Trend Micro Cloud Security for Citrix CloudPlatform



Similar documents
Trend Micro InterScan Web Security and Citrix NetScaler SDX Platform Overview

Trend Micro. Advanced Security Built for the Cloud

Citrix desktop virtualization and Microsoft System Center 2012: better together

Total Cloud Protection

Citrix Lifecycle Management

How To Protect Your Cloud From Attack

Cloud and Data Center Security

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

Comprehensive security platform for physical, virtual, and cloud servers

Citrix Ready Solutions Brief. CA Single Sign-On and Citrix NetScaler: Quickly Adapt to Your Dynamic Authentication Demands. citrix.

How To Get Cloud Services To Work For You

Windows XP Application Migration Checklist

Cisco and Citrix: Building Application Centric, ADC-enabled Data Centers

Citrix XenServer Industry-leading open source platform for cost-effective cloud, server and desktop virtualization. citrix.com

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Citrix NetScaler and Microsoft SharePoint 2013 Hybrid Deployment Guide

Websense Data Security Gateway and Citrix NetScaler SDX Platform Overview

Building success in the cloud

Cisco and Citrix: Building Application Centric, ADC-enabled Data Centers

Trend Micro deep security 9.6

PCI DSS 3.0 Compliance

The Office Reinvented: Mobile Workspaces are the Future of Work

Microsoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing

Advanced Service Desk Security

Solution Guide for Citrix NetScaler and Cisco APIC EM

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

Data Center Consolidation for Federal Government

SolidFire SF3010 All-SSD storage system with Citrix CloudPlatform Reference Architecture

The falling cost and rising value of desktop virtualization

Design and deliver cloudbased apps and data for flexible, on-demand IT

Staying Ahead of the Hacker Curve Turn-key Web Application Security Solution

Modernize your business with Citrix XenApp 7.6

Optimizing service assurance for XenServer virtual infrastructures with Xangati

Secure SSL, Fast SSL

RSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview

Desktop virtualization for all

Solutions Guide. Deploying Citrix NetScaler for Global Server Load Balancing of Microsoft Lync citrix.com

Guide to Deploying Microsoft Exchange 2013 with Citrix NetScaler

Solutions Brief. Citrix Solutions for Healthcare and HIPAA Compliance. citrix.com/healthcare

Citrix Solutions. Overview

Safeguard Protected Health Information With Citrix ShareFile

Microsoft SharePoint 2013 with Citrix NetScaler

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Desktop virtualization for all

Deploying NetScaler Gateway in ICA Proxy Mode

Securing Outlook Web Access (OWA) 2013 with NetScaler AppFirewall

Provisioning ShareFile on Microsoft Azure Storage

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

How To Use Netscaler As An Afs Proxy

Citrix Support and Maintenance Services

Powering Real-Time Mobile Access to Critical Information With Citrix ShareFile

Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard

Fullerton India enhances its employee productivity and efficiency with Citrix XenDesktop

Taking Windows Mobile on Any Device

Run Skype for Business as a Secure Virtual App with a Great User Experience

Maximizing Flexibility and Productivity for Mobile MacBook Users

The top 5 truths behind what the cloud is not

Citrix ShareFile Enterprise: a technical overview citrix.com

Top Three Reasons to Deliver Web Apps with App Virtualization

Enterprise- Grade MDM

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Mobility and cloud transform access and delivery of apps, desktops and data

Enabling mobile workstyles with an end-to-end enterprise mobility management solution.

Securing virtual desktop infrastructure with Citrix NetScaler

BlueCat Networks Adonis and Proteus on Citrix NetScaler SDX Platform Overview

How To Buy Nitro Security

Mobilize with Enterprise-Grade Security and a Great Experience

Securing virtual desktop infrastructure with Citrix NetScaler

Devising a Server Protection Strategy with Trend Micro

icrosoft TMG Replacement with NetScaler

Devising a Server Protection Strategy with Trend Micro

Solutions Guide. Deploying Citrix NetScaler with Microsoft Exchange 2013 for GSLB. citrix.com

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?

Secure Data Sharing in the Enterprise

NetScaler: A comprehensive replacement for Microsoft Forefront Threat Management Gateway

Deep Security. Προστατεύοντας Server Farm. Σωτήρης Δ. Σαράντος. Available Aug 30, Σύμβουλος Δικτυακών Λύσεων. Copyright 2011 Trend Micro Inc.

BlueCat IPAM, DNS and DHCP Solutions on Citrix NetScaler SDX Platform Overview

Preemptive security solutions for healthcare

Citrix ShareFile Enterprise technical overview

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Virtual desktops in hospitals: streamlining clinical workflows

The Always-on Enterprise: Business Continuity Scenarios that Work

Solution Brief. Deliver Production Grade OpenStack LBaaS with Citrix NetScaler. citrix.com

Three ways companies are slashing IT costs with VDI

Citrix Workspace Cloud Apps and Desktop Service with an on-premises Resource Reference Architecture

XenApp and XenDesktop 7.8 AppDisk & AppDNA for AppDisk technology

IBM Endpoint Manager for Core Protection

Virtual Patching: a Proven Cost Savings Strategy

Transcription:

Trend Micro Cloud Security for Citrix CloudPlatform Proven Security Solutions for Public, Private and Hybrid Clouds

2 Trend Micro Provides Security for Citrix CloudPlatform Organizations today are embracing the economic and operational benefits of cloud computing. Whether you re evolving your virtualized data center resources to public, private or hybrid infrastructure-as-a-service (IaaS) clouds, you need to be diligent about ensuring the safety of your desktops, servers, applications, and data. Trend Micro provides dynamic, adaptive protection for data center and cloud environments built on Citrix CloudPlatform powered by Apache CloudStack. Our comprehensive server security protects systems and applications on physical, virtual, and cloud servers as well as virtual desktops. And encryption with policy-based key management secures your data with a solution designed for the cloud as well as data stored in physical and virtual servers. Trend Micro s Cloud Security Solutions for Citrix CloudPlatform are powered by industry leading security products: Trend Micro Deep Security provides a comprehensive server security platform designed to protect your virtualized datacenter from data breaches and business disruptions while enabling compliance. It simplifies security operations while accelerating the ROI of virtualization and cloud projects. Tightly integrated modules easily expand the platform to ensure server, application, and data security across physical, virtual, and cloud servers, as well as virtual desktops. You can custom tailor your security with any combination of agent-based protection, including anti-malware, web reputation, firewall, intrusion prevention, integrity monitoring, and log inspection. The result is an adaptive and efficient server security platform that protects mission-critical enterprise applications and data from breaches and business disruptions without expensive emergency patching. Why Trend Micro and Citrix Trend Micro, a global leader in cloud security, delivers flexible, proven solutions for Citrix which: Have been architected to be highly effective and efficient in protecting the data and applications running on Citrix CloudPlatform. Have been built to the highest government standards, including common criteria EAL 4+. Integrate seamlessly with cloud management tools such as RightScale, Chef and Puppet etc. to automate security management. Reduce security management costs by automating security tasks and lowering the preparation time and effort required to support audits. Trend Micro Helps Resolve Key Business Challenges Security: Designed and optimized for cloud workloads, providing servers running in the cloud the comprehensive protection required to fully leverage and maximize the benefits of cloud computing. Virtual Patching: Shield vulnerabilities before they can be exploited, eliminating the operational pains of emergency patching, frequent patch cycles, and costly system downtime. Compliance: Achieving and demonstrating compliance in cloud environments requires host-based security controls such as those offered by Deep Security in order to meet regulatory requirements including PCI DSS 2.0, HIPAA, FISMA/NIST, NERC, SSAE 16 and more. Integrated Server Security: Consolidate all server security point products into one comprehensive, integrated and flexible platform that optimizes protection across physical, virtual, and cloud servers. Extend to VDI: Deep Security s centralized datacenter security management can be extended to also protect virtual desktops (Citrix XenDesktop) and servers (Citrix XenServer) against zero-day malware while minimizing operational impact from resource inefficiencies and emergency patching ensuring consistent security policy enforcement across all environments.

3 Trend Micro SecureCloud protects sensitive information in cloud and virtual environments from theft, unauthorized exposure, or unapproved geographic migration to other datacenters. It provides a patent-pending, key management system that enables you to set policies that determine where and when encrypted data can be accessed. In addition, server validation applies identity and integrity rules when servers request access to secure storage volumes. SecureCloud s simple approach safely delivers encryption keys to valid devices without the need to deploy an entire file system and management infrastructure. This protection helps support internal governance while ensuring compliance with regulations like HIPAA, HITECH, Sarbanes-Oxley, GLBA and PCI DSS. SecureCloud also features FIPS 140-2 certification to support government agencies and companies that mandate high security standards. And by giving you ownership and control of the encryption keys independent of the cloud provider, SecureCloud enables regulated organizations to demonstrate that sensitive cloud data remains encrypted and confidential upon termination of their cloud instances. Together, Trend Micro Deep Security and Trend Micro SecureCloud enable enterprises and service providers to: Maximize Operational Cost Reductions Reduce complexity with tight integrations to management consoles from Trend Micro and enterprise directories. Provide vulnerability protection to prioritize secure coding and cost-effective implementation of unscheduled patching. Eliminate the cost of deploying multiple software clients with a centrally managed, multi-purpose software agent or virtual appliance. Reduce management costs by automating repetitive and resource intensive security tasks, reducing false-positive security alerts, and enabling workflow of security incident response Significantly reduce the complexity of managing file integrity monitoring with cloud-based event whitelisting and trusted events.

4 Prevent Data Breaches & Business Disruptions Detect and remove malware in real time with minimal performance impact. Block malware that attempts to evade detection by uninstalling or otherwise disrupting the security program. Shield known and unknown vulnerabilities in web and enterprise applications and operating systems. Deliver Zero-day protection: Provide immediate protection while eliminating the costs and operational pains of emergency patching, frequent patch cycles, breaches, and costly system downtime. Detect and alert suspicious or malicious activity to trigger proactive, preventative actions. Leverage the web reputation capabilities of one of the largest domain-reputation databases in the world to protect users from accessing infected sites. Achieve Cost-effective Compliance Address major compliance requirements for PCI DSS 2.0, as well as HIPAA, NIST and SSAE 16 with one integrated and cost-effective solution. Provide detailed, auditable reports that document prevented attacks and policy compliance status. Reduce the preparation time and effort required to support audits. Support internal compliance initiatives to increase visibility of internal network activity. Leverage proven technology certified to Common Criteria EAL 4+. Encrypt and Protect Sensitive Information Encrypt and decrypt information in real time, so data at rest is always protected. Enhance data security and control by remotely managing cipher keys. Allow businesses to choose when and where information is accessed. Segregate and protect sensitive information in private clouds and virtual environments. Address compliance requirements for applications and services running in the cloud. Integrate with Deep Security Manager to further validate the XenServer and XenDesktop environment security posture. Accelerate Your Virtualization and Cloud Journey Today Trend Micro Deep Security and Trend Micro SecureCloud provide a holistic approach to cloud protection to mitigate the risks of data breach, theft, and data mobility. Deploying protection that travels between physical, virtual, and private, public, and hybrid cloud servers provides better protection, less administrative complexity, and increased performance. As a recognized leader in virtualization and server security, Trend Micro offers proven solutions that will help you accelerate your virtualization and cloud ROI. Learn more at www.trendmicro.com.

5 Corporate Headquarters Fort Lauderdale, FL, USA India Development Center Bangalore, India Latin America Headquarters Coral Gables, FL, USA Silicon Valley Headquarters Santa Clara, CA, USA Online Division Headquarters Santa Barbara, CA, USA UK Development Center Chalfont, United Kingdom EMEA Headquarters Schaffhausen, Switzerland Pacific Headquarters Hong Kong, China About Citrix Ready Citrix Ready identifies recommended solutions that are trusted to enhance the Citrix Delivery Center infrastructure. All products featured in Citrix Ready have completed verification testing, thereby providing confidence in joint solution compatibility. Leveraging its industry leading alliances and partner eco-system, Citrix Ready showcases select trusted solutions designed to meet a variety of business needs. Through the online catalog and Citrix Ready branding program, you can easily find and build a trusted infrastructure. Citrix Ready not only demonstrates current mutual product compatibility, but through continued industry relationships also ensures future interoperability. Learn more at www.. About Trend Micro Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years experience, we deliver top-ranked client, server and cloud-based security that fits customers and partners needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro Smart Protection Network cloud computing security infrastructure, Trend Micro s products and services stop threats where they emerge - from the Internet. They are supported by 1,000+ threat intelligence experts around the globe. Additional information about Trend Micro Incorporated and its products and services are available at Trend Micro.com. This Trend Micro news release and other announcements are available at http://newsroom.trendmicro.com and as part of an RSS feed at www.trendmicro.com/rss. Or follow our news on Twitter at @TrendMicro. Copyright 2013 Citrix Systems, Inc. All rights reserved. Citrix, the Citrix logo, Citrix NetScaler, and other Citrix product names are trademarks of Citrix Systems, Inc. All other product names, company names, marks, logos, and symbols are trademarks of their respective owners.