DATASHEET

Trend Micro DEEP SECURITY Agile Security Built for the

Organizations are embracing the economic and operational benefits of cloud Key benefits computing, turning to leading cloud providers including •• Fast: start securing workloads (AWS), Azure, and others. In the cloud, security is a shared responsibility. in minutes The cloud provider is responsible for the security of the physical and network •• Cost-effective: usage-based infrastructure up to the hypervisor layer. It’s up to you to protect what you put in pricing starting at $0.01 / hour the cloud—the workloads—including operating systems, service configuration, •• Comprehensive: multiple security applications, and data. controls in a single product Built on Trend Micro’s industry-leading cloud and security solution, •• Saves time: we manage and Trend Micro Deep Security as a Service is designed to augment cloud provider update the product so you can focus on your business security with comprehensive protection for cloud workloads. The Deep Security service provides a complete suite of security capabilities including intrusion •• Proven: protects thousands of detection and prevention, firewall, anti-malware, integrity monitoring, log customers and millions of servers globally inspection, and web reputation.

Deep Security as a Service gives you the proven protection of Deep Security without all the work. As a service deployment means we do the heavy lifting for you. We manage regular product and kernel updates, set up and maintain the security database, and administer the Deep Security manager.

Our cloud-based security offering enables quick setup and automates and simplifies security operations for cloud instances.

SIMPLIFY SECURITY PREVENT DATA BREACHES ACHIEVE COST-EFFECTIVE MANAGEMENT AND BUSINESS DISRUPTIONS COMPLIANCE •• Reduces resources needed for set up •• Immediately protects against •• Addresses major compliance and management vulnerabilities like Shellshock or requirements for PCI DSS, as well as •• Simplifies purchasing and Heartbleed HIPAA, NIST, SANS, and SSAE 16 with management with multiple security •• Blocks malware, including ransomware, one solution controls in one product that attempts to evade detection •• Provides detailed, auditable reports •• Lowers management costs by •• Ensures cloud servers only that document prevented attacks and automating repetitive and resource- communicate with expected systems policy compliance status intensive security tasks and safe domains •• Reduces the preparation time and •• Detects and alerts you of suspicious or effort required to support audits malicious activity

Page 1 of 4 • DATASHEET • DEEP SECURITY AS A SERVICE KEY FEATURES

Intrusion detection and prevention Anti-malware Bidirectional firewall •• Proactive intrusion prevention as well •• Protects your workloads against •• Decreases the attack surface by as detection malicious software creating a firewall perimeter to block •• Protects against known and zero- •• Isolates malware to protect instances attacks day attacks by shielding known from sophisticated attacks, including •• Limits communication to only the ports vulnerabilities ransomware and protocols necessary

•• Examines all incoming and outgoing Integrity monitoring •• Centrally manages server firewall policy, traffic for protocol deviations, policy including templates for common server violations, or content that signals an •• Monitors and tracks system changes types attack and reports malicious and unexpected changes in real time Log inspection •• Virtual patching helps compliance with major regulations like PCI DSS, HIPAA, •• Event tagging automatically replicates •• Collects and analyzes operating system etc. actions for similar events and application logs for suspicious behavior, security events, and •• Defends against SQL injection, Web reputation administrative events cross-site scripting, and other web ™ application vulnerabilities •• Integrates with Trend Micro Smart •• Assists compliance (PCI DSS) by Protection Network™ to prevent identifying of important security •• Provides increased visibility into, or communication with known Command events control over applications accessing the and Control servers network •• Forwards events to SIEM system or centralized logging server for correlation, reporting, and archiving

CLEAR CONTROL AT YOUR FINGERTIPS •• Enables policy-driven management and administration •• Customizable dashboard enables users to see the health of their security environment at a glance •• Customizable policy templates allow users to enable and disable security controls on the fly based on rules they assigned •• Provides immediate notification of events or activities that may require immediate attention (Logging Alert)

Page 2 of 4 • DATASHEET • DEEP SECURITY AS A SERVICE CLOUD INSTANCES DEEP SECURITY INTEGRATED AS A SERVICE DASHBOARD

Instances Instances Alerts

Reports Administrator

Deep Security Agent

ELASTIC, SEAMLESS, AND STRESS-FREE Deep Security as a Service helps you resolve key business issues •• Designed to seamlessly integrate with cloud and virtual environments for fast and easy deployment Virtual patching Shield vulnerabilities before they •• Works with industry-leading cloud management tools such as Chef, Puppet, can be exploited and eliminate the SaltStack, Ansible, and others operational pains of emergency •• The AutoSync feature detects new instances and provides detailed information that patching, frequent patch cycles, and can be used to automatically set security policy without administrative intervention costly system downtime Zero-day security Protection against zero-day BUILT FOR SECURITY IN THE CLOUD vulnerabilities while minimizing operational impact from resource Trend Micro Deep Security as a Service is optimized for leading cloud providers’ inefficiencies and emergency patching infrastructures, including support of the most common operating systems: Compliance Achieve and prove compliance with a number of regulatory requirements for PCI DSS, HIPAA, SANS, NIST, SSAE 16, and more Integrated security Shift from multiple point products to one comprehensive security service

And compatibility with configuration management tools:

Page 3 of 4 • DATASHEET • DEEP SECURITY AS A SERVICE SUPPORTED PLATFORMS Key certifications and alliances •• Microsoft Windows (32-bit/64-bit) •• AWS SaaS Partner and •• Amazon Linux AMI (32-bit/64-bit) Security Competency •• Ubuntu (64-bit) •• Level 1 PCI DSS Certified •• CentOS 5, 6, 7 Service Provider •• Oracle Linux •• PCI Suitability Testing for HIPS •• Cloud Linux 5, 6 (NSS Labs) •• Red Hat® Enterprise 5, 6, 7 (32-bit/64-bit) •• Microsoft Certified Partnership ® •• SUSE Enterprise 10, 11 (32-bit/64-bit) •• Certified Red Hat Ready

DEEP SECURITY AS A SERVICE FITS HOW YOU USE THE CLOUD Built for leading cloud providers Pay only for what you use with Trend Micro Deep Security as a Service. Get comprehensive protection for your cloud workloads starting at only $0.01 per hour—with no long term commitments or minimum fees.

Flexible pricing to meet cloud needs:

Deep Security as a Service usage-based pricing

MICROSOFT AZURE AWS EC2 INSTANCE SIZE HOURLY PRICE (USD) VIRTUAL MACHINE Micro, small, medium 1 Core: A0, A1, D1 $0.01 Large 2 cores: A2, D2, D11, G1 $0.03 4+ cores: A3-A11, D3-D4, D12-D14, XLarge and above $0.06 G2-G5, D3, D4, D12-D14, G2-G5

Requires use of the Deep Security Cloud Connector (included). Price is $0.06/hour for unknown instance sizes.

AWS and Azure Marketplace: Leverage the effortless deployment of Deep Security as a Service while keeping payments on your AWS or Azure bill. Securing Your Journey to the Cloud

©2016 by Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, and Trend Micro Smart Protection Network are trademarks or registered trademarks of Trend Micro Incorporated. All Deep Security is available as software, as a service, or from the other company and/or product names may be trademarks or registered trademarks of their owners. Information contained in this document is Marketplaces of leading Cloud providers like AWS and Azure. subject to change without notice. [DS06_DSaaS_161215US]

Page 4 of 4 • DATASHEET • DEEP SECURITY AS A SERVICE