Trend Micro. Advanced Security Built for the Cloud



Similar documents
ADVANCED PERSISTENT THREATS AND OTHER ADVANCED ATTACKS:

Payment Card Industry (PCI) Data Security Standard Approved Scanning Vendors

EMC VSPEX PRIVATE CLOUD

PCI DSS Virtualization Guidelines. Information Supplement: PCI Data Security Standard (PCI DSS) Version: 2.0 Date: June 2011

How AWS Pricing Works May 2015

Domain Time II. Time Synchronization Software Suite Precise Time Synchronization for the Entire Enterprise

Guide to Security for Full Virtualization Technologies

Public or Private Cloud: The Choice is Yours

PROACTIVE ASSET MANAGEMENT

An architectural blueprint for autonomic computing.

How To Protect Your Cardholder Data From Fraud

ORACLE HEALTH SCIENCES INFORM: COMPREHENSIVE CLINICAL DATA CAPTURE AND MANAGEMENT CLOUD

Server Management with Lenovo ThinkServer System Manager

Out-of-Band Security Solution // Solutions Overview

Business Management Made Simpler

Achieving Intel Transformation through IT Innovation

What s New in the VMware vsphere 6.0 Platform

Architectural Overview

How Do Threat Actors Move Deeper Into Your Network?

VMware vsphere with Operations Management and VMware vsphere

How To Protect Your Network From Attack From A Network Firewall

See What's Coming in Oracle Service Cloud

EOS: The Next Generation Extensible Operating System

Web Scale IT in the Enterprise

lights-out testing for end-to-end business process validation What It Is and Why You Need It.

FEDERAL CLOUD COMPUTING STRATEGY. Vivek Kundra U.S. Chief Information Officer

How To Use A Cloud Service From Org.Org'S Enterprise Manager 12C

Solutions Guide for Data-At-Rest

Who s Really Attacking Your ICS Equipment?

Transcription:

datasheet Trend Micro deep security as a service Advanced Security Built for the Cloud Organizations are embracing the economic and operational benefits of cloud computing, turning to leading cloud providers including Amazon Web Services, Microsoft Azure, VMware vcloud and others. To ensure an end-to-end secure computing environment, cloud providers employ a shared security responsibility model with their customers. While the cloud provider delivers secure facilities and processes, it is up to organizations to protect their cloud workloads, including operating systems, applications, and data. Built on Trend Micro s industry leading cloud and data center security solution, Trend Micro Deep Security as a Service is designed specifically to complement cloud provider security so that organizations can be fully protected and worry free. The Deep Security service provides a complete suite of security capabilities including firewall, intrusion detection and prevention, anti-malware, integrity monitoring, log inspection, and web reputation. Deep Security as a Service was developed specifically for securing cloud workloads. This highly optimized security offering is cloud based for quick setup and automates and simplifies security operations for cloud instances. Deep Security as a Service is elastic, dynamic and flexible all characteristics necessary to enable organizations to fully exploit the benefits of cloud computing while remaining protected. Key Benefits Deep Security as a Service Security and compliance with a broad set of recommended security capabilities for the deployment of AWS instances Fast deployment from the cloud reduces setup time and eliminates hardware Minimal change to deployment with support for leading cloud deployment tools Lowered risk with instances automatically recognized and secured upon their launch Easy management from an integrated console with customizable policy rules and templates Built on proven technology selected by thousands of customers to secure millions of servers Maximize Operational Cost Reductions Avoids setup and hardware costs by hosting on leading cloud provider platforms Saves the effort to deploy and manage disparate products with a single suite of security capabilities Reduces administrative workload with automatic recognition of new instances Provides vulnerability protection to prioritize secure coding and cost-effective implementation of unscheduled patching Reduces management costs by automating repetitive and resource intensive security tasks, reducing false positive security alerts, and enabling workflow of security incident response Prevent Data Breaches and Business Disruptions Detects and removes malware in real time with minimal performance impact Blocks malware that attempts to evade detection by uninstalling or otherwise disrupting the security program Reduces exposure to attack by ensuring cloud servers are only communicating with expected systems Shields known and unknown vulnerabilities Detects and alerts suspicious or malicious activity to trigger proactive, preventive actions Leverages the web reputation capabilities by controlling server communication at the domain level Achieve Cost-Effective Compliance Addresses major compliance requirements for PCI DSS 2.0, as well as HIPAA, NIST, and SAS 70 with one integrated and cost-effective solution Provides detailed, auditable reports that document prevented attacks and policy compliance status Reduces the preparation time and effort required to support audits Supports internal compliance initiatives to increase visibility of internal network activity Leverages proven technology certified to Common Critera EAL4+ Page 1 of 4 datasheet deep security as a service

key features Anti-Malware Optimizes security operations to avoid antivirus storms commonly seen in full system scans and pattern updates Tamper-proofs security from sophisticated attacks in virtual environments by isolating malware from anti-malware Integrity Monitoring Monitors and tracks both authorized and unauthorized changes made to an instance and detects and reports malicious and unexpected changes in real time Reduces administrative overhead with trusted event tagging that automatically replicates actions for similar events Web Reputation Integrates with Trend Micro Smart Protection Network for web reputation capabilities to reduce the risk of communicating with compromised domain servers Intrusion Detection and Prevention Protects against known and zero-day attacks by shielding known vulnerabilities from unlimited exploits Examines all incoming and outgoing traffic for protocol deviations, policy violations, or content that signals an attack Automatically shields newly discovered vulnerabilities from attack with auto-updating security policies Assists compliance (PCI DSS 6.6) to protect web applications and the data they process Defends against SQL injection, cross-site scripting, and other web application vulnerabilities Shields against vulnerabilities until code fixes can be completed Includes out-of-the-box vulnerability protection for all major operating systems and over 100 applications, including database, web, email, and FTP servers Provides increased visibility into, or control over applications accessing the network Bidirectional Stateful Firewall Decreases the attack surface of each cloud server by creating a firewall perimeter to block attacks and limit communication to only the ports and protocols necessary Centrally manages server firewall policy, including templates for common server types Prevents denial-of-service attacks and detects reconnaissance scans Log Inspection Collects and analyzes operating system and application logs for suspicious behavior, security events, and administrative events across your cloud instances Assists compliance (PCI DSS 10.6) to optimize the identification of important security events buried in multiple log entries Forwards events to SIEM system or centralized logging server for correlation, reporting, and archiving Clear Control at Your Fingertips Enables policy-driven management and administration Customizable dashboard enables users to see the health of their security environment at a glance Customizable policy templates allow users to enable and disable security controls on the fly based on rules they assigned Provides users with immediate notification of events or activities that may require their immediate attention (Logging Alert) Page 2 of 4 datasheet deep security as a service

cloud Instances deep security as a service integrated Dashboard Alerts Reports Administrator Deep Security Agent Elastic, Seamless and Stress-Free Designed to seamlessly integrate with cloud infrastructure security controls, making it fast and easy for users to get up and running in minutes Works seamlessly with industry-leading cloud management tools such as Chef, Puppet, Rightscale and others Enables cloud instances to be immediately secured regardless of the deployment method (Active Protection) The AutoSync feature detects new instances and provides detailed information that can be used to automatically set security policy without administrative intervention Built for Security in the Cloud Trend Micro Deep Security as a Service is optimized for leading cloud providers infrastructures, including support of the most common instance types: And compatibility with cloud management tools: Deep Security as a Service Helps You Resolve Key Business Issues Virtual Patching Shield vulnerabilities before they can be exploited and eliminate the operational pains of emergency patching, frequent patch cycles, and costly system downtime Zero-Day Security Protection against zero-day malware while minimizing operational impact from resource inefficiencies and emergency patching Compliance Achieve and prove compliance to a number of regulatory requirements including PCI DSS 2.0, FIPAA, FISMA/NIST, NERC, SAS 70 and more Integrated Security Consolidate all security point products into one comprehensive platform that optimizes protection across all cloud instances Page 3 of 4 datasheet deep security as a service

Supported Platforms Microsoft Windows (32/64 bit) Amazon Linux AMI (32/64 bit) Ubuntu (64 bit) Red Hat Enterprise 4, 5, 6 (32-bit/64-bit) 1 SUSE Enterprise 10, 11 (32-bit/64-bit) 1 Deep Security as a Service fits how enterprises use the cloud Customers can deploy in the cloud with the investment model that is consistent with how they purchase cloud services paying on-demand with a credit card within the application, or for reserved instance security, via the Trend Micro sales channel. Flexible Pricing to Meet Cloud Needs Deep Security as a Service provides flexible pricing to reflect how you use the cloud. You can pay only for what you use with a simple per hour rate for securing your cloud instances. There is no minimum fee. Billing is monthly via credit card. Key Certifications and Alliances Common Criteria EAL 4+ PCI Suitability Testing for HIPS (Nss Labs) Visualization by VMware Microsoft Application Protection Program Microsoft Certified Partnership Oracle Partnership HP Business Partnership Certified Red Hat Ready Certification for CSPs Trend Ready for Cloud Service Providers is a global testing program designed for Cloud Service Providers (CSPs) to prove interoperability with industry-leading cloud security solutions from Trend Micro. You can also purchase as an annual-per-server subscription. For this and other purchasing options, please contact your Trend Micro sales representative or reseller, or contact us at 1-877-218-7363. Special Pricing for AWS Deep Security as a Service also introduces special pricing for Amazon Web Services that delivers unprecedented value and that reflects how you use AWS. Not only do you pay only for what you use without minimum fees, your costs are based on EC2 instance pricing. With Deep Security as a Service, you only pay for security you use at a rate of 20% of the EC2 price for the instances you are protecting. For example: Securing a Small Instance costs 20% of the current AWS EC2 price (for example, $0.060 per hour) for a cost of $0.012 per hour. Securing an Extra Large Instance costs 20% of the current AWS EC2 price (for example, $0.480 per hour) for a cost of $0.096 per hour. This AWS special pricing requires the use of the Deep Security AWS Connector to detect AWS instance types. Otherwise charges of $0.10 per hour will apply. Pricing is based on Linux, On-Demand Instance price in the US East (N. Virginia) data center. This assures you the lowest cost regardless of what O/S or Region you actually use. As EC2 Pricing changes, your costs will automatically be updated! Or if you would like to manage Deep Security yourself, you can purchase our software version directly on AWS Marketplace. Securing Your Journey to the Cloud 2014 by Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, and Smart Protection Network are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their owners. Information contained in this document is subject to change without notice. [DS03_DSaaS_141121US] Page 4 of 4 datasheet deep security as a service