WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

Similar documents
Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Fighting Advanced Threats

Symantec Protection Suite Add-On for Hosted and Web Security

For additional information and evaluation copies of Trend Micro products and services, visit our website at

STPIC/Admin/002/ / Date: Sub: Quotation for purchase/renewal of Anti Virus Software Reg.

User Documentation Web Traffic Security. University of Stavanger

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

overview Enterprise Security Solutions

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES

isheriff CLOUD SECURITY

HTTP Virus Protection in the Enterprise Environment

Host-based Intrusion Prevention System (HIPS)

Reviewer s Guide. PureMessage for Windows/Exchange Product tour 1

How To Integrate Hosted Security With Office 365 And Microsoft Mail Flow Security With Microsoft Security (Hes)

Symantec Endpoint Protection

Small and Midsize Business Protection Guide

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

Stop Spam. Save Time.

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

The Hillstone and Trend Micro Joint Solution

IBM Endpoint Manager for Core Protection

Spear Phishing Attacks Why They are Successful and How to Stop Them

Cyber Security Solutions:

Cisco ASA 5500 Series Anti-X Edition for the Enterprise

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

Endpoint protection for physical and virtual desktops

Technical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems

overview Enterprise Security Solutions

Putting Web Threat Protection and Content Filtering in the Cloud

NetDefend Firewall UTM Services

WildFire. Preparing for Modern Network Attacks

Symantec Endpoint Protection

Trend Micro Hosted Security Stop Spam. Save Time.

Advantages of Managed Security Services

WEBSENSE SECURITY SOLUTIONS OVERVIEW

Building a Web Security Ecosystem to Combat Emerging Internet Threats

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

Symantec Endpoint Protection

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

McAfee Total Protection Reduce the Complexity of Managing Security

Devising a Server Protection Strategy with Trend Micro

Commtouch RPD Technology. Network Based Protection Against -Borne Threats

Symantec Protection Suite Small Business Edition

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Top tips for improved network security

Devising a Server Protection Strategy with Trend Micro

Cisco ASA 5500 Series Content Security Edition for the Enterprise

NetDefend Firewall UTM Services

Symantec Endpoint Protection A unified, proactive approach to endpoint security

Cisco Security Intelligence Operations

Intrusion Defense Firewall

OfficeScan Corporate Edition 6.5

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Top five strategies for combating modern threats Is anti-virus dead?

Cisco ASA 5500 Series Content Security Edition for the Enterprise

Managing Web Security in an Increasingly Challenging Threat Landscape

Client Server Messaging Security3

24/7 Visibility into Advanced Malware on Networks and Endpoints

Endpoint protection for physical and virtual desktops

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

INFORMATION PROTECTED

Symantec Protection Suite Small Business Edition

SafeNet Content Security Product Overview. Protecting the Network Edge

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS. Corporate Account Takeover & Information Security Awareness

The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only.

WHITE PAPER. Understanding How File Size Affects Malware Detection

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document

BitDefender Client Security Workstation Security and Management

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Get Started Guide - PC Tools Internet Security

Symantec Endpoint Protection Datasheet

T E C H N I C A L S A L E S S O L U T I O N

10 Things Every Web Application Firewall Should Provide Share this ebook

Types of cyber-attacks. And how to prevent them

Advanced Persistent Threats

Spyware: Securing gateway and endpoint against data theft

IBM Internet Security Systems

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

Symantec AntiVirus Enterprise Edition

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Superior protection from Internet threats and control over unsafe web usage

Transcription:

Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING

Web Threats Are Serious Business Your employees are increasingly dependent on the Internet, whether they are in the office, at home, or on the road. This dependence, combined with a new generation of blended, targeted, and regional Web threats leaves your business more vulnerable than ever before. To compound the problem, Web threats make the very act of browsing risky. They can enter your network without user intervention, threatening your company s data, productivity, reputation, and revenue. 116% Web Threats Index: Increasing Percentage of Growth 161% 165% 175% 150% 100% 50% 1H 2005 2H 2005 1H 2006 2H 2006 0% Trojan horse programs, pharming, spyware, adware, and other malware are all threats that cyber criminals combine together to perform malicious activities. Web threats are pervasive, profit driven, and the fastest growing threat vector today. Hackers are looking more like organized crime with a thriving black market, providing incentive to develop technologically sophisticated attacks. These threats spawn many variants creating an infection chain that uses the Web to infiltrate, spread, deliver additional exploits, and hide on corporate machines. Web threats may also be triggered by a hyperlink or an executable file attachment in a spam email. You Need Proactive, Seamless Protection Today s URL filtering and content inspection solutions are effective at protecting against known threats from known sources. Since they are by nature reactive and require static updates, you need an additional layer of protection to safeguard your business against unknown Web threats that adapt to avoid detection by traditional scanning methods. A dynamic Web security solution provides continuous updates and complements URL filtering. Trend Micro s comprehensive multi-layered, multi-threat solution includes innovative technologies that work together to proactively respond to Web threats. By including Web reputation with its industryleading protection, Trend Micro provides a unique means for users to avoid the malicious websites where these threats first emerge.

Trend Micro Breaks the Infection Chain Trend Micro provides comprehensive, coordinated security in every area where Web threats can be most effectively thwarted: in the cloud, at the gateway, and on the endpoint. Trend Micro solutions integrate antivirus, anti-spyware, and anti-spam to deflect Web threats and blend innovative technologies such as Web reputation, URL filtering, in-line scanning, behavioral analysis, and endpoint access control. Key information is shared between layers of protection to strengthen your overall security. Location-Aware Security Protects Your Roaming Users Users have the greatest risk of being infected by a Web threat when they access the Internet at home or away from the office. Trend Micro security solutions protect users when they re off the corporate network and corporate gateway security policies are no longer being enforced. Flexible. Enables flexible policy configurations. Automatic. Provides agent and agent-less scanning and cleaning. Efficient. Eliminates server or client performance impact. TrendLabs Trend Micro Web Reputation Tools and Reports Trend Micro Control Manager Web Reputation Lets You Avoid Threats Similar to providing a credit check for websites, Trend Micro assigns websites a reputation score based on factors such as age, location, and history to alert users to any potential risks when they are most vulnerable while they are attempting to access a questionable website. This reputation helps determine whether or not the website is safe. Comprehensive. Tracks lifecycle for hundreds of millions of Web domains. Real time. Provides continuous updates and live reputation feeds. Proven. Extends market-leading Email Reputation Service protection to the Web. Multi-Layered, Multi-Threat Approach Offers Total Protection Integrated, coordinated protection in the cloud, at the gateway, and on the endpoint, combined with Trend Micro s industry-leading messaging security capabilities, provides multi-layered, multi-threat protection. Dynamic. Delivers optimum Web security by analyzing the reputation of the source as well as the content being accessed. Multi threat. Provides comprehensive protection by combining antivirus, anti-spyware, anti-phishing and anti-spam. Multi layer. Maximizes protection with multiple techniques including Web reputation, URL filtering, and HTTP traffic scanning applied as appropriate within multiple network layers. Integrated. Coordinates defences for malware detection, infection removal, and cleaning. Threats SPYWARE BOTNET HTTP Internet HTTP HTTP HTTP PHISHING VIRUSES Gateway Endpoint Anti-Spyware Anti-Spam Antivirus Anti-Phishing Web Filtering Off Network

Total Web Threat Protection Trend Micro s total Web threat protection enables the sharing of critical intelligence for Web threats between layers of protection, as well as providing centralized cleaning and recovery services. This comprehensive protection is complemented by the intelligence gathering, sample sourcing, mitigation, and prevention efforts of TrendLabs sm. Uniquely positioned to address Web threats through its network of regional centers worldwide, TrendLabs draws on the collective expertise of more than 800 dedicated engineers, 24x7 operations, and our threat prevention network. Anti-Phishing Protects Against Malicious Activities Trend Micro anti-phishing security offers a comprehensive approach to preventing identity theft and protecting your confidential business information. Block malicious websites. Stops users from unintentionally visiting phishing sites using both Web reputation and URL filtering. Stops phishing emails. Blocks email from known phishing sources at the IP-connection layer before it enters the network. Filters messaging traffic. Stops malicious, phishing-related email at the messaging gateway and mail servers. Prevents data theft. Protects credit card and bank account numbers, usernames, passwords, and other private data. ANTI-PHISHING Anti-Spyware Detects and Blocks Unwanted Transmissions Trend Micro solutions block incoming spyware, rootkits and bots that may evade traditional detection methods. Innovative technology protects outbound data from being collected by spyware. Plus, it prevents your users from browsing websites that install tracking software. If spyware is already installed, it automatically cleans the infected systems. Stops spyware at multiple layers. Delivers end-to-end spyware protection from the Web gateway to endpoints. Blocks websites known for spyware. Prevents users from browsing websites known to harbor malicious spyware based on both domain reputation and URL filtering. Blocks outbound communication. Stops spyware that tries to phone home, preventing the transmission of private data to disreputable sites. Prevents drive-by spyware downloads. Screens Web pages as users browse and blocks drive-by spyware installations. ANTI-SPYWARE URL and Content Filtering Blocks Inappropriate Content Trend Micro URL filtering security enables you to manage your employees Internet use and block offensive or non-work related websites. By restricting content, you can improve network performance, reduce legal liability, and increase employee productivity. Manages employee Internet use. Enables you to set Web-use policies for the company, groups, or individuals. Offers flexible filtering options. Filters by category, time, day, bandwidth, keywords, file name, true file types, and more. Filters incoming and outgoing content. Blocks inappropriate content from entering your network and prevents sensitive data from going out. Categorizes websites in real time. Employs dynamic rating technology to categorize websites while users browse. WEB FILTERING

Award-Winning Antivirus Provides Real-time Protection Trend Micro antivirus security guards every entry point in your network from the Internet gateway and network perimeter to mail and file servers, desktops, and laptops. Proven malware protection blocks viruses, worms, and Trojans by using signatures, heuristics, and other innovative technologies. Blocks virus-laden websites. Prevents connections based on the reputation of the domain, preventing both the initial download and update of malware. Blocks Web-mail malware. Minimizes the impact of Web threats that attempt to enter embedded in HTTP traffic. Stops zero-day threats in their tracks. Monitors your network in real-time to detect and block suspicious activity before an attack can gain momentum. Blocks malicious mobile code. Screens Web pages for malware hidden in applets, ActiveX, JavaScript, and vbscript. Stops network worms. Runs inline network and host-based scans to detect and block worms and botnets. Web Reputation Protects Against Malicious Sources Trend Micro s new Web reputation protects you against zero-day attacks before they enter your network. By tracking hundreds of millions of domains and providing continuous updates and live reputation feeds, Trend Micro assesses the trustworthiness of a website based on an analysis of the domain. Protects from zero-day attacks. Protection is based on the trustworthiness of the website and not on actual content, preventing the initial download of malware. Combats phishing and URL hijacking. Stops users from accessing potentially fraudulent websites based on the domain reputation. Blocks malware-driven connections. Halts communication from spyware or malware performing a call home attempt to transmit data or to upload malicious code, based on the reputation of the destination domain. Enhances spam protection. URLs included in spam messages are screened to help classify email as spam. ANTIVIRUS WEB REPUTATION Anti-Spam Blocks Web Threats That Arrive Through Email Trend Micro s anti-spam security helps prevent spam from consuming network resources and wasting your employees valuable time. This solution has evolved to combat blended attacks, often initiated by spam, by combining machine learning, pattern recognition, heuristics, blacklists, and whitelists for better detection. Blocks spam before it reaches the gateway. Stops spam by checking IP addresses against the largest database of known spammers. Validates embedded hyperlinks. Strengthens defenses by filtering and blocking email containing malicious URLs. Stops spam in real time. Uses dynamic reputation analysis to detect and block spam from botnets or spam servers. Enables customization. Gives you the flexibility to customize policy and spam tolerance levels for groups or individuals. Centralized Policy and Cleanup Minimize Damage Trend Micro centralized management enables administrators to coordinate policy actions and cleanup across multiple Trend Micro products and services. Confines outbreaks. Isolates infected network segments before threats can spread. Enforces security compliance. Ensures devices have up-to-date security and critical security patches before accessing the network. Automates damage cleanup. Removes malware and remnants from endpoints, including guest devices and servers. Reduces IT burden. Delivers scheduled and real-time reports, providing a single view of activity. ANTI-SPAM

Web Threat Security Solutions HOME, HOME OFFICE, AND SMALL BUSINESS Trend Micro Internet Security Trend Micro s total Web threat protection is a comprehensive, multilayered solution that protects enterprises, small and medium businesses, and consumers against a broad array of Web threats. At the Internet gateway, software and appliances provide file checking and behavior analysis to correlate malicious activities. Endpoint products provide access control and scanning. Comprehensively safeguards your computers, home network and personal identity with integrated URL Filtering, Web Reputation and firewall. TrendProtect Browser plug-in continuously protects consumers against unwanted Web content and hidden Web threats on a website or on individual Web pages based on multiple criteria. TrendSecure A suite of online security tools that is constantly updated and expanded to provide powerful and effective protection from viruses and other Web threats. ENTERPRISE AND MEDIUM BUSINESS OfficeScan Client/Server Edition Protects enterprise networks and roaming users from Web threats. Enables coordinated security policy and automatic updates on every client and server. InterScan VirusWall All-in-one Web and messaging gateway security software for medium businesses effectively cleans emails and Web traffic and restricts access to unwanted websites InterScan Messaging Security Solutions Available in software, appliance, and hosted services, these messaging security solutions offer integrated protection against all email threats and inappropriate content. NeatSuite Fully integrated, centrally managed security suite delivers multilayered, multi-threat protection at the gateway, mail servers, files servers, and endpoints. InterScan Gateway Security Appliance All-in-one Web and messaging gateway security appliance offers medium businesses the most complete defense against spam and Web threats. InterScan Web Security Solutions Available in software or an appliance, these Web security solutions scan, block, and clean Web threats at the enterprise gateway.* *requires Damage Cleanup Service (DCS) InterScan WebProtect for ISA Installed on the same server as Microsoft Internet Security and Acceleration Server (ISA), this solution tightly integrates with ISA to protect against Web threats. Damage Cleanup Services Agent-less client remediation removes spyware, worms, virus remnants, and Trojans, and repairs system registries and memory on clients and servers. Trend Micro Incorporated is a pioneer in secure content and threat management. Founded in 1988, Trend Micro provides individuals and organizations of all sizes with award-winning security software, hardware, and services. With headquarters in Tokyo and operations in more than 30 countries, Trend Micro solutions are sold through corporate and value-added resellers and service providers worldwide. For additional information and evaluation copies of Trend Micro products and services, visit our website at www.trendmicro.com. Trend Micro Inc. 10101 N. De Anza Blvd. Cupertino, CA, 95014, USA Toll free: 1+800-228-5651 Phone: 1+408-257-1500 Fax: 1+408-257-2003 2007 by Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, InterScan, NeatSuite, OfficeScan, Trend Micro Internet Security, VirusWall, WebProtect, and TrendLabs are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their owners. Information contained in this document is subject to change without notice.