* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download the catalogue here
Multilevel security wikipedia , lookup
Cross-site scripting wikipedia , lookup
Information security wikipedia , lookup
Post-quantum cryptography wikipedia , lookup
Information privacy law wikipedia , lookup
Computer and network surveillance wikipedia , lookup
Next-Generation Secure Computing Base wikipedia , lookup
Security and safety features new to Windows Vista wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Airport security wikipedia , lookup
Wireless security wikipedia , lookup
Unix security wikipedia , lookup
Distributed firewall wikipedia , lookup
Cyber-security regulation wikipedia , lookup
Microsoft Security Essentials wikipedia , lookup
Computer security wikipedia , lookup
Mobile security wikipedia , lookup
September 2013 Trend Micro Total Product Catalogue http://apac.trendmicro.com Trend Micro Trademarks Notice Trend Micro Incorporated, InterScan, InterScan VirusWall, ScanMail, ServerProtect, VirusWall, and WebProtect are trademarks of Trend Micro, registered in the U.S. and are trademarks in other countries, and AppletTrap, ChipAwayVirus, Edoctor, Ehospital, Emanager, MacroTrap, OfficeScan, PC-Cillin, Trend Micro, Trend VCS, Web Trap and NeatSuite are trademarks of Trend Micro. All other trademarks are the property of their respective owners. Copyright © 1989-2013 Trend Micro Incorporated. All rights reserved. P/N TOPE-SE-0005 Our VISION Management Eva Chen A world safe for exchanging digital information CEO & Co-Founder Mahendra Negi COO& CFO The assurance of safety, for all people The Internet society has now become commonplace. However, a society that can use the Internet safely is certainly not commonplace. Trend Micro has extensive experience and advanced technology to protect individuals and companies from the threats of the information society. We will consolidate all our strengths to confront these threats and continue to provide a safe network society. Steve Chang Chairman & Founder Akihiko Omikawa Executive Vice President, General Manager Japan Region, Global Consumer Business Unit, Global Service Business Unit Traded Tokyo Stock Exchange 4704 ASIA-PACIFIC Providing the reassurance of security, across borders. Trend Micro responds to threats all around the world with threat analysis network spreading globally. Trend Micro is a multinational corporation from Japan that has reached beyond borders to become a transnational company. In 1988, Trend Micro was founded in California in the United States, and in Japan from 1989. Since then, Trend Micro has continued to grow steadily, and as a multinational corporation from Japan with activity bases located around the world, has built up a network which continuously monitors worldwide and regional threats to quickly provide solutions to customers. Trend Micro Global Network Ireland UK France Germany USA 11F, No.198 Sec. 2 Tun Hwa S. Road Taipei, Taiwan (106) +886-2-2378-9666 http://trendmicro.com/tw Eva Chen CEO & Co-Founder Company Introduction & Global Map Company Introduction & Global Map Company Introduction & Global Map (California) Japan China USA (Head Office) (Texas) Taiwan Philippines (Headquarters) JAPAN Shinjuku MAYNDS Tower 2-1-1 Yoyogi, Shibuya-ku Tokyo, Japan 151-0053 +81-3-5334-3600 www.trendmicro.com/jp Brazil Development Sites Major Overseas Bases TrendLabs Philippine is granted the ISO 20000-1 2005 for the adherence to IT service excellence of its malware information, detection cleanup and technical support services. Japan Our MISSION Innovate to provide the best content security that fits into the IT infrastructure Providing the optimal solution, with constant innovation. As the leader in content security, Trend Micro provides solutions enabling a safe information society. This is Trend Micro’s mission. In addition to the changing trends in threats, the emergence of cloud computing, and the penetration of mobile PCs, there are also changes in the network environment. Developing innovative products and services in order to protect valuable information assets from unpredictable threats anytime, anywhere. Our job is to continue to quickly provide optimal solutions in response to this changing environment. Therefore we are committed to constant innovation. 2 NORTH AMERICA Head Office 10101 N. De Anza Blvd. Cupertino, CA 95014 USA 408-257-1500 www.trendmicro.com TrendLabs Regional Trend Labs LATIN AMERICA Development Sites Insurgentes Sur 813, Pisoll Colonia Napoles C.P. 03810 - Mexico D.F. 5255-3067-6000 www.trendmicro.com/la Philippines Overseas Subsidiary EMEA Business and Technology Park Model Farm Road Cork, Ireland +353 21-7307-300 www.trendmicro.co.uk Major Overseas Bases (Headquarters) Japan USA USA Japan Canada Taiwan Germany UK Germany Taiwan Ireland China China India France Australia Germany China China (Beijing) (Shanghai) Taiwan France (Hong Kong) India Korea Italy UK Australia Canada Thailand Switzerland Malaysia Singapore Brazil New Zealand Austria Belgium Netherlands Denmark UAE(Dubai) Norway Poland Spain Sweden Turkey Vietnam Philippines Egypt USA Ireland Mexico China Ireland UK France Brazil Brazil Panama Russia Indonesia Saudi Arabia South Africa 3 Product Map Trend Micro Smart Protection Network Email Reputation Services Trend Micro Deep Security Virus FRS WRS Product Map Web Reputation Service File Reputation Service Invade “For the Cloud” Scalable from Physical server to Cloud environment Customer Datacenter Trend Micro Product Map ERS “From the Cloud” Virus Virus Spyware Spam Invade Data Loss Trend Micro Deep Security Trend Micro InterScan Web Security Virtual Appliance Trend Micro InterScan Messaging Security Virtual Appliance Virus Web Spyware Threats Phishing Data Loss Medium – Enterprise Environment Trend Micro ARM Trend Micro Hosted Email Security URL Filtering Phishing Virus Spyware Spam Phishing Router Trend Micro Collaboration Security - ScanMail Suite for Microsoft Exchange - PortalProtect - Trend Micro IM Security Virus Spyware Spam Phishing Data Loss Trend Micro Deep Discovery Virus Spyware Web Threats Phishing Spam Trend Micro ScanMail for Groupware Firewall Appliance for analyze suspicious behavior in network and respond to unknown threats Virus Trend Micro Enterprise Security for Endpoints Invade Spam Server Storage - OfficeScan - ServerProtect for Windows/Linux - Control Manager - OfficeScan plug-in IDF - OfficeScan plug-in Macintosh Virus Spyware Phishing Data Loss Switch Web Spyware Threats Small – Medium Environment - ScanMail Suite for Microsoft Exchange - ScanMail Suite for Lotus Domino Trend Micro Network VirusWall Enforcer Network Quarantine Virus Data Loss Trend Micro Worry-Free Business Security Trend Micro ServerProtect Series Virus Spyware Spam Management Server Mobile URL Web Threats Phishing Filtering Data Loss Security Virus Antimalware Trend Micro Product Matrix Products Categories Antivirus For Web threats URL Web reputation filtering Antispam Encryption Antispam Endpoint Email Encryption Data Loss Mobile Firewall Prevention security encryption encryption Data Protection Virtualization Vulnerability / Intrusion IDS / IPS FIM Log inspection VDI Categories Enterprise Security for Endpoints Standard Collaboration Security Gateway Security (Email / Web) Anti-spam Anti-Phishing Unknown threats Known threats Restore Analysis report Quarantine infected sources Quarantine ScanMail Suite for Lotus Domino InterScan Web Security Enterprise Security for Gateways ServerProtect Linux ServerProtect NetApp Enterprise Security for Enterprise and Mail Servers Products Categories ServerProtect EMC Security Suites Anti-Phishing Hosted Email Security ServerProtect NT/NW Server / Storage Security URL filtering InterScan Messaging Security Worry Free Business Security Standard Deep Security Web reputation PortalProtect Worry Free Business Security Advanced Worry Free Business Security Services Antivirus Data Loss Prevention Data Loss Prevention ScanMail Suite for Microsoft Exchange Enterprise Security for Endpoints Advanced Endpoint Security Products Anti-spam For Web threats Anti-malware Network Security Enterprise Security Suite Behavior monitoring Deep Discovery Network VirusWall Enforcer Enterprise Security and Data Protection 4 Cloud Security SecureCloud Offline Security Portable Security Data Protection Enterprise Data Protection Anti-malware Categories Mobile Security Products Antivirus For Web threats Web reputation URL filtering Vulnerability / Intrusion Data Loss Prevention Encryption Device control Remote lock Remote wipe Firewall Mobile Security 5 Endpoint Security Endpoint and Suites Endpoint Security Secure your endpoints, both on and off the network, with award-winning protection including: anti-malware, web reputation technology to block access to malicious websites, and HIPS protection. Powered by Trend Micro Smart Protection Network cloud-based security, pattern files are managed in the cloud and not on your endpoints to free computing resources and optimize performance. Further customize your protection with add-on options for data protection, mobile security, and desktop virtualization—all coordinated through a single management console. FILE SERVERS OfficeScan ServerProtect for Microsoft Windows / Novell Netware ServerProtect for Linux CLIENTS OfficeScan Endpoint Security with plug-in modules: Intrusion Defense Firewall Security for Mac Virtual Desktop Infrastructure(VDI) CENTRALIZED MANAGEMENT Control Manager Enterprise Security Suite Trend Micro Enterprise Security Suite is a tightly integrated suite of products that secure your network from gateway to endpoint. With comprehensive threat protection and centralized management, you can close the security gaps while decreasing costs and complexity. Powered by Trend Micro Smart Protection Network cloud-based security, this end-to-end suite delivers global threat intelligence and faster performance. FILE SERVERS Advantages SMART: Get consistent security that delivers proactive protection across all endpoints Simple: Increase security at lower costs with a consolidated, cloud-client architecture and simplified management Security That Fits: Streamline administration by enforcing threat protection policies from a single console OfficeScan Endpoint Security ServerProtect for Microsoft Windows / Novell Netware ServerProtect for Linux CENTRALIZED MANAGEMENT Control Manager COMPARISON CHART Enterprise Security for Endpoints OfficeScan Plug-Ins OfficeScan Intrusion Defense Firewall Security for Mac ServerProtect for Windows, NetWare, Linux VDI Trend Micro Control Manager Standard Standard Advanced Advanced MAIL SERVERS InterScan Messaging Security InterScan Web Security Enterprise Security for Endpoints and Mail Servers Trend Micro Enterprise Security for Endpoints and Mail Servers is an integrated, centrally managed suite that delivers adaptive threat protection with award-winning anti-malware, antispam, host intrusion prevention (HIPs), web reputation, and optional data security. This suite is powered by Trend Micro Smart Protection Network cloud-based security for global threat intelligence and faster performance. Reduce risks and costs with a single solution offering unified management of integrated security across enterprise desktops, laptops, file servers, and mail servers. FILE SERVERS OfficeScan ServerProtect for Microsoft Windows / Novell Netware ServerProtect for Linux ScanMail Suite for Lotus Domino ScanMail Suite for Microsoft Exchange ScanMail Suite for Lotus Domino ServerProtect for Microsoft Windows / Novell Netware ServerProtect for Linux Minimizes Complexity Reduces time to acquire, deploy, and manage with integrated solution Streamlines administration with web-based centralized management CLIENTS OfficeScan Endpoint Security with plug-in modules: Intrusion Defense Firewall Security for Mac Virtual Desktop Infrastructure(VDI) Platform Coverage Advantage GATEWAY InterScan Messaging Security Virtual Appliance VMware Virtualized email gateway security stops spam and email threats InterScan Web Security Virtual Appliance VMware Virtualized web gateway security blocks web threats and includes URL filtering Windows Blocking spam, malware and spyware at the mail server Windows, Linux Blocking spam, malware and spyware at the mail server MAIL SERVER ScanMail Suite for Microsoft Exchange ScanMail Suite for Lotus Domino CLIENTS OfficeScan Endpoint Security with plug-in modules: Intrusion Defense Firewall Security for Mac Virtual Desktop Infrastructure(VDI) CENTRALIZED MANAGEMENT Control Manager Platform Coverage FILE SERVER OfficeScan ServerProtect for Microsoft Windows / Novell Netware Advantage Windows Blocking spam and spyware at the mail server Windows, Linux Blocking spam and spyware at the mail server FILE SERVER OfficeScan Multilayered Protection MAIL SERVERS MAIL SERVER ScanMail Suite for Microsoft Exchange Maximizes Protection Reduces risk with comprehensive multilayered, multi-threat protection Delivers immediate protection with in-the-cloud threat intelligence Improves productivity with #1 rated spam blocking and web filtering Lowers Costs Lowers endpoint infection rates by 62% Slashes IT security management costs by 40% Maximum Protection and Minimum Complexity across Protections Points and Platforms Maximum Protection across Endpoints and Mail Servers Multilayered Protection ScanMail Suite for Microsoft Exchange ScanMail Suite for Lotus Domino GATEWAY Advantages Endpoint Security Enterprise Security for Endpoints Advanced Enterprise Security for Endpoints Standard ServerProtect for Linux Windows, NetWare Linux Secures Windows servers Secures Windows and NetWare file servers Windows, NetWare Linux Secures Windows servers Secures Windows and NetWare file servers Secures Linux file servers CLIENT / MOBILE DEVICE OfficeScan Intrusion Defense Firewall Data Loss Prevention Security for Mac Windows Windows Windows Secures Windows clients Windows __ Proactive HIPS and vulnerability shielding Apple Macintosh Protect your sensitive data Protects Macintosh clients from malware and blocks malicious websites MANAGEMENT Control Manager Advanced Windows Centrally manages security Secures Linux file servers CLIENT OfficeScan Intrusion Defense Firewall Security for Mac VDI Windows Secures Windows clients Windows Proactive HIPS and vulnerability shielding Apple Macintosh __ Protects Macintosh clients from malware and blocks malicious websites Secure virtual desktop environment MANAGEMENT Control Manager Advanced 6 Windows Centrally manages security 7 Endpoint Security OfficeScan plug-ins Endpoint and Suites Endpoint Security Trend Micro Enterprise Security and Data Protection is an integrated suite of products that secure your network from gateway to mobile devices for complete end user protection. This comprehensive suite combines multi-layer adaptive threat protection with Trend Micro Enterprise Data Protection to help you efficiently mitigate the risks of attacks and data breaches across the spectrum of end-user platforms, from smartphones to tablets, and laptops to removable drives. Trend Micro Enterprise Data Protection simplifies data security in today’s complex mobile environments by integrating data loss prevention (DLP), encryption, mobile security, and mobile device management (MDM) with your existing Trend Micro security suite. By combining threat and data protection in a flexible, centrally-managed solution, it lowers the cost and effort to deploy and manage while closing critical security and compliance gaps—for complete end-user protection across endpoints, mobile devices, email, and gateway. Solution FILE SERVERS OfficeScan ServerProtect Integrated DLP ScanMail Suites Email Encryption Integrated DLP Data Loss Prevention Module Intrusion Defense Firewall The DLP plug-in is an option for OfficeScan customers to gain visibility and control into how sensitive data is being handled. Real-time scanning of users will detect when sensitive data is being copied, moved, emailed, pasted or uploaded and appropriate action can be taken such as blocking, reporting or warning. As a plug-in for OfficeScan within Trend Micro Enterprise Security for Endpoints, Intrusion Defense Firewall supplements highly effective OfficeScan client-level security with network-level Host Intrusion Prevention System (HIPS). Advantages Data privacy and compliance Can be deployed immediately / easily GATEWAY InterScan Massaging Security InterScan Web Security Integrated DLP Components Data protection Trend Micro Integrated Data Loss Prevention Trend Micro Mobile Security Trend Micro Endpoint Encryption Trend Micro Email Encryption Gateway Centralized Management Trend Micro Control Manager Gateway Protection InterScan Messaging Security InterScanWeb Security Mail Servers Protection ScanMail Suite for Microsoft Exchange ScanMail Suite for Lotus Domino Mail Servers Protection OfficeScan Endpoint Security Server Protect for Microsoft Windows / Novell Netware ServerProtect fo Linux Endpoint Protection OfficeScan Endpoint Security Intrusion Defense Firewall Trend Micro Security for Mac VDI Security CENTRALIZED MANAGEMENT Control Manager CLIENTS OfficeScan Intrusion Defense Firewall Security for Mac VDI Security Mobile Security Endpoint Encryption Integrated DLP OfficeScan Virtual Desktop Infrastructure Enterprise Data Protection Protects endpoints with minimal impact on network throughput, performance, or user productivity. Blocks attacks before they enter the endpoint’s application and execution layer. Provides protection before patches are deployed . Security for Macintosh Built specifically to handle the rigors of virtual desktop environments, Trend Micro Virtual Desktop Security maximizes protection for a broad spectrum of virtual desktop scenarios. Advantages Enterprise Security and Data Protection Advantages Endpoint Security Enterprise Security and Data Protection Enterprise Data Protection MAIL SERVERS As a plug-in for OfficeScan Trend Micro Security for Mac leverages Trend Micro Smart Protection Network to proactively limit exposure to threats. Real-time, in-the-cloud Web Reputation technology prevents users and applications from accessing malicious web content. Advantages Agentless anti-malware No security agent in the VM Leverage VMware vShield APIs VDI optimized agents Prevent resource contention Cleans, scans memory and monitors behavior. Blocks malware for all systems, including both Mac OS and Windows. Mobile Security Trend Micro Mobile Security enables businesses to extend protection beyond traditional PCs to secure mobile devices and data for the smartphone and tablet platforms your employees are demanding. This solution lets organizations reduce costs by providing a single point of visibility and control for device management and security. It protects data and limits data loss incidents by enforcing the use of passwords, encrypting data, and remotely wiping data from lost or stolen devices. iPhone / iPad User Advantages Threat Protection Malware Spyware Web threats Reduced Operational Costs Limit Data Loss Reduced Security Risk Android User BlackBerry User Monitor Windows Mobile User Manager Control 8 9 Endpoint Security Cloud Security Worry Free SecureCloud Endpoint Security Provides fast, effective, and simple protection against web viruses, cybercriminals, and data loss, so you can focus on your business instead of worrying about Internet security. Worry-Free is ranked #1 in independent tests at blocking Internet threats BEFORE they reach your PCs; Mac computers; file and mail servers — increasing protection, while preventing computer slow down. Viruses Mobile Security Advantages Web Threat Protection Smart Scan Scans faster and updates quicker Data Loss Prevention Comprehensive spam prevention Device Control Zero update effort (Services only) URL filtering Spam mails Data loss Phishing Spyware UNIQUE ADVANTAGES Web threats Worry-Free Business Security Services Worry-Free Business Security Standard Worry-Free Business Security Advanced More companies are turning to cloud computing and virtualization to provide rapid provisioning, agility, and cost savings. However, these benefits also introduce privacy and security risks-businesses may not always know where their data is or who can access it. Trend Micro SecureCloud provides distinctive data protection for cloud and virtual environments using encryption with policy-based key management and unique server validation. This protection safely and easily secures sensitive data stored with leading cloud service providers, including Amazon EC2, Dell, Eucalyptus, and NTT America, as well as VMware vCloud and any virtual environment. With SecureCloud, you can protect sensitive information in cloud and virtual environments from theft, unauthorized exposure, or unapproved geographic migration to other data centers. This protection helps support internal governance and ensure compliance with regulations like HIPAA, HITECH, Sarbanes-Oxley, GLB and PCI DSS. SecureCloud also features FIPS 140-2 certification to support government agencies and companies that mandate high security standards. Web threat protection stops viruses and threats from the web before they reach your business Intuit QuickBooks protection Smart Feedback – faster identification and response to new threats Integrated fake antivirus removal tool Support for IPv6 Cloud platform Trend Micro SecureCloud agent PLATFORMS PCs, laptops, Windows servers Windows 8 compatible Virtualization (VMware and Microsoft) Mac clients (iMacs and MacBooks) and servers Android Devices VM Hy pe VM Features & Advantages Advanced Security Techniques Features FIPS 140-2 certification and FIPS approved AES encryption Encrypts and decrypts information in real time, so data at rest is always protected Applies whole volume encryption to secure all data, metadata, and associated structures without impacting application functionality Access and Authentication Controls Employs role-based management to help ensure proper separation of duties Automates key release and virtual machine authorization for rapid operations or requires manual approval for increased security Offers cloud provider credential rotation Policy-driven Key Management Uses identity- and integrity-based policy enforcement to ensure only authorized virtual machines receive keys and access secure volumes Enables the use of policies to determine when and where information is accessed Robust Auditing, Reporting, and Alerting Logs actions in the management console for audit purposes Provides detailed reporting and alerting features with incident-based and interval-based notifications Authentication for key deployment done by rule base policy per VMs. VM rvi so r Random session key over SSL ANTIVIRUS AND WEB SECURITY Defends against viruses, spyware, bots, rootkits Advanced URL filtering blocks access to inappropriate websites (with blacklist feature) Shared Storage CENTRALIZED MANAGEMENT Intuitive web console Management server location DATA PROTECTION Device control, controls access to USB drives and other attached devices to prevent data loss and block threats. Data loss prevention via business email messages, accidental or deliberately sent MESSAGING SECURITY AND ANTISPAM Users Hosted On Premise Access VM On Premise Kernel level encryption on writing data. Encryption will be done for per volumes which connects to virtual instance server OS. Key will be deployed per volumes Scans and blocks spam from entering POP3 mail accounts Includes Hosted Email Security-Inbound Filtering that stops spam and email-based viruses before they reach mail servers Threat protection and multi-layer antispam for Microsoft Exchange Servers 10 11 Cloud Security Worry-Free Business Security Advanced Worry-Free Business Security Standard Worry-Free Business Security Services Server/Storage Security Deep Security and ServerProtect series ServerProtect for Microsoft Windows and Novell NetWare Server/Storage Security Trend Micro Deep Security provides a comprehensive server security platform designed to protect your virtualized data center from data breaches and business disruptions while enabling compliance. This agentless solution simplifies security operations while accelerating the ROI of virtualization and cloud projects. Tightly integrated modules easily expand the platform to ensure server, application, and data security across physical, virtual, and cloud servers, as well as virtual desktops. So you can custom tailor your security with any combination of agentless and agent-based protection, including anti-malware, web reputation, firewall, intrusion prevention, integrity monitoring, and log inspection. The result is an adaptive and efficient server security platform that protects mission-critical enterprise applications and data from breaches and business disruptions without expensive emergency patching. Features Anti-Malware Integrity Monitoring Web Reputation Intrusion Detection and Prevention Bidirectional Stateful Firewall Log Inspection NEW Multi-Tenant NEW Hypervisor Integrity Monitoring NEW AWS and vCloud Integration NEW vSphere 5.1 ready NEW IPv6 ready Advantages Accelerate Virtualization, VDI, and Cloud ROI Provides a lighter, more manageable way to secure VMs Maximize Operational Cost Reductions Prevent Data Breaches and Business Disruptions Detects and removes malware in real time with minimal performance impact Achieve Cost-effective Compliance Addresses major compliance requirements for PCI DSS 2.0, as well as HIPAA, NIST, and SAS 70 Trend Micro Deep Security Virtual Appliance PHYSICAL VIRTUAL VM Deep Security Agent VM CLOUD VM VM VM Deep Security Agent VM VM DESKTOP/LAPTOP VM Deep Security Agent Prevent viruses from spreading through your network by blocking them before they reach the end user. Trend Micro ServerProtect for Microsoft Windows and Novell NetWare scans, detects and removes virus from files and compressed files in real time. ServerProtect delivers 24x7 antivirus support and protection with automatic, incremental virus updates. Centralized management of servers via a Web-based console simplifies network protection. Advantages Certified with Microsoft Windows Server 2000/2003 to deliver high performance, reliability, security, scalability and availability Enables real-time, high-performance scanning with minimal impact to servers ServerProtect Linux Protect your Linux file servers from becoming unwitting hosts for viruses, trojans, bots and a full range of other malware. Trend Micro ServerProtect for Linux offers real-time protection, high performance and low processing overhead, and supports all common Linux distributions. ServerProtect for Linux adds another powerful solution to your enterprise’s security and compliance strategy. Advantages Prevents Linux servers from spreading threats to other servers and personal computers Maximizes performance and lowers processor overhead with multi-threaded, kernel-based scanning Server/Storage Security Deep Security ServerProtect for EMC ServerProtect for NetApp ServerProtect for Hitachi Data Systems Trend Micro ServerProtect for Storage, the industry’s most reliable, high-performing security solution for storage platforms, safeguards your file storage systems by detecting and removing viruses and spyware in real time. Advantages Integrates tightly with EMC Celerra, NetApp Filers or Hitachi NAS. Enables real-time, high-performance scanning with minimal impact to servers and no impact to end users Deep Security Agent 2 Security Profile Scan request Trend Micro ServerProtect for EMC Celerra for NetApp for Hitachi Data Systems IT Infrastructure Integration Alerts 1 3 Access files Scan result NAS Users 4 Allow/deny access Report Trend Micro NAS Security Administrator Trend Micro Deep Security Manager Security Center Trend Micro NAS Security scans files on a scheduled basis and can even scan files in real-time, protecting the data on the NAS from the threat of virus. Advantages Pre-installed antivirus to the NAS, no installation required. Real-time malware scanning. This product is offered as embedded function in designated device distributed by selected vendors. 12 13 Collaboration Security Groupware ScanMail Suite for Microsoft Exchange ScanMail Suite for Lotus Domino IM Security for Microsoft Lync and Office Communications Server ScanMail Suite for Lotus Domino ScanMail Suite for Microsoft Exchange not only stops traditional spam and malware but also detects malicious URLs, highly targeted attacks, and advanced persistent threats (APTs). With a combination of web, email, and file reputation, plus exploit detection and sandboxing, ScanMail Suite is the most comprehensive mail server security. It’s the enterprise-level protection you need that you won’t get with other solutions. ScanMail Suite for IBM Lotus Domino stops traditional email threats with the correlated intelligence of Trend Micro Smart Protection Network cloud-based security. It also protects your data with optional Data Loss Prevention and blocks targeted email attacks when integrated with Trend Micro Deep Discovery Advisor. ScanMail and Deep Discovery Advisor are both components of the Trend Micro Custom Defense Solution. ScanMail Suite is an easy-to-manage solution supporting nearly all Domino platforms. Advantages Advantages Collaboration Security Guards against APTs and highly targeted attacks Blocks phishing emails with malware or bad web links Prevents data loss and simplifies compliance Cuts administration time in half Speeds throughput—up to 57% faster than other solutions Customizes protection against highly targeted attacks Blocks phishing emails with malware or bad web links Prevents data loss and simplifies compliance Lowers administration with better controls and optimization “Suspicious’’ ScanMail Deep Discovery Advisor Sandboxes Anti-spam Features & Advantages Unique! Blocks malicious links—before delivery—using Web Reputation Identifies and blocks zero-day threats with proprietary IntelliTrap technology Stops more spyware, with dedicated inspection, before it can infect PCs Filters content to protect against data loss and undesirable language Reduces administration with tight platform integration and robust central control Enterprise Security for Communication and Collaboration Trend Micro Communication & Collaboration Security protects your Microsoft email, collaboration, and IM systems by stopping threats in real time—before they can strike. The unique cloud-client architecture of Trend Micro Smart Protection Network powers real-time threat protections (like Email and Web Reputation) that work in concert with leading conventional content security technologies—allowing you to connect without the heightened risk. Collaboration Security ScanMail Suite for Microsoft Exchange Secure your real-time IM communications by stopping fast-moving attacks designed to spread malware, lure victims to malicious sites, and steal data. Powered by Trend Micro Smart Protection Network and its unique cloud-client architecture, IM Security blocks links to malicious sites before the links can be delivered. Signature-independent zero-day security, leading antivirus, and new antispyware work together to stop malware before any damage. Plus, flexible content filtering ensures appropriate IM use and prevents data theft. Communication & Collaboration Security Sandboxes Feedback Anti-phishing Threat Analysis Enhanced Web Reputation Antivirus Threat Intellignce Quarantine Advanced Threat Scan Adaptive Security Updates Trend Micro and third-party security products Central Management Collaboration Server Mail Server Instant Messaging Server Trend Micro Control Manager Trend Micro PortalProtect for Microsoft SharePoint Trend Micro ScanMail Suite for Microsoft Exchange Trend Micro IM Security for Microsoft Office Communications Server PortalProtect for Microsoft SharePoint Trend Micro PortalProtect secures your collaborations with a dedicated layer of protection that guards against malware, malicious links, and other threats that SharePoint administrators often don’t know about. Its web reputation technology blocks malicious links from entering your web portals, while its powerful content filtering scans both the files and web components of SharePoint. 14 Advantages Protects SharePoint users and data Stops the wide range of malicious files and URLs Filters inappropriate content from social aspects of SharePoint Controls sensitive data for compliance and risk management Takes half the time to manage Scales to any deployment size The integrated Data Loss Prevention protects your sensitive data 15 Gateway Security Gateways InterScan Messaging Security Virtual Appliance Enterprise Security for Gateways Trend Micro InterScan Messaging Security stops traditional threats in the cloud with global threat intelligence, protects your data with data loss prevention and encryption, and identifies targeted email attacks as part of a custom APT defense. The hybrid SaaS deployment combines the privacy and control of an on-premise virtual appliance with the proactive protection of a cloud-based pre-filter service. Keep your data confidential and your employees safe while interacting with rich Internet content. Trend Micro Enterprise Security for Gateways integrates virtualized web and messaging gateway security—proven to maximize protection while minimizing complexity and lowering total cost up to 40 percent.1 In-the-cloud web and email reputation combined with industry-leading antispam, antivirus, and URL filtering provide multilayered, multi-threat protection that blocks malware, malicious links, and unwanted content before they can enter your network. With real-time reporting, you’ll gain unprecedented visibility of current web activity, enabling you to stop risky behavior immediately. Outbound filtering and email encryption* protect confidential data and support compliance—for complete gateway security. Advantages Detect and block APTs and targeted attacks Thwart targeted phishing attacks and advanced malware Simplify data protection and encryption Block more spam—proven #1 in independent tests 1 Osterman Research, Why You Should Consider Virtualization, February 2009 * Trend Micro Encryption for Gateway Add-on is an optional purchase Viruses Users Trend Micro Maximum Protection and Minimum Complexity at the Gateway InterScan Multilayered Protection Anti-virus Data loss Anti-spyware Spyware InterScan Messaging Security Virtual Appliance Virtualized email gateway security stops spam, phishing and email threats Contents filtering InterScan Web Security Virtual Appliance Virtualized web gateway security blocks web threats and includes URL filtering Advanced Threat Detection Trend Micro Encryption for Email Gateway Virtualized email gateway security encrypts email content and file attachments APT Hosted Email Security Trend Micro Hosted Email Security is a no maintenance required solution that delivers continuously updated protection to stop spam and viruses before they reach your network. InterScan Web Security Virtual Appliance Faced with today's advanced Internet threats and the growing use of cloud-based consumer applications in the workplace, application visibility is essential to understanding network risks. InterScan Web Security is a software virtual appliance that combines application control with advanced anti-malware scanning, real-time web reputation, and flexible URL filtering to provide superior Internet threat protection. Gateway Security Advantage GATEWAY Advantages Get instant visibility and control with Advanced Reporting and Management Stop web threats before they penetrate the perimeter Lower your TCO The integrated Data Loss Prevention protects your sensitive data Advantages Helps you reclaim productivity and bandwidth Helps free your time to implement critical business initiatives Gives you peace of mind Gateway Security Spam mail Internet Mails Trend Micro Hosted Email Security Viruses Trend Micro Spam mail InterScan Anti-virus Anti-spyware Phishing Data loss Clean mails Anti-phishing URL filtering Spyware Users URL filtering Customers’ site Web reputation Advanced Threat Detection APT 16 17 Encryption Endpoint Encryption Email encryption Client Endpoint Encryption encrypts data on a wide range of devices—laptops, desktops, tablets, CDs, DVDs, USB drives and any other removable media. This solution offers enterprise-wide full disk, file/folder, and removable media encryption, combined with granular port and device control to prevent unauthorized access and use of private information. A single management console allows you to manage both hardware and software encryption—enterprise-wide—for entire hard drives, specific files, folders, removable media, and storage devices. Trend Micro Email Encryption efficiently secures email delivered to anyone with an email address. Client-based encryption allows the end user to select which emails should be encrypted by merely clicking a button on the desktop. This ability for end users to encrypt specific emails with unique data complements policy-based encryption which automatically encrypts general content types. Together they create a complete email encryption solution. Trend Micro Email Encryption Client is a software plug-in for popular email clients that deploys without modifying existing business processes and integrates seamlessly with the existing email infrastructure. Features Advanced Reporting & Auditing Automate enforcement of regulatory compliance with policy-based encryption Receive detailed auditing and reporting by individual, organizational unit, and device Pre-Boot Multi-Factor Authentication Gain flexible authentication, including fixed password, CAC, PIV, Pin, and ColorCode® Trigger lockout feature in response to incorrect authentication attempts Administrative Tools & Active Directory Integration Leverage Active Directory and existing IT infrastructure for deployment and management Take the burden off IT staff by allowing users to change and reset passwords and accounts. Advantages Maximize Platform Coverage for Data & Device Encryption Encrypt private data with fully integrated full disk, file folder, USB, and removable media encryption Lower TCO with Centralized Policy Administration & Key Management Simplify operations with a unified data repository with single management server and console Simplify Remote Device Management Maintain compliance and protect your data without disrupting users in the event of a lost device or forgotten password. Manage policies and protect data on PCs, laptops, tablets, USBs, CDs, DVDs Users Trend Micro Email Encryption Client Internet Hosted Central Trust Authority Users Encryption for Email Gateway Enterprise gateway encryption augments email security by providing policy-based encryption and integration with messaging security infrastructure. The solution provides simple deployment and administration without altering existing business processes. When combined with content security, it enables enterprises to encrypt emails and attachments automatically, without having to rely on individual users to secure private information. Messaging Security Gateway Trend Micro Endpoint Encryption Full Disk Encryption File Encryption Level 2 Level 2 Level 2 Users Internet Encryption Encryption Key Features Centralized policy and key management FIPS 140-2 encryption certification AES 256-bit encryption Users File and folder encryption Removable media (CD/DVD/USB) encryption Granular port and device control Self-encrypting drive management Full disk encryption Network-aware pre-boot authentication Trend Micro Email Encryption Gateway Automatic Synchronization and sharing Plug-ins Hosted Email Encryption for Hosted E-mail Security This policy-based encryption service seamlessly integrates with the content filtering capabilities of Hosted Email Security to identify particular types of content and encrypts emails when the rules are triggered. * Must use Hosted Email Security with outbound content filtering. No additional hardware or software is required. 18 19 Network Security Network, Data Loss Prevention Deep Discovery solution Custom Defense Services Trend Micro Deep Discovery provides the network-wide visibility, insight and control that enterprises and government organizations need to reduce the risk of Advanced Persistent Threats (APTs) and targeted attacks. Deep Discovery uniquely detects and identifies evasive threats in real-time, and provides the in-depth analysis and actionable intelligence needed to prevent, discover and contain attacks against corporate data. Today’s most damaging attacks are targeted specifically at your people, your systems, your vulnerabilities, and your data. Advanced persistent threats (APTs) are stealthier and more sophisticated than ever, using insidious social engineering techniques to quietly penetrate your organization to deploy customized malware that can live undetected for months. Then when you are least expecting it, cybercriminals can remotely and covertly steal your valuable information—from credit card data to the more lucrative intellectual property or government secrets—potentially destroying your competitive advantage, or in the case of government even putting national security at risk. Command and Control callback blacklist local update Sharing new C&C callback blacklist (IP addresses/URLs) found during sandbox analysis to customer’s current security solution to block the targeted attack communications. APT & Targeted Attack Detection Reduces the risk of damages and data loss from APTs Network-Wide Visibility Reveals and tracks your true security posture Deep targeted attack insight and recommendation Delivers real-time threat profiling and remediation information Integration capability Integrates results with the blocking device and exports as security policies, that improves enterprise-wide threat detection and prevention Deep Discovery solution includes 1 .Deep Discovery Inspector 2.Deep Discovery Advisor How Deep Discovery works Attack Detection Emails containing embedded document exploits Drive-by downloads Zero-day & known malware Decode & decompress embedded files Sandbox simulation of suspicious files Browser exploit kit detection Malware scan (Signature & Heuristic) Suspect Communication C&C communication for all malware: bots, downloaders, data stealing, worms, and blended threats Backdoor activity by attacker Destination analysis (URL, IP, domain, email, IRC channel, …) via dynamic blacklisting, white listing Smart Protection Network URL reputation Communication fingerprinting rules Attack Behavior Malware activity: propagation, downloading, spamming... Attacker activity: scan, brute force, service exploitation... Data exfiltration Malicious Content Rule-based heuristic analysis Identification and analysis of usage of 100’ s of protocols & apps including HTTP-based apps Network Security Attackers Malicious Sites Backdoors Visualize Deep Discovery Advisor Deep Discovery Inspector ANALYZE ADAPT Assessment Analysis and Advisory Monitoring and Alert Attack mails InterScan Web Security Virtual Appliance InterScan Messaging Security Virtual Appliance 20 Investigation and mitigation Components Advantages Critical System Assessment Onsite critical systems for their health check. Provide assessment report and recommendations for breach prevention. Network Assessment Visibility of hidden malicious activities with one time assessment service deploying Deep Discovery Inspector. Monitoring network and endpoints. Analyze Monthly Advisory Quarterly advisory meeting based on data collected through Deep Discovery. Monthly Advisory report and recommendation based on data collected through Deep Discovery. Adapt Monitoring & Alert 24x7 monitoring through Deep Discovery. Email and phone notification for potential risks. Breach Investigation Onsite investigation and analysis of suspected systems by the security experts. System Cleanup The tool to mitigate and cleanup compromised systems. Clean up compromised systems on which Deep Discovery detects suspicious C&C activities. Custom Signature SLO Customized pattern files based on malicious files specifically collected in customer sites. 6 hours SLO. Server farm Respond Inspection Detection RESPOND Service components and advantages Services Deep Security Analysis Adapt DETECT Detect Share local threats intelligence from Deep Discovery Advisor with Trend Micro products and 3rd party security products to prevent connections to malicious sites including C&C (Command & Control) servers. Respond The Custom Defense Services is the solution that helps customers to detect, analyze, adapt and respond to recent attacks represented by targeted attack s and APTs. Service overview Detection Methods Detect Network Security Advantages Block Network VirusWall OfficeScan 21 Network Security Security Management Network, Data Loss Prevention Network VirusWall Enforcer Trend Micro Control Manager Trend Micro Network VirusWall Enforcer protects your corporate network by ensuring that all devices comply with your corporate security policy before entering your network. As an agentless NAC solution, it can scan any device—managed or unmanaged, local or remote—for the most up-to-date security and critical Microsoft patches. Non-compliant devices are automatically quarantined and sent through remediation. Once a device meets security requirements, it is allowed access to the network. Network VirusWall Enforcer also filters network traffic to detect and block network worms—with zero false positives. The easy-to-manage appliance isolates infected areas from the rest of the network so threats cannot spread. Streamline administration of Trend Micro security solutions with the latest version of Control Manager. This web-based management console tracks security performance, reports malware events and policy violations, and automates routine tasks. New features include a customizable dashboard and at-a-glance access to threat statistics from the Trend Micro Smart Protection Network, Trend Micro's cloud-based security infrastructure. Advantages Lowers security risks Checks every device Secures network traffic Minimizes damage Simplifies management Block unknown viruses. Advantages Reduce risks Gain security insight and control Lowers costs Simplify security management Minimize complexity Create an integrated, centrally managed security framework for a unified defense Control Manager is available in two versions: Standard and Advanced Trend Micro Control Manager Users Standard Advanced Web-based Centralized Security Management Customizable Dashboard, Ad Hoc Query, Alerts Trend Micro Network VirusWall Enforcer Smart Protection Network Threat Statistics Quarantine devices. Visibility into Clients Multi-Tiered Management Customizable Reporting License Management Integrated Data Loss Prevention Exchange Advantages Integrated Data Loss Prevention Data protection capabilities integrated within traditional enterprise security solutions, from endpoint to messaging and network, simplify deployment, reduce infrastructure cost, and provide peace-of-mind for data compliance Central DLP policy management Central configuration and application of pre-defined policy templates across protection layers reduces initial and ongoing administrative effort and provides consistent policy enforcement enterprise-wide Customizable, consolidated displays and reports Aggregated logs, reports and dashboard views provide real-time, enterprise-wide visibility into potential data breaches and data policy violations Security Management Network Security Trend Micro integrated DLP with central policy management simplifies data protection across multiple layers of the existing IT security infrastructure, streamlining administration and providing more consistent enforcement to increase data protection and compliance with little additional effort or cost. SharePoint Firewall Internet Trend Micro Control Manager Mail Gateway Web Gateway Endpoints 1. Centrally configure DLP policies 2. Centrally monitor DLP violation =Trend Micro iDLP 22 23 Online Storage Offline Security / USB Security SafeSync for Enterprise Portable Security SafeSync for Enterprise enables larger companies to securely sync, share and manage documents, while also providing an essential private cloud environment for IT to consolidate scattered documents in a controlled space. With SafeSync for Enterprise, IT increases users agility and convenience, by allowing the distribution and access to large documents whether in the office or on the road. Trend Micro Portable Security is a new concept in antivirus products designed for environments where installing antivirus can be difficult - manufacturing environments, medical offices, public institutions, or schools. Portable Security uses a USB memory device to enable IT managers to scan and eliminate viruses, whether you are linked to the internet or not. Advantages Access: Access all files from anywhere, at any time, and from any device, secured by centrally managed user access controls. Share: Share files and folders instantly using secure shareable links, and use team folders to collaborate on files. Sync: Sync files across every device used by team members to keep them safe and accessible even if computer or mobile devices fail or get lost. Advantages Deploys rapidly and scales over time, no installation required Functions via USB memory device, no installation required Scans and removes viruses using the latest pattern files Tracks your scanning practice -includes native log data management Can be updated via single management computer Closed network environment Trend Micro Configure the scanning tool and update the tool with the latest virus pattern file Active Update Server Get the latest virus pattern file Scanning tool Connect Internet Management Computer Manage log data Trend Micro Portable Security Scan for viruses and collect log data Offline environment Trend Micro USB Security Trend Micro USB Security (TMUSB) is stored within the USB memory device, and is an antivirus solution which prevents virus infection. Thus, even when USB memory devices connected to the devices or systems where anti-malware is not available, TMUSB prevents malwares to travel from/to these devices. Trend Micro USB Security Features & Advantages Online Storage Real-time scan of files on USB storage Initial scan : scan the entire storage of USB storage when it is inserted into a PC Manual scan: scan the entire USB storage at the user's convenience Quarantine of detected viruses (removal to a quarantined area) Manual/automatic update of virus pattern files and the virus scan engine Various administrative functions for quarantine information and log data Installed in the USB storage device, Trend Micro USB Security performs a virus scan on the data to ensure that there is no contamination from viruses Quarantined area If a virus is detected, it will be safely quarantined in a storage area of the USB memory. Offline Security / USB Security This product is offered as embedded function in designated device distributed by selected vendors. 24 25 Services Premium Support Program Project Consulting Service To help you fully leverage the value of your Trend Micro solutions and to achieve optimized IT service levels, you can rely on Trend Micro Premium Support Program. Working as an extension to your team, Premium Support Program delivers a business critical component of your IT security management program. You gain proactive security resources for customer advocacy and a partner to help you optimize your security profile across technology, processes, and people. Our Technical Account Managers (TAM) are security experts with extensive product knowledge, threat expertise, and access across the Trend Micro ecosystem to help you get the most out of your Trend Micro investment. With Trend Micro Project Consulting Services, your IT staff can rely on a trusted advisor and partner to help meet your company’s goals. Our experts have the insight and security expertise needed to design the optimal architecture for maximizing the effectiveness of your Trend Micro solutions. Analyzing your security requirements and working closely with your team, our experts will craft a detailed plan specifically tailored to meet your needs. Advantages Proactive security services with regular touch points Trusted security expertise that augments your team resources Fully optimized security posture that reduces your risk exposure SILVER GOLD PLATINUM 4 hours 2 hours 1 hours 24x7 24x7 24x7 Dedicated Technical Account Manager (TAM) Response Time Telephone Access to Support Engineers ASSESS PLAN BUILD MANAGE Expert Services Service Level and Feature Matrix Description Trend Micro Project Consulting Service Trend Micro’s best-of-breed antivirus products enable an organization to cover messaging, Web, endpoint , and network security. Expert-on-Guard (EoG) is a Trend Micro Expert Service that uses these products and technologies to proactively detect threats and vulnerabilities that compromise the confidentiality, integrity, and availability of an organization’s data, applications, or operating systems. Remote Problem Diagnosis and Remediation Support Proactive Threat Alerts Access to Advanced Engineers Priority Case Handling Annual Proactive Security Planning 2-Hours SLA for Malware Support Crisis Management Planning Assistance Services Services Multi-Region Support Capabilities 26 27