all endpoints Simple: Increase security at lower costs with a consolidated, cloud-client architecture and simplified management Security That Fits: Streamline administration by enforcing threat protection policies from a single console Enterprise Security for Endpoints Standard Advanced COMPARISON CHART Plug-Ins Intrusion Defense Security for Mac Firewall VDI ServerProtect for Windows, NetWare, Linux FILE SERVERS ServerProtect for Microsoft Windows / Novell Netware ServerProtect for Linux CENTRALIZED MANAGEMENT Control Manager Control Manager Standard Advanced Enterprise Security Suite Enterprise Security Suite is a tightly integrated suite of products that secure your network from gateway to endpoint. With comprehensive threat protection and centralized management, you can close the security gaps while decreasing costs and complexity. Powered by Trend Micro Smart Protection Network cloud-based security, this end-to-end suite delivers global threat intelligence and faster performance. CENTRALIZED MANAGEMENT Control Manager GATEWAY InterScan Messaging Security InterScan Web Security MAIL SERVERS ScanMail Suite for Microsoft Exchange ScanMail Suite for Lotus Domino FILE SERVERS Endpoint Security ServerProtect for Microsoft Windows / Novell Netware ServerProtect for Linux CLIENTS Endpoint Security with plug-in modules: Intrusion Defense Firewall Security for Mac Virtual Desktop Infrastructure(VDI) Maximizes Protection Reduces risk with comprehensive multilayered, multi-threat protection Delivers immediate protection with in-the-cloud threat intelligence Improves productivity with #1 rated spam blocking and web filtering Lowers Costs Lowers endpoint infection rates by 62% Slashes IT security management costs by 40% Minimizes Complexity Reduces time to acquire, deploy, and manage with integrated solution Streamlines administration with web-based centralized management Endpoint Security Enterprise Security for Endpoints and Mail Servers Enterprise Security for Endpoints and Mail Servers is an integrated, centrally managed suite that delivers adaptive threat protection with award-winning anti-malware, antispam, host intrusion prevention (HIPs), web reputation, and optional data security. This suite is powered by Trend Micro Smart Protection Network cloud-based security for global threat intelligence and faster performance. Reduce risks and costs with a single solution offering unified management of integrated security across enterprise desktops, laptops, file servers, and mail servers. Maximum Protection across Endpoints and Mail Servers Multilayered Protection Platform Coverage Advantage MAIL SERVER ScanMail Suite for Microsoft Exchange Windows Blocking spam and spyware at the mail server ScanMail Suite for Lotus Domino Windows, Linux Blocking spam and spyware at the mail server FILE SERVER ServerProtect for Microsoft Windows / Novell Netware Windows Windows, NetWare Secures Windows servers Secures Windows and NetWare file servers ServerProtect for Linux Linux Secures Linux file servers CLIENT FILE SERVERS ServerProtect for Microsoft Windows / Novell Netware ServerProtect for Linux CLIENTS Endpoint Security with plug-in modules: Intrusion Defense Firewall Security for Mac Virtual Desktop Infrastructure(VDI) MAIL SERVERS ScanMail Suite for Microsoft Exchange ScanMail Suite for Lotus Domino CENTRALIZED MANAGEMENT Control Manager Maximum Protection and Minimum Complexity across Protections Points and Platforms Multilayered Protection Platform Coverage Advantage GATEWAY InterScan Messaging Security Virtual Appliance VMware Virtualized gateway security stops spam and threats InterScan Web Security Virtual Appliance VMware Virtualized web gateway security blocks web threats and includes URL filtering MAIL SERVER ScanMail Suite for Microsoft Exchange Windows Blocking spam, malware and spyware at the mail server ScanMail Suite for Lotus Domino Windows, Linux Blocking spam, malware and spyware at the mail server FILE SERVER ServerProtect for Microsoft Windows / Novell Netware Windows Windows, NetWare Secures Windows servers Secures Windows and NetWare file servers ServerProtect for Linux Linux Secures Linux file servers CLIENT / MOBILE DEVICE Windows Secures Windows clients Intrusion Defense Firewall Windows Proactive HIPS and vulnerability shielding Data Loss Prevention Protect your sensitive data Security for Mac Apple Macintosh Protects Macintosh clients from malware and blocks malicious websites MANAGEMENT Control Manager Advanced Windows Centrally manages security Intrusion Defense Firewall Windows Windows Secures Windows clients Proactive HIPS and vulnerability shielding Security for Mac Apple Macintosh Protects Macintosh clients from malware and blocks malicious websites VDI Secure virtual desktop environment MANAGEMENT Control Manager Advanced Windows Centrally manages security 6 7

5 Endpoint Security Endpoint and Suites plug-ins Endpoint Security Enterprise Security and Data Protection Enterprise Data Protection Enterprise Security and Data Protection is an integrated suite of products that secure your network from gateway to mobile devices for complete end user protection. This comprehensive suite combines multi-layer adaptive threat protection with Enterprise Data Protection to help you efficiently mitigate the risks of attacks and data breaches across the spectrum of end-user platforms, from smartphones to tablets, and laptops to removable drives. Enterprise Data Protection simplifies data security in today s complex mobile environments by integrating data loss prevention (DLP), encryption, mobile security, and mobile device management (MDM) with your existing security suite. By combining threat and data protection in a flexible, centrally-managed solution, it lowers the cost and effort to deploy and manage while closing critical security and compliance gaps for complete end-user protection across endpoints, mobile devices, , and gateway. Solution Data protection Centralized Management Gateway Protection Mail Servers Protection Mail Servers Protection Endpoint Protection Integrated Data Loss Prevention Mobile Security Endpoint Encryption Encryption Gateway Control Manager InterScan Messaging Security InterScanWeb Security Components ScanMail Suite for Microsoft Exchange ScanMail Suite for Lotus Domino MAIL SERVERS ScanMail Suites Encryption Integrated DLP GATEWAY InterScan Massaging Security InterScan Web Security Integrated DLP Endpoint Security Server Protect for Microsoft Windows / Novell Netware ServerProtect fo Linux Endpoint Security Intrusion Defense Firewall Security for Mac VDI Security CENTRALIZED MANAGEMENT Control Manager Enterprise Security and Data Protection FILE SERVERS ServerProtect Integrated DLP CLIENTS Intrusion Defense Firewall Security for Mac VDI Security Mobile Security Endpoint Encryption Integrated DLP Enterprise Data Protection Data Loss Prevention Module The DLP plug-in is an option for customers to gain visibility and control into how sensitive data is being handled. Real-time scanning of users will detect when sensitive data is being copied, moved, ed, pasted or uploaded and appropriate action can be taken such as blocking, reporting or warning. Data privacy and compliance Can be deployed immediately / easily Virtual Desktop Infrastructure Built specifically to handle the rigors of virtual desktop environments, Virtual Desktop Security maximizes protection for a broad spectrum of virtual desktop scenarios. Agentless anti-malware No security agent in the VM Leverage VMware vshield APIs VDI optimized agents Prevent resource contention Cleans, scans memory and monitors behavior. Mobile Security Mobile Security enables businesses to extend protection beyond traditional PCs to secure mobile devices and data for the smartphone and tablet platforms your employees are demanding. This solution lets organizations reduce costs by providing a single point of visibility and control for device management and security. It protects data and limits data loss incidents by enforcing the use of passwords, encrypting data, and remotely wiping data from lost or stolen devices. Threat Protection Malware Spyware Web threats Reduced Operational Costs Limit Data Loss Reduced Security Risk Monitor Intrusion Defense Firewall As a plug-in for within Enterprise Security for Endpoints, Intrusion Defense Firewall supplements highly effective client-level security with network-level Host Intrusion Prevention System (HIPS). Protects endpoints with minimal impact on network throughput, performance, or user productivity. Blocks attacks before they enter the endpoint s application and execution layer. Provides protection before patches are deployed. Security for Macintosh As a plug-in for Security for Mac leverages Smart Protection Network to proactively limit exposure to threats. Real-time, in-the-cloud Web Reputation technology prevents users and applications from accessing malicious web content. Blocks malware for all systems, including both Mac OS and Windows. User Android User User iphone / ipad User BlackBerry Windows Mobile Endpoint Security Manager Control 8 9

6 Endpoint Security Worry Free Cloud Security Endpoint Security Worry-Free Business Security Advanced Worry-Free Business Security Standard Worry-Free Business Security Services Provides fast, effective, and simple protection against web viruses, cybercriminals, and data loss, so you can focus on your business instead of worrying about Internet security. Worry-Free is ranked #1 in independent tests at blocking Internet threats BEFORE they reach your PCs; Mac computers; file and mail servers increasing protection, while preventing computer slow down. Web Threat Protection Smart Scan Scans faster and updates quicker Data Loss Prevention Comprehensive spam prevention Device Control Zero update effort (Services only) UNIQUE ADVANTAGES Web threat protection stops viruses and threats from the web before they reach your business Intuit QuickBooks protection Smart Feedback faster identification and response to new threats Integrated fake antivirus removal tool Support for IPv6 PLATFORMS PCs, laptops, Windows servers Windows 8 compatible Virtualization (VMware and Microsoft) Mac clients (imacs and MacBooks) and servers Android Devices Spam mails Phishing Viruses Spyware Mobile Security Web threats Worry-Free Business Security Services Worry-Free Business Security Standard URL filtering Data loss Worry-Free Business Security Advanced SecureCloud More companies are turning to cloud computing and virtualization to provide rapid provisioning, agility, and cost savings. However, these benefits also introduce privacy and security risks-businesses may not always know where their data is or who can access it. SecureCloud provides distinctive data protection for cloud and virtual environments using encryption with policy-based key management and unique server validation. This protection safely and easily secures sensitive data stored with leading cloud service providers, including Amazon EC2, Dell, Eucalyptus, and NTT America, as well as VMware vcloud and any virtual environment. With SecureCloud, you can protect sensitive information in cloud and virtual environments from theft, unauthorized exposure, or unapproved geographic migration to other data centers. This protection helps support internal governance and ensure compliance with regulations like HIPAA, HITECH, Sarbanes-Oxley, GLB and PCI DSS. SecureCloud also features FIPS certification to support government agencies and companies that mandate high security standards. SecureCloud agent Cloud platform VM VM VM Hypervisor Features & Advanced Security Techniques Features FIPS certification and FIPS approved AES encryption Encrypts and decrypts information in real time, so data at rest is always protected Applies whole volume encryption to secure all data, metadata, and associated structures without impacting application functionality Access and Authentication Controls Employs role-based management to help ensure proper separation of duties Automates key release and virtual machine authorization for rapid operations or requires manual approval for increased security Offers cloud provider credential rotation Policy-driven Key Management Uses identity- and integrity-based policy enforcement to ensure only authorized virtual machines receive keys and access secure volumes Enables the use of policies to determine when and where information is accessed Robust Auditing, Reporting, and Alerting Logs actions in the management console for audit purposes Provides detailed reporting and alerting features with incident-based and interval-based notifications Authentication for key deployment done by rule base policy per VMs. Random session key over SSL Cloud Security ANTIVIRUS AND WEB SECURITY Defends against viruses, spyware, bots, rootkits Advanced URL filtering blocks access to inappropriate websites CENTRALIZED MANAGEMENT Intuitive web console Management server location (with blacklist feature) Hosted On Premise On Premise Access VM Shared Storage Kernel level encryption on writing data. DATA PROTECTION Device control, controls access to USB drives and other attached devices to prevent data loss and block threats. Data loss prevention via business messages, accidental or deliberately sent MESSAGING SECURITY AND ANTISPAM Scans and blocks spam from entering POP3 mail accounts Includes Hosted Security-Inbound Filtering that stops spam and -based viruses before they reach mail servers Threat protection and multi-layer antispam for Microsoft Exchange Servers Encryption will be done for per volumes which connects to virtual instance server OS. Key will be deployed per volumes

7 Server/Storage Security and ServerProtect series Server/Storage Security provides a comprehensive server security platform designed to protect your virtualized data center from data breaches and business disruptions while enabling compliance. This agentless solution simplifies security operations while accelerating the ROI of virtualization and cloud projects. Tightly integrated modules easily expand the platform to ensure server, application, and data security across physical, virtual, and cloud servers, as well as virtual desktops. So you can custom tailor your security with any combination of agentless and agent-based protection, including anti-malware, web reputation, firewall, intrusion prevention, integrity monitoring, and log inspection. The result is an adaptive and efficient server security platform that protects mission-critical enterprise applications and data from breaches and business disruptions without expensive emergency patching. PHYSICAL Virtual Appliance VIRTUAL Features Anti-Malware Integrity Monitoring Web Reputation Intrusion Detection and Prevention Bidirectional Stateful Firewall Log Inspection NEW Multi-Tenant NEW Hypervisor Integrity Monitoring NEW AWS and vcloud Integration NEW vsphere 5.1 ready NEW IPv6 ready Accelerate Virtualization, VDI, and Cloud ROI Provides a lighter, more manageable way to secure VMs Maximize Operational Cost Reductions Prevent Data Breaches and Business Disruptions Detects and removes malware in real time with minimal performance impact Achieve Cost-effective Compliance Addresses major compliance requirements for PCI DSS 2.0, as well as HIPAA, NIST, and SAS 70 CLOUD DESKTOP/LAPTOP ServerProtect for Microsoft Windows and Novell NetWare Prevent viruses from spreading through your network by blocking them before they reach the end user. ServerProtect for Microsoft Windows and Novell NetWare scans, detects and removes virus from files and compressed files in real time. ServerProtect delivers 24x7 antivirus support and protection with automatic, incremental virus updates. Centralized management of servers via a Web-based console simplifies network protection. ServerProtect Linux Protect your Linux file servers from becoming unwitting hosts for viruses, trojans, bots and a full range of other malware. ServerProtect for Linux offers real-time protection, high performance and low processing overhead, and supports all common Linux distributions. ServerProtect for Linux adds another powerful solution to your enterprise s security and compliance strategy. ServerProtect for Storage, the industry s most reliable, high-performing security solution for storage platforms, safeguards your file storage systems by detecting and removing viruses and spyware in real time. Certified with Microsoft Windows Server 2000/2003 to deliver high performance, reliability, security, scalability and availability Enables real-time, high-performance scanning with minimal impact to servers ServerProtect for EMC ServerProtect for NetApp ServerProtect for Hitachi Data Systems Prevents Linux servers from spreading threats to other servers and personal computers Maximizes performance and lowers processor overhead with multi-threaded, kernel-based scanning Integrates tightly with EMC Celerra, NetApp Filers or Hitachi NAS. Enables real-time, high-performance scanning with minimal impact to servers and no impact to end users Server/Storage Security Agent Agent Agent Agent Security Profile 2 Scan request Alerts IT Infrastructure Integration 1 Access files ServerProtect for EMC Celerra for NetApp for Hitachi Data Systems 3 Scan result Report 4 Allow/deny access Administrator Manager Security Center NAS Security NAS Security scans files on a scheduled basis and can even scan files in real-time, protecting the data on the NAS from the threat of virus. This product is offered as embedded function in designated device distributed by selected vendors. Pre-installed antivirus to the NAS, no installation required. Real-time malware scanning

8 Collaboration Security Groupware Collaboration Security ScanMail Suite for Microsoft Exchange ScanMail Suite for Lotus Domino ScanMail Suite for Microsoft Exchange ScanMail Suite for Microsoft Exchange not only stops traditional spam and malware but also detects malicious URLs, highly targeted attacks, and advanced persistent threats (APTs). With a combination of web, , and file reputation, plus exploit detection and sandboxing, ScanMail Suite is the most comprehensive mail server security. It s the enterprise-level protection you need that you won t get with other solutions. Guards against APTs and highly targeted attacks Blocks phishing s with malware or bad web links Prevents data loss and simplifies compliance Cuts administration time in half Speeds throughput up to 57% faster than other solutions ScanMail Suspicious ScanMail Suite for Lotus Domino ScanMail Suite for IBM Lotus Domino stops traditional threats with the correlated intelligence of Smart Protection Network cloud-based security. It also protects your data with optional Data Loss Prevention and blocks targeted attacks when integrated with Trend Micro Deep Discovery Advisor. ScanMail and Deep Discovery Advisor are both components of the Custom Defense Solution. ScanMail Suite is an easy-to-manage solution supporting nearly all Domino platforms Customizes protection against highly targeted attacks Blocks phishing s with malware or bad web links Prevents data loss and simplifies compliance Lowers administration with better controls and optimization Deep Discovery Advisor IM Security for Microsoft Lync and Office Communications Server Secure your real-time IM communications by stopping fast-moving attacks designed to spread malware, lure victims to malicious sites, and steal data. Powered by Smart Protection Network and its unique cloud-client architecture, IM Security blocks links to malicious sites before the links can be delivered. Signature-independent zero-day security, leading antivirus, and new antispyware work together to stop malware before any damage. Plus, flexible content filtering ensures appropriate IM use and prevents data theft. Communication & Collaboration Security protects your Microsoft , collaboration, and IM systems by stopping threats in real time before they can strike. The unique cloud-client architecture of Smart Protection Network powers real-time threat protections (like and Web Reputation) that work in concert with leading conventional content security technologies allowing you to connect without the heightened risk. Features & Unique! Blocks malicious links before delivery using Web Reputation Identifies and blocks zero-day threats with proprietary IntelliTrap technology Stops more spyware, with dedicated inspection, before it can infect PCs Filters content to protect against data loss and undesirable language Reduces administration with tight platform integration and robust central control Enterprise Security for Communication and Collaboration Communication & Collaboration Security Collaboration Security Anti-spam Anti-phishing Enhanced Web Reputation Antivirus Quarantine Feedback Sandboxes Sandboxes Threat Analysis Threat Intellignce Advanced Threat Scan Adaptive Security Updates and third-party security products Central Management Control Manager Collaboration Server PortalProtect for Microsoft SharePoint Mail Server ScanMail Suite for Microsoft Exchange Instant Messaging Server IM Security for Microsoft Office Communications Server PortalProtect for Microsoft SharePoint PortalProtect secures your collaborations with a dedicated layer of protection that guards against malware, malicious links, and other threats that SharePoint administrators often don t know about. Its web reputation technology blocks malicious links from entering your web portals, while its powerful content filtering scans both the files and web components of SharePoint. Protects SharePoint users and data Stops the wide range of malicious files and URLs Filters inappropriate content from social aspects of SharePoint Controls sensitive data for compliance and risk management Takes half the time to manage Scales to any deployment size The integrated Data Loss Prevention protects your sensitive data 14 15

9 Gateway Security Gateways InterScan Messaging Security Virtual Appliance InterScan Messaging Security stops traditional threats in the cloud with global threat intelligence, protects your data with data loss prevention and encryption, and identifies targeted attacks as part of a custom APT defense. The hybrid SaaS deployment combines the privacy and control of an on-premise virtual appliance with the proactive protection of a cloud-based pre-filter service. Viruses Detect and block APTs and targeted attacks Thwart targeted phishing attacks and advanced malware Simplify data protection and encryption Block more spam proven #1 in independent tests Enterprise Security for Gateways Keep your data confidential and your employees safe while interacting with rich Internet content. Enterprise Security for Gateways integrates virtualized web and messaging gateway security proven to maximize protection while minimizing complexity and lowering total cost up to 40 percent. 1 In-the-cloud web and reputation combined with industry-leading antispam, antivirus, and URL filtering provide multilayered, multi-threat protection that blocks malware, malicious links, and unwanted content before they can enter your network. With real-time reporting, you ll gain unprecedented visibility of current web activity, enabling you to stop risky behavior immediately. Outbound filtering and encryption* protect confidential data and support compliance for complete gateway security. 1 Osterman Research, Why You Should Consider Virtualization, February 2009 * Encryption for Gateway Add-on is an optional purchase Spam mail Spyware InterScan Anti-virus Anti-spyware Contents filtering Advanced Threat Detection Data loss Maximum Protection and Minimum Complexity at the Gateway Multilayered Protection Advantage GATEWAY InterScan Messaging Security Virtual Appliance Virtualized gateway security stops spam, phishing and threats InterScan Web Security Virtual Appliance Virtualized web gateway security blocks web threats and includes URL filtering Encryption for Gateway Virtualized gateway security encrypts content and file attachments APT Hosted Security Gateway Security InterScan Web Security Virtual Appliance Faced with today's advanced Internet threats and the growing use of cloud-based consumer applications in the workplace, application visibility is essential to understanding network risks. InterScan Web Security is a software virtual appliance that combines application control with advanced anti-malware scanning, real-time web reputation, and flexible URL filtering to provide superior Internet threat protection. Viruses Get instant visibility and control with Advanced Reporting and Management Stop web threats before they penetrate the perimeter Lower your TCO The integrated Data Loss Prevention protects your sensitive data Hosted Security is a no maintenance required solution that delivers continuously updated protection to stop spam and viruses before they reach your network. Internet Mails Helps you reclaim productivity and bandwidth Helps free your time to implement critical business initiatives Gives you peace of mind Hosted Security Gateway Security Spam mail Phishing InterScan Anti-virus Anti-spyware Anti-phishing Data loss Clean mails Spyware URL filtering Web reputation Advanced Threat Detection URL filtering Customers site APT 16 17

10 Encryption Endpoint Encryption Endpoint Encryption encrypts data on a wide range of devices laptops, desktops, tablets, CDs, DVDs, USB drives and any other removable media. This solution offers enterprise-wide full disk, file/folder, and removable media encryption, combined with granular port and device control to prevent unauthorized access and use of private information. A single management console allows you to manage both hardware and software encryption enterprise-wide for entire hard drives, specific files, folders, removable media, and storage devices. Features Advanced Reporting & Auditing Automate enforcement of regulatory compliance with policy-based encryption Receive detailed auditing and reporting by individual, organizational unit, and device Pre-Boot Multi-Factor Authentication Gain flexible authentication, including fixed password, CAC, PIV, Pin, and ColorCode Trigger lockout feature in response to incorrect authentication attempts Administrative Tools & Active Directory Integration Leverage Active Directory and existing IT infrastructure for deployment and management Take the burden off IT staff by allowing users to change and reset passwords and accounts. Maximize Platform Coverage for Data & Device Encryption Encrypt private data with fully integrated full disk, file folder, USB, and removable media encryption Lower TCO with Centralized Policy Administration & Key Management Simplify operations with a unified data repository with single management server and console Simplify Remote Device Management Maintain compliance and protect your data without disrupting users in the event of a lost device or forgotten password. Manage policies and protect data on PCs, laptops, tablets, USBs, CDs, DVDs encryption Client Encryption efficiently secures delivered to anyone with an address. Client-based encryption allows the end user to select which s should be encrypted by merely clicking a button on the desktop. This ability for end users to encrypt specific s with unique data complements policy-based encryption which automatically encrypts general content types. Together they create a complete encryption solution. Encryption Client is a software plug-in for popular clients that deploys without modifying existing business processes and integrates seamlessly with the existing infrastructure. Hosted Central Trust Authority Encryption for Gateway Internet Enterprise gateway encryption augments security by providing policy-based encryption and integration with messaging security infrastructure. The solution provides simple deployment and administration without altering existing business processes. When combined with content security, it enables enterprises to encrypt s and attachments automatically, without having to rely on individual users to secure private information. Messaging Security Gateway Encryption Client Encryption Key Features Endpoint Encryption Full Disk Encryption File Encryption Centralized policy and key management FIPS encryption certification Level 2 Level 2 Level 2 Internet Encryption AES 256-bit encryption File and folder encryption Removable media (CD/DVD/USB) encryption Granular port and device control Self-encrypting drive management Full disk encryption Network-aware pre-boot authentication Encryption Gateway Automatic Synchronization and sharing Plug-ins Hosted Encryption for Hosted Security This policy-based encryption service seamlessly integrates with the content filtering capabilities of Hosted Security to identify particular types of content and encrypts s when the rules are triggered. * Must use Hosted Security with outbound content filtering. No additional hardware or software is required

11 Network Security Network, Data Loss Prevention Deep Discovery solution Custom Defense Services Deep Discovery provides the network-wide visibility, insight and control that enterprises and government organizations need to reduce the risk of Advanced Persistent Threats (APTs) and targeted attacks. Deep Discovery uniquely detects and identifies evasive threats in real-time, and provides the in-depth analysis and actionable intelligence needed to prevent, discover and contain attacks against corporate data. Deep Discovery solution includes 1.Deep Discovery Inspector 2.Deep Discovery Advisor Command and Control callback blacklist local update Sharing new C&C callback blacklist (IP addresses/urls) found during sandbox analysis to customer s current security solution to block the targeted attack communications. APT & Targeted Attack Detection Reduces the risk of damages and data loss from APTs Network-Wide Visibility Reveals and tracks your true security posture Deep targeted attack insight and recommendation Delivers real-time threat profiling and remediation information Integration capability Integrates results with the blocking device and exports as security policies, that improves enterprise-wide threat detection and prevention Today s most damaging attacks are targeted specifically at your people, your systems, your vulnerabilities, and your data. Advanced persistent threats (APTs) are stealthier and more sophisticated than ever, using insidious social engineering techniques to quietly penetrate your organization to deploy customized malware that can live undetected for months. Then when you are least expecting it, cybercriminals can remotely and covertly steal your valuable information from credit card data to the more lucrative intellectual property or government secrets potentially destroying your competitive advantage, or in the case of government even putting national security at risk. The Custom Defense Services is the solution that helps customers to detect, analyze, adapt and respond to recent attacks represented by targeted attack s and APTs. Respond Adapt Detect How Deep Discovery works Malicious Content Attack Detection s containing embedded document exploits Drive-by downloads Zero-day & known malware Detection Methods Decode & decompress embedded files Sandbox simulation of suspicious files Browser exploit kit detection Malware scan (Signature & Heuristic) Service overview DETECT ANALYZE ADAPT RESPOND Assessment Analysis and Advisory Monitoring and Alert Investigation and mitigation Suspect Communication Attack Behavior C&C communication for all malware: bots, downloaders, data stealing, worms, and blended threats Backdoor activity by attacker Malware activity: propagation, downloading, spamming... Attacker activity: scan, brute force, service exploitation... Data exfiltration Destination analysis (URL, IP, domain, , IRC channel, ) via dynamic blacklisting, white listing Smart Protection Network URL reputation Communication fingerprinting rules Rule-based heuristic analysis Identification and analysis of usage of 100 s of protocols & apps including HTTP-based apps Services Components Critical System Assessment Service components and advantages Onsite critical systems for their health check. Provide assessment report and recommendations for breach prevention. Network Security Attackers Malicious Sites Share local threats intelligence from Deep Discovery Advisor with products and 3rd party security products to prevent connections to malicious sites including C&C (Command & Control) servers. Detect Analyze Adapt Network Assessment Monthly Advisory Monitoring & Alert Visibility of hidden malicious activities with one time assessment service deploying Deep Discovery Inspector. Monitoring network and endpoints. Quarterly advisory meeting based on data collected through Deep Discovery. Monthly Advisory report and recommendation based on data collected through Deep Discovery. 24x7 monitoring through Deep Discovery. and phone notification for potential risks. Network Security Backdoors Visualize Analysis Deep Discovery Advisor Deep Discovery Inspector Server farm Respond Breach Investigation System Cleanup Onsite investigation and analysis of suspected systems by the security experts. The tool to mitigate and cleanup compromised systems. Clean up compromised systems on which Deep Discovery detects suspicious C&C activities. Attack mails Inspection Detection Custom Signature SLO Customized pattern files based on malicious files specifically collected in customer sites. 6 hours SLO. InterScan Web Security Virtual Appliance InterScan Messaging Security Virtual Appliance Block Network VirusWall 20 21

12 Network Security Network, Data Loss Prevention Security Management Network Security Network VirusWall Enforcer Network VirusWall Enforcer protects your corporate network by ensuring that all devices comply with your corporate security policy before entering your network. As an agentless NAC solution, it can scan any device managed or unmanaged, local or remote for the most up-to-date security and critical Microsoft patches. Non-compliant devices are automatically quarantined and sent through remediation. Once a device meets security requirements, it is allowed access to the network. Network VirusWall Enforcer also filters network traffic to detect and block network worms with zero false positives. The easy-to-manage appliance isolates infected areas from the rest of the network so threats cannot spread. Lowers security risks Checks every device Secures network traffic Minimizes damage Simplifies management Integrated Data Loss Prevention integrated DLP with central policy management simplifies data protection across multiple layers of the existing IT security infrastructure, streamlining administration and providing more consistent enforcement to increase data protection and compliance with little additional effort or cost. Network VirusWall Enforcer Block unknown viruses. Quarantine devices. Integrated Data Loss Prevention Data protection capabilities integrated within traditional enterprise security solutions, from endpoint to messaging and network, simplify deployment, reduce infrastructure cost, and provide peace-of-mind for data compliance Central DLP policy management Central configuration and application of pre-defined policy templates across protection layers reduces initial and ongoing administrative effort and provides consistent policy enforcement enterprise-wide Customizable, consolidated displays and reports Aggregated logs, reports and dashboard views provide real-time, enterprise-wide visibility into potential data breaches and data policy violations Control Manager Streamline administration of security solutions with the latest version of Control Manager. This web-based management console tracks security performance, reports malware events and policy violations, and automates routine tasks. New features include a customizable dashboard and at-a-glance access to threat statistics from the Smart Protection Network, 's cloud-based security infrastructure. Web-based Centralized Security Management Customizable Dashboard, Ad Hoc Query, Alerts Smart Protection Network Threat Statistics Visibility into Clients Multi-Tiered Management Customizable Reporting License Management Reduce risks Gain security insight and control Lowers costs Simplify security management Minimize complexity Create an integrated, centrally managed security framework for a unified defense Control Manager is available in two versions: Standard and Advanced Control Manager Standard Advanced Firewall Exchange SharePoint Security Management Internet Control Manager Mail Gateway Web Gateway Endpoints 1. Centrally configure DLP policies 2. Centrally monitor DLP violation = idlp 22 23

13 Online Storage Offline Security / USB Security SafeSync for Enterprise SafeSync for Enterprise enables larger companies to securely sync, share and manage documents, while also providing an essential private cloud environment for IT to consolidate scattered documents in a controlled space. With SafeSync for Enterprise, IT increases users agility and convenience, by allowing the distribution and access to large documents whether in the office or on the road. Access: Access all files from anywhere, at any time, and from any device, secured by centrally managed user access controls. Share: Share files and folders instantly using secure shareable links, and use team folders to collaborate on files. Sync: Sync files across every device used by team members to keep them safe and accessible even if computer or mobile devices fail or get lost. Portable Security Portable Security is a new concept in antivirus products designed for environments where installing antivirus can be difficult - manufacturing environments, medical offices, public institutions, or schools. Portable Security uses a USB memory device to enable IT managers to scan and eliminate viruses, whether you are linked to the internet or not. Deploys rapidly and scales over time, no installation required Functions via USB memory device, no installation required Scans and removes viruses using the latest pattern files Tracks your scanning practice -includes native log data management Can be updated via single management computer Closed network environment Active Update Server Configure the scanning tool and update the tool with the latest virus pattern file Get the latest virus pattern file Connect Scanning tool Internet Management Computer Manage log data Portable Security Scan for viruses and collect log data Offline environment Online Storage USB Security USB Security (TMUSB) is stored within the USB memory device, and is an antivirus solution which prevents virus infection. Thus, even when USB memory devices connected to the devices or systems where anti-malware is not available, TMUSB prevents malwares to travel from/to these devices. Quarantined area Features & USB Security Real-time scan of files on USB storage Initial scan : scan the entire storage of USB storage when it is inserted into a PC Manual scan: scan the entire USB storage at the user's convenience Quarantine of detected viruses (removal to a quarantined area) Manual/automatic update of virus pattern files and the virus scan engine Various administrative functions for quarantine information and log data This product is offered as embedded function in designated device distributed by selected vendors. Installed in the USB storage device, USB Security performs a virus scan on the data to ensure that there is no contamination from viruses Offline Security / USB Security If a virus is detected, it will be safely quarantined in a storage area of the USB memory

14 Services Premium Support Program To help you fully leverage the value of your solutions and to achieve optimized IT service levels, you can rely on Premium Support Program. Working as an extension to your team, Premium Support Program delivers a business critical component of your IT security management program. You gain proactive security resources for customer advocacy and a partner to help you optimize your security profile across technology, processes, and people. Our Technical Account Managers (TAM) are security experts with extensive product knowledge, threat expertise, and access across the ecosystem to help you get the most out of your investment. Proactive security services with regular touch points Trusted security expertise that augments your team resources Fully optimized security posture that reduces your risk exposure Description Dedicated Technical Account Manager (TAM) Service Level and Feature Matrix SILVER GOLD PLATINUM Project Consulting Service With Project Consulting Services, your IT staff can rely on a trusted advisor and partner to help meet your company s goals. Our experts have the insight and security expertise needed to design the optimal architecture for maximizing the effectiveness of your solutions. Analyzing your security requirements and working closely with your team, our experts will craft a detailed plan specifically tailored to meet your needs. Expert Services Project Consulting Service ASSESS PLAN BUILD MANAGE s best-of-breed antivirus products enable an organization to cover messaging, Web, endpoint, and network security. Expert-on-Guard (EoG) is a Expert Service that uses these products and technologies to proactively detect threats and vulnerabilities that compromise the confidentiality, integrity, and availability of an organization s data, applications, or operating systems. Response Time 4 hours 2 hours 1 hours Telephone Access to Support Engineers 24x7 24x7 24x7 Remote Problem Diagnosis and Remediation Support Proactive Threat Alerts Access to Advanced Engineers Priority Case Handling Annual Proactive Security Planning 2-Hours SLA for Malware Support Crisis Management Planning Assistance Multi-Region Support Capabilities Services Services 26 27

overview Enterprise Security Solutions

overview Enterprise Security Solutions Enterprise Security Solutions overview For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an ever-evolving IT threat landscape. It s how we got to be the world

More information

overview Enterprise Security Solutions

overview Enterprise Security Solutions Enterprise Security Solutions overview For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an ever-evolving IT threat landscape. It s how we got to be the world

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

OVERVIEW. Enterprise Security Solutions

OVERVIEW. Enterprise Security Solutions Enterprise Security Solutions OVERVIEW For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an everevolving IT threat landscape. It s how we got to be the world s

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

OVERVIEW. Enterprise Security Solutions

OVERVIEW. Enterprise Security Solutions Enterprise Security Solutions OVERVIEW For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an everevolving IT threat landscape. It s how we got to be the world s

More information

How To Protect Your Cloud From Attack

How To Protect Your Cloud From Attack A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to

More information

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your

More information

Trend Micro Cloud Security for Citrix CloudPlatform

Trend Micro Cloud Security for Citrix CloudPlatform Trend Micro Cloud Security for Citrix CloudPlatform Proven Security Solutions for Public, Private and Hybrid Clouds 2 Trend Micro Provides Security for Citrix CloudPlatform Organizations today are embracing

More information

Total Cloud Protection

Total Cloud Protection Total Cloud Protection Data Center and Cloud Security Security for Your Unique Cloud Infrastructure A Trend Micro White Paper August 2011 I. INTRODUCTION Many businesses are looking to the cloud for increased

More information

Total Product Catalogue

Total Product Catalogue June 2014 TM Total Product Catalogue Our Company Company Introduction Our History Our Company Management Eva Chen CEO & Co-Founder Mahendra Negi CFO Steve Chang Chairman & Founder has continuously defended

More information

Websense Data Security Solutions

Websense Data Security Solutions Data Security Suite Data Discover Data Monitor Data Protect Data Endpoint Data Security Solutions What is your confidential data and where is it stored? Who is using your confidential data and how? Protecting

More information

Superior protection from Internet threats and control over unsafe web usage

Superior protection from Internet threats and control over unsafe web usage datasheet Trend Micro interscan web security Superior protection from Internet threats and control over unsafe web usage Traditional secure web gateway solutions that rely on periodic updates to cyber

More information

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE

More information

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security Web Security Gateway Web Security Web Filter Express Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content

More information

for businesses with more than 25 seats

for businesses with more than 25 seats for businesses with more than 25 seats ESET Business Solutions 1/6 Whether your business is just starting out or is established, there are a few things that you should expect from the software you use

More information

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION SOLUTION BRIEF Trend Micro CLOUD AND DATA CENTER SECURITY Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION As you take advantage of the operational and economic

More information

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments Trusted protection for endpoints and messaging environments Overview Symantec Protection Suite Enterprise Edition creates a protected endpoint and messaging environment that is secure against today s complex

More information

Cloud and Data Center Security

Cloud and Data Center Security solution brief Trend Micro Cloud and Data Center Security Secure virtual, cloud, physical, and hybrid environments easily and effectively introduction As you take advantage of the operational and economic

More information

Trend Micro. Advanced Security Built for the Cloud

Trend Micro. Advanced Security Built for the Cloud datasheet Trend Micro deep security as a service Advanced Security Built for the Cloud Organizations are embracing the economic and operational benefits of cloud computing, turning to leading cloud providers

More information

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro Udo_Schneider@trendmicro.de 26.03.2013

More information

Devising a Server Protection Strategy with Trend Micro

Devising a Server Protection Strategy with Trend Micro Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper Trend Micro, Incorporated» A detailed account of why Gartner recognizes Trend Micro as a leader in Virtualization and Cloud

More information

Devising a Server Protection Strategy with Trend Micro

Devising a Server Protection Strategy with Trend Micro Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper» Trend Micro s portfolio of solutions meets and exceeds Gartner s recommendations on how to devise a server protection strategy.

More information

McAfee Server Security

McAfee Server Security Security Secure server workloads with low performance impact and integrated management efficiency. Suppose you had to choose between securing all the servers in your data center physical and virtual or

More information

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN Albin Penič Technical Team Leader Eastern Europe Trend Micro 27 years focused on security software Headquartered

More information

PCI DSS 3.0 Compliance

PCI DSS 3.0 Compliance A Trend Micro White Paper April 2014 PCI DSS 3.0 Compliance How Trend Micro Cloud and Data Center Security Solutions Can Help INTRODUCTION Merchants and service providers that process credit card payments

More information

For additional information and evaluation copies of Trend Micro products and services, visit our website at www.trendmicro.com.

For additional information and evaluation copies of Trend Micro products and services, visit our website at www.trendmicro.com. TM TREND MICRO, Incorporated is a pioneer in secure content and threat management. Founded in 1988, provides individuals and organizations of all sizes with award-winning security software, hardware, and

More information

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security Web Security Gateway Web Security Web Filter Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content even

More information

Symantec Endpoint Protection

Symantec Endpoint Protection The next generation of antivirus technology from Overview Advanced threat protection combines AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops,

More information

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security

More information

The Hillstone and Trend Micro Joint Solution

The Hillstone and Trend Micro Joint Solution The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry

More information

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility

More information

CA Anti-Virus r8.1. Benefits. Overview. CA Advantage

CA Anti-Virus r8.1. Benefits. Overview. CA Advantage PRODUCT BRIEF: CA ANTI-VIRUS CA Anti-Virus r8.1 CA ANTI-VIRUS IS THE NEXT GENERATION IN COMPREHENSIVE ANTI-VIRUS SECURITY FOR BUSINESS PCS, SERVERS AND PDAS. IT COMBINES PROACTIVE PROTECTION AGAINST MALWARE

More information

Symantec Endpoint Protection 12.1.2

Symantec Endpoint Protection 12.1.2 Data Sheet: Endpoint Security Overview offers comprehensive defense against complex attacks for both physical and virtual environments. It integrates ten essential security technologies in a single, high

More information

Proven LANDesk Solutions

Proven LANDesk Solutions LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond Trend Micro Cloud App Security for Office 365 October 27, 2015 Trevor Richmond Too many malware incidents >90% Targeted Attacks Start with Email Attackers: Target specific companies or individuals Research

More information

Trend Micro Data Protection

Trend Micro Data Protection Trend Micro Data Protection Solutions for privacy, disclosure and encryption A Trend Micro White Paper I. INTRODUCTION Enterprises are faced with addressing several common compliance requirements across

More information

WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW

WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW Challenge The nature of email threats has changed over the past few years. Gone are the days when email security, better known as anti-spam, was primarily tasked

More information

Secure Your Mobile Workplace

Secure Your Mobile Workplace Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in

More information

Websense Messaging Security Solutions. Websense Email Security Websense Hosted Email Security Websense Hybrid Email Security

Websense Messaging Security Solutions. Websense Email Security Websense Hosted Email Security Websense Hybrid Email Security Websense Email Security Websense Hosted Email Security Websense Hybrid Email Security Websense Messaging Security Solutions The Websense Approach to Messaging Security Websense enables organizations to

More information

Securing the Borderless Enterprise

Securing the Borderless Enterprise Securing the Borderless Enterprise Websense TRITON Solution The Web 2.0 Workplace: New Opportunities, New Risks Web-enabled technologies are reshaping the modern enterprise. Powerful, cloud-based business

More information

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs? A Special Primer on APTs DETECTING THE ENEMY INSIDE THE NETWORK How Tough Is It to Deal with APTs? What are APTs or targeted attacks? Human weaknesses include the susceptibility of employees to social

More information

Trend Micro Total Product Catalogue

Trend Micro Total Product Catalogue Trend Micro Total Product Catalogue March 2015 Our Company Company Introduction Our VISION A world safe for exchanging digital information Our MISSION Defend against threats that would impact user s digital

More information

Security Overview Enterprise-Class Secure Mobile File Sharing

Security Overview Enterprise-Class Secure Mobile File Sharing Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud

More information

Symantec Endpoint Protection 12.1.4

Symantec Endpoint Protection 12.1.4 Data Sheet: Endpoint Security Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec

More information

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary

More information

Symantec Messaging Gateway 10.6

Symantec Messaging Gateway 10.6 Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate

More information

Vulnerability Management

Vulnerability Management Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other

More information

UNCLASSIFIED. UK Email Archiving powered by Mimecast Service Description

UNCLASSIFIED. UK Email Archiving powered by Mimecast Service Description UNCLASSIFIED 11/12/2015 v2.2 UK Email Archiving powered by Mimecast Service Description Cobweb s UK Email Archiving, powered by Mimecast, provides businesses with a secure, scalable cloud-based message

More information

EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST

EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST Enabling user efficiency with a cloud-based email platform With productivity, revenues and reputation at stake, an

More information

For Businesses with more than 25 seats. www.eset.com

For Businesses with more than 25 seats. www.eset.com For Businesses with more than 25 seats www.eset.com ESET Endpoint Protection Standard Whether your business is just starting or Simple and Straightforward established, there are a few things you expect

More information

Websense Web Security Solutions

Websense Web Security Solutions Web Security Gateway Web Security Web Filter Hosted Web Security Web Security Solutions The Web 2.0 Challenge The Internet is rapidly evolving. Web 2.0 technologies are dramatically changing the way people

More information

INTRODUCING isheriff CLOUD SECURITY

INTRODUCING isheriff CLOUD SECURITY INTRODUCING isheriff CLOUD SECURITY isheriff s cloud-based, multi-layered, threat protection service is the simplest and most cost effective way to protect your organization s data and devices from cyber-threats.

More information

INFORMATION PROTECTED

INFORMATION PROTECTED INFORMATION PROTECTED Symantec Protection Suite Effective, comprehensive threat protection Safeguarding your organization s business-critical assets in today s ever-changing threat landscape has never

More information

Bitdefender GravityZone Sales Presentation

Bitdefender GravityZone Sales Presentation 6 March 2014 Page 1 Bitdefender GravityZone Sales Presentation 1 Page 2 Bitdefender at a Glance The #1 Anti-Malware Security Technology in the world First security software vendor to receive top recommendations

More information

STPIC/Admin/002/2009-2010/ Date: 18.06.09. Sub: Quotation for purchase/renewal of Anti Virus Software Reg.

STPIC/Admin/002/2009-2010/ Date: 18.06.09. Sub: Quotation for purchase/renewal of Anti Virus Software Reg. STPIC/Admin/002/2009-2010/ Date: 18.06.09 Sub: Quotation for purchase/renewal of Anti Virus Software Reg. Software Technology Parks of India (STPI), an autonomous Society under Ministry of Communication

More information

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents

More information

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP SOLUTION BRIEF PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP The benefits of cloud computing are clear and compelling: no upfront investment, low ongoing costs, flexible capacity and fast application

More information

Symantec AntiVirus Enterprise Edition

Symantec AntiVirus Enterprise Edition Symantec AntiVirus Enterprise Edition Comprehensive threat protection for every network tier, including client-based spyware prot e c t i o n, in a single product suite Overview Symantec AntiVirus Enterprise

More information

SECURING TODAY S MOBILE WORKFORCE

SECURING TODAY S MOBILE WORKFORCE WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table

More information

Effective End-to-End Cloud Security

Effective End-to-End Cloud Security Effective End-to-End Cloud Security Securing Your Journey to the Cloud Trend Micro SecureCloud A Trend Micro & VMware White Paper August 2011 I. EXECUTIVE SUMMARY This is the first paper of a series of

More information

Symantec Messaging Gateway 10.5

Symantec Messaging Gateway 10.5 Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate

More information

IBM Endpoint Manager for Core Protection

IBM Endpoint Manager for Core Protection IBM Endpoint Manager for Core Protection Device control and endpoint protection designed to guard against malware and loss of sensitive data Highlights Delivers real-time endpoint protection against viruses,

More information

Total Defense Endpoint Premium r12

Total Defense Endpoint Premium r12 DATA SHEET Total Defense Endpoint Premium r12 Overview: Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems from intrusions, malicious

More information

Symantec Endpoint Protection 12.1.6

Symantec Endpoint Protection 12.1.6 Data Sheet: Endpoint Security Overview Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high 1. The threat environment is evolving quickly

More information

VDI Security for Better Protection and Performance

VDI Security for Better Protection and Performance VDI Security for Better Protection and Performance Addressing security and infrastructure challenges in your VDI deployments Trend Micro, Incorporated» See why you need security designed for VDI environments

More information

Reducing the cost and complexity of endpoint management

Reducing the cost and complexity of endpoint management IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and

More information

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned

More information

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community A Sampling of Cyber Security Solutions Designed for the

More information

The ForeScout Difference

The ForeScout Difference The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete

More information

Symantec Protection Suite Small Business Edition

Symantec Protection Suite Small Business Edition Easy-to-use, all-in-one suite designed for small businesses Overview Suite Small Business Edition is an easyto-use, all-in-one suite that secures your critical business assets and information against today

More information

End-user Security Analytics Strengthens Protection with ArcSight

End-user Security Analytics Strengthens Protection with ArcSight Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security

More information

V1.4. Spambrella Email Continuity SaaS. August 2

V1.4. Spambrella Email Continuity SaaS. August 2 V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable

More information

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation Threat Center Real-time multi-level threat detection, analysis, and automated remediation Description Advanced targeted and persistent threats can easily evade standard security, software vulnerabilities

More information

Trend Micro Solutions for PCI DSS Compliance

Trend Micro Solutions for PCI DSS Compliance s for PCI DSS Compliance A Trend Micro White Paper Addressing PCI DSS Requirements with Trend Micro Enterprise July 2010 I. PCI DSS AND TREND MICRO ENTERPRISE SECURITY Targeted threats, distributed environments,

More information

ForeScout MDM Enterprise

ForeScout MDM Enterprise Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify

More information

Analyzing HTTP/HTTPS Traffic Logs

Analyzing HTTP/HTTPS Traffic Logs Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that

More information

isheriff CLOUD SECURITY

isheriff CLOUD SECURITY isheriff CLOUD SECURITY isheriff is the industry s first cloud-based security platform: providing fully integrated endpoint, Web and email security, delivered through a single Web-based management console

More information

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information

Advantages of Managed Security Services

Advantages of Managed Security Services Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical

More information

Virtualization Journey Stages

Virtualization Journey Stages Deep Security 7.5 Todd Thiemann Sr. Dir. of Datacenter Security Marketing Trend Micro Harish Agastya Director of Datacenter Security Marketing Trend Micro Classification 11/12/2010 1 Virtualization Journey

More information

SAAS VS. ON-PREMISE SECURITY. Why Software-as-a-Service Is a Better Choice for Email and Web Threat Management

SAAS VS. ON-PREMISE SECURITY. Why Software-as-a-Service Is a Better Choice for Email and Web Threat Management SAAS VS. ON-PREMISE SECURITY Why Software-as-a-Service Is a Better Choice for Email and Web Threat Management How SaaS Solves the Problems of On-Premise Security Businesses traditionally invest in security

More information

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! December 2014 Adapted from Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares by

More information

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware

More information

Unified Security, ATP and more

Unified Security, ATP and more SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users

More information

Advanced Persistent Threats

Advanced Persistent Threats White Paper INTRODUCTION Although most business leaders and IT managers believe their security technologies adequately defend against low-level threats, instances of (APTs) have increased. APTs, which

More information

Netzwerkvirtualisierung? Aber mit Sicherheit!

Netzwerkvirtualisierung? Aber mit Sicherheit! Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction

More information

Cyber Security Solutions:

Cyber Security Solutions: ThisIsCable for Business Report Series Cyber Security Solutions: A Sampling of Cyber Security Solutions Designed for the Small Business Community Comparison Report Produced by BizTechReports.com Editorial

More information

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Stop advanced targeted attacks, identify high risk users and control Insider Threats TRITON AP-EMAIL Stop advanced targeted attacks, identify high risk users and control Insider Threats From socially engineered lures to targeted phishing, most large cyberattacks begin with email. As these

More information

Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise

Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise Comprehensive Agentless Cloud Backup and Recovery Software for the Enterprise 2 Your company s single most valuable asset may be its data. Customer data, product data, financial data, employee data this

More information

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it Complete and high performance protection where you need it Overview delivers high-performance protection against physical and virtual server downtime with policy based prevention, using multiple protection

More information

PULSE SECURE FOR GOOGLE ANDROID

PULSE SECURE FOR GOOGLE ANDROID DATASHEET PULSE SECURE FOR GOOGLE ANDROID Product Overview In addition to enabling network and resource access for corporate managed mobile devices, many enterprises are implementing a Bring Your Own Device

More information

Secure Cloud-Ready Data Centers Juniper Networks

Secure Cloud-Ready Data Centers Juniper Networks Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security

More information

Deep Security. Προστατεύοντας Server Farm. Σωτήρης Δ. Σαράντος. Available Aug 30, 2011. Σύμβουλος Δικτυακών Λύσεων. Copyright 2011 Trend Micro Inc.

Deep Security. Προστατεύοντας Server Farm. Σωτήρης Δ. Σαράντος. Available Aug 30, 2011. Σύμβουλος Δικτυακών Λύσεων. Copyright 2011 Trend Micro Inc. Deep Security Προστατεύοντας Server Farm Available Aug 30, 2011 Σωτήρης Δ. Σαράντος Σύμβουλος Δικτυακών Λύσεων Copyright 2011 Trend Micro Inc. Legacy Security Hinders Datacenter Consolidation Physical

More information

Top Four Considerations for Securing Microsoft SharePoint

Top Four Considerations for Securing Microsoft SharePoint Top Four Considerations for Securing by Chris McCormack, Product Marketing Manager, Sophos is now the standard for internal and external collaboration and content management in much the same way Microsoft

More information

Virtualizing Email Gateway Security

Virtualizing Email Gateway Security Virtualizing Email Gateway Security Flexible, Cost-Effective Protection at the Email Gateway August 2009 I. COST AND COMPLEXITY DRIVE VIRTUALIZATION EFFORTS Virtualization initiatives have gained momentum

More information

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0 White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative

More information