1 Trend Micro Cloud Security for Citrix CloudPlatform Proven Security Solutions for Public, Private and Hybrid Clouds
2 2 Trend Micro Provides Security for Citrix CloudPlatform Organizations today are embracing the economic and operational benefits of cloud computing. Whether you re evolving your virtualized data center resources to public, private or hybrid infrastructure-as-a-service (IaaS) clouds, you need to be diligent about ensuring the safety of your desktops, servers, applications, and data. Trend Micro provides dynamic, adaptive protection for data center and cloud environments built on Citrix CloudPlatform powered by Apache CloudStack. Our comprehensive server security protects systems and applications on physical, virtual, and cloud servers as well as virtual desktops. And encryption with policy-based key management secures your data with a solution designed for the cloud as well as data stored in physical and virtual servers. Trend Micro s Cloud Security Solutions for Citrix CloudPlatform are powered by industry leading security products: Trend Micro Deep Security provides a comprehensive server security platform designed to protect your virtualized datacenter from data breaches and business disruptions while enabling compliance. It simplifies security operations while accelerating the ROI of virtualization and cloud projects. Tightly integrated modules easily expand the platform to ensure server, application, and data security across physical, virtual, and cloud servers, as well as virtual desktops. You can custom tailor your security with any combination of agent-based protection, including anti-malware, web reputation, firewall, intrusion prevention, integrity monitoring, and log inspection. The result is an adaptive and efficient server security platform that protects mission-critical enterprise applications and data from breaches and business disruptions without expensive emergency patching. Why Trend Micro and Citrix Trend Micro, a global leader in cloud security, delivers flexible, proven solutions for Citrix which: Have been architected to be highly effective and efficient in protecting the data and applications running on Citrix CloudPlatform. Have been built to the highest government standards, including common criteria EAL 4+. Integrate seamlessly with cloud management tools such as RightScale, Chef and Puppet etc. to automate security management. Reduce security management costs by automating security tasks and lowering the preparation time and effort required to support audits. Trend Micro Helps Resolve Key Business Challenges Security: Designed and optimized for cloud workloads, providing servers running in the cloud the comprehensive protection required to fully leverage and maximize the benefits of cloud computing. Virtual Patching: Shield vulnerabilities before they can be exploited, eliminating the operational pains of emergency patching, frequent patch cycles, and costly system downtime. Compliance: Achieving and demonstrating compliance in cloud environments requires host-based security controls such as those offered by Deep Security in order to meet regulatory requirements including PCI DSS 2.0, HIPAA, FISMA/NIST, NERC, SSAE 16 and more. Integrated Server Security: Consolidate all server security point products into one comprehensive, integrated and flexible platform that optimizes protection across physical, virtual, and cloud servers. Extend to VDI: Deep Security s centralized datacenter security management can be extended to also protect virtual desktops (Citrix XenDesktop) and servers (Citrix XenServer) against zero-day malware while minimizing operational impact from resource inefficiencies and emergency patching ensuring consistent security policy enforcement across all environments.
3 3 Trend Micro SecureCloud protects sensitive information in cloud and virtual environments from theft, unauthorized exposure, or unapproved geographic migration to other datacenters. It provides a patent-pending, key management system that enables you to set policies that determine where and when encrypted data can be accessed. In addition, server validation applies identity and integrity rules when servers request access to secure storage volumes. SecureCloud s simple approach safely delivers encryption keys to valid devices without the need to deploy an entire file system and management infrastructure. This protection helps support internal governance while ensuring compliance with regulations like HIPAA, HITECH, Sarbanes-Oxley, GLBA and PCI DSS. SecureCloud also features FIPS certification to support government agencies and companies that mandate high security standards. And by giving you ownership and control of the encryption keys independent of the cloud provider, SecureCloud enables regulated organizations to demonstrate that sensitive cloud data remains encrypted and confidential upon termination of their cloud instances. Together, Trend Micro Deep Security and Trend Micro SecureCloud enable enterprises and service providers to: Maximize Operational Cost Reductions Reduce complexity with tight integrations to management consoles from Trend Micro and enterprise directories. Provide vulnerability protection to prioritize secure coding and cost-effective implementation of unscheduled patching. Eliminate the cost of deploying multiple software clients with a centrally managed, multi-purpose software agent or virtual appliance. Reduce management costs by automating repetitive and resource intensive security tasks, reducing false-positive security alerts, and enabling workflow of security incident response Significantly reduce the complexity of managing file integrity monitoring with cloud-based event whitelisting and trusted events.
4 4 Prevent Data Breaches & Business Disruptions Detect and remove malware in real time with minimal performance impact. Block malware that attempts to evade detection by uninstalling or otherwise disrupting the security program. Shield known and unknown vulnerabilities in web and enterprise applications and operating systems. Deliver Zero-day protection: Provide immediate protection while eliminating the costs and operational pains of emergency patching, frequent patch cycles, breaches, and costly system downtime. Detect and alert suspicious or malicious activity to trigger proactive, preventative actions. Leverage the web reputation capabilities of one of the largest domain-reputation databases in the world to protect users from accessing infected sites. Achieve Cost-effective Compliance Address major compliance requirements for PCI DSS 2.0, as well as HIPAA, NIST and SSAE 16 with one integrated and cost-effective solution. Provide detailed, auditable reports that document prevented attacks and policy compliance status. Reduce the preparation time and effort required to support audits. Support internal compliance initiatives to increase visibility of internal network activity. Leverage proven technology certified to Common Criteria EAL 4+. Encrypt and Protect Sensitive Information Encrypt and decrypt information in real time, so data at rest is always protected. Enhance data security and control by remotely managing cipher keys. Allow businesses to choose when and where information is accessed. Segregate and protect sensitive information in private clouds and virtual environments. Address compliance requirements for applications and services running in the cloud. Integrate with Deep Security Manager to further validate the XenServer and XenDesktop environment security posture. Accelerate Your Virtualization and Cloud Journey Today Trend Micro Deep Security and Trend Micro SecureCloud provide a holistic approach to cloud protection to mitigate the risks of data breach, theft, and data mobility. Deploying protection that travels between physical, virtual, and private, public, and hybrid cloud servers provides better protection, less administrative complexity, and increased performance. As a recognized leader in virtualization and server security, Trend Micro offers proven solutions that will help you accelerate your virtualization and cloud ROI. Learn more at
5 5 Corporate Headquarters Fort Lauderdale, FL, USA India Development Center Bangalore, India Latin America Headquarters Coral Gables, FL, USA Silicon Valley Headquarters Santa Clara, CA, USA Online Division Headquarters Santa Barbara, CA, USA UK Development Center Chalfont, United Kingdom EMEA Headquarters Schaffhausen, Switzerland Pacific Headquarters Hong Kong, China About Citrix Ready Citrix Ready identifies recommended solutions that are trusted to enhance the Citrix Delivery Center infrastructure. All products featured in Citrix Ready have completed verification testing, thereby providing confidence in joint solution compatibility. Leveraging its industry leading alliances and partner eco-system, Citrix Ready showcases select trusted solutions designed to meet a variety of business needs. Through the online catalog and Citrix Ready branding program, you can easily find and build a trusted infrastructure. Citrix Ready not only demonstrates current mutual product compatibility, but through continued industry relationships also ensures future interoperability. Learn more at About Trend Micro Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years experience, we deliver top-ranked client, server and cloud-based security that fits customers and partners needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro Smart Protection Network cloud computing security infrastructure, Trend Micro s products and services stop threats where they emerge - from the Internet. They are supported by 1,000+ threat intelligence experts around the globe. Additional information about Trend Micro Incorporated and its products and services are available at Trend Micro.com. This Trend Micro news release and other announcements are available at and as part of an RSS feed at Or follow our news on Twitter Copyright 2013 Citrix Systems, Inc. All rights reserved. Citrix, the Citrix logo, Citrix NetScaler, and other Citrix product names are trademarks of Citrix Systems, Inc. All other product names, company names, marks, logos, and symbols are trademarks of their respective owners.
datasheet Trend Micro deep security as a service Advanced Security Built for the Cloud Organizations are embracing the economic and operational benefits of cloud computing, turning to leading cloud providers
Overview Guide ShareFile Enterprise technical overview Secure data sync and sharing services ShareFile empowers users to securely share files with anyone and to sync files across all of their devices The
Trend Micro Deep Security Server Security Protecting the Dynamic Datacenter A Trend Micro White Paper August 2009 I. SECURITY IN THE DYNAMIC DATACENTER The purpose of IT security is to enable your business,
A COALFIRE WHITE PAPER Using s Cloud & Data Center Security Solution to meet PCI DSS 3.0 Compliance Implementing s Deep Security Platform in a Payment Card Environment April 2015 Page 1 Executive Summary...
Optimizing with Citrix NetScaler White Paper Three keys to building the best front-end network for virtual desktop delivery www.citrix.com Executive summary Motivated by the compelling benefits virtual
White Paper Why choose NetScaler over F5 Discover 9 ways NetScaler outperforms F5. Today s enterprises face new requirements for their datacenter and cloud architectures, from keeping pace cost-effectively
A Modern Framework for Network Security in Government 3 A MODERN FRAMEWORK FOR NETWORK SECURITY IN THE FEDERAL GOVERNMENT Government: Securing Your Data, However and Wherever Accessed Governments around
Introducing XenDesktop, built on the Avalon platform Citrix XenDesktop transforms Windows apps and desktops into a secure, mobile service for any user, any device, anywhere. 2 Citrix XenDesktop enables
Virtual Patching: Lower Security Risks and Costs A Trend Micro White Paper, 2012 Trend Micro Deep Security Trend Micro, Incorporated» Hundreds of software vulnerabilities are exposed each month, and timely
Securing Traditional and Cloud-Based Datacenters With Next-generation Firewalls February 2015 Table of Contents Executive Summary 3 Changing datacenter characteristics 4 Cloud computing depends on virtualization
Symantec Control Compliance Suite Overview Addressing IT Risk and Compliance Challenges Only 1 in 8 best performing organizations feel their Information Security teams can effectively influence business
IBM Software Thought Leadership White Paper February 2012 Automated, centralized management for enterprise servers Servers present unique management challenges but IBM Endpoint Manager is up to the job
Trend Micro Sicherheit in den Tiefen des Hypervisors Richard Javet und Gabriel Kälin Trend Micro (Schweiz) Lösungsausrichtung von Trend Micro Aktuelle Herausforderungen Deep Security: Sicherheit für Recheninfrastrukturen
White Paper Information Security, Virtualization, and the Journey to the Cloud By Jon Oltsik August, 2010 This ESG White Paper was commissioned by Trend Micro and is distributed under license from ESG.
10 must-haves for secure enterprise mobility White Paper The 10 musthaves for secure enterprise mobility A security framework and evaluators checklist 2 Becoming a mobile enterprise means new opportunities
APPLICATION-CENTRIC IaaS SOLUTIONS FOR A CLOUD-EMPOWERED ENTERPRISE Changing fast, acting smart and innovating quickly are what enable organizations to get ahead and stay ahead of the competition. Today,
Securing Remote Vendor Access with Privileged Account Security Table of Contents Introduction to privileged remote third-party access 3 Do you know who your remote vendors are? 3 The risk: unmanaged credentials
Thought Leadership Paper Cloud Computing in the Hedge Fund Industry About Eze Castle Integration Eze Castle Integration is the leading provider of IT solutions and private cloud services to more than 600
VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility
Check Point Software Blade Architecture Achieving the right balance between security protection and investment Contents Introduction 3 Check Point Software Blade architecture overview 3 What is a Software
White Paper Content Security: Protect Your Network with Five Must-Haves What You Will Learn The continually evolving threat landscape is what makes the discovery of threats more relevant than defense as
Continuous Cyber Situational Awareness Continuous monitoring of security controls and comprehensive cyber situational awareness represent the building blocks of proactive network security. A publication