Deep Security 9
Total Page:16
File Type:pdf, Size:1020Kb
trend Micro™ DeeP SeCurity 9 Comprehensive Security Platform for Physical, Virtual, and Cloud Servers Accelerate Virtualization, VDI, and Cloud ROI Virtualization and cloud computing have changed the face of today’s data center. Yet as • Provides a lighter, more manageable way to secure VMs with the industry’s first organizations move from physical environments to a mix of physical, virtual, and cloud, and only agentless security platform many have addressed the prevailing threat landscape with yesterday’s mix of legacy built for VMware environments security solutions. The results can actually threaten desired performance gains—causing • unparalleled agentless security undue operational complexity, leaving unintentional security gaps, and ultimately architecture with improved resource hindering the organization’s ability to fully invest in virtualization and cloud. efficiency via eSX scanning deduplication • Delivers significantly more efficient Trend Micro Deep Security provides a comprehensive server security platform designed resource utilization and higher VM densities of traditional security solutions to protect your virtualized data center from data breaches and business disruptions while enabling compliance. This agentless solution simplifies security operations while • Improves the manageability of security in VMware environments by reducing accelerating the ROI of virtualization and cloud projects. Tightly integrated modules the need to continually configure, easily expand the platform to ensure server, application, and data security across update, and patch agents physical, virtual, and cloud servers, as well as virtual desktops. So you can custom tailor • Secures VMware View virtual desktops your security with any combination of agentless and agent-based protection, including while in local mode with an optional agent anti-malware, web reputation, firewall, intrusion prevention, integrity monitoring, and log • Coordinates protection with virtual inspection. The result is an adaptive and efficient server security platform that protects appliance and agents to allow continuous mission-critical enterprise applications and data from breaches and business disruptions and optimized protection of virtual servers as they move between data without expensive emergency patching. center and public cloud keY feaTuReS Maximize Operational Cost Reductions Prevent Data Breaches Achieve Cost-effective Compliance • Reduces complexity with tight integrations and Business Disruptions • addresses major compliance requirements to management consoles from Trend Micro, • Detects and removes malware in real time for PCI DSS 2.0, as well as HIPaa, NIST, VMware, and enterprise directories with minimal performance impact and SaS 70 with one integrated and cost-effective solution • Provides vulnerability protection to • Blocks malware that attempts to evade prioritize secure coding and cost-effective detection by uninstalling or otherwise • Provides detailed, auditable reports that implementation of unscheduled patching disrupting the security program document prevented attacks and policy compliance status • eliminates the cost of deploying multiple • Shields known and unknown vulnerabilities software clients with a centrally managed, in web and enterprise applications and • Reduces the preparation time and effort multi-purpose software agent or operating systems required to support audits virtual appliance • Detects and alerts suspicious or • Supports internal compliance initiatives to • Reduces management costs by automating malicious activity to trigger proactive, increase visibility of internal network activity repetitive and resource intensive security preventative actions • Leverages proven technology certified to tasks, reducing false-positive security • Leverages the web reputation capabilities Common Criteria eaL 4+ alerts, and enabling workflow of security of one of the largest domain-reputation incident response databases in the world to protect users • Significantly reduces the complexity of managing from accessing infected sites file integrity monitoring with cloud-based event whitelisting and trusted events Page 1 of 4 • datasheet • deeP security 9 DeeP SeCuRITY PLaTfORM MODuLeS Anti-Malware Web Reputation Bidirectional Stateful Firewall • Integrates VMware vShield endpoint aPIs • Integrates with the Trend Micro™ Smart • Decreases the attack surface of physical, to protect VMware virtual machines against Protection Network™ for web reputation cloud, and virtual servers with fine-grained viruses, spyware, trojans and other malware capabilities that strengthen protection for filtering, design policies per network, and with zero in-guest footprint servers and virtual desktops location awareness for all IP-based protocols and frame types • Delivers an anti-malware agent to extend • Provides agentless web reputation on the same protection to physical servers as well as virtual appliance as agentless anti-malware • Centrally manages server firewall policy, public cloud servers and intrusion prevention for greater virtual including templates for common server types server security without added footprint • NeW! Now includes improved performance • Prevents denial of service attacks and detects through eSX level caching and deduplication. reconnaissance scans • Optimizes security operations to avoid antivirus storms commonly seen in full system scans and pattern updates Intrusion Detection and Prevention • Tamper-proofs security from sophisticated • Protects against known and zero-day attacks Log Inspection attacks in virtual environments by isolating by shielding known vulnerabilities from • Collects and analyzes operating system malware from anti-malware unlimited exploits and application logs for suspicious behavior, • examines all incoming and outgoing traffic security events, and administrative events for protocol deviations, policy violations, or across your datacenter content that signals an attack • assists compliance (PCI DSS 10.6) to optimize Integrity Monitoring • automatically shields newly discovered the identification of important security events vulnerabilities within hours, pushing buried in multiple log entries • Monitors critical operating system and protection to thousands of servers in application files, such as directories, • forwards events to SIeM system or minutes without a system reboot registry keys, and values, to detect and centralized logging server for correlation, report malicious and unexpected changes • assists compliance (PCI DSS 6.6) to protect reporting, and archiving in real time web applications and the data they process • NeW! utilizes Intel TPM/TXT technology • Defends against SQL injection, cross-site to perform hypervisor integrity monitoring. scripting, and other web application Monitors for any unauthorized changes to vulnerabilities the hypervisor, thereby extending security • Shields against vulnerabilities until code fixes and compliance of virtualized systems to can be completed the hypervisor. • Includes out-of-the-box vulnerability protection • Reduces administrative overhead with for all major operating systems and over 100 trusted event tagging that automatically applications, including database, web, email, replicates actions for similar events across and fTP servers the entire data center • Provides increased visibility into, or control • Simplifies administration by greatly reducing over applications accessing the network the number of known good events through automatic cloud-based whitelisting from Trend Micro Certified Safe Software Service Page 2 of 4 • datasheet • deeP security 9 Physical virtual cloud desktoP/laPtoP Deep Security agent Deep Security Virtual appliance Deep Security Manager Security Center Security Profile IT Infrastructure Integration alerts Deep Security Helps You Resolve key Business Issues Virtual Patching Shield vulnerabilities before they can be Reports administrator exploited, eliminating the operational pains of emergency patching, frequent patch cycles, and costly system downtime. Virtual Desktop and Server Security BuILT fOR VMWaRe VIRTUAL aND CLOuD eNVIRONMeNTS Protect virtual desktops and servers against zero-day malware while minimizing deep security is specifically designed for virtual environments. Its agentless architecture addresses operational impact from resource aV storms, minimizes operational complexity of security and allows organizations to increase VM inefficiencies and emergency patching. densities and accelerate virtualization and cloud adoption. Developed in close collaboration with VMware, Deep Security is the first product in its category to offer support for VMware vSphere Compliance 5.1 and VMware vShield endpoint 5.1. Deep Security also provides full backward compatibility with achieve and prove compliance to a vSphere 4.1 and 5.0 environments. The Deep Security 9 Manager also supports mixed mode VMware number of regulatory requirements environments supporting both vSphere 5.1 and vSphere 5.0 protected by the Deep Security 9 or 8 including PCI DSS 2.0, HIPaa, virtual appliances. fISMa/NIST, NeRC. SaS 70 and more. Integrated Server Security Consolidate all server security point PLaTfORM aRCHITeCTuRe products into one comprehensive, integrated and flexible platform that Deep Security Virtual Appliance. Transparently enforces security policies on VMware vSphere optimizes protection across physical, virtual machines for agentless anti-malware, web reputation, intrusion prevention, integrity virtual, and cloud servers. monitoring,