In collaborazione con
|
|
- Lynn O’Brien’
- 8 years ago
- Views:
Transcription
1 Scopriamo il Virtual Patching Alessandro de Simone Product Manager Security and Data Protection Roma, 28maggio 2014 In collaborazione con
2 Scopriamo il Virtual Patching
3 Lo Scenario Attuale Number of vulnerabilities on the rise Over 13,000 vulnerabilities reported in 2013, 32% increase from % of them are remotely exploitable over the network In July 2013, The New York Times reported that the average vulnerability sells from around $35,000 to $160,000 Exploits become available shortly after disclosure 74% on the same day 8% more than one day later Roaming endpoints are directly exposed to threats Connecting to the Internet from home, hotels, Wifi-Hotspots Not protected by security on the corporate network In February 2014, NBC reported that a new laptop & mobile phone were probed by hackers in less than one minute and the machine exploited just a few minutes later on the hotel wifi
4 Lo Scenario Attuale Patching di tutte le vulnerabilità Irrealistico Some vulnerabilities cannot be patched Systems need to be up 24/7 and cannot be rebooted Patches often do not exist for 52% of known vulnerabilites, no patch exists Average of 151 days for vendors to release patch (NSS Labs 2013) Patches if available are not deployed immediately Average time to patch in enterprises in 2013: 59 days! Endpoints remain vulnerable
5 Lo Scenario Attuale la fine di XP Desktop OS Market Share as of Feb 2014 Operating System Market Share Windows % Windows XP 28.44% Windows % Windows % Mac OS X % Windows Vista 3.15% Linux 1.59% Mac OS X % Mac OS X % Mac OS X % Mac OS X % Windows NT 0.17% Mac OS X % Windows % Mac OS X (no version reported) 0.01% Windows %
6 Lo Scenario Attuale Microsoft will end the Extended Support on April 8, 2014 for Windows XP with Service Pack 3 and Windows XP x64 Edition with Service Pack 2 But Customers will still be on XP for the time being because? 1. Cost Gartner estimates that the per-machine cost of migrating from XP to Windows 7, for example, in an organization with 10,000 desktops or more will vary from $1,274USD to $2,069USD The Camwood research found that while only 16% of IT decision makers stated that budgetary reasons were holding them back from migrating off XP, those in the throes of migration (25%) were more concerned about the amount of money needed to be spent to achieve a successful migration. 2. Migration Concerns Worry about migration was cited by over 1/5 of IT decision makers as another reason why they have not started migration. 3. Legacy Software Support Companies with in-house applications generally have a greater dependency on OSes, which will prohibited them from moving away
7 Lo Scenario Attuale Protezione delle vulnerabilità prima che possano venire sfruttate Centinaia di vulnerabilità software vengono scoperte ogni mese e l'applicazione puntuale delle patch è dispendiosa, soggetta a errori e spesso impossibile. Vengono così messi in evidenza i costi e le difficoltà della distribuzione di patch di emergenza, i cicli di patch frequenti e le costose interruzioni dell'attività di sistema.
8 La Soluzione Il Patching Virtuale Le soluzioni con patching virtuale assicurano la protezione immediata. Potete ottenere una consolidata tutela delle vulnerabilità che proteggerà i vostri server ed endpoint fino all implementazione delle patch, o indefinitamente per i sistemi privi di supporto o a cui non è possibile applicare patch. La protezione tramite patching virtuale puoi aiutarvi ad ampliare la vita dei sistemi e delle applicazioni preesistenti oltre a ridurre i costi amministrativi.
9 Deep packet inspection Come Funziona? Raw Traffic Over 100 applications shielded including: Operating Systems 1 2 Stateful Firewall Allow known good Exploit Rules Stop known bad Database servers Web app servers Mail servers FTP servers Backup servers 3 Vulnerability Rules Shield known vulnerabilities Storage mgt servers DHCP servers Desktop applications Filtered Traffic 4 Smart Rules Shield unknown vulnerabilities and protect specific applications Mail clients Web browsers Anti-virus Other applications
10 Virtual Patching Protezione Multilivello Data Center End Point Trend Micro DEEP SECURITY Trend Micro VULNERABILITY PROTECTION
11 Trend Micro Vunerability Protection
12 Trend Micro Vunerability Protection TMVP = TrendMicro Vulnerability Protection TMVP is focusing on vulnerability protection which using virtual patching to defense remote attacks. TMVP {DPI, FW} TMVP is based Deep Packet Inspection (DPI) and Firewall (FW) technologies to provide virtual patching and device control. TMVP OfficeScan Plugin TMVP is different to IDF because it integrates with Control Manager alongside all other endpoint products, is a standalone product, and does not require or have any dependencies on OfficeScan.
13 Features Multiple-Level Policy Inheritance A newly created policy can be configured to inherit all or some of its settings from a parent policy. This lets you create a tree structure of security policies. Complete IPv6 support IPv6 support. IPv6 specific rules can use IPv6 addresses and ICMPv6 support has been added. Generic rules like IP TCP allow port 80 apply to both IPv4 and IPv6 traffic. Standalone TMVP doesn t require OSCE for installation, it can operate with other major AV such as McAfee, Symmetric, Sophos, Kaspersky.
14 Features TMCM Integration: Central management of multiple TMVP servers in TMCM TMVP Status Log summary in TMCM Show Health Status New UI: Completely redesigned user experience, simplified management and navigation Refined options for device control related configurations Task-Based Navigation: Tabbed Dashboard to allow multiple dashboards with easy switch between them, provide many different views. Broader Browser Support: Included IE 10, Chrome, and Safari to the existing Firefox and IE 9 support CSV export
15 5 Punti di forza Reduce the need for patching (down-time, reboot) Extend the life of XP systems Protection against exploits Enable compliance with PCI 6.6 Control unauthorized network access
16 Interfaccia Grafica di amministrazione
17 Features Differentiation Comparison Key Capabilities Trend McAfee Symantec Sophos Kaspersky Automated protection against vulnerabilities Patch Deployment only Shields OS and apps from known and unknown attacks Protects from vulnerabilities before patches are deployed Visibility of vulnerabilities and CVE information Host Intrusion Prevention via App Control Supports Windows XP / Server 2003 and above No XP x64 support Blocks networking backdoors from penetrating the network (Interface Isolation) Device Control only Automatic location-based security configuration Detects malicious traffic for known protocols on dynamic ports EPP / AV Suite integration & pricing
18 System Requirements Vulnerability Protection Manager Memory: 4 GB (8 GB recommended) Disk Space: 1.5 GB (5 GB recommended) Operating System Microsoft Windows 2012 R2 (64-bit) Microsoft Windows 2012 (64-bit) Windows Server 2008 R2 (64-bit) Windows Server 2008 (32-bit and 64-bit) Windows 2003 Server SP2 (32-bit and 64-bit) Windows 2003 Server R2 SP2 (32-bit and 64-bit) Embedded SQL Server 2008 SP2 or SQL Server (2008/2012) or Oracle (10g/11g) Required 20GB Disk Space Vulnerability Protection Agent Memory: 128 MB Disk Space: 500 MB Operating System Windows 8.1 (32-bit and 64-bit) Windows Server 2012 R2 (64-bit) Windows 8 (32-bit and 64-bit) Windows Server 2012 (64-bit) Windows 7 (32-bit and 64-bit) Windows Server 2008 R2 (64-bit) Windows Server 2008 (32-bit and 64-bit) Windows Vista (32-bit and 64-bit) Windows Server 2003 SP1 (32-bit and 64-bit) patched with "Windows Server 2003 Scalable Networking Pack" Windows Server 2003 SP2 (32-bit and 64-bit) Windows Server 2003 R2 SP2 (32-bit and 64-bit) Windows XP (32-bit and 64-bit)
19 Trend Micro Deep Security
20 Cos è? Deep Security assicura una protezione server avanzata per server fisici, virtuali e in-the-cloud. Protegge le applicazioni e i dati aziendali da violazioni e interruzioni dell attività senza ricorrere alle patch di emergenza. Questa piattaforma completa a gestione centralizzata vi aiuta a semplificare le operazioni di sicurezza, garantendo allo stesso tempo la conformità normativa e incrementando il ROI dei progetti di virtualizzazione e cloud.
21 Più attacchi Più Mirati More Sophisticated More Targeted More Frequent More Profitable Advanced Persistent Threats Le tecnologie di protezione tradizionali non sono più adeguate De-Perimeterization
22 Perché Deep Security? Virtualization Security with Deep Security Agentless Security Platform for Virtual Environments Deep Security Virtual Appliance Intrusion prevention Firewall Anti-malware Web reputation Integrity monitoring The Old Way With Deep Security More VMs VM VM VM Security Virtual Appliance VM VM VM VM VM Higher Density Fewer Resources Easier Manageability Stronger Security
23 6 moduli Integrati 6 protection modules Reduces attack surface. Prevents DoS & detects reconnaissance scans Firewall Intrusion Prevention Detects and blocks known and zero-day attacks that target vulnerabilities Tracks credibility of websites and safeguards users from malicious urls Web Reputation Anti-Virus Detects and blocks malware (web threats, viruses & worms, Trojans) Optimizes the identification of important security events buried in log entries Log Inspection Integrity Monitoring Detects malicious and unauthorized changes to directories, files, registry keys
24 Architettura Single Pane Scalable Redundant Deep Security Manager Threat Intelligence Manager SecureCloud Reports Deep Security Agent Modules: Intrusion Prevention Firewall Integrity Monitoring Log Inspection Anti-malware Web Reputation Deep Security Virtual Appliance Includes: Intrusion Prevention Firewall Anti-malware Web Reputation Integrity Monitoring Hypervisor Integrity Monitoring
25 .Concludendo Una soluzione unica ed integrata per la protezione dei server L unica soluzione che offre protezione ad-hoc per ambienti virtuali e nel cloud Prima ed unica piattaforma di sicurezza Agentless(anti-malware, web reputation, firewall, intrusion prevention, VM & hypervisor integrity monitoring, virtual patching) per VMware Prima ed unica soluzione che estende la protezione dei Datacenter al public/hybrid cloud Trend Micro 22.9% Trend Micro 13% Trend Micro All Others 77.1% All Others Combined 87%
26 SEDI: Roma Milano Venezia Torino Novara Bologna CONTATTI: -
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro Udo_Schneider@trendmicro.de 26.03.2013
More informationSicurezza Data Center 22 giugno 2015. Fabio Paravani Regional Account Manager
Sicurezza Data Center 22 giugno 2015 Fabio Paravani Regional Account Manager A world safe for exchanging digital information CEO Founded Headquarters Employees Offices 2012 Sales Eva Chen 1988, United
More informationDeep Security. Προστατεύοντας Server Farm. Σωτήρης Δ. Σαράντος. Available Aug 30, 2011. Σύμβουλος Δικτυακών Λύσεων. Copyright 2011 Trend Micro Inc.
Deep Security Προστατεύοντας Server Farm Available Aug 30, 2011 Σωτήρης Δ. Σαράντος Σύμβουλος Δικτυακών Λύσεων Copyright 2011 Trend Micro Inc. Legacy Security Hinders Datacenter Consolidation Physical
More informationTrend Micro Sicherheit in den Tiefen des Hypervisors. Richard Javet und Gabriel Kälin Trend Micro (Schweiz)
Trend Micro Sicherheit in den Tiefen des Hypervisors Richard Javet und Gabriel Kälin Trend Micro (Schweiz) Lösungsausrichtung von Trend Micro Aktuelle Herausforderungen Deep Security: Sicherheit für Recheninfrastrukturen
More informationVirtualization Journey Stages
Deep Security 7.5 Todd Thiemann Sr. Dir. of Datacenter Security Marketing Trend Micro Harish Agastya Director of Datacenter Security Marketing Trend Micro Classification 11/12/2010 1 Virtualization Journey
More informationNew possibilities in latest OfficeScan and OfficeScan plug-in architecture
New possibilities in latest OfficeScan and OfficeScan plug-in architecture Märt Erik AS Stallion Agenda New in OfficeScan 10.5 OfficeScan plug-ins» More Active Directory support» New automated client grouping
More informationDevising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper Trend Micro, Incorporated» A detailed account of why Gartner recognizes Trend Micro as a leader in Virtualization and Cloud
More informationDevising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper» Trend Micro s portfolio of solutions meets and exceeds Gartner s recommendations on how to devise a server protection strategy.
More informationNetzwerkvirtualisierung? Aber mit Sicherheit!
Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction
More informationDeep Security Vulnerability Protection Summary
Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security
More informationSecurity and Billing for Azure Pack. Presented by 5nine Software and Cloud Cruiser
Security and Billing for Azure Pack Presented by 5nine Software and Cloud Cruiser Meet our Speakers Symon Perriman VP of Business Development 5nine Software symon@5nine.com @SymonPerriman Paul Zinn Senior
More informationHow To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
More informationEndpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationData Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec
The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware
More informationComprehensive security platform for physical, virtual, and cloud servers
datasheet Trend Micro deep security 9 Comprehensive security platform for physical, virtual, and cloud servers Virtualization and cloud computing have changed the face of today s data center. Yet as organizations
More informationAutomated Protection on UCS with Trend Micro Deep Security
Copyright 2014 Trend Micro Inc. Automated Protection on UCS with Trend Micro Deep Security Chris Van Den Abbeele Senior presales Engineer Agenda 1. Industrialization of Cyber threats The boomerang of Project
More informationThe Clock is Ticking on Windows Server 2003 Support
A Trend Micro White Paper April 2015 The Clock is Ticking on Windows Server 2003 Support >> How Trend Micro can secure your end of life servers while enabling a safe transition Contents Introduction...3
More informationHow to survive in a world of Virtualization and Cloud Computing, where you even can t trust your own environment anymore. Raimund Genes, CTO
How to survive in a world of Virtualization and Cloud Computing, where you even can t trust your own environment anymore. Raimund Genes, CTO Data everywhere but protection? Unprotected Data Needing Protection
More informationVirtual Patching: a Proven Cost Savings Strategy
Virtual Patching: a Proven Cost Savings Strategy An Ogren Group Special Report December 2011 Executive Summary Security executives, pushing the limits of traditional labor-intensive IT patch processes
More informationData Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec
The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware
More informationCryptoLocker la punta dell iceberg, impariamo a difenderci dagli attacchi mirati. Patrick Gada 18 March 2015 Senior Sales Engineer
CryptoLocker la punta dell iceberg, impariamo a difenderci dagli attacchi mirati Patrick Gada 18 March 2015 Senior Sales Engineer CryptoLocker Rossi Mario, CryptoLocker CryptoLocker Attacco del 27 gennaio
More informationSymantec Endpoint Protection 12.1.5 Datasheet
Symantec Endpoint Protection 12.1.5 Datasheet Data Sheet: Endpoint Security Overview Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that
More informationInternet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT
Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT TESTED PRODUCTS: AVG Internet Security Network Edition v8.0 Kaspersky Total Space Security v6.0 McAfee Total Protection for Endpoint Sophos
More informationHow To Protect A Virtual Desktop From Attack
Endpoint Security: Become Aware of Virtual Desktop Infrastructures! An Ogren Group Special Report May 2011 Executive Summary Virtual desktops infrastructures, VDI, present IT with the unique opportunity
More informationTrend Micro. Advanced Security Built for the Cloud
datasheet Trend Micro deep security as a service Advanced Security Built for the Cloud Organizations are embracing the economic and operational benefits of cloud computing, turning to leading cloud providers
More informationSecuring Your Journey to the Cloud. Thomas J. Miller Executive Vice President
Securing Your Journey to the Cloud Thomas J. Miller Executive Vice President February 23, 2011 Classification 2/24/2011 Copyright 2011 Trend Micro Inc. 1 Have you ever tried to explain Virtualization to
More informationSymantec Endpoint Protection 12.1.2
Data Sheet: Endpoint Security Overview offers comprehensive defense against complex attacks for both physical and virtual environments. It integrates ten essential security technologies in a single, high
More informationVIRTUALIZATION SECURITY IN THE REAL WORLD
VIRTUALIZATION SECURITY IN THE REAL WORLD Growing Technology Virtualization has become the standard for many corporate IT departments. The market for server virtualization infrastructure has matured, surpassing
More informationTrend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard
Partner Addendum Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard The findings and recommendations contained in this document are provided by VMware-certified
More informationOfficeScan 10 Enterprise Client Firewall Updated: March 9, 2010
OfficeScan 10 Enterprise Client Firewall Updated: March 9, 2010 What is Trend Micro OfficeScan? Trend Micro OfficeScan Corporate Edition protects campus networks from viruses, Trojans, worms, Web-based
More informationConfidence in a Connected World. MEEC Symantec Product Availability. John Lally MD Education Account Executive 204-401-7342 John_Lally@symantec.
Confidence in a Connected World MEEC Symantec Product Availability John Lally MD Education Account Executive 204-401-7342 John_Lally@symantec.com 1 Agenda New threats means advanced security tactics SEP
More informationVirtual Patching: a Compelling Cost Savings Strategy
Virtual Patching: a Compelling Cost Savings Strategy An Ogren Group Special Report November 2010 Executive Summary IT patch processes are at a critical crossroads. Exploits appear in the wild only a day
More informationSymantec Endpoint Protection
The next generation of antivirus technology from Overview Advanced threat protection combines AntiVirus with advanced threat prevention to deliver an unmatched defense against malware for laptops, desktops,
More informationKaspersky Endpoint Security 10 for Windows. Deployment guide
Kaspersky Endpoint Security 10 for Windows Deployment guide Introduction Typical Corporate Network Network servers Internet Gateway Workstations Mail servers Portable media Malware Intrusion Routes Viruses
More informationEndpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
More informationSymantec Endpoint Protection 12.1.4
Data Sheet: Endpoint Security Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec
More informationSecure Virtualization in the Federal Government
White Paper Secure Virtualization in the Federal Government Achieve efficiency while managing risk Table of Contents Ready, Fire, Aim? 3 McAfee Solutions for Virtualization 4 Securing virtual servers in
More informationTrend Micro OfficeScan 11.0. Best Practice Guide for Malware
Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned
More informationTotal Defense Endpoint Premium r12
DATA SHEET Total Defense Endpoint Premium r12 Overview: Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems from intrusions, malicious
More informationMeeting the Challenges of Virtualization Security
Meeting the Challenges of Virtualization Security Coordinate Security. Server Defense for Virtual Machines A Trend Micro White Paper August 2009 I. INTRODUCTION Virtualization enables your organization
More informationVulnerabilità e Attacchi alle Infrastrutture IT Simone Riccetti. Sr. IT Security Architect
Vulnerabilità e Attacchi alle Infrastrutture IT Simone Riccetti Sr. IT Security Architect Agenda Team di Ricerca X-Force Vulnerabilità e Minacce Tecnologie di Protezione Attack Lifecycle Live Demo 2 The
More informationEnterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
More informationBest Practice Configurations for OfficeScan (OSCE) 10.6
Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches for OfficeScan, click here. Enable Smart Clients 1. Ensure that Officescan
More informationSymantec Protection Suite Small Business Edition
Easy-to-use, all-in-one suite designed for small businesses Overview Suite Small Business is an easyto-use, all-in-one suite that secures your critical business assets and information against today s complex
More informationINTRODUCING: KASPERSKY SECURITY FOR VIRTUALIZATION LIGHT AGENT
INTRODUCING: KASPERSKY SECURITY FOR VIRTUALIZATION LIGHT AGENT WHAT IS VIRTUALIZATION SUPPOSED TO BRING? REDUCED IT COSTS FASTER DISASTER RECOVERY OS MIGRATIONS VM CENTRALIZED HW MANAGEMENT STABILITY DATA
More informationKaspersky Security. for Virtualization 1.1 and Trend Micro Deep. Security 8.0 virtual environment detection rate and performance testing by AV-Test
Kaspersky Security for Virtualization 1.1 and Deep Security 8.0 virtual environment detection rate and performance testing by AV-Test Kaspersky Security for Virtualization, Kaspersky Lab s corporate security
More informationFirewalls and Software Updates
Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General
More informationSecure Cloud-Ready Data Centers Juniper Networks
Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security
More informationSygate Secure Enterprise and Alcatel
Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and
More informationGetting Started with Symantec Endpoint Protection
Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only
More informationOUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME
OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME We believe that everyone from home computer users and small companies, to large corporations and governments has the right to be free from cybersecurity
More informationEffective End-to-End Cloud Security
Effective End-to-End Cloud Security Securing Your Journey to the Cloud Trend Micro SecureCloud A Trend Micro & VMware White Paper August 2011 I. EXECUTIVE SUMMARY This is the first paper of a series of
More informationPCI DSS 3.0 Compliance
A Trend Micro White Paper April 2014 PCI DSS 3.0 Compliance How Trend Micro Cloud and Data Center Security Solutions Can Help INTRODUCTION Merchants and service providers that process credit card payments
More informationRelease Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
More informationTrend Micro deep security 9.6
datasheet Trend Micro deep security 9.6 Comprehensive security platform for physical, virtual, and cloud servers Virtualization has already transformed the data center and now, organizations are moving
More informationPROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM
PROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM EMPLOYEES WORK ON THE MOVE, WITH MULTIPLE DEVICES MEETING CUSTOMERS WORKING FROM HOME BUSINESS TRIP CLOUD SERVICES ARE ENABLERS OF MOBILE
More informationThe Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
More informationData Center Connector for vsphere 3.0.0
Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationSymantec Protection Suite Small Business Edition
Easy-to-use, all-in-one suite designed for small businesses Overview Suite Small Business Edition is an easyto-use, all-in-one suite that secures your critical business assets and information against today
More informationTotal Cloud Protection
Total Cloud Protection Data Center and Cloud Security Security for Your Unique Cloud Infrastructure A Trend Micro White Paper August 2011 I. INTRODUCTION Many businesses are looking to the cloud for increased
More informationHow To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)
McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload
More informationComprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
More informationSymantec Endpoint Protection 12.1.6
Data Sheet: Endpoint Security Overview Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high 1. The threat environment is evolving quickly
More informationChapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
More informationI D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!
I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! December 2014 Adapted from Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares by
More informationMcAfee MOVE AntiVirus Multi-Platform 3.5.0
Product Guide McAfee MOVE AntiVirus Multi-Platform 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationInstallation Guide for Symantec Endpoint Protection and Symantec Network Access Control
Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in
More informationStaying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro
Staying Secure After Microsoft Windows Server 2003 Reaches End of Life Trevor Richmond, Sales Engineer Trend Micro Windows Server 2003 End of Life- Why Care? The next big vulnerability (Heartbleed/Shellshock)
More informationServer Virtualization A Game-Changer For SMB Customers
Whitepaper Server Virtualization A Game-Changer For SMB Customers Introduction Everyone in the IT world has heard of server virtualization, and some stunning achievements by datacenter and Enterprise customers
More informationVirtual Desktops Security Test Report
Virtual Desktops Security Test Report A test commissioned by Kaspersky Lab and performed by AV-TEST GmbH Date of the report: May 19 th, 214 Executive Summary AV-TEST performed a comparative review (January
More informationHOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments
HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments OVERVIEW This document explains the functionality of Security for Virtual and Cloud Environments (SVCE) - what
More informationOvation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
More informationSymantec Endpoint Protection Getting Started Guide
Symantec Endpoint Protection Getting Started Guide 12167130 Symantec Endpoint Protection Getting Started Guide The software described in this book is furnished under a license agreement and may be used
More information1. Server 2008 - Microsoft FEP 2010 - Instalation
1. Server 2008 - Microsoft FEP 2010 - Instalation 1 2. Windows XP x86 (32bit) - Microsoft FEP 2010 Instalation 2 3 2.1. 4 System Requirements Microsoft Forefront Endpoint Protection 2010 1 System Requirements
More informationMcAfee MOVE / VMware Collaboration Best Practices
McAfee MOVE / VMware Collaboration Best Practices Christie J. Karrels Sales Engineer Federal DoD January 11, 2013 1 P a g e Contents Introduction... 3 Traditional Anti-Malware vs. Optimized Anti-Malware...
More informationHow To Protect Your Computer From A Malicious Virus
Trusted protection from malware and email-borne threats for multiplatform environments Overview safeguards enterprise assets and lowers risk by providing unmatched protection against threats for laptops,
More informationSymantec Protection Suite Small Business Edition
Easy-to-use, all-in-one suite designed for small businesses Overview Suite Small Business Edition is an easy-to-use, all-in-one suite that secures your critical business assets and information against
More informationBitdefender GravityZone Sales Presentation
6 March 2014 Page 1 Bitdefender GravityZone Sales Presentation 1 Page 2 Bitdefender at a Glance The #1 Anti-Malware Security Technology in the world First security software vendor to receive top recommendations
More informationTrend Micro Deep Security
Trend Micro Deep Security Server Security Protecting the Dynamic Datacenter A Trend Micro White Paper August 2009 I. SECURITY IN THE DYNAMIC DATACENTER The purpose of IT security is to enable your business,
More informationNessus and Antivirus. January 31, 2014 (Revision 4)
Nessus and Antivirus January 31, 2014 (Revision 4) Table of Contents Introduction... 3 Standards and Conventions... 3 Overview... 3 A Note on SCAP Audits... 4 Microsoft Windows Defender... 4 Kaspersky
More informationCore Protection for Virtual Machines 1
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
More informationSourceFireNext-Generation IPS
D Ů V Ě Ř U J T E S I L N Ý M SourceFireNext-Generation IPS Petr Salač CCNP Security, CCNP, CICSP, CCSI #33835 petr.salac@alefnula.com Our Customers Biggest Security Challenges Maintaining security posture
More informationSonicWALL Unified Threat Management. Alvin Mann April 2009
SonicWALL Unified Threat Management Alvin Mann April 2009 Agenda Who is SonicWALL? Networking Drivers & Trends SonicWALL Unified Threat Management (UTM) Next Generation Protection SonicWALL CONFIDENTIAL
More informationCloud and Data Center Security
solution brief Trend Micro Cloud and Data Center Security Secure virtual, cloud, physical, and hybrid environments easily and effectively introduction As you take advantage of the operational and economic
More informationhttp://www.trendmicro.com/download
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationSymantec Endpoint Protection
The next generation of antivirus technology from Symantec Overview Advanced threat protection combines Symantec AntiVirus with advanced threat prevention to deliver an unmatched defense against malware
More informationOvation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,
More informationSymantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide
Symantec Endpoint Protection Small Business Edition 12.1.2 Getting Started Guide Symantec Endpoint Protection Small Business Edition Getting Started Guide The software described in this book is furnished
More informationDeep Security 9.5 Supported Features by Platform
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationIntro to NSX. Network Virtualization. 2014 VMware Inc. All rights reserved.
Intro to NSX Network Virtualization 2014 VMware Inc. All rights reserved. Agenda Introduction NSX Overview Details: Microsegmentation NSX Operations More Information SDDC/Network Virtualization Security
More informationSymantec Endpoint Protection Getting Started Guide
Symantec Endpoint Protection Getting Started Guide Symantec Endpoint Protection Getting Started Guide The software described in this book is furnished under a license agreement and may be used only in
More informationSecuring Virtual Applications and Servers
White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating
More informationRequired Software Product List
Symantec ($3.2 million, 35% weight) AdVantage AdvisorMail AntiVirus (Endpoint Protection) AntiVirus Enterprise Edition App Center Application HA Asset Management Suite Backup Exec Certificate Intelligence
More informationIBM Endpoint Manager for Core Protection
IBM Endpoint Manager for Core Protection Device control and endpoint protection designed to guard against malware and loss of sensitive data Highlights Delivers real-time endpoint protection against viruses,
More informationThe self-defending network a resilient network. By Steen Pedersen Ementor, Denmark
The self-defending network a resilient network By Steen Pedersen Ementor, Denmark The self-defending network - a resilient network What is required of our internal networks? Available, robust, fast and
More informationDid you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
More informationThe first agentless Security, Virtual Firewall, Anti- Malware and Compliance Solution built for Windows Server 2012 Hyper-V
The first agentless Security, Virtual Firewall, Anti- Malware and Compliance Solution built for Windows Server 2012 Hyper-V #1 Hyper-V Security The first agentless Security, Virtual Firewall, Anti-Malware
More informationSymantec Client Management Suite 8.0
IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,
More information5 Steps to Advanced Threat Protection
5 Steps to Advanced Threat Protection Agenda Endpoint Protection Gap Profile of Advanced Threats Consensus Audit Guidelines 5 Steps to Advanced Threat Protection Resources 20 Years of Chasing Malicious
More information