Endpoint protection for physical and virtual desktops

Similar documents
Endpoint protection for physical and virtual desktops

IBM Endpoint Manager for Core Protection

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Symantec Endpoint Protection

Superior protection from Internet threats and control over unsafe web usage

Symantec Endpoint Protection

Trend Micro OfficeScan 10.6 SP3 System Requirements

Total Defense Endpoint Premium r12

Symantec Endpoint Protection Datasheet

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

overview Enterprise Security Solutions

Trend Micro OfficeScan 11.0 System Requirements

Trend Micro OfficeScan 10.6 SP2 System Requirements

Trend Micro OfficeScan 10.6 System Requirements

Symantec Protection Suite Small Business Edition

Symantec Protection Suite Small Business Edition

Patch Management SoftwareTechnical Specs

CA Anti-Virus r8.1. Benefits. Overview. CA Advantage

OVERVIEW. Enterprise Security Solutions

overview Enterprise Security Solutions

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

PROTECTION SERVICE FOR BUSINESS WELCOME TO THE BUSINESS OF FREEDOM

McAfee Server Security

Redefining Endpoint Security: Symantec Endpoint Protection Russ Jensen

McAfee Endpoint Protection Products

Devising a Server Protection Strategy with Trend Micro

CA Host-Based Intrusion Prevention System r8.1

Devising a Server Protection Strategy with Trend Micro

Kaseya IT Automation Framework

Worry-FreeTM. Business Security Standard and Advanced Editions. System Requirements. Administrator s Guide. Securing Your Journey to the Cloud8

INFORMATION PROTECTED

Comprehensive security platform for physical, virtual, and cloud servers

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Kaspersky Endpoint Security 10 for Windows. Deployment guide

How To Protect Your Cloud From Attack

STPIC/Admin/002/ / Date: Sub: Quotation for purchase/renewal of Anti Virus Software Reg.

Core Protection for Virtual Machines 1

Trend Micro OfficeScan Best Practice Guide for Malware



VIRTUALIZATION SECURITY IN THE REAL WORLD

BITDEFENDER ENDPOINT SECURITY TOOLS

Trend Micro Incorporated Research Paper Adding Android and Mac OS X Malware to the APT Toolbox

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

Endpoint Security Solutions (Physical & VDI Environment) Comparative Testing Analysis

VDI Security for Better Protection and Performance

Symantec Endpoint Protection

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection

Microsoft Windows Intune: Cloud-based solution


Secure Your Mobile Workplace

Symantec Endpoint Protection

IBM Endpoint Manager Product Introduction and Overview

A+ Practical Applications Solution Key

Symantec Endpoint Protection Small Business Edition Getting Started Guide

Proven LANDesk Solutions

How To Protect A Virtual Desktop From Attack

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

Trend Micro OfficeScan 11.0 SP1. Best Practice Guide for Malware

How To Protect Your Computer From A Malicious Virus

What We Do: Simplify Enterprise Mobility

Malware and Other Malicious Threats

Risk and threats everywhere, all the time

Symantec Backup Exec.cloud

WHITE PAPER. Mobile Security. Top Five Security Threats for the Mobile Enterprise and How to Address Them

Reducing the cost and complexity of endpoint management

Best Practice Configurations for OfficeScan (OSCE) 10.6

Dell Enterprise Mobility Management

IBM Tivoli Endpoint Manager for Security and Compliance

ORACLE VIRTUAL DESKTOP INFRASTRUCTURE

Cisco Advanced Malware Protection for Endpoints

Protecting the Irreplacable. November 2013 Athens Ian Whiteside, F-Secure

The ForeScout Difference

Kaspersky Security for Business

KASPERSKY SECURITY FOR BUSINESS

Symantec Mobile Security

Virtualization Journey Stages

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments

IBM Endpoint Manager for Mobile Devices

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

ForeScout MDM Enterprise

EndUser Protection. Peter Skondro. Sophos

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Desktop Virtualization in the Educational Environment

Endpoint Protection Small Business Edition 2013?

Endpoint Security for DeltaV Systems

Protecting Content and Securing the Organization Through Smarter Endpoint Choices

Kaspersky Endpoint Security 8 for Windows and Kaspersky Security Center

Symantec Endpoint Protection

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Transcription:

datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become a costly juggling act for IT managers. With mobile devices and cloud computing, protection your data from loss or theft is top of mind. Add to that the performance issues associated with trying to apply traditional security to virtual desktop infrastructures and it s clear, IT needs a flexible endpoint security platform that will adapt to changing needs with a light and lean architecture geared for performance. Trend Micro OfficeScan endpoint security delivers real-time protection against the latest threats, in a light and lean client optimized for physical and virtual endpoint deployments. OfficeScan enhances your endpoint protection with cloud-based global threat intelligence, integrated data loss prevention (DLP) and virtualization-aware client that reduces the endpoint footprint, protects sensitive data, and improves endpoint performance across the enterprise. By providing an architecture that supports the easy application of additional protection as it s needed, OfficeScan broadens the flexibility of IT management, enabling the immediate deployment of data protection, mobile device and app management. With OfficeScan endpoint security you can add additional protection as you need it without having to roll out additional management or client infrastructure. Protection Points Data loss prevention Macintosh computers Mobile devices Physical endpoints Virtualized endpoints Windows PCs Threat Protection Anti-rootkit Antispyware Antivirus Firewall Host intrusion prevention Vulnerability shielding Web threat protection Virtualized endpoints Windows PCs Superior malware protection: Protects endpoints, on or off the corporate network, against viruses, Trojans, worms, spyware, and new variants as they emerge Easy to deploy and manage: Centralizes management capabilities, for heightened visibility and greater control Security optimized for virtual desktop infrastructures (VDI): Isolate control of desktop environments, streamline management, and consolidate and extend the life of existing hardware Virtual patching against zero-day threats: Shield vulnerabilities before they can be exploited, saving the cost of emergency patching Extensible architecture: Leverage flexible architecture to add security services as needed, and, apply future updates, without having to redeploy the entire solution Integrated Data Loss Prevention: Protect your private data with this optional plug-in module by securing the two most common vectors for accidental and intentional data leaks: USB devices and email Integrated Mobile Security: Optional add-on provides mobile device management, anti-malware and app management to protect data across smartphones and tablets from a single management console Page 1 of 6 datasheet officescan

advantages Secure data on physical and virtual desktops from a central management platform OfficeScan endpoint security makes it possible to keep up with the growing number of attacks on any mobile device or endpoint including virtual desktops, while delivering full visibility from a single console that integrates with your existing endpoint infrastructure. Reduces the burden of client updates, decreases agent footprint and minimizes performance impact Queries up-to-the-second data on the safety of a file or Web page before it s accessed Secures endpoints, on or off the corporate network, as new threats emerge Shields against vulnerabilities from zero-day threats via virtual patching Improves web performance and privacy by synchronizing with a local server Detects and removes active and hidden rootkits Safeguards endpoint mail boxes by scanning POP3 email and Outlook folders for threats Identifies and blocks botnet and targeted attack Command and Control (C&C) communications using global and local threat intelligence Key Benefits Recognizes if an agent is on a physical or virtual endpoint for optimum targeting Offers integrated plug-in architecture, quick updates and instant deployments when needed Prevents network, CPU, and storage conflicts by serializing scan and updates per virtual server Provides virtual patching capabilities for quicker, more secure fixes Reduces scan times of virtual desktops by white-listing images and previously scanned content Light and lean cloud-client architecture increases performance to boost productivity Enable Consumerization and BYOD without compromising security posture Offered as a plug-in for OfficeScan, Trend Micro Mobile Security is an integrated mobile device, security and mobile app management solution that can be deployed and managed from your existing OfficeScan infrastructure to help you manage BYOD. Centralizes management capabilities, for heightened visibility and greater control Protects sensitive data on smartphones and tablets by enforcing use of passwords and encryption, enforcing app restrictions, and remotely locking and wiping lost or stolen devices Reduces helpdesk and IT costs by simplifying device provisioning and management Integrates with Active Directory to synchronize endpoint data and report on policy compliance Empowers IT to restrict the use of USB drives, CD/DVD writers, and other removable media Offers granular device control, including the ability to create specific rules based on make and serial number of the device Educates employees on corporate data usage policies through alerts, blocking and reporting OfficeScan is available as a product, or as a component of these enterprise security suites: Enterprise Security Suite Enterprise Security for Endpoints and Mail Servers Enterprise Security for Endpoints Page 2 of 6 datasheet officescan

CUSTOMIZE YOUR ENDPOINT PROTECTION Expand your existing Trend Micro endpoint security with optional plug-in modules Data Loss Prevention Plug-In Module Protect your sensitive data with the Data Loss Prevention plug-in, for maximum visibility and control. Protects private data on or off network Advanced device control capability protects against data leaks via USB drives and other media Covers the broadest range of devices, applications, and file types Detects data-stealing malware and mitigates risky behavior Aids compliance with greater visibility and enforcement Mobile Security Plug-In Module Secure and manage corporate and employee-owned mobile devices. Supports policies for data access and protection by enforcing the use of passwords, encrypting data, and remotely removing data from lost or stolen devices Ensures the proper device configurations and adds protections to prevent malware and reduce the risk of compromised devices Saves time and money with centralized visibility and control of device management and security, along with the ability for end users to select consumer-grade devices at corporate discount prices Security for Mac Plug-In Module Provide a layer of protection for Apple Mac clients on your network by preventing them from accessing malicious sites and distributing malware even if the malware is not targeted at Mac OS X. Reduces exposure to web-based threats, including fast-spreading Mac-targeting malware such as Flashback Adheres to Mac OS X look and feel for positive user experience Saves time and effort with centralized management across endpoints, including Macs Security Optimized for Virtual Desktop Infrastructures Extends consistent protection from your physical desktops to virtual desktops. You ll get security consolidated into a single, optimized in-guest agent for the highest security and portability at the virtual desktop. Serialized VDI security to prevent resource contention Protection that cleans, scans memory, and monitors behavior Base-image awareness to scan faster, save resources, and improve performance Intrusion Defense Firewall Module Supplement OfficeScan client-level security with network-level Host Intrusion Prevention System (HIPS) for virtual patching. Virtually patch vulnerabilities in operating systems and client applications to block threats until patches are deployed Windows 8 support planned for Q1 2013 Page 3 of 6 datasheet officescan

PRODUCT & OPERATING SYSTEM VIRTUALIZATION SUPPORT CPU memory disk space OfficeScan Server for: Microsoft Server, R2, 2003, 2003 R2; Microsoft Windows Storage Server, R2, 2003, 2003 R2; Windows Compute Cluster Server 2003; Windows HPC Server Microsoft Virtual Server 2005 R2 with SP1 Microsoft Windows Server R2, with Hyper-V VMware vsphere 4 VMware ESXi Server 4 VMware Server 2 VMware Workstation and Workstation ACE Edition 7 1.86GHz Intel Core 2 Duo 3.5GB of space Server, R2; Windows Storage Server, R2; Windows HPC Server Microsoft Windows Server, Server 2GHz Intel for 32 bit 3.5GB of space 8 32-bit with SP1 VMware ESX/ESXi Server 3.5, 4.0, 4.1, 5.0, 5.1 Workstation ACE Edition 7.0, 7.1, 8.0, 9.0, 5.0, 5.1. 5.0, 5.1, 6.5, 6.0, 5.5 1GHz Intel 2GHz recommended 1GB minimum with at least 100MB exclusively for OfficeScan client. 2GB recommended 350MB minimum 8 64-bit with SP1 Microsoft Windows Server 64-bit Hyper-V Microsoft Windows R2 64-bit Hyper-V Microsoft Hyper-V Server R2 64-bit VMware ESX/ESXi Server 3.5, 4.0, 4.1, 5.0, 5.1 Workstation ACE Edition 7.0, 7.1, 8.0, 9.0, 5.0, 5.1. 5.0, 5.1, 6.5, 6.0, 5.5 2GHz Intel 1.5GB minimum with at least 100MB exclusively for OfficeScan client. 2GB recommended 350MB minimum Page 4 of 6 datasheet officescan

PRODUCT & OPERATING SYSTEM VIRTUALIZATION SUPPORT CPU memory disk space 7 Microsoft Windows Server, Server 1GHz Intel Vista Microsoft Windows Server, Server 1GHz Intel 1.5GB of RAM XP Microsoft Windows Server, Server 300MHz Intel 512MB of RAM Page 5 of 6 datasheet officescan

PRODUCT & OPERATING SYSTEM VIRTUALIZATION SUPPORT CPU memory disk space Embedded POSReady 2009 512MB of RAM Microsoft Windows Server, Server 300MHz Intel 512MB of RAM Web-based Management Console 300MHz Intel 128MB of RAM 30MB of Securing Your Journey to the Cloud 2013 by Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, and OfficeScan are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their owners. Information contained in this document is subject to change without notice. [DS01_OfficeScan_C&C_130618US] Page 6 of 6 datasheet officescan