overview Enterprise Security Solutions



Similar documents
OVERVIEW. Enterprise Security Solutions

OVERVIEW. Enterprise Security Solutions

overview Enterprise Security Solutions

Endpoint protection for physical and virtual desktops

INFORMATION PROTECTED

DETECTING THE ENEMY INSIDE THE NETWORK. How Tough Is It to Deal with APTs?

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Devising a Server Protection Strategy with Trend Micro

Devising a Server Protection Strategy with Trend Micro

Endpoint protection for physical and virtual desktops

for businesses with more than 25 seats

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

Trend Micro Solutions for PCI DSS Compliance

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Cyber Security Solutions for Small Businesses Comparison Report: A Sampling of Cyber Security Solutions Designed for the Small Business Community

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

INTRODUCING isheriff CLOUD SECURITY

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

The Hillstone and Trend Micro Joint Solution

Cloud and Data Center Security

For additional information and evaluation copies of Trend Micro products and services, visit our website at

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

Cyber Security Solutions:

SMART. SIMPLE. SECURITY THAT FITS YOUR BUSINESS.

McAfee Server Security

Proven LANDesk Solutions

How To Protect Your Cloud From Attack

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Cisco Security Intelligence Operations

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

Superior protection from Internet threats and control over unsafe web usage

Comprehensive real-time protection against Advanced Threats and data theft

IBM Endpoint Manager for Core Protection

How To Protect A Virtual Desktop From Attack

Trend Micro Data Protection

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

Getting Started with Trend Micro Certification

Virtualizing Gateway Security

Symantec Endpoint Protection

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

WEBSENSE TRITON SOLUTIONS

Web Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited

Small and Midsize Business Protection Guide

PCI DSS 3.0 Compliance

Securing the Internet of Things OEM capabilities assure trust, integrity, accountability, and privacy.

Endpoint Security More secure. Less complex. Less costs... More control.

IBM Internet Security Systems

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Top Four Considerations for Securing Microsoft SharePoint

WEBSENSE SECURITY SOLUTIONS OVERVIEW

McAfee Total Protection Reduce the Complexity of Managing Security

Virtualization Journey Stages

Symantec Messaging Gateway 10.5

Cisco Advanced Malware Protection

Security Threats to Business, the Digital Lifestyle, and the Cloud. Trend Micro Predictions for 2013 and Beyond

V1.4. Spambrella Continuity SaaS. August 2

2012 Endpoint Security Best Practices Survey

Symantec Messaging Gateway 10.6

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Content Security: Protect Your Network with Five Must-Haves

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Accelerating Enterprise Growth by Leveraging Strategic Solutions. Eva Chen CEO and Co-Founder

IBM Global Technology Services Preemptive security products and services

Symantec Endpoint Security Management Solutions Presentation and Demo for:

Cloud App Security. Tiberio Molino Sales Engineer

Advantages of Managed Security Services

Securing the Internet of Things

TRITON APX. Websense TRITON APX

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

DOWNTIME BREACHES DATA LOSS. SYMANTEC TECHNICAL SERVICES HELP YOU AVOID THEM.

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Total Cloud Protection

Complete User Protection

Trend Micro Total Product Catalogue

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Fighting Advanced Threats

The Clock is Ticking on Windows Server 2003 Support

Finding Security in the Cloud

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Connected Threat Defense Strategy. Eva Chen, Co-Founder and CEO

Technical Product Overview. Employing cloud-based technologies to address security risks to endpoint systems

Cisco Advanced Malware Protection for Endpoints

Symantec Protection Suite Add-On for Hosted and Web Security

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

How To Buy Nitro Security

Building a Business Case:

Next Gen Firewall and UTM Buyers Guide

Websense Web Security Solutions

Symantec Messaging Gateway powered by Brightmail

Trend Micro Cloud Security for Citrix CloudPlatform

Agentless Security for VMware Virtual Data Centers and Cloud

CryptoLocker la punta dell iceberg, impariamo a difenderci dagli attacchi mirati. Patrick Gada 18 March 2015 Senior Sales Engineer

Transcription:

Enterprise Security Solutions overview For more than 25 years, Trend Micro has innovated constantly to keep our customers ahead of an ever-evolving IT threat landscape. It s how we got to be the world s largest pure-play security provider and the global cloud security leader. It s how we continue to set the pace for the IT security industry: by delivering simple, integrated, solutions that elegantly solve your most pressing challenges. Today, those challenges stem primarily from three trends that are sweeping the business landscape and reshaping IT infrastructures everywhere: Consumerization: The explosion of endpoints is boosting productivity but with users controlling multiple devices and using unsecured consumer applications such as DropBox at work, it s also forcing IT managers to re-think traditional perimeter defenses. Cloud and Virtualization: The growing use of cloudbased and virtualized computing drives dramatic efficiency and operational gains but if security strategies are not evolved to fit these environments, those benefits are not realized and security gaps are created. Advanced Cyber Threats: Yesterday s viruses and malware are still lurking out there, requiring vigilant updating of traditional defenses but the current explosion of advanced targeted attacks demands new, customized detection and response capabilities. Trend Micro delivers smart, simple, security that fits your infrastructure and defends your key assets as well as your bottom line, by letting you fully realize the business benefits of today s technology trends while avoiding the costs of relying on security that can t keep up.

Analysts and Customers Agree: Trend Micro Leads in Enterprise Security Cloud and Data Center Security Cloud Security Leader 2014 Trend Micro is the clear leader in the cloud security technologies and services category, setting the pace for its competitors. Experton Cloud Vendor Benchmark 2014 The versatility and ease of deployment of Trend Micro s Cloud and Data Center Security solution have made a substantial contribution in launching our cloud-based IaaS solutions. Dilip Rahulan, Executive Chairman at Pacific Controls Systems Complete User Protection Trend remained the third double-digit market share vendor. IDC Worldwide Endpoint Security 2013-2017 Forecast and 2012 Vendor Shares, August 2013 It s our policy to go the extra mile to protect patient information. After reviewing several competing solutions, it was clear that Trend Micro would provide the comprehensive security and central management we needed. Greg Bell, IT director of DCIDS Global SMB Content Security Leader 2011-2013 Trend Micro maintained its global lead in this market segment with its Worry-Free product range. Canalys Small Business Content Security Market Estimate, April 2014 Custom Defense NSS LABS RECOMMENDED The Trend Micro Deep Discovery Inspector Model 1000 detected 97% of HTTP malware, 100% of email malware, and 100% of exploits, giving an overall breach detection rating of 99.1%. The device passed all stability and reliability tests and detected 94% of evasions. The Deep Discovery Inspector Model 1000 also had a 0% false positive rate. NSS Labs, Breach Detection Systems Product Analysis Trend Micro Deep Discovery Inspector Model 1000, April 2014 There were many reasons why we chose Deep Discovery. Firstly, the Trend Micro solution provides more in-depth forensic analyses than its competitors. Secondly, this insurance company already uses Trend Micro solutions and can leverage the benefits of a seamless integration with this new solution. Chris Baur, Head of Technology Management at SWICA

Complete User Protection Endpoint Security Secure, encrypt, and optimize performance for any endpoint mobile devices, laptops, and computers on-premises or as a hosted solution. Trend Micro OfficeScan software delivers real-time endpoint protection against the latest threats using a lightweight format. Trend Micro Endpoint Application Control prevents unwanted and unknown applications from executing on your endpoints. Trend Micro Vulnerability Protection provides intelligent virtual patching to block exploits and zero-day threats Trend Micro Worry-Free Business Security Services is a cloud-based solution for servers and endpoints that provides continuous protection and blocks new threats before they reach your computers no matter where they are located. Trend Micro Endpoint Encryption software fully encrypts data at rest on desktops, laptops, files, folders, and removable media such as CDs, DVDs, and USB drives. Mobile Security Secure, track, monitor, and manage your employee s mobile devices and company data with mobile security that balances consumerization with IT control. Trend Micro Mobile Security software provides mobile device management and protects data by enforcing passwords, encrypting data, and remotely wiping data from lost or stolen devices. Trend Micro SafeSync for Enterprise provides anytime, anywhere access, synchronization, and sharing of files from any device. Secure Web Gateway Defend against Internet threats at the gateway, while application visibility helps manage the risks of accessing cloud-based consumer applications in the workplace. Trend Micro InterScan Web Security virtual appliance includes application-control, anti-malware, web-reputation, and URL-filtering systems. Trend Micro InterScan Web Security as a Service extends security to your users beyond your corporate network with a cloud-based offering. Email and Collaboration Security Protection for email, collaboration, and IM systems combine onpremise privacy and control with cloud-based reputation services that stop threats in real time before they strike your network. Stop spam, phishing, viruses, spyware, and inappropriate content in email. Trend Micro InterScan Messaging Security service is an on-premises gateway virtual appliance that deploys with a cloud pre-filter for an additional layer of proactive protection. Integrates with Trend Micro Deep Discovery to catch targeted threats. Add optional data-privacy or encryption modules for more protection. Trend Micro Hosted Email Security service stops spam and email-based malware in the cloud before they reach your network. Add the optional Hosted Email Encryption module for more protection. Trend Micro Email Encryption software secures sensitive email content with identity-based encryption for hosted, gateway, and/or endpoint email solutions. Trend Micro ScanMail for Microsoft Exchange software delivers antivirus, antispam, and antiphishing protection plus email and web reputation services to block messages containing links to malicious sites. It integrates with Deep Discovery to catch targeted threats. ScanMail for IBM Domino software offers email security as a native IBM Lotus Domino server application, blocking viruses, spam, and other email threats. It integrates with Deep Discovery to provide better protection from targeted attacks. Trend Micro PortalProtect for Microsoft SharePoint software scans files and web components for malware, malicious links, and other threats in Microsoft SharePoint environments. Trend Micro IM Security for Microsoft Lync secures real-time IM communications with web reputation, antivirus, antispyware, and content filtering systems. Integrated Data Loss Prevention Easily discover, monitor, and protect confidential data and intellectual property from insider threats, data-stealing malware, and hackers. Trend Micro Integrated Data Loss Prevention software provides a network and endpoint solution combined with a workflow-navigation engine to easily identify, track, and secure your business-critical data from gateway to endpoint. Optional modules integrate with OfficeScan, InterScan Messaging Security, InterScan Web Security, ScanMail, and PortalProtect to instantly extend data protection throughout your network.

Cloud and Data Center Security Comprehensive server security provides adaptive protection for systems and applications across physical, virtual, and cloud servers. And encryption and key management secures data stored in the cloud, and in physical and virtual environments. Trend Micro Deep Security platform provides centralized protection for physical, virtual, and cloud servers as well as virtual desktops. Tightly integrated modules expand its capabilities to include anti-malware, integrity monitoring, intrusion prevention for virtual patching, web application control, and firewall and log inspection. And it can unify security management, enforcing the same corporate policies across private and public clouds or different policies for self-service, multi-tenant clouds. Trend Micro Deep Security as a Service is a cloud-hosted solution designed specifically for customers using Amazon Web Services, Microsoft Azure, and VMware vcloud to support their business. Trend Micro ServerProtect malware protection simplifies and automates security operations on physical servers for leading storage systems as well as for Linux, Microsoft Windows, and Novell NetWare. Trend Micro SecureCloud key management software encrypts data in public, private, and hybrid clouds, as well as in physical and virtual servers, and provides unique identity and integrity authentication of servers requesting encryption keys. Deep Security for Web Apps is a cloud-hosted solution that provides intelligent web application scanning for today s complex threat environment, as well as integrated protection mechanisms including Intrusion Prevention and SSL certificates

Custom Defense against Targeted Attacks Enterprise-wide cyber security management integrated across your security portfolio, with proactive threat and vulnerability mitigation to lower the risks from targeted attacks and advanced threats. Trend Micro Deep Discovery is an advanced threat protection platform that enables you to detect, analyze, and respond to stealthy, targeted attacks. It uses specialized detection engines, custom sandboxing and global threat intelligence from the Trend Micro Smart Protection Network to defend against attacks that are invisible to standard security products. Deep Discovery uniquely detects and identifies evasive threats in real time, then provides the in-depth analysis and relevant actionable intelligence that will protect your organization from attack. Deep Discovery Inspector delivers 360-degree monitoring for network-wide detection of malware and attacker activities. Deep Discovery Analyzer enhances existing detection capabilities with advanced heuristics, sandboxing, and intelligence-sharing to discover targeted attacks and advanced threats. Deep Discovery Email Inspector uses a variety of advanced techniques to detect and block spear-phishing and other targeted email attacks. Deep Discovery Endpoint Sensor provides detailed endpoint activity tracking that enables rapid attack validation and analysis. Deep Discovery is at the heart of a custom defense solution. Its advanced detection and intelligence can be integrated with Trend Micro and third-party products to unite your security infrastructure into a unique comprehensive defense. With Trend Micro Custom Defense you can detect, analyze, and respond to targeted attacks before damage is done. Centralized Management and Reporting Simplify administration, improve security intelligence, and lower security management costs with an integrated, centrally managed security framework. Trend Micro Control Manager software provides a central platform to manage the configuration, policies, and operation of Trend Micro enterprise security products. Trend Micro Remote Manager is a multi-tenant, cloud-based management console that makes it easy for Managed Service Providers to oversee and manage Worry-Free Business and Hosted Email Security products across multiple customer deployments

Trend Micro Security Suites Upgrade to better, simpler, more flexible security with an interconnected suite of security that protects your users no matter where they are going or what they are doing. Trend Micro Smart Protection Complete delivers the best protection at multiple layers, supports flexible on-premise, cloud and hybrid deployment models, and lets you manage users across multiple threat vectors from a single pane of glass with a complete view of your security. Trend Micro Smart Protection for Endpoints protects virtual and physical desktops with multiple layers of threat and data security across devices and applications. Plus, you get the same cloud flexibility and user-centric management benefits of Smart Protection Complete. Support Services Trend Micro provides a wide assortment of support services to help ensure that you get the most value from your security investment. Three levels of technical support are available. Standard Support includes all regular product updates and upgrades, along with highly responsive, expert telephone support during regular business hours. 24x7 Support gives you round-the-clock access to advanced support engineers who can help with your most pressing issues, including problem diagnosis and remediation. Premium Support provides you with a named Customer Service Manager who will be your on-going contact to assist you with urgent issues and provide expert guidance designed to elevate your security posture. Trend Micro Inc. 10101 N. De Anza Blvd. Cupertino, CA, 95014, USA Toll free: +1 800.228.5651 Phone: +1 408.257.1500 Fax: +1 408.257.2003 2014 by Trend Micro Incorporated. All rights reserved. Trend Micro, and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their owners. Information contained in this document is subject to change without notice. [BR03_ENT_Solutions_140730US_w]