Endpoint protection for physical and virtual desktops

Similar documents
Endpoint protection for physical and virtual desktops

IBM Endpoint Manager for Core Protection

Superior protection from Internet threats and control over unsafe web usage

Symantec Endpoint Protection

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Symantec Endpoint Protection Datasheet

Symantec Protection Suite Small Business Edition

Symantec Protection Suite Small Business Edition

overview Enterprise Security Solutions

Trend Micro OfficeScan 10.6 SP3 System Requirements

Symantec Protection Suite Small Business Edition

overview Enterprise Security Solutions

Trend Micro OfficeScan 11.0 System Requirements

Total Defense Endpoint Premium r12

CA Host-Based Intrusion Prevention System r8.1

Trend Micro OfficeScan 10.6 System Requirements

Trend Micro OfficeScan 10.6 SP2 System Requirements

OVERVIEW. Enterprise Security Solutions

PROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM

McAfee Server Security

OVERVIEW. Enterprise Security Solutions

for businesses with more than 25 seats

How To Protect Your Cloud From Attack

Devising a Server Protection Strategy with Trend Micro

Devising a Server Protection Strategy with Trend Micro

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

STPIC/Admin/002/ / Date: Sub: Quotation for purchase/renewal of Anti Virus Software Reg.

Comprehensive security platform for physical, virtual, and cloud servers

Symantec Endpoint Protection

CA Anti-Virus r8.1. Benefits. Overview. CA Advantage

INFORMATION PROTECTED

When Desktops Go Virtual

Symantec Endpoint Protection

Symantec Endpoint Protection

Kaseya IT Automation Framework

Redefining Endpoint Security: Symantec Endpoint Protection Russ Jensen

Worry-FreeTM. Business Security Standard and Advanced Editions. System Requirements. Administrator s Guide. Securing Your Journey to the Cloud8

Patch Management SoftwareTechnical Specs

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Proven LANDesk Solutions

Virtualization Journey Stages

Information Security Recommendation Report

VDI Security for Better Protection and Performance

Secure Your Mobile Workplace

SECURING TODAY S MOBILE WORKFORCE

For Businesses with more than 25 seats.

How To Protect Your Computer From A Malicious Virus

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Endpoint Protection Small Business Edition 2013?

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

Symantec Endpoint Protection

Malware and Other Malicious Threats



Microsoft Windows Intune: Cloud-based solution

Symantec Endpoint Protection Small Business Edition Getting Started Guide


Protecting the Irreplacable. November 2013 Athens Ian Whiteside, F-Secure

Kaspersky Endpoint Security 8 for Windows and Kaspersky Security Center

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

Kaspersky Security for Business

Trend Micro OfficeScan Best Practice Guide for Malware

KASPERSKY SECURITY FOR BUSINESS

BITDEFENDER ENDPOINT SECURITY TOOLS

Total Cloud Protection

Symantec Mobile Security

Reducing the cost and complexity of endpoint management

Core Protection for Virtual Machines 1

When Desktops Go Virtual

McAfee Endpoint Protection Products

Seven for 7: Best practices for implementing Windows 7

Trend Micro Incorporated Research Paper Adding Android and Mac OS X Malware to the APT Toolbox

IBM Tivoli Endpoint Manager for Security and Compliance

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Risk and threats everywhere, all the time

Symantec Backup Exec.cloud

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

VIRTUALIZATION SECURITY IN THE REAL WORLD

A number of factors contribute to the diminished regard for security:

Getting Started with Symantec Endpoint Protection

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

The ForeScout Difference

How To Protect A Virtual Desktop From Attack

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection

Protecting Content and Securing the Organization Through Smarter Endpoint Choices

Cloud and Data Center Security

Symantec Endpoint Security Management Solutions Presentation and Demo for:

Symantec Endpoint Protection Getting Started Guide

A number of factors contribute to the diminished regard for security:

avast! Business products 2014 Introducing the new features and technologies in the latest lineup of avast! security solutions for business.

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Dell Enterprise Mobility Management

ForeScout MDM Enterprise

OfficeScanTM 10 For Enterprise and Medium Business

V1.4. Spambrella Continuity SaaS. August 2

Transcription:

datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become a costly juggling act for IT managers. With mobile devices and cloud computing, protection your data from loss or theft is top of mind. Add to that the performance issues associated with trying to apply traditional security to virtual desktop infrastructures and it s clear, IT needs a flexible endpoint security platform that will adapt to changing needs with a light and lean architecture geared for performance. Trend Micro OfficeScan endpoint security delivers real-time protection against the latest threats, in a light and lean client optimized for physical and virtual endpoint deployments. OfficeScan enhances your endpoint protection with cloud-based global threat intelligence, integrated data loss prevention (DLP), and a virtualization-aware client that reduces the endpoint footprint, protects sensitive data, and improves endpoint performance across the enterprise. By providing a modular architecture, OfficeScan allows you to add additional protection as it s needed. Security modules for data protection, Mac, or virtual patching can be immediately deployed without having to roll out additional management or client infrastructure. Protection Points Physical endpoints Virtualized endpoints Windows PCs Macintosh computers Sensitive data Threat Protection Anti-rootkit Antispyware Antivirus Firewall Data loss prevention Host intrusion prevention Vulnerability shielding Web threat protection Superior malware protection: Protects endpoints, on or off the corporate network, against viruses, Trojans, worms, spyware, and new variants as they emerge Easy to deploy and manage: Centralizes management capabilities, for heightened visibility and greater control Security optimized for virtual desktop infrastructures (VDI): Isolate control of desktop environments, streamline management, and consolidate and extend the life of existing hardware Virtual patching against zero-day threats: Shield vulnerabilities before they can be exploited, saving the cost of emergency patching Extensible architecture: Leverage flexible architecture to add security services as needed, and, apply future updates, without having to redeploy the entire solution Integrated data loss prevention (DLP): Protect your private data with this optional DLP module that secures the two most common vectors for accidental and intentional data leaks: USB devices and email Centralized Visibility and Control: When deployed with Trend Micro Control Manager, multiple OfficeScan servers can be managed through a single console; other Trend Micro products such as mobile and gateway security can also be integrated with OfficeScan through Control Manager Mobile Security Integration (via Control Manager): Centralize security management and policy deployment across all endpoints, using Control Manager to integrate Trend Micro Mobile Security and OfficeScan; Mobile Security includes mobile device threat protection, mobile app management, mobile device management (MDM), and data protection Page 1 of 6 datasheet officescan

advantages Secure data on physical and virtual desktops from a central management platform OfficeScan endpoint security defends against the growing number of attacks on endpoints, including virtual desktops, while delivering full visibility from a single console that integrates with your existing endpoint infrastructure. Reduces the burden of client updates, decreases agent footprints, and minimizes performance impact Queries up-to-the-second data on the safety of a file or web page before it s accessed Secures endpoints, on or off the corporate network, as new threats emerge Shields against vulnerabilities from zero-day threats via virtual patching Improves web performance and privacy by synchronizing with a local server Detects and removes active and hidden rootkits Safeguards endpoint mail boxes by scanning POP3 email and Outlook folders for threats Identifies and blocks botnet and targeted attack Command and Control (C&C) communications using global and local threat intelligence Key Benefits Recognizes if an agent is on a physical or virtual endpoint for optimum targeting Offers a flexible, modular architecture, quick updates, and instant deployments when needed Prevents network, CPU, and storage conflicts by serializing scan and updates per virtual server Provides virtual patching capabilities for quicker, more secure fixes Reduces scan times of virtual desktops by white-listing images and previously scanned content Light and lean cloud-client architecture increases performance to boost productivity Enable consumerization and BYOD without compromising security When deployed with OfficeScan, Trend Micro Mobile Security extends your endpoint protection to smartphones and tablets enabling centralized management, policy deployment, and visibility of all endpoint security through Trend Micro Control Manager. As a 4-in-1 solution, Trend Micro Mobile Security integrates mobile device antimalware, mobile app management, mobile device management (MDM), and data protection to help you manage BYOD. Centralizes management via Trend Micro Control Manager, for heightened visibility and greater control Protects sensitive data on smartphones and tablets by enforcing use of passwords and encryption, enforcing app restrictions, and remotely locking and wiping lost or stolen devices Reduces helpdesk and IT costs by simplifying device provisioning and management Reduces data loss by providing visibility and control of mobile apps, enabling you to determine which apps employees can use Identifies risky mobile apps by utilizing the cloud-based Trend Micro Mobile Application Reputation Service, enabling IT to set policies restricting app use Integrates with Active Directory to synchronize endpoint data and report on policy compliance Empowers IT to restrict the use of USB drives, CD/DVD writers, and other removable media Offers granular device control, including the ability to create specific rules based on make and serial number of the device Educates employees on corporate data usage policies through alerts, blocking and reporting OfficeScan is available as a product, or as a component of these enterprise security suites: Enterprise Security Suite Enterprise Security for Endpoints and Mail Servers Enterprise Security for Endpoints Page 2 of 6 datasheet officescan

CUSTOMIZE YOUR ENDPOINT PROTECTION Expand your existing Trend Micro endpoint security with optional security modules Data Loss Prevention Module Protect your sensitive data with the Data Loss Prevention (DLP) module, for maximum visibility and control. Protects private data on or off network Advanced device control capability protects against data leaks via USB drives and other media Covers the broadest range of devices, applications, and file types Detects data-stealing malware and mitigates risky behavior Aids compliance with greater visibility and enforcement Security for Mac Module Provide a layer of protection for Apple Mac clients on your network by preventing them from accessing malicious sites and distributing malware even if the malware is not targeted at Mac OS X. Reduces exposure to web-based threats, including fast-spreading Mac-targeting malware such as Flashback Adheres to Mac OS X look and feel for positive user experience Saves time and effort with centralized management across endpoints, including Macs Intrusion Defense Firewall Module Supplement OfficeScan client-level security with network-level Host Intrusion Prevention System (HIPS) for virtual patching. Virtually patch vulnerabilities in operating systems and client applications to block threats until patches are deployed Windows 8 support planned for Q1 2013 Page 3 of 6 datasheet officescan

PRODUCT & OPERATING SYSTEM VIRTUALIZATION SUPPORT CPU memory disk space OfficeScan Server for: Microsoft Server, R2, 2003, 2003 R2; Microsoft Windows Storage Server, R2, 2003, 2003 R2; Windows Compute Cluster Server 2003; Windows HPC Server Microsoft Virtual Server 2005 R2 with SP1 Microsoft Windows Server R2, with Hyper-V VMware vsphere 4 VMware ESXi Server 4 VMware Server 2 VMware Workstation and Workstation ACE Edition 7 1.86GHz Intel Core 2 Duo 3.5GB of space Server, R2; Windows Storage Server, R2; Windows HPC Server Microsoft Windows Server, Server 2GHz Intel for 32 bit 3.5GB of space 8 32-bit with SP1 VMware ESX/ESXi Server 3.5, 4.0, 4.1, 5.0, 5.1 Workstation ACE Edition 7.0, 7.1, 8.0, 9.0, 5.0, 5.1. 5.0, 5.1, 6.5, 6.0, 5.5 1GHz Intel 2GHz recommended 1GB minimum with at least 100MB exclusively for OfficeScan client. 2GB recommended 350MB minimum 8 64-bit with SP1 Microsoft Windows Server 64-bit Hyper-V Microsoft Windows R2 64-bit Hyper-V Microsoft Hyper-V Server R2 64-bit VMware ESX/ESXi Server 3.5, 4.0, 4.1, 5.0, 5.1 Workstation ACE Edition 7.0, 7.1, 8.0, 9.0, 5.0, 5.1. 5.0, 5.1, 6.5, 6.0, 5.5 2GHz Intel 1.5GB minimum with at least 100MB exclusively for OfficeScan client. 2GB recommended 350MB minimum Page 4 of 6 datasheet officescan

PRODUCT & OPERATING SYSTEM VIRTUALIZATION SUPPORT CPU memory disk space 7 Microsoft Windows Server, Server 1GHz Intel Vista Microsoft Windows Server, Server 1GHz Intel 1.5GB of RAM XP Microsoft Windows Server, Server 300MHz Intel 512MB of RAM Page 5 of 6 datasheet officescan

PRODUCT & OPERATING SYSTEM VIRTUALIZATION SUPPORT CPU memory disk space Embedded POSReady 2009 512MB of RAM Microsoft Windows Server, Server 300MHz Intel 512MB of RAM Web-based Management Console 300MHz Intel 128MB of RAM 30MB of Securing Your Journey to the Cloud 2013 by Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, and OfficeScan are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their owners. Information contained in this document is subject to change without notice. [DS02_OfficeScan_C&C_130731US] Page 6 of 6 datasheet officescan