Trend Micro OfficeScan 10.5 Release

Size: px
Start display at page:

Download "Trend Micro OfficeScan 10.5 Release"

Transcription

1 Trend Micro OfficeScan 10.5 Release A Broadband-Testing Report Update

2 First published June 2010 (V1.1) Published by Broadband-Testing A division of Connexio-Informatica 2007, Andorra Tel : info@broadband-testing.co.uk Internet : Broadband-Testing All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the express written consent of the authors. Please note that access to or use of this Report is conditioned on the following: 1. The information in this Report is subject to change by Broadband-Testing without notice. 2. The information in this Report, at publication date, is believed by Broadband-Testing to be accurate and reliable, but is not guaranteed. All use of and reliance on this Report are at your sole risk. Broadband-Testing is not liable or responsible for any damages, losses or expenses arising from any error or omission in this Report. 3. NO WARRANTIES, EXPRESS OR IMPLIED ARE GIVEN BY Broadband-Testing. ALL IMPLIED WARRANTIES, INCLUDING IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT ARE DISCLAIMED AND EXCLUDED BY Broadband-Testing. IN NO EVENT SHALL Broadband-Testing BE LIABLE FOR ANY CONSEQUENTIAL, INCIDENTAL OR INDIRECT DAMAGES, OR FOR ANY LOSS OF PROFIT, REVENUE, DATA, COMPUTER PROGRAMS, OR OTHER ASSETS, EVEN IF ADVISED OF THE POSSIBILITY THEREOF. 4. This Report does not constitute an endorsement, recommendation or guarantee of any of the products (hardware or software) tested or the hardware and software used in testing the products. The testing does not guarantee that there are no errors or defects in the products, or that the products will meet your expectations, requirements, needs or specifications, or that they will operate without interruption. 5. This Report does not imply any endorsement, sponsorship, affiliation or verification by or with any companies mentioned in this report. 6. All trademarks, service marks, and trade names used in this Report are the trademarks, service marks, and trade names of their respective owners, and no endorsement of, sponsorship of, affiliation with, or involvement in, any of the testing, this Report or Broadband-Testing is implied, nor should it be inferred. ii Broadband-Testing

3 TABLE OF CONTENTS TABLE OF CONTENTS... III BROADBAND-TESTING... IV EXECUTIVE SUMMARY... 1 INTRODUCTION: THE VIRTUAL WORLD IS UPON US INCLUDING THE DESKTOP 2 OFFICESCAN THE BASICS... 4 OFFICESCAN SUMMARY & CONCLUSIONS... 9 TABLE OF FIGURES Figure 1 Smart Protection Network...4 Figure 2 VDI Architecture...5 Broadband-Testing iii

4 BROADBAND-TESTING Broadband-Testing is Europe s foremost independent network testing facility and consultancy organisation for broadband and network infrastructure products. Based in Andorra, Broadband-Testing provides extensive test demo facilities. From this base, Broadband-Testing provides a range of specialist IT, networking and development services to vendors and end-user organisations throughout Europe, SEAP and the United States. Broadband-Testing is an associate of the following: NSS Labs (specialising in security product testing) Limbo Creatives (bespoke software development) Broadband-Testing Laboratories are available to vendors and end-users for fully independent testing of networking, communications and security hardware and software. Broadband-Testing Laboratories operates an Approval scheme which enables products to be short-listed for purchase by end-users, based on their successful approval. Output from the labs, including detailed research reports, articles and white papers on the latest network-related technologies, are made available free of charge on our web site at Broadband-Testing Consultancy Services offers a range of network consultancy services including network design, strategy planning, Internet connectivity and product development assistance. iv Broadband-Testing

5 EXECUTIVE SUMMARY With its initial OfficeScan 10 release, Trend Micro was early to take the cloud approach to AV database storage and updates. When we tested the product we found that is has executed the architecture extremely well with what it calls the Smart Protection Network. With OfficeScan 10.5, Trend Micro has addressed another key element of security in the virtual world, namely VDI or the Virtual Desktop Infrastructure. Support for Citrix, as well as VMware, is included. Trend Micro defines OfficeScan 10.5 as being VDI aware meaning that it optimises a VDI by treating virtual clients differently to physical ones, removing unnecessary task replication, ensuring availability and performance of servers and combining local and global cloud resources on a best-fit basis. Full adoption of the hugely popular Windows 7 Operation System has also been included in the update. Smart Protection Network support has been enhanced in version 10.5 with the implementation of Trend Micro s Web Reputation and File Reputation features. Key to this is that bulk of patterns in the cloud (local or global) offloads the client (pattern file) and keeps its size predictable. With OfficeScan 10.5 the cloud approach has generally been made more flexible with more choices as to what to hold in a local cloud or the global cloud. Scalability has been improved in the new version with endpoint support more than doubled to now allow up to 20,000 endpoints to be managed from a single OfficeScan Management Server. Active Directory integration has been significantly enhanced to aid with faster deployments. The enhanced, role-based administration feature now allows dedicated administration rights on domain and sub-domain levels. Broadband-Testing

6 Update INTRODUCTION: THE VIRTUAL WORLD IS UPON US INCLUDING THE DESKTOP There ll soon be a new cliché to rival what are the three most important things about selling a house location, location and location The new variant is in the computer world the three most important things being: virtualisation, virtualisation and virtualisation, in this case, the data centre, servers and now the desktop. According to a recent study by the Enterprise Strategy Group (ESG), 60% of enterprises have a desktop virtualisation strategy and 45% of them will have virtualised 50% of their desktops within the next three years. This is pretty aggressive change when you consider that it is very new territory for most IT/networking administrators to deal with. Not only are there issues such as application compatibility and performance to consider, but also what is seen by analysts as the key issue securing those virtual desktops. According to ESG, while desktop virtualisation is able to can help directly with issues such as basic configuration consistency and patch management, specific security problems, notably around authentication, data security, and security and compliance management remain. In other words, in order for desktop virtualisation to be successful, the securing of those desktops is paramount. This also means bridging the physical and virtual worlds within a single security policy that is manageable and scalable. This is not trivial stuff. It certainly isn t simply a case of employing the same strategies as those used when deploying virtual servers. We are talking specific Virtual Desktop Infrastructure (VDI) requirements here, a kind of supercharged Citrix/Windows Terminal Server deployment where, instead of dealing with a single thin client, server-based Operating System we are talking about multiple, virtual desktop OSs with not necessarily the same combination on each desktop. Or even where it is the same combination there is still a degree possibly major of customisation required on a per user or per group of users basis. Before we look at the security implications here, let us first consider the obvious benefits. One obvious one given the current near obsession with it is regulatory compliance. Since a VDI is centralised within the data centre, in turn that means that compliance is also centralised. Mandatory controls can thereby be enforced from a central location, efficiently and repeatedly. Backup of the client endpoints is also far more manageable in this environment. Yet another big ticket number currently data protection becomes significantly easier to manage, since the data is centralised and not randomly distributed among endpoints that could be anything from a desktop PC to a smartphone. Day to day maintenance and management also becomes far more streamlined. Rolling out patch updates and new applications becomes almost infinitely more manageable within a VDI. From an efficiency standpoint, the ability to dynamically allocate hardware resources to virtualised desktops on an as needed basis not only makes huge economic sense but also ticks the all-important green box too. 2 Broadband-Testing

7 Support also becomes far more centralised and therefore easier to manage, thereby offsetting any potential increases in support issues that moving to a VDI might initially bring. From a pure security perspective, however, the world does change and not in an immediately positive way. If we consider the risk profile of a desktop versus a server, the former encounters many more risky environments through regular interaction with numerous (often new) websites, the ease with which confidential information can be donated and s with potentially malicious content, links or attachments. There is also the plethora of individual applications, tools and utilities that can become part of an individual desktop. In other words, protecting a virtual desktop is more complex certainly different than protecting a virtual server and systems need to be continually up to date to protect from these threats. By protection we are looking at areas such as shielding vulnerabilities from being exploited, preventing unauthorised access over the network and ensuring malwarefree data storage. The problem in protecting the desktop is that the threats are dynamic and ever-changing in nature, so there is no simple solution here. Instead we are looking at a combination of technologies being required to protect a VDI. First we need to prevent exposure to threats with cloud-based security such as detecting malicious files at the endpoint clients in real-time and shielding vulnerabilities before deploying patches and updates. But at the same time we need to avoid impacting upon system performance as much as possible by maintaining a small client footprint, despite the need to run regular full systems scans on either a scheduled or ad hoc/on demand basis to ensure that all malware is detected and removed. When we looked at Trend Micro s OfficeScan 10 product last year (full report available to download from our website: we were impressed with the combination of threat mitigation and low client resource that it provided. With the 10.5 update that Trend Micro has just released, the company is looking to build on that servercentric approach to the virtual world, to offer the same level of functionality at the virtual desktop. So let us now see what changes have been made in the new release, first reminding ourselves what the foundations of the OfficeScan product are. Broadband-Testing

8 Update OFFICESCAN THE BASICS Trend Micro has designed OfficeScan as a multi-threat prevention solution to protect networks from malware, network viruses, web-based threats, spyware, and mixed threat attacks. Architecturally, the product is based on Trend Micro s Smart Protection Network, a cloudclient infrastructure, resulting in a lighter-weight client. The aim here is twofold to reduce the reliance on conventional pattern downloads and to eliminate the delays commonly associated with desktop updates. The stated benefits include increased network bandwidth, reduced CPU utilisation and the associated cost savings that go with this approach. Figure 1 Smart Protection Network As well as being cloud-based, OfficeScan works on a true client-server architecture, either physical or virtual. The server performs two important functions installing, monitoring and managing OfficeScan clients and downloading most of the components needed by clients. From the Active Update server and then distributing them to clients, the server provides real-time, true bidirectional communication between itself and the client base. The Virus Scan Engine is at the heart of all Trend Micro products, developed originally in response to early file-based computer viruses. Nowadays it is capable of detecting different types of viruses and malware. The scan engine also detects controlled viruses that are developed and used for research. Rather than scanning every byte of every file, the engine and pattern file work together to identify tell-tale characteristics of the virus code and the precise location within a file where the virus resides. In the original OfficeScan 10 release, client focus was on the physical client, protecting the user by providing three methods of scanning - real-time scan, scheduled scan, and 4 Broadband-Testing

9 manual scan with the client reporting back to the parent server from which it was installed. The client then sends events and status information to the server in real time. Examples of events are virus/malware detection, client start-up, client shutdown, start of a scan, and completion of an update. In the 10.5 release, full support for virtual clients and a complete VDI has been added, so let us now look at what Trend Micro has provided in OfficeScan OFFICESCAN 10.5 The big news regarding OfficeScan 10.5 is the complete support for a VDI. Figure 2 VDI Architecture As we have made clear already, virtualising the desktop is not a trivial matter. The most obvious issue is how to manage the security of those virtual desktops. Trend Micro has noted the problems that its customers foresaw in moving to a VDI and has therefore responded with OfficeScan The company claims that this is the industry s first endpoint security solution specifically designed to secure physical and virtualised desktops and we certainly haven t seen anything of this comprehensive nature to date. Let s first define exactly what we mean by Virtual Desktop Infrastructure as shown in the diagram above. By this we mean a user operating environment with virtual machines on an central server that can be accessed from existing hardware or a thin client, and from anywhere, including, for example, a home user via a VPN or a BYOC Bring Your Own Computer individual. Broadband-Testing

10 Update Trend Micro specifically defines OfficeScan 10.5 as having VDI-aware endpoint security, so what exactly does it mean by this? In order to explain this we need to consider the pros and cons of VDI adoption. Why VDI? Lower operational cost than physical hardware Easier Deployment, Patching, Application Provisioning Extended desktop hardware lifecycles More secure: data never leaves the data centre Better regulatory compliance management Why Not? Malware risk potential: Identical to physical desktops Same OSs/software Same vulnerabilities Same risk of exposing sensitive, company data It is important to understand that a VDI brings with it new requirements from an administrative and security standpoint. For example, it is necessary to identify endpoint clients virtualisation status at all times. Sharing resource sounds great but that resource contention also needs to be managed. System utilisation such as processor, storage and network usage and performance need to be constantly monitored. Scalability, in other words, is a key issue here. With OfficeScan 10.5, Trend Micro has looked to avoid the kind of resource issues that can bring a VDI to its (virtual) knees, by providing specific measures to avoid this. Scanning for threats has a fundamental performance impact, whether at the client or server. In the case of a cloud-based solution, while as much of this impact is lifted from the client-server as possible, there remains some requirement for scanning at server or client level. In the case of a VDI, the impact is on the server. So imagine the consequences of what we call the 9am problem, where every virtual client is potentially receiving updates or scanning simultaneously. This problem is so rife that, in some cases, companies have been forced to turn off their security within a VDI hardly to be recommended. For this reason, OfficeScan 10.5 has scheduling options so that there is no single hit on the servers. Similarly, new pattern distribution is designed to be a background task, again removing over-utilisation of the servers. Interestingly, in tests, it is shown that serialisation of tasks such as scanning is more efficient in every sense than concurrent scanning, in that unless you have an infinite amount of CPU/memory/disk resource, which you do not it will also finish more quickly, as well as using far less resource. Techniques such as white-listing, developed from a base image, means that many elements such as those files that are unchanged - do not need to be re-scanned, again 6 Broadband-Testing

11 saving valuable resource within a VDI and reducing impact on the performance of the VDI host. Trend Micro claims that the new version of OfficeScan lets customer run more than double the number of desktop images per host without sacrificing security. Here is where the VDI awareness cuts in. OfficeScan 10.5 first detects whether a client is physical or virtual, and the applies logic appropriately with specific support for different virtual environments such as VMware View or Citrix XenDesktop. For example, it can serialise updates and cans on a per VDI-host basis and control the number of concurrent scans and updates per VDI host, thereby maintaining availability and performance levels of the VDI host. In order to maximise the cloud-based architecture of OfficeScan, with 10.5 a customer can choose between what they want in the local cloud and what stays in the global cloud. So, for any information requests, the system will interrogate the local cloud (server) first and only then, if it needs to, move to the global cloud. Again, we see clear performance benefits from this approach. The Great Trade-Off - Resolved Historically, within IT the bean counters have always seen investment in security as a trade off against the return on that investment i.e. security has been seen as a necessary evil. But within a VDI context, Trend Micro is confident that OfficeScan 10.5 actually provides a rapid ROI because of the cost savings involved in the optimisation of that environment. So the classic trade-off scenario no longer exists. The company claims that it pays for itself in less than three months with 1,000 users and in less than two months with 2,500 users. Under what Trend Micro terms as Enterprise Class Management, further scalability improvements have been made with OfficeScan 10.5, starting with unified management for physical and virtual endpoint clients. The total number of endpoints supported has also more than doubled to 20,000. Management and administration options have also been expanded so, for example, assigned roles can now be made domain specific, while individual domains can now have sub-domain trees. The database now synchronises fully with Active Directory while reporting options are also improved. OfficeScan 10.5 integrates with Active Directory for client management and compliance reports, so there is no requirement to duplicate databases. Cisco NAC support has also been further improved with tight integration on both the client and the management side. The software also optimises on a per virtual desktop OS basis. For example, the integration with Citrix Receiver means OfficeScan 10.5 deploys through Citrix Receiver, secure the endpoint client as a self-service application and enables easy provisioning of OfficeScan clients to end user devices. Broadband-Testing

12 Update There is no trade-off in security; the software supports consumerisation and, for example, in a BYOC scenario, that user s computer is checked and guaranteed to be protected before access is granted. With OfficeScan 10.5 Trend Micro has also moved forward significantly regarding Windows 7 certified support for both 32-bit and 64-bit environments, as well as migration between physical and virtual versions of Windows. OfficeScan 10.5 is also integrated with the Windows 7 Action Center for client status reports to the end-user. File AND Web Reputation With OfficeScan 10.5 the software now supports both File and Web Reputation services in local as well as global mode, working in both privacy and proxy modes. Providing local support again improves performance and data retrieval for the end user. File Reputation: this queries constantly updated information on the safety of a file before it is accessed, thereby eliminating the management burden commonly associated with pattern based solutions. In so doing it provides immediate protection for endpoints, on or off the corporate network and reduces the impact on the endpoint s performance and resources. With OfficeScan 10.5, it has been designed to minimise the client footprint on the virtual Machines both memory and CPU. Web Reputation: this defends against web-based malware, data theft, lost productivity, and reputation damage with a view to protecting customers and applications from accessing malicious or infected websites. The feature works directly with the Smart Protection Network to determine the safety of websites which are dynamically rated for degrees of safety. By getting to the absolute root of the threat, the software can then scan the web for other bad content emanating from this route. As such it is designed to provide real-time protection in any networking scenario, regardless of connection type. 8 Broadband-Testing

13 SUMMARY & CONCLUSIONS When we first looked at OfficeScan 10 we recognised its effective use of the cloud an area that has been much abused previously by many vendors. But with OfficeScan 10.5 the game has moved on again, with the virtual desktop now also secured. All the benefits of OfficeScan 10 that we identified are now available in a Virtual Desktop Infrastructure. What needs to be understood is that security must be tightly integrated into the VDI and Trend Micro has done exactly that here. Defining itself as the industry s first VDI-aware security solution is a big claim, but one that seems justified. Advanced support for Windows 7 and both VMware and Citrix virtual environments are significant advances, while overall management flexibility and use of local or global cloud resources has been improved. The result is that Trend Micro claims that OfficeScan 10.5 can pay for itself within two months, again a substantial claim, but one that we can believe, given the number of optimisation features the software delivers. Broadband-Testing

Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT

Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT TESTED PRODUCTS: AVG Internet Security Network Edition v8.0 Kaspersky Total Space Security v6.0 McAfee Total Protection for Endpoint Sophos

More information

IBM Endpoint Manager for Core Protection

IBM Endpoint Manager for Core Protection IBM Endpoint Manager for Core Protection Device control and endpoint protection designed to guard against malware and loss of sensitive data Highlights Delivers real-time endpoint protection against viruses,

More information

jetnexus Accelerating Load Balancer Extreme (ALB-X) 2.0 Features Update Report

jetnexus Accelerating Load Balancer Extreme (ALB-X) 2.0 Features Update Report jetnexus Accelerating Load Balancer Extreme (ALB-X) 2.0 Features Update Report A Broadband-Testing Report First published August 2011 (V1.0) Published by Broadband-Testing Tel : +376 633010 E-mail : info@broadband-testing.co.uk

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

When Desktops Go Virtual

When Desktops Go Virtual When Desktops Go Virtual Addressing security challenges in your virtual desktop infrastructure A Trend Micro White Paper I. INTRODUCTION Server virtualization is well on its way to becoming mainstream.

More information

How To Protect A Virtual Desktop From Attack

How To Protect A Virtual Desktop From Attack Endpoint Security: Become Aware of Virtual Desktop Infrastructures! An Ogren Group Special Report May 2011 Executive Summary Virtual desktops infrastructures, VDI, present IT with the unique opportunity

More information

Virtual Machine Environments: Data Protection and Recovery Solutions

Virtual Machine Environments: Data Protection and Recovery Solutions The Essentials Series: The Evolving Landscape of Enterprise Data Protection Virtual Machine Environments: Data Protection and Recovery Solutions sponsored by by Dan Sullivan Vir tual Machine Environments:

More information

When Desktops Go Virtual

When Desktops Go Virtual When Desktops Go Virtual Virtualization Security. Addressing security challenges in your virtual desktop infrastructure A Trend Micro White Paper February 2011 I. VIRTUAL DESKTOP INFRASTRUCTURE Server

More information

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to

More information

ENTERPRISE EPP COMPARATIVE ANALYSIS

ENTERPRISE EPP COMPARATIVE ANALYSIS ENTERPRISE EPP COMPARATIVE ANALYSIS Socially Engineered Malware Randy Abrams, Jayendra Pathak, Ahmed Garhy Tested Products Fortinet Fortigate 100D Management station Forticlient- 5.0.7.333 McAfee VirusScan

More information

Tips and Best Practices for Managing a Private Cloud

Tips and Best Practices for Managing a Private Cloud Deploying and Managing Private Clouds The Essentials Series Tips and Best Practices for Managing a Private Cloud sponsored by Tip s and Best Practices for Managing a Private Cloud... 1 Es tablishing Policies

More information

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for White Paper What the ideal cloud-based web security service should provide A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 The components required of an effective web

More information

Real World Considerations for Implementing Desktop Virtualization

Real World Considerations for Implementing Desktop Virtualization Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by Intro duction to Desktop Virtualization for the IT Pro... 1 What Is Desktop Virtualization?... 2 VDI

More information

Mobile App Containers: Product Or Feature?

Mobile App Containers: Product Or Feature? ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating

More information

Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities?

Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities? ANALYST BRIEF Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities? Author Randy Abrams Tested Products Avast Internet Security 7 AVG Internet Security 2012 Avira Internet Security

More information

Maximizing Your Desktop and Application Virtualization Implementation

Maximizing Your Desktop and Application Virtualization Implementation Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop

More information

Understanding & Improving Hypervisor Security

Understanding & Improving Hypervisor Security The Essentials Series: Security Concerns & Solutions Understanding & Improving Hypervisor Security sponsored by by Greg Shields Understanding & Improving Hypervisor Security...1 What Is the Hypervisor?...1

More information

Best Practices in Deploying Anti-Malware for Best Performance

Best Practices in Deploying Anti-Malware for Best Performance The Essentials Series: Increasing Performance in Enterprise Anti-Malware Software Best Practices in Deploying Anti-Malware for Best Performance sponsored by by Eric Schmidt Be st Practices in Deploying

More information

Eight Ways Better Software Deployment and Management Can Save You Money

Eight Ways Better Software Deployment and Management Can Save You Money Eight Ways Better Software Deployment and Management Can Save You Money Introduction Software management and deployment are perhaps among the most difficult and time-consuming activities undertaken by

More information

How To Protect Your Cloud From Attack

How To Protect Your Cloud From Attack A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to

More information

Maximizing Your Desktop and Application Virtualization Implementation

Maximizing Your Desktop and Application Virtualization Implementation Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop

More information

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection Technology Blueprint Secure Your Virtual Desktop Infrastructure Optimize your virtual desktop infrastructure for performance and protection LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL

More information

Moving Beyond Perimeter-Based Security

Moving Beyond Perimeter-Based Security Moving Beyond Perimeter-Based Security A Broadband-Testing Report By Steve Broadhead, Founder & Director, BB-T First published February 2015 (V1.0) Published by Broadband-Testing A division of Connexio-Informatica

More information

ENTERPRISE EPP COMPARATIVE REPORT

ENTERPRISE EPP COMPARATIVE REPORT ENTERPRISE EPP COMPARATIVE REPORT Security Stack: Socially Engineered Malware Authors Bhaarath Venkateswaran, Randy Abrams, Thomas Skybakmoen Tested Products Bitdefender Endpoint Security v5.3.15.539 ESET

More information

Proven LANDesk Solutions

Proven LANDesk Solutions LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations

More information

Security Industry Market Share Analysis

Security Industry Market Share Analysis Security Industry Market Share Analysis December Introduction The Research OPSWAT releases quarterly market share reports for several sectors of the security industry. This report includes both worldwide

More information

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware

Trend Micro OfficeScan 11.0. Best Practice Guide for Malware Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned

More information

Beyond the Hype: Advanced Persistent Threats

Beyond the Hype: Advanced Persistent Threats Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,

More information

Breach Found. Did It Hurt?

Breach Found. Did It Hurt? ANALYST BRIEF Breach Found. Did It Hurt? INCIDENT RESPONSE PART 2: A PROCESS FOR ASSESSING LOSS Authors Christopher Morales, Jason Pappalexis Overview Malware infections impact every organization. Many

More information

Replication and Recovery Management Solutions

Replication and Recovery Management Solutions The Essentials Series: Virtualization and Disaster Recovery Replication and Recovery Management Solutions sponsored by by J. Peter Bruzzese Re plication and Recovery Management Solutions... 1 Pricing Models

More information

Microsoft Windows Intune: Cloud-based solution

Microsoft Windows Intune: Cloud-based solution Microsoft Windows Intune: Cloud-based solution So what exactly is Windows Intune? Windows Intune simplifies and helps businesses manage and secure PCs using Windows cloud services and Windows 7. Windows

More information

Intelligent, Scalable Web Security

Intelligent, Scalable Web Security Solution Overview Citrix and Trend Micro Intelligent, Scalable Web Security Application-Level Control, Load Balancing, High-Traffic Capacity Table of Contents The Challenge... 3 The Solution: Citrix NetScaler

More information

Real World Considerations for Implementing Desktop Virtualization

Real World Considerations for Implementing Desktop Virtualization Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by En suring Desktop Virtualization Success... 1 Siz ing Your Desktop Virtualization Environment... 2 Ap

More information

Securing Endpoints without a Security Expert

Securing Endpoints without a Security Expert How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Securing Endpoints without a Security Expert sponsored by Introduction to Realtime Publishers by Don Jones, Series

More information

Internet Advertising: Is Your Browser Putting You at Risk?

Internet Advertising: Is Your Browser Putting You at Risk? ANALYST BRIEF Is Your Browser Putting You at Risk? PART 2: CLICK FRAUD Authors Francisco Artes, Stefan Frei, Ken Baylor, Jayendra Pathak, Bob Walder Overview The US online advertising market in 2011 was

More information

White Paper. The benefits of a cloud-based service for web security. reducing risk, adding value and cutting costs

White Paper. The benefits of a cloud-based service for web security. reducing risk, adding value and cutting costs White Paper The benefits of a cloud-based service for web security A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 By using a service based in the cloud, protection against

More information

Guardian365. Managed IT Support Services Suite

Guardian365. Managed IT Support Services Suite Guardian365 Managed IT Support Services Suite What will you get from us? Award Winning Team Deloitte Best Managed Company in 2015. Ranked in the Top 3 globally for Best Managed Service Desk by the Service

More information

Best Practice Configurations for OfficeScan (OSCE) 10.6

Best Practice Configurations for OfficeScan (OSCE) 10.6 Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches for OfficeScan, click here. Enable Smart Clients 1. Ensure that Officescan

More information

SSL Performance Problems

SSL Performance Problems ANALYST BRIEF SSL Performance Problems SIGNIFICANT SSL PERFORMANCE LOSS LEAVES MUCH ROOM FOR IMPROVEMENT Author John W. Pirc Overview In early 2013, NSS Labs released the results of its Next Generation

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Server-centric client virtualization model reduces costs while improving security and flexibility.

Server-centric client virtualization model reduces costs while improving security and flexibility. BUSINESS SOLUTIONS Desktop Demystified Server-centric client virtualization model reduces costs while improving security and flexibility. Virtualization is transforming the data center. It s eliminating

More information

VDI can reduce costs, simplify systems and provide a less frustrating experience for users.

VDI can reduce costs, simplify systems and provide a less frustrating experience for users. 1 INFORMATION TECHNOLOGY GROUP VDI can reduce costs, simplify systems and provide a less frustrating experience for users. infor ation technology group 2 INFORMATION TECHNOLOGY GROUP CONTENTS Introduction...3

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Protecting the Irreplacable. November 2013 Athens Ian Whiteside, F-Secure Ian.Whiteside@f-secure.com

Protecting the Irreplacable. November 2013 Athens Ian Whiteside, F-Secure Ian.Whiteside@f-secure.com Protecting the Irreplacable November Athens Ian Whiteside, F-Secure Ian.Whiteside@f-secure.com PC Sales continue to fall. Lack of innovation and no excitement Windows 8 doesn t seem to have excited the

More information

Protecting Data with a Unified Platform

Protecting Data with a Unified Platform Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens

More information

Devising a Server Protection Strategy with Trend Micro

Devising a Server Protection Strategy with Trend Micro Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper» Trend Micro s portfolio of solutions meets and exceeds Gartner s recommendations on how to devise a server protection strategy.

More information

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software McAfee Global Threat Intelligence File Reputation Service Best Practices Guide for McAfee VirusScan Enterprise Software Table of Contents McAfee Global Threat Intelligence File Reputation Service McAfee

More information

Server Based Desktop Virtualization with Mobile Thin Clients

Server Based Desktop Virtualization with Mobile Thin Clients Server Based Desktop Virtualization with Mobile Thin Clients Prof. Sangita Chaudhari Email: sangita123sp@rediffmail.com Amod N. Narvekar Abhishek V. Potnis Pratik J. Patil Email: amod.narvekar@rediffmail.com

More information

Maximizing Your Desktop and Application Virtualization Implementation

Maximizing Your Desktop and Application Virtualization Implementation Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Desktop and Application Virtualization Management Best Practices... 1 Image Management

More information

Windows Embedded Security and Surveillance Solutions

Windows Embedded Security and Surveillance Solutions Windows Embedded Security and Surveillance Solutions Windows Embedded 2010 Page 1 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues

More information

VDI Security for Better Protection and Performance

VDI Security for Better Protection and Performance VDI Security for Better Protection and Performance Addressing security and infrastructure challenges in your VDI deployments Trend Micro, Incorporated» See why you need security designed for VDI environments

More information

Zone Labs Integrity Smarter Enterprise Security

Zone Labs Integrity Smarter Enterprise Security Zone Labs Integrity Smarter Enterprise Security Every day: There are approximately 650 successful hacker attacks against enterprise and government locations. 1 Every year: Data security breaches at the

More information

The Evolving Threat Landscape and New Best Practices for SSL

The Evolving Threat Landscape and New Best Practices for SSL The Evolving Threat Landscape and New Best Practices for SSL sponsored by Dan Sullivan Chapter 2: Deploying SSL in the Enterprise... 16 Infrastructure in Need of SSL Protection... 16 Public Servers...

More information

Trend Micro OfficeScan 10 with File Reputation

Trend Micro OfficeScan 10 with File Reputation Trend Micro OfficeScan 10 with File Reputation Part of Trend Micro Enterprise Security. A Revolutionary New Approach to Enterprise Endpoint Security A Trend Micro White Paper March 2009 I. DRAMATIC RISE

More information

CuTTIng ComplexITy simplifying security

CuTTIng ComplexITy simplifying security CuTTIng ComplexITy simplifying security With corporate IT becoming increasingly complex, how can you boost efficiency while improving corporate security? with kaspersky, now you can. kaspersky.com/business

More information

Developing a Backup Strategy for Hybrid Physical and Virtual Infrastructures

Developing a Backup Strategy for Hybrid Physical and Virtual Infrastructures Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series Developing a Backup Strategy for Hybrid Physical and Virtual Infrastructures sponsored by Introduction to Realtime

More information

Reducing the cost and complexity of endpoint management

Reducing the cost and complexity of endpoint management IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and

More information

Types of cyber-attacks. And how to prevent them

Types of cyber-attacks. And how to prevent them Types of cyber-attacks And how to prevent them Introduction Today s cybercriminals employ several complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual

More information

White paper: Unlocking the potential of load testing to maximise ROI and reduce risk.

White paper: Unlocking the potential of load testing to maximise ROI and reduce risk. White paper: Unlocking the potential of load testing to maximise ROI and reduce risk. Executive Summary Load testing can be used in a range of business scenarios to deliver numerous benefits. At its core,

More information

Cloud and Data Center Security

Cloud and Data Center Security solution brief Trend Micro Cloud and Data Center Security Secure virtual, cloud, physical, and hybrid environments easily and effectively introduction As you take advantage of the operational and economic

More information

Increasing Your VDI Project s Return on Investment Using Workspace Virtualization

Increasing Your VDI Project s Return on Investment Using Workspace Virtualization W H I T E P A P E R Increasing Your VDI Project s Return on Investment Using Workspace Virtualization W H I T E P A P E R Increasing Your VDI Project s Return on Investment Using Workspace Virtualization

More information

INSTANT MESSAGING SECURITY

INSTANT MESSAGING SECURITY INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part

More information

Where Do I Start With Virtual Desktops?

Where Do I Start With Virtual Desktops? The Essentials Series: Important Questions in Implementing Virtual Desktops Where Do I Start With Virtual Desktops? sponsored by by W here Do I Start with Virtual Desktops?... 1 W hat Is a Virtual Desktop?...

More information

Controlling and Managing Security with Performance Tools

Controlling and Managing Security with Performance Tools Security Management Tactics for the Network Administrator The Essentials Series Controlling and Managing Security with Performance Tools sponsored by Co ntrolling and Managing Security with Performance

More information

Simphony v2 Antivirus Recommendations

Simphony v2 Antivirus Recommendations DECLARATIONS WARRANTIES Although the best efforts are made to ensure that the information in this document is complete and correct, MICROS Systems, Inc. makes no warranty of any kind with regard to this

More information

Evolutions in Browser Security

Evolutions in Browser Security ANALYST BRIEF Evolutions in Browser Security TRENDS IN BROWSER SECURITY PERFORMANCE Author Randy Abrams Overview This analyst brief aggregates results from NSS Labs tests conducted between 2009 and 2013

More information

The Next-Generation Virtual Data Center

The Next-Generation Virtual Data Center The Essentials Series: Managing Workloads in a Virtual Environment The Next-Generation Virtual Data Center sponsored by by Jaime Halscott Th e Next Generation Virtual Data Center... 1 Be nefits of Virtualization

More information

Maximizing Your Desktop and Application Virtualization Implementation

Maximizing Your Desktop and Application Virtualization Implementation Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop Virtualization...

More information

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

New possibilities in latest OfficeScan and OfficeScan plug-in architecture New possibilities in latest OfficeScan and OfficeScan plug-in architecture Märt Erik AS Stallion Agenda New in OfficeScan 10.5 OfficeScan plug-ins» More Active Directory support» New automated client grouping

More information

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION SOLUTION BRIEF Trend Micro CLOUD AND DATA CENTER SECURITY Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION As you take advantage of the operational and economic

More information

Cloud-Client Enterprise Security Impact Report Increased Protection at a Lower Cost

Cloud-Client Enterprise Security Impact Report Increased Protection at a Lower Cost y Cloud-Client Enterprise Security Impact Report Increased Protection at a Lower Cost An Osterman Research White Paper Published January 2009 SPONSORED BY onsored by Phone: +1 877-21-TREND www.trendmicro.com/go/smartprotection

More information

Symantec Endpoint Protection 12.1.6

Symantec Endpoint Protection 12.1.6 Data Sheet: Endpoint Security Overview Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high 1. The threat environment is evolving quickly

More information

Achieve Deeper Network Security

Achieve Deeper Network Security Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order

More information

ORACLE VIRTUAL DESKTOP INFRASTRUCTURE

ORACLE VIRTUAL DESKTOP INFRASTRUCTURE ORACLE VIRTUAL DESKTOP INFRASTRUCTURE HIGHLY SECURE AND MOBILE ACCESS TO VIRTUALIZED DESKTOP ENVIRONMENTS KEY FEATURES Centralized virtual desktop management and hosting Facilitates access to VDI desktops

More information

Guideline on Safe BYOD Management

Guideline on Safe BYOD Management CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version

More information

DOBUS And SBL Cloud Services Brochure

DOBUS And SBL Cloud Services Brochure 01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure enquiries@softbox.co.uk DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted

More information

Symantec Endpoint Protection 12.1.5 Datasheet

Symantec Endpoint Protection 12.1.5 Datasheet Symantec Endpoint Protection 12.1.5 Datasheet Data Sheet: Endpoint Security Overview Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that

More information

Streamlining Web and Email Security

Streamlining Web and Email Security How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor

More information

Core Protection Module 1.6 for Mac powered by. User s Guide

Core Protection Module 1.6 for Mac powered by. User s Guide Core Protection Module 1.6 for Mac July, 2010 Copyright All rights reserved. Copyright 1998-2010 Trend Micro Incorporated. BigFix, Fixlet, Relevance Engine, Powered by BigFix and related BigFix logos are

More information

Mitigating Risks and Monitoring Activity for Database Security

Mitigating Risks and Monitoring Activity for Database Security The Essentials Series: Role of Database Activity Monitoring in Database Security Mitigating Risks and Monitoring Activity for Database Security sponsored by by Dan Sullivan Mi tigating Risks and Monitoring

More information

Securing Your Journey to the Cloud. Managing security across platforms today and for the future. Table of Contents

Securing Your Journey to the Cloud. Managing security across platforms today and for the future. Table of Contents P h y s i c a l V i r t u a l - C l o u d Securing Your Journey to the Cloud Managing security across platforms today and for the future Table of Contents Executive summary 1 Journey to the cloud varies,

More information

How To Protect Your Data From Being Hacked

How To Protect Your Data From Being Hacked Data Security and the Cloud TABLE OF CONTENTS DATA SECURITY AND THE CLOUD EXECUTIVE SUMMARY PAGE 3 CHAPTER 1 CHAPTER 2 CHAPTER 3 CHAPTER 4 CHAPTER 5 PAGE 4 PAGE 5 PAGE 6 PAGE 8 PAGE 9 DATA SECURITY: HOW

More information

Network device management solution

Network device management solution iw Management Console Network device management solution iw MANAGEMENT CONSOLE Scalability. Reliability. Real-time communications. Productivity. Network efficiency. You demand it from your ERP systems

More information

Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform

Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR RUNNING SEP ON.... AZURE.................................... Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform Who should

More information

Radia Cloud. User Guide. For the Windows operating systems Software Version: 9.10. Document Release Date: June 2014

Radia Cloud. User Guide. For the Windows operating systems Software Version: 9.10. Document Release Date: June 2014 Radia Cloud For the Windows operating systems Software Version: 9.10 User Guide Document Release Date: June 2014 Software Release Date: June 2014 Legal Notices Warranty The only warranties for products

More information

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.

itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future. Web Filtering Email Filtering Mail Archiving Cloud Backup Disaster Recovery Virtual Machines Private Cloud itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your

More information

How To Make Money From Your Desktop Virtualisation

How To Make Money From Your Desktop Virtualisation Shaping the future of end user services Desktop Virtualisation Seize opportunities before others see them Remember the not-too-distant past?» Traditional thin client systems struggled to gain wide acceptance,

More information

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction

More information

Steps to Migrating to a Private Cloud

Steps to Migrating to a Private Cloud Deploying and Managing Private Clouds The Essentials Series Steps to Migrating to a Private Cloud sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime

More information

A number of factors contribute to the diminished regard for security:

A number of factors contribute to the diminished regard for security: TrendLabs Enterprises cite security as their number one concern with regard to consumerization. During the actual execution of a consumerization strategy, however, IT groups find that the increasing demand

More information

IBM Tivoli Endpoint Manager for Lifecycle Management

IBM Tivoli Endpoint Manager for Lifecycle Management IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,

More information

IBM Security X-Force Threat Intelligence

IBM Security X-Force Threat Intelligence IBM Security X-Force Threat Intelligence Use dynamic IBM X-Force data with IBM Security QRadar to detect the latest Internet threats Highlights Automatically feed IBM X-Force data into IBM QRadar Security

More information

How To Get The Most Out Of Vdi

How To Get The Most Out Of Vdi A GUIDE TO IMPLEMENTING VDI AS A SERVICE CREATIVE-ITC.COM OVERVIEW After years of promise, Virtual Desktop Infrastructure (VDI) is finally hitting the mainstream as a desktop management solution suitable

More information

Devising a Server Protection Strategy with Trend Micro

Devising a Server Protection Strategy with Trend Micro Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper Trend Micro, Incorporated» A detailed account of why Gartner recognizes Trend Micro as a leader in Virtualization and Cloud

More information

Mobile workforce management software solutions. Empowering the evolving workforce with an end-to-end framework

Mobile workforce management software solutions. Empowering the evolving workforce with an end-to-end framework Mobile workforce management software solutions Empowering the evolving workforce with an end-to-end framework 2013 Dell, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected

More information

Hosted Desktop Model vs. SBC, VDI and Traditional Desktop Position Document

Hosted Desktop Model vs. SBC, VDI and Traditional Desktop Position Document Hosted Desktop Model vs. SBC, VDI and Traditional Desktop Position Document Author: Richard South Document #: 1033 Date: 11/07/2008 Last Revision: 20/08/2008 Hosted Desktop Infrastructure is an innovative

More information

More effective systems management from Microsoft and Avnet Technology Solutions

More effective systems management from Microsoft and Avnet Technology Solutions Accelerating Your Success More effective systems management from Microsoft and Avnet Technology Solutions Avnet Technology Solutions recommends genuine Microsoft software Software Why Avnet Technology

More information

The Hidden Costs of Repurposing

The Hidden Costs of Repurposing 01 Finches Only 02 ViewSonic Only The Hidden Costs of Repurposing PCs as VDI Clients Erik Willey 04.04.2014 DI Endpoint The Authority VDI Endpoint SUMMARY: An often overlooked factor when evaluating the

More information

CORPORATE AV / EPP COMPARATIVE ANALYSIS

CORPORATE AV / EPP COMPARATIVE ANALYSIS CORPORATE AV / EPP COMPARATIVE ANALYSIS Exploit Evasion Defenses 2013 Randy Abrams, Dipti Ghimire, Joshua Smith Tested Vendors AVG, ESET, F- Secure, Kaspersky, McAfee, Microsoft, Norman, Panda, Sophos,

More information