Trend MicroTM. Total Product Catalogue

Size: px
Start display at page:

Download "Trend MicroTM. Total Product Catalogue"

Transcription

1 TM Total Product Catalogue

2 Our Company Company Introduction Our History Our Company Management Eva Chen CEO Mahendra Negi CFO Steve Chang Chairman has continuously defended against security threats since its inception. As modern network environments have grown more complex and diverse, the threats against them have become steadily more sophisticated. has kept pace with the evolution of both, providing strong yet flexible solutions. Our Company Eva Chen CEO Jenny Chang Co-Founder and CCO 연락처 서울시강남구대치동 홍우빌딩 6층 TEL FAX never stops innovating to deal with emerging new threats Cyber Threats & Targeted Attacks Closed-System Infrastructure Mobility & BYOD Virtualization & Cloud Computing Age of Internet Proliferation of Usage Servers & Storage Our Vision A world safe for exchanging digital information Our Mission Defend against threats that would impact user s digital life or IT infrastructure. Desktop/PC Era Antivirus product Titanium TM (Known as PC Cillin) 1991 Server solution ServerProtect TM 1996 Block s with malware attached InterScan TM VirusWall TM 2004 Inspect packets to prevent malicious virus intrusion and malicious traffic NetWork VirusWall TM Family Fighting against new threats 2008 Cloud-based Global Threat Intelligence Smart Protection Network TM 2010 Agentless security in the virtual environment Deep TM Encrypt the data on the cloud SecureCloud TM* *Released in Protection against targeted attacks Deep Discovery TM Deep Discovery Inspector * *Released in Virus detection and cleanup tool for Off-line device Portable Protect control system (ICS), embedded device and devices for specific purpose in closed environment Safe Lock 2014 for smartphone / Device management Delivering the best solutions for the latest IT environments Mobile * *Released in 2008 technology for comfort and safety of Mobile Apps Mobile App Safe Mobile Workspace Our Strategy Be the threat defense expert that adapts quickly to evolving user behaviors, infrastructure and threat vectors Founded in Los Angeles, USA 1989 Incorporated established 1991 VirusBuster developed and distributed 1996 Osaka office established Internet server virus countermeasure product "InterScan VirusWall" developed and distributed 1997 Fukuoka office established 1998 Nagoya office established Stock offered to the public as over-the-counter issues 2000 Listed in the first section of the Tokyo Stock Exchange 2002 Selected for Nikkei Stock Average (Nikkei 225) stock composition 2003 Centralized management tool " Control Manager " released Network virus countermeasures device (Network VirusWall Family) released Comprehensive contract relating to network virus prevention solutions signed with Cisco Systems, Inc. Acquisition of InterMute Inc. (USA) Acquisition of Kelkea Inc. (USA) Provision of Network Service begins Privacy Mark certification gained Provision of Service, including Service, begins Acquisition of Provilla, Inc. (USA) Acquisition of Identum Ltd. (UK) LeakProof released (presently Data Loss Prevention ) Mobile released 2009 Acquisition of Third Brigade (Canada) Listed in Global 100 Most Sustainable Corporations in the World Deep released Acquisition of humyo (UK) Online Storage SafeSync released Vulnerability Management Services released SecureCloud released VirusBuster Mobile for Android released TrendLabs SM Philippines gains ISO20000 standard Deep Discovery released Provision of " SSL " begins 2013 Deep as a Service for Amazon Services released 2014 Deep Discovery Inspector released

3 Our Company Global Network - Smart Protection Network Global Protection Against Dangers That Know No Borders The world s most advanced global threat intelligence Because threats can appear anywhere and spread everywhere, 's network spans the globe. Delivering professional peace of mind in the age of mass consumerization, cloud-based security, and secretive cyber attacks Originally founded in California in 1988, has since become a truly transnational company. Now headquartered in Japan, has offices across Asia, Australia, the Middle East, Europe, and the Americas to help monitor both worldwide and regional emerging threats and provide solutions as quickly as possible. 's cloud security infrastructure quickly identifies the latest threats and immediately provides the optimum solutions with a minimal burden on businesses. Our Company Our Company Global Network - Global Map Threat Information Collected Worldwide Global Network Ireland Collection of threat information UK France Germany Identification and analysis of threats USA (California) Japan China USA (Head Office) (Texas) Taiwan Customer protection Cloud-Based Solutions Based on Rapid Threat Analysis Philippines (Headquarters) Brazil 1 Collection of threat information Global Sensor Network 2 Identification and analysis of threats Global Threat Intelligence 3 Customer protection Proactive Protection Development Sites Collects More Information in More Places Hundreds of millions of sensors 16 billion threat queries daily Major Overseas Bases TrendLabs Philippines received ISO certification for adhering to IT service excellence in compiling malicious software information, detection and cleanup procedures, and technical services. Japan <Information Collected> URLs Vulnerabilities Files Domains Network traffic Cyber attackers Mobile applications IP addresses Exploit kits Accurately Analyzes & Identifies Threats Faster Identifies new threats 50x faster than average (NSS Labs) <Data Analyzed> Approximately 180,000 pieces of threat information identified daily 100TB of data is correlated Blocks Real-World Threats Sooner 250M threats blocked daily 500k new threats identified per day <Supporting Technology> reputation reputation File reputation White-listing Vulnerabilities and exploits Mobile App Network traffic rules Cyber criminal intelligence Head Office Philippines TrendLabs Regional Trend Labs Development Sites Overseas Subsidiary (Headquarters) Japan USA USA Japan Canada Taiwan Germany Germany UK Ireland Taiwan China China France India Brazil Australia Ireland Germany China China (Beijing) (Shanghai) Taiwan France Panama (Hong Kong) India Korea Italy UK Australia Netherlands Canada Thailand Switzerland Malaysia Singapore Brazil New Zealand Austria Belgium Denmark UAE(Dubai) Norway Sweden Turkey Vietnam Philippines Egypt USA Ireland Mexico China Infrastructure in the Age of Targeted Attacks and Personal Mobile Devices Singapore France Brazil The Smart Protection Network cloud security infrastructure quickly and accurately identifies the latest threats and provides optimum solutions. By analyzing attacks using proprietary cloud technology and techniques, the Smart Protection Network swiftly identifies the latest threats and circulates solutions proactively. Smart Protection Network Benefits Smart Protection Network Numbers Totally new and highly complex security threats now appear at an astonishing rate, so has developed a multi-faceted security solution to rapidly and comprehensively identify, analyze, and resolve them. By employing an independent cloud infrastructure to collect and analyze a vast amount of threat data from around the world, can provide customers with nimble yet powerful security solutions. The Smart Protection Network also reduces the burden on company networks by relying on the cloud to do much of the heavy lifting. Summary of Smart Protection Network features Major Overseas Bases 4 Russia Saudi Arabia South Africa Indonesia Poland Israel Finland Spain File reputation reputation reputation Mobile App Smart Protection Server Network traffic rules Vulnerability rules White lists Cyber criminal intelligence Correlation analysis Smart feedback Amount of threat data correlated per day: 100 terabytes Number of queries processed per day: 16 billion Number of threats blocked per day: 250 million * study,

4 Our Company Changing Landscape for Today Smart Protection Strategy Our Company The Changing Threat Landscape For the first time ever, mobile devices now outsell PCs* 1. Organizations of all sizes have started embracing cloud-based solutions for storing data and business applications. The unprecedented amount of data now generated and stored online can now help more and more people make critical decisions, discover new opportunities, reduce customer churn, and promote greater operational efficiency. Smart Protection Strategy Everyone now recognizes that information requires protection regardless of the storage location or which devices and platforms transmit it. Administrators need inexpensive yet effective security solutions that they can easily manage and deploy with flexibility. Our Company This new environment has also resulted in a much more complex IT landscape with many more support requirements. At this moment, a new security threat appears almost every second. Over 90% of organizations have suffered from some sort of malicious software, but more than half never become aware of the intrusions.* 2 Hackers and cyber-attackers have clearly kept up with the new technology and still know exactly how to access protected customer data, credit card numbers, and private intellectual property. Cyber Threats Critical Strategies for Today The New Reality Information no longer protected by traditional defenses Endpoint solutions with limited visibility and de-centralized administration Customers Need Smart protection for information Simple yet flexible to manage and deploy Attackers Complex and dynamic environments with many new apps and platforms that fits an evolving ecosystem Consumerization Cloud and Virtualization products support the Smart Protection Strategy CUSTOM DEFENSE Smart Protection Strategy Smart Advanced, targeted threat detection Customizable sandboxes for accurate analysis Actionable insight from global threat intelligence Integration with leading SIEM solutions Simple Single appliance monitors multiple ports/protocols Automated, customized security updates that fits Sandbox analysis and custom signatures available to other security products Products/Services that fit Network Collaboration Gateway Endpoints/Server Service Deep Discovery Network VirusWall Enforcer ScanMail TM Series InterScan TM Messaging InterScan TM TM Deep Custom Defense Services Then Employees Company issued PC connected solely to the organization s network with access to a finite set of applications. Data center servers were physically located in the company data center. Corporate systems had the latest antivirus pattern file to protect them from the most recent broad-based attack. * 1 Asymco.com, June 2012 * survey Now IT Consumerization: no longer have a one-to-one relationship with their company-issued device or the corporate applications and network. Cloud and Virtualization: Many organizations have moved away from data centers in favor of a more agile network environment that includes virtualization and cloud-based computing. Cyber Threats: Sophisticated, stealthy, and social cyber threats now target businesses like never before. CLOUD & DATA CENTER SECURITY COMPLETE USER PROTECTION Smart Comprehensive protection across physical, virtual, cloud Automated protection from vulnerabilities with virtual patching Simple Single platform and administration with modular deployment Agent-less security for VMware TM ; efficient, high consolidation Easy multi-tenant and service provider management that fits Optimized, automated security for VMware, Amazon Services and Microsoft TM Azure Open: Microsoft, Linux TM, Solaris TM, Unix, VMware, Citrix Smart Layered security from mobile devices to gateways Transparent, real-time protection Simple Unified dashboard with centralized policy control Modular, lightweight and efficient Flexible deployment: on-premise or security as a service Purpose-built for enterprise, mid-market, service providers that fits Specialized plug-ins for Exchange, Domino, SharePoint TM Open: Win, Mac, ios, Android, Blackberry Powers IBM TM Endpoint Protection Server/Storage Cloud and viurtualization Endpoint Collaboration Gateway Integrated Data Loss Prevention ServerProtect Series SecureCloud Deep Enterprise Suite Worry Free TM Series Mobile SafeSync for Enterprise Endpoint Encryption Endpoint Application Control Vulnerability Protection ScanMail Series PortalProtect TM Hosted InterScan TM Series Integrated DLP 6 7

5 Product Map ERS WRS Mobile Services Deep FRS Service File Service For the Cloud Scalable from Physical server to Cloud environment Mobile Devices Customer Datacenter Deep for SAP Systems InterScan Virtual Appliance Deep Product Map Safe Lock Deep for Apps InterScan Messaging Virtual Appliance Router - ScanMail Suite for MicrosoftTM Exchange - PortalProtect - IM Deep Discovery Analyzer Firewall Portable 2 Deep Discovery Inspector TM Network VirusWall Enforcer Deep Discovery Endpoint Sensor ServerProtect Series ScanMail for Groupware Virus Switch Data Loss - - ServerProtect for Windows/Linux - Control Manager - plug-in IDF - plug-in Macintosh Worry-Free Business Cyber Threat Deep Discovery Inspector Deep Discovery Analyzer Deep Discovery Inspector Deep Discovery Endpoint Sensor Network & Management Network VirusWall Enforcer Entry Point C&C Lateral Movement Known Threats Respond Adapt Unknown Threats C&C callback blacklist sharing Corp IOC / YARA Offline Blocking Categories Endpoint Protection Products Endpoint Application Control Endpoint Encryption Vulnerability Protection Portable 2 Safe Lock Antimalware For Threats Antivirus Cloud & Data Center Products Anti-malware For Threats Encryption Antivirus Encryption & Collaboration 8 File Sharing Vulnerability / Intrusion Firewall FIM IDS / IPS Log Inspection Complete Intelligent Application Scanning Deep Deep as a Service Deep for SAP Systems Deep for Apps SecureCloud ServerProtect for NT/NW ServerProtect for Linux ServerProtect for Storage Data Loss Prevention Data Loss Prevention Endpoint Encryption Vulnerability / Intrusion Firewall Phishing URL Filtering Mobile Quarantine Network Virus Intrusion SSL Integrity Monitoring Spear Phishing Threat Behavior Blacklisting Firewall System Blacklisting Whitelisting Lockdown Application Control IDS/ IPS *1 Products Hosted InterScan Messaging Virtual Appliance PortalProtect for Microsoft IM for Lync and Office Communications Server Enterprise for Communication and Collaboration ScanMail Suite for Microsoft Exchange ScanMail Suite for IBM Lotus Domino Encryption Client Encryption Gateway Hosted Encryption Data Protection Integrated Unlimited Detection and SSL Protection Certificates Categories Whitelisting System Lockdown *2 Mobility Products Antivirus Categories Small Business Antivirus For Threats Anti-spam Products Antivirus URL Filtering AntiPhishing Antispam AntiPhishing Data Loss Prevention Encryption Gateway Products Antivirus Suite Remote Lock Remote Wipe Secure File Sharing Firewall Anti-spam URL Filtering Anti-spam Data Protection Data Loss Prevention Mobile Vulnerability / Intrusion Firewall For Threats Data Loss Prevention URL Filtering Data Loss Prevention Anti-Phishing InterScan Virtual Appliance InterScan as a Service Anti-malware Categories Device Control Worry-Free Business Standard Worry-Free Business Advanced Worry-Free Business Services Data Loss Prevention Categories Encryption For Threats Anti-malware For Threats Vulnerability / Intrusion Data Loss Prevention URL Filtering Mobile Safe Sync for Enterprise Anti-malware Antimalware Categories Threats *1 Execution prevention by Application Control *2 Network Virus Protection Anti-malware Categories Spam Log Data Protection Inspection Share/Sync Management Server Suspicious Object Analyze Detect Spyware Server Storage Product Matrix Products Small Medium Environment - ScanMail Suite for Microsoft Exchange - ScanMail for IBM LotusTM DominoTM Endpoint Application Control Categories Hosted Collaboration Deep Discovery Inspector Enterprise for Endpoints From the Cloud Medium Enterprise Environment SafeSync for Enterprise Solution for analyzing networks for suspicious behavior/ suspicious objects and to respond to unknown threats Deep as a Service Product Map Standalone / Closed Environment Products Antivirus For Threats URL Filtering Vulnerability / Intrusion Data Protection Anti-spam Anti-spam Data Loss Prevention Mobile Endpoint Encryption Encryption Firewall IDS/ IPS Enterprise for Endpoints Enterprise for Endpoints and Mail Servers Enterprise Suite Enterprise and Data Protection Enterprise Data Protection Smart Protection Complete Smart Protection for Endpoints 9

6 Cyber Threat Deep Discovery Solution Deep Discovery Inspector Deep Discovery Analyzer Cyber Threat Deep Discovery Solution Deep Discovery provides 360 degree network-wide visibility, insight and control that enterprises and government organizations need to reduce the risk of Advanced Persistent Threats (APTs) and targeted attacks. Deep Discovery uniquely detects and identifies evasive threats in real-time, and provides in-depth analysis and actionable intelligence needed to prevent, discover and contain attacks against corporate data. Refer to trendlab APT report, 95% APT attacks come from spear-phishing attacks. The new member of Deep Discovery family-deep Discovery inspector is a completed anti-spear-phishing solution to detect, analysis and block the spear-phishing into enterprise. Deep Discovery solution includes 1.Deep Discovery Inspector 2.Deep Discovery Analyzer 3.Deep Discovery Inspector 4.Deep Discovery Endpoint Sensor How Deep Discovery Works Malicious Content Suspect Communication Attack Behavior Attack Detection s containing embedded document exploits Drive-by downloads Zero-day & known malware C&C communication for all malware: bots, downloaders, data stealing, worms, and blended threats Backdoor activity by attacker Malware activity: propagation, downloading, spamming... Attacker activity: scan, brute force, service exploitation... Data exfiltration Detection Methods Decode & decompress embedded files Sandbox simulation of suspicious files Browser exploit kit detection Malware scan (Signature & Heuristic) Destination analysis (URL, IP, domain, , IRC channel, ) via dynamic blacklisting, white listing Smart Protection Network URL reputation Communication fingerprinting rules Rule-based heuristic analysis Identification and analysis of usage of 100 s of protocols & apps including HTTP-based apps Cyber Threat Smart Protection Network Internet Deep Discovery Inspector Big Branch Deep Discovery Inspector Monitors branch network Router Deep Discovery Inspector provides network-wide visibility, insight, and control needed to combat APTs and targeted attacks. For advanced threat protection, Deep Discovery Inspector uniquely detects and identifies evasive threats in real time, then provides in-depth analysis and relevant actionable intelligence to assess, remediate, and defend organizations against targeted attacks. Hypervisors Storage Control Manager NG FW/IPS Deep Discovery Inspector DNS App Public-DMZ APT & Targeted Attack Detection Zero-day malware and document exploits detection Attacker network activity threats (exploits, drive-by-downloads) Bots, trojans, worms, keyloggers 360 degree Network-Wide Visibility More than 80 protocols analyzed GeoTrack identifies the origins of malicious communication Quick access widgets provide critical information at a glance In-Depth Contextual Analysis & Insight Provides the threat intelligence needed to understand and respond to an attack Includes a customizable sandbox fully reflects true operating environments like support non-en OS platform in the production network Detects targeted attacks threats which come through executable files, PDF files, Flash files, RTF files and other objects File Exchange DB App Deep Discovery Analyzer Sandbox analysis in-depth Internal Servers Forensics/ Team Deep Discovery Inspector Monitors lateral movement Human Resources Deep Discovery Inspector Monitors ingress/egress Deep Discovery Endpoint Sensor Marketing Pre-deployed Deep Discovery Endpoint Sensor agents monitor workstations. Note: recommends deploying Deep or agents on workstations for optimal protection. Deep Discovery Analyzer Deep Discovery Analyzer provides open, scalable custom sandbox analysis to offer in-depth simulations of potentially malicious sample files, including executables and common Microsoft Office documents, and security update exports all in a unified intelligence platform. Threat Analyzer In-depth threat simulation and analysis uses sandbox simulation and other advanced detection engines to classify and deeply analyze submitted files Custom sandbox execution environments allow customers to create and analyze multiple fully custom target images that precisely match the host environments Intelligence Update Server Export useful security blocking information learned from Threat Analyzer simulation intelligence includes newly identified malicious IP/ URL addresses and file hash codes Integration capabilities Integration with Deep Discovery Inspector and other products provides expanded detection and analysis options to customers Integrated with its own threat intelligence portal to further understand and remediate an attack Integration with leading SIEM platforms delivers improved enterprise-wide threat management from a single SIEM console Provides a web service interface/api for customer to customize their own system integration

7 Cyber Threat Deep Discovery Inspector Deep Discovery Endpoint Sensor Network & Management Network VirusWall Enforcer Cyber Threat Deep Discovery Inspector Deep Discovery Inspector stops sophisticated targeted attacks and cyber threats by scanning, simulating, and analyzing suspicious links and attachments in messages before they can threaten networks. Designed to integrate into existing anti-spam/antivirus network topology, Deep Discovery Inspector can act as a Mail Transfer Agent in the mail traffic flow or as an out-of-band appliance silently monitoring for cyber threats. Cover most Spear-phishing attack detection in a single appliance Password derivation for zipped/protected files Embedded URL analysis via sandboxing, reputation, page analysis Document exploit detection and sandboxing for accurate detection of malicious attachments Custom Defense integration and intelligence sharing Co-exists with other security products Exporting IP/URL/File SHA-1 blacklist for other security solution integration Powerful policy management & investigation functions Provides schedules and on-demand incident and sandbox reports Policy definition by different security risk level Geo-map dashboard and widget design are easy to investigate the security incident Document exploit detection & custom sandboxing Custom sandbox execution environments allow the customer to create and analyze multiple fully custom target images that precisely match their host environments Multi-OS platform support like win7 and win XP with 32-bit and 64-bit Attachments analyzed include a wide range of win_exe, Microsoft Office, PDF, Zip, content and compressed file types Support up to 24 sandboxes in a device Network VirusWall Enforcer Network VirusWall Enforcer protects corporate networks by ensuring that all devices comply with the corporate security policy before entry. This agentless NAC solution can scan any device managed or unmanaged, local or remote for the most up-to-date security and critical Microsoft patches. Non-compliant devices get quarantined and sent through a remediation process automatically. Once a device meets the security requirements, it may access the network. Network VirusWall Enforcer also filters network traffic to detect and block network worms with zero false positives. The easy-to-manage appliance isolates infected areas from the rest of the network so threats cannot spread. Lowers security risks Checks every device Secures network traffic Minimizes damage Simplifies management Network VirusWall Enforcer Blocks unknown viruses Quarantines devices Network & Management Deep Discovery Endpoint Sensor Deep Discovery Endpoint Sensor is a context-aware endpoint security monitor that records and reports detailed system-level activities, allowing threat investigators to rapidly assess the nature and extent of an attack. Deep Discovery Endpoint Sensor uses Indicators of Compromise (IOC) information from Deep Discovery and other sources to perform multi-level searches across user endpoints and servers. Endpoint-resident Event Recording Deep Discovery Endpoint Sensor uses a lightweight agent to record significant activities and communication events at the kernel level Agents index and store information locally for the server's search and analysis activities Agents respond to a variety of real-time requests, including memory and registry snapshots Centralized Search and Analysis Searches can be executed directly from the Deep Discovery Endpoint Sensor web console or from Control Manager Endpoints can be queried for specific communications, specific malware, registry activity, account activity, running processes, and more. Search parameters can be individual parameters, OpenIOC files, or YARA files Interactive dashboards allow you to view and analyze system activities over time, assess enterprise-wide activity timelines, and export investigation results Integration capabilities Deep Discovery Endpoint Sensor can coexist with any endpoint/server antivirus software Deep Discovery IOC data can be used by Endpoint Sensor to verify endpoint infiltrations and discover the full context, timeline, and extent of an attack Deep Discovery Endpoint Sensor integrates with Control Manager for centralized investigations that leverage IOC data from other products, enabling investigators to take immediate action in response to an attack

8 Cloud & Data Center Deep Deep as a Service Deep Deep as a Service Public Cloud Services Cloud & Data Center Deep provides a comprehensive server security platform designed to protect virtualized data centers from data breaches and business disruptions while enabling compliance. This agentless solution simplifies security operations while accelerating the ROI from virtualization and cloud projects. Tightly integrated modules easily expand the platform to ensure server, application, and data security across physical, virtual, and cloud servers, as well as virtual desktops. Customize your security with any combination of agentless and agent-based protection,including anti-malware, web reputation, firewall, intrusion prevention, integrity monitoring, and log inspection. This adaptive and efficient server security platform protects mission-critical enterprise applications and data from breaches and business disruptions without expensive emergency patching. Deep Virtual Appliance Features Agentless Anti-Malware with Integrity Monitoring Intrusion Detection and Prevention Bidirectional Stateful Firewall Log Inspection Multi-Tenant Hypervisor Integrity Monitoring Secures AWS, Microsoft Azure, and vcloud Air Integration NSX API and Service Composer Integration Virtual Patching vsphere 5.5 Support IPv6 Support Linux Support (real-time anti-malware) Accelerates Virtualization, VDI, and Cloud adoption Provides a lighter, more manageable way to secure VMs Maximizes Operational Cost Reductions Offload 500MB of pattern file from hundreds of VMs to 1 virtual appliance Prevents Data Breaches and Business Disruptions File and network security in real time with minimal performance impact Provides Cost-effective Compliance for Private and Hybrid Cloud Environments Addresses major compliance requirements for PCI DSS 2.0, as well as HIPAA, NIST, and SAS 70 Extends micro segmentation to provide layer security for VMware NSX Deep as a Service Amazon Services (AWS), Microsoft Azure, and VMware vcloud Air have emerged as leading Infrastructure as a Service providers for cloud computing. To ensure a complete end-to-end secure computing environment, these public cloud services employ a shared security responsibility model with their customers. The customers are responsible for protecting their operating systems, applications, and data that are hosted on public cloud services. While they provide secure facilities and processes, public cloud service customers must protect their operating systems, applications and data running on public cloud service. The Deep service provides a complete suite of security capabilities including firewall, intrusion detection and prevention, anti-malware, integrity monitoring, web reputation and Log Inspection. Developed specifically for securing public cloud service workloads, Deep 's optimized security provides quick and easy set up, and automated security operations for public cloud services. Like the public cloud services it protects, Deep as a Service is elastic, dynamic and flexible all characteristics necessary to enable organizations to fully realize the benefits of cloud computing while remaining protected. Features & Correspondence to Amazon Services, Microsoft Azure, VMware, vcloud Air Comprehensive and integrated protection Protects VM instances using Anti-malware, Integrity Monitoring,, Intrusion Detection and Prevention, Bidirectional Stateful Firewall, and Log Inspection Detects and removes malware in real time with minimal performance impact Shields known and unknown vulnerabilities Detects and alerts suspicious or malicious activity to trigger proactive, preventative actions Developed for Cloud services Avoids set-up and hardware costs by hosting on Amazon Services (AWS) Saves the effort to deploy and manage disparate products with a single suite of security capabilities Reduces administrative workload using the automatic instance recognition of Autosync Achieve Cost effective Compliance Addresses major compliance requirements for PCI DSS 2.0, as well as HIPAA, NIST, and SAS 70 with one integrated and cost-effective solution Instant-On Deep s Autosync capability means that new instances are automatically recognized when launched and security initiated, dramatically reducing the risk of any instances being unprotected at any point Cloud & Data Center PHYSICAL VIRTUAL VM VM VM VM CLOUD VM VM VM VM DESKTOP/LAPTOP PUBLIC CLOUD VM VM VM VM Data Center PUBLIC CLOUD PHYSICAL VIRTUAL VM VM VM VM VM VM VM VM Deep Agent Deep Agent Deep Agent Deep Agent Deep Agent Deep Manager Profile Single Infrastructure for Hybrid Cloud Alerts IT Infrastructure Integration Alerts Reports Reports Deep Agent Administrator Deep Manager Center Administrator Deep (On Premise or SaaS) Alerts Reports Administrator Deep Manager Deep Agentless Virtual Appliance 14 15

9 Cloud & Data Center Deep for SAP Systems Deep for Apps Deep Deployment Services Deep for SAP Systems Deep for Apps Cloud & Data Center SAP systems contain highly sensitive financial, HR, customer and supply chain data that requires strong protection from cybercriminals. With business systems becoming increasingly accessible from the web, attackers can more readily target and exploit vulnerabilities in operating systems, web servers and the business applications themselves. Despite the availability of vendor-supplied patches, all web-facing systems remain at risk if patches are not applied on a timely basis. The growing prevalence of zero-day exploits makes staying ahead of the latest threats increasingly difficult. Deep for SAP Systems can protect SAP systems from breaches and business disruptions with integrated anti-malware, reputation, and firewall in addition to intrusion prevention, integrity monitoring, and log inspection. By leveraging the SAP VirusScan Interface, Deep for SAP Systems achieved SAP-certified integration with the SAP NetWeaver platform. It protects SAP deployments, helping to secure critical information from attack, including a wide variety of threats like malware, cross-site scripting and SQL injection. Features & Scans the content uploaded to the SAP NetWeaver technology platform to determine its true type Reports information to SAP systems via the NetWeaver- VSI interface Content scanning protects against possible malicious script content that might be embedded or disguised inside documents SAP administrators can then set policy according to which actual document types should be allowed As organizations rely more and more on web applications to deliver services to their employees, partners and customers, the threat landscape broadens and security challenges become increasingly complex. Deep for Apps provides comprehensive application vulnerability detection and protection offering in a single, integrated console to help protect sensitive data from attack and meet government and regulatory requirements. This SaaS security offering continuously detects application vulnerabilities, delivers actionable security insights, and protects websites from attack. Automated scanning enhanced by hands-on expertise can prevent false positives while testing business logic. Vulnerabilities can be quickly mitigated with WAF rule integration and an intrusion prevention system. Unlimited SSL certificates, including extended validation, are also included. Features & Comprehensive, Intelligent, vulnerability Scanning Automated: Application and platform vulnerability scanning Validation: Expert vetting of scanning results to eliminate false positives and prioritization of issues to focus mitigation resources Hands on testing: Checks for business logical flaws Comprehensive malware scanning Monitoring web application reputation helps customers off from blacklists Integrated Detection and Automated Protection Protection against known and zero-day attacks Virtual patching shields discovered vulnerabilities Coverage for all major servers and operating systems App Firewall (WAF) rules to defend against application exploits which can be exported to leading WAFs Unlimited SSL Deploy unlimited SSL certificates including Extended Validation (EV) at dramatic cost savings versus traditional SSL suppliers Expand use of SSL to internal applications and protect all Applications Single Integrated Management Console All detection and protection functions are managed through a single cloud-based console Cloud & Data Center SAP VirusScan Interface Scan the contents uploaded to SAP systems Deep for SAP Systems Cloud-based Operation Center Scanners Enterprise or Organizational Systems Integrated Management Console SAP Content Documents s Embedded Images Active Content SAP NetWeaver SAP administrators can set policy which document types should be allowed SAP Administrator Experts Alerts Deep Deployment Services Deep Deployment Services offers direct access to specialists with the expertise to optimize your Deep solution, whether onsite or offsite. Rely on to handle every stage from the initial assessment through construction to ongoing maintenance. / IT Reports Features Assess your current security environment Plan and design Deep to meet your objectives Build and implement Deep Manage, optimize and migrate your Deep ASSESS PLAN BUILD MANAGE 16 17

10 Cloud & Data Center SecureCloud ServerProtect for Microsoft Windows and Novell NetWare ServerProtect for Linux ServerProtect for Storage SecureCloud ServerProtect for Microsoft Windows and Novell TM NetWare TM Cloud & Data Center Companies that turn to cloud computing and virtualization to provide rapid provisioning, agility, and cost savings must also deal with new privacy and security risks, since they may not always know the exact location and accessibility of their data. SecureCloud provides strong protection for data in the cloud and virtual environments using encryption with policy-based key management and unique server validation systems. It secures sensitive data stored on leading cloud services like Amazon EC2, Dell, Eucalyptus, and NTT America, as well as VMware VCloud and almost any other virtual environment. SecureCloud protects critical information from theft, unauthorized exposure, and unapproved migrations to other data centers. These features help support internal governance and ensure compliance with regulations like HIPAA, HITECH, Sarbanes-Oxley, GLB, and PCI DSS. SecureCloud also has FIPS certification to support government agencies and companies with high security standards or mandates. SecureCloud agent Cloud Platform VM VM VM Features & Advanced Techniques Features FIPS certification and FIPS approved AES encryption Encrypts and decrypts information in real time, so data at rest is always protected Applies whole volume encryption to secure all data, metadata, and associated structures without impacting application functionality Access and Authentication Controls Employs role-based management to help ensure proper separation of duties Automates key release and virtual machine authorization for rapid operations or requires manual approval for increased security Offers cloud provider credential rotation Policy-driven Key Management Uses identity- and integrity-based policy enforcement to ensure only authorized virtual machines receive keys and access secure volumes Enables the use of policies to determine when and where information is accessed Robust Auditing, Reporting, and Alerting Logs actions in the management console for audit purposes Provides detailed reporting and alerting features with incident-based and interval-based notifications Authentication for key deployment done by rule base policy per VMs Prevent viruses from spreading through your network by blocking them before they reach the end user. ServerProtect for Microsoft Windows and Novell NetWare scans, detects, and removes virus from files and compressed files in real time. ServerProtect delivers 24x7 antivirus support and protection with automatic, incremental virus updates. Centralized management of servers via a -based console simplifies network protection. ServerProtect for Linux Protect your Linux file servers from becoming unwitting hosts for viruses, trojans, bots and all sorts of other malware. ServerProtect for Linux offers real-time protection, high performance and low processing overhead, and supports all common Linux distributions. ServerProtect for Linux adds another powerful solution to any security and compliance strategy. ServerProtect for Storage ServerProtect for Storage is designed to provide network-wide, comprehensive anti-malware scanning for the EMC Celerra and VNX/VNXe series, NetApp, and Hitachi Data Systems (HDS) lines of data storage systems. Managed through an intuitive, portable console, ServerProtect provides centralized malware scanning, cleanup, pattern file updates, and event reporting with enterprise-class performance and automation. Certified with Microsoft Windows Server 2000/2003 to deliver high performance, reliability, security, scalability and availability Enables real-time, high-performance scanning with minimal impact to servers Prevents Linux servers from spreading threats to other servers and personal computers Maximizes performance and lowers processor overhead with multi-threaded, kernel-based scanning Integrates tightly with EMC Celerra, NetApp Filers or Hitachi NAS Enables real-time, high-performance scanning with minimal impact to servers and no impact to end users Cloud & Data Center Hypervisor Random session key over SSL 2 Scan Request ServerProtect for Storage Access VM Shared Storage 1 Access Files NAS 3 Scan Result Kernel level encryption on writing data Encryption will be done for per volumes which connects to virtual instance server OS Key will be deployed per volumes 4 Allow/Deny Access 5 Notify filer clients upon infection 18 19

11 Centralized Management Control Manager & Collaboration Hosted InterScan Messaging Virtual Appliance Control Manager Hosted Centralize threat and data protection policy management with a single management console that manages, monitors, and reports across multiple layers of security, as well as across on-premise and cloud deployment models. Better Protection Integrate security management and analysis across multiple layers of protection-critical to defending against advanced threats that exploit multiple threat vectors Simple, Enterprise-wide Visibility Rapidly understand your security posture, identify threats, and respond to incidents with up-to-the-minute situational awareness across your environment Simplified, User-based Management Manage multiple security layers, whether deployed on-premise on in the cloud, so you don't have to hop from console to console to ensure that protection is properly defined across the enterprise Hosted is a no maintenance solution that delivers continuously updated protection to stop spam and viruses before they get inside a network. Internet Mails Reclaim productivity and bandwidth Free up time to implement critical business initiatives Get peace of mind Hosted Control Manager is available in two versions: Standard and Advanced Control Manager Standard Advanced Centralized Management -based Centralized Management Customizable Dashboard, Ad Hoc Query, Alerts Smart Protection Network Threat Statistics Visibility into Clients Multi-Tiered Management Customizable Reporting License Management Customers site Clean Mails & Collaboration InterScan Messaging Virtual Appliance InterScan Messaging stops traditional threats in the cloud with global threat intelligence, provides data loss prevention and encryption, and identifies targeted attacks as part of a custom APT defense. The hybrid SaaS deployment combines the privacy and control of an on-premise virtual appliance with the proactive protection of a cloud-based prefiltering service. Detect and block APTs and targeted attacks Thwart targeted phishing attacks and advanced malware Simplify data protection and encryption Block more spam proven #1 in independent tests Viruses Spam Mail InterScan Messaging Virtual Appliance Spyware APT Anti-virus Anti-spyware Contents Filtering Advanced Threat Detection Data Loss Spearphishing 20 21

12 & Collaboration PortalProtect for Microsoft IM for Microsoft Lync and Office Communications Server Enterprise for Communication and Collaboration ScanMail Suite for Microsoft Exchange ScanMail Suite for IBM Lotus Domino & Collaboration PortalProtect for Microsoft PortalProtect secures collaborations with a dedicated layer of protection that guards against malware, malicious links, and other threats often unfamiliar to SharePoint administrators. Its web reputation technology blocks malicious links from entering web portals, while its powerful content filtering scans both the files and web components of SharePoint. IM for Microsoft Lync and Office Communications Server Secure real-time IM communications by stopping fast-moving attacks designed to spread malware, lure victims to malicious sites, and steal data. Powered by Smart Protection Network and its unique cloud-client architecture, IM blocks links to malicious sites before the links can be delivered. Signature-independent zero-day security, leading antivirus protection, and new antispyware features work together to stop malware before threats can cause any damage. Plus, flexible content filtering ensures appropriate IM use and helps prevent data theft. Communication & Collaboration protects Microsoft , collaboration, and IM systems by stopping threats in real time before they can strike. The unique cloud-client architecture of the Smart Protection Network powers real-time threat protection (like and ) that work in concert with leading conventional content security technologies allowing for all sorts of connections without the usual risks. Protects SharePoint users and data Stops a wide range of malicious files and URLs Filters inappropriate content from social aspects of SharePoint Controls sensitive data for compliance and risk management Takes half the time to manage Scales to any deployment size The integrated Data Loss Prevention protects your sensitive data Features & Blocks malicious links before delivery using Identifies and blocks zero-day threats with proprietary IntelliTrap technology Stops more spyware, with dedicated inspection, before it can infect PCs Filters content to protect against data loss and undesirable language Reduces administration with tight platform integration and robust central control Enterprise for Communication and Collaboration ScanMail Suite for Microsoft Exchange ScanMail Suite for IBM Lotus Domino ScanMail Suite for Microsoft Exchange ScanMail Suite for Microsoft Exchange not only stops traditional spam and malware but also detects malicious URLs, highly targeted attacks, and advanced persistent threats (APTs). With a combination of web, , and file reputation, plus exploit detection and sandboxing, ScanMail Suite provides the most comprehensive mail server security. No other solution offers this kind of enterprise-level protection. Guards against APTs and highly targeted attacks Blocks phishing s with malware or bad web links Prevents data loss and simplifies compliance Cuts administration time in half Speeds throughput up to 57% faster than other solutions ScanMail Anti-spam Anti-phishing Enhanced Antivirus Advanced Threat Scan Suspicious Quarantine ScanMail Suite for IBM Lotus Domino ScanMail Suite for IBM Lotus Domino stops traditional threats with the correlated intelligence of Smart Protection Network cloud-based security. It also protects data with optional Data Loss Prevention and blocks targeted attacks when integrated with Deep Discovery Analyzer. ScanMail and Deep Discovery Analyzer are both components of the Custom Defense Solution. ScanMail Suite is an easy-to-manage solution supporting nearly all Domino platforms. Customizes protection against highly targeted attacks Blocks phishing s with malware or bad web links Prevents data loss and simplifies compliance Lowers administration with better controls and optimization Feedback Deep Discovery Analyzer Sandboxes Sandboxes Threat Analysis Threat Intelligence Adaptive Updates & Collaboration Communication & Collaboration and third-party security products Central Management Control Manager Collaboration Server PortalProtect for Microsoft SharePoint Mail Server ScanMail Suite for Microsoft Exchange Instant Messaging Server IM for Microsoft Office Communications Server 22 23

13 & Collaboration Encryption Client Encryption Gateway Hosted Encryption Endpoint Protection Intrusion Defense Firewall Virtual Desktop Infrastructure (VDI) Module for Macintosh Encryption Client Encryption efficiently secures delivered to anyone with an address. Client-based encryption allows the end user to select which messages should be encrypted just by clicking a button on the desktop. This ability for end users to encrypt specific s with unique data complements policy-based encryption which automatically encrypts general content types. Together they offer a complete encryption solution. The Encryption software plug-in for popular clients deploys without modifying existing business processes and integrates seamlessly with the existing infrastructure. Hosted Central Trust Authority Internet Encryption Client secures both physical and virtual endpoints with immediate protection against threats delivered through leading malware protection and cloud-based global threat intelligence. Optional modules allow instant deployment of data loss prevention, virtual desktop infrastructure and Mac protection. also works in conjunction with proactive security technologies like application control, vulnerability protection, mobile security, and endpoint encryption to further enhance your threat protection. Secures data on physical and virtual desktops from a central management platform defends your endpoints, both physical and virtual, from an ever-increasing number of attacks and provides complete user visibility and integration through a single web console Secures endpoints with the broadest range of superior malware protection Protects endpoints on or off the corporate network, against viruses, trojans, worms, spyware, advanced persistent threats (APTs) and new variant as they emerge Enables Consumerization and BYOD without compromising security When deployed with, Mobile extends your endpoint protection to include smart phones and tablets-enabling centralized management, policy deployment, and visibility of all endpoint security through Control Manager & Collaboration Encryption Gateway Enterprise gateway encryption augments security by combining policy-based encryption and integration with a messaging security infrastructure. This solution offers simple deployment and administration without altering existing business processes. When combined with content security, it enables enterprises to encrypt s and attachments automatically, without having to rely on individual users to secure private information. Messaging Gateway Internet Intrusion Defense Firewall Intrusion Defense Firewall, a plug-in for Trend Micro Enterprise for Endpoints, supplements Trend Micro's highly effective client-level security with a network-level Host Intrusion Prevention System (HIPS). Virtual Desktop Infrastructure (VDI) Module Built specifically to handle the rigors of virtual desktop environments, Virtual Desktop maximizes protection for a broad spectrum of virtual desktop scenarios. Protects endpoints with minimal impact on network throughput, performance, or user productivity Blocks attacks before they enter the endpoint s application and execution layer Provides protection before patches are deployed Agentless anti-malware No security agent in the VM Leverage VMware vshield APIs VDI optimized agents Prevent resource contention Cleans, scans memory and monitors behavior Endpoint Protection Encryption Gateway Hosted Encryption This policy-based encryption service seamlessly integrates with the content filtering capabilities of Hosted to identify particular types of content and encrypts messages when the rules are triggered. * Must use Hosted with outbound content filtering. No additional hardware or software is required. for Macintosh By leveraging the Smart Protection Network, the Trend Micro for Mac plug-in for proactively limits exposure to threats and prevents both users and applications from accessing malicious websites. Blocks malware for all systems, including both Mac OS and Windows 24 25

14 Endpoint Protection Endpoint Application Control Endpoint Encryption Integrated Data Loss Prevention Vulnerability Protection Endpoint Application Control Integrated Data Loss Prevention Defend against attacks by preventing endpoints from launching unwanted and unknown applications. Reduce risks with flexible and easily-managed policies, whitelists, and blacklists that work in tandem with a global, cloud-based application database. Features Enhanced protection defends against malware, targeted, and zero-day threats Using the latest protection from real-time threat intelligence correlated across a global network, this solution provides the most up-to-date endpoint application protection against malware, targeted attacks and zero-day threats Simplified management speeds protection Streamlined dashboard and management console offers greater insight into threat outbreaks and standardizes end-user configurations from one centralized location Endpoint Encryption Prevents users and machines from executing malicious software Provides advanced features to enforce corporate policies Uses correlated threat data from billions of records daily Helps support compliance requirements In-depth whitelisting and blacklisting blocks unknown and unwanted applications Block unknown and unwanted applications with fully customizable application whitelisting and blacklisting options, including an unparalleled database of applications and good file data Compliance with internal IT policies helps reduce legal and financial liabilities Reduce risks by limiting application usage to a specific list supported by data loss prevention products and prevent new applications from executing integrated DLP with central policy management simplifies data protection across multiple layers of the existing IT security infrastructure, streamlining administration and providing more consistent enforcement to increase data protection and compliance with little additional effort or cost. Exchange Integrated Data Loss Prevention Data protection capabilities integrated within traditional enterprise security solutions, from endpoint to messaging and network, simplify deployment, reduce infrastructure cost, and provide peace-of-mind for data compliance Central DLP Policy Management Central configuration and application of pre-defined policy templates across protection layers reduces initial and ongoing administrative effort and provides consistent policy enforcement enterprise-wide Customizable, Consolidated Displays and Reports Aggregated logs, reports and dashboard views provide real-time, enterprise-wide visibility into potential data breaches and data policy violations SharePoint Endpoint Encryption encrypts data on a wide range of devices laptops, desktops, tablets, CDs, DVDs, USB drives and any other removable media. This solution offers enterprise-wide full disk, file/folder, and removable media encryption, combined with granular port and device control to prevent unauthorized access and use of private information. A single management console handles both hardware and software encryption enterprise-wide for entire hard drives, specific files, folders, removable media, and storage devices. Internet Firewall Features Advanced Reporting & Auditing Automate enforcement of regulatory compliance with policy-based encryption Receive detailed auditing and reporting by individual, organizational unit, and device Pre-Boot Multi-Factor Authentication Gain flexible authentication, including fixed password, CAC, PIV, Pin, and ColorCode Trigger a lockout feature in response to incorrect authentication attempts Administrative Tools & Active Directory Integration Leverage Active Directory and existing IT infrastructure for deployment and management Take the burden off IT staff by allowing users to change and reset passwords and accounts Endpoint Protection Maximize Platform Coverage for Data & Device Encryption Encrypt private data with fully integrated full disk, file folder, USB, and removable media encryption Lower TCO with Centralized Policy Administration & Key Management Simplify operations with a unified data repository with single management server and console Simplify Remote Device Management Maintain compliance and protect your data without disrupting users in the event of a lost device or forgotten password Manage policies and protect data on PCs, laptops, tablets, USBs, CDs, DVDs Centralized policy and key management FIPS encryption certification AES 256-bit encryption File and folder encryption Granular port and device control Level 2 Key Features Endpoint Encryption Full Disk Encryption File Encryption Removable media (CD/DVD/USB) encryption Self-encrypting drive management Full disk encryption Network-aware pre-boot authentication Level 2 Level 2 Mail Gateway Gateway Vulnerability Protection Vulnerability Protection shields endpoints until patches can be deployed and can protect "un-patchable" or "end-of-support" endpoints indefinitely. Easy-to-use and quickly deployed filters prevent vulnerabilities from being exploited providing full protection to your endpoints until you can deploy patches in a timely sensible manner for your business. Eliminates risk exposure due to missing patches Extends the life of legacy and end-of-support operating systems like Windows XP Reduces downtime for recovery with incremental protection against zero-day attacks Allows patching on your own terms and timelines Endpoints Control Manager 1. Centrally configure DLP policies 2. Centrally monitor DLP violation = idlp Features Defend against advanced threats Blocks known and unknown vulnerability exploits before patches are deployed on systems that hold sensitive data, critical to regulatory and corporate policy compliance Remove bad data from business-critical traffic Ensures delivery of business-critical communications with by filtering out forbidden network traffic and ensuring only allowed traffic is delivered Get earlier protection Provides protection before patches are deployed using attack blocking, vulnerability shielding, and malicious traffic detection Deploy and manage within your existing infrastructure Simply and easily deploys with existing endpoint security solutions and streamlines management with a simplified dashboard and management console Endpoint Protection Automatic Synchronization and sharing 26 27

15 Endpoint Protection Portable 2 Safe Lock Mobility Mobile SafeSync for Enterprise Endpoint Protection Portable 2 A malware scanning and cleanup tool shaped like a USB flash drive for environments where an Internet connection is not available or anti-malware software cannot be installed. Features Centralized Management Manages configurations of the scanning tools for multiple locations, malware pattern files, and logs Easy Operation Scans status and result notifications with an LED indicator Using only the scanning tool, malware can be scanned and removed, and the malware pattern file can be updated No installation required Scans target terminals without installing scanning software Safe Lock By locking down the system, Safe Lock prevents the intrusion and execution of malware with little impact on system performance and without the need of updating pattern files. Features Application Whitelisting By only allowing applications added to the Whitelisting to run, malware is unable to execute with little performance impact Safe Lock does not affect a system s important communications or require the system to be restarted during operation No Internet Connection Required Since routine updates of pattern files are not necessary, Safe Lock can protect terminals in environments that are not connected to the Internet Exploit Protection Through its intrusion and execution prevention functions, Safe Lock prevents exploit attacks via networks, external storage devices (such as USB memory), and running processes, thereby ensuring a low risk of malware infection or unauthorized execution Unregistered applications Malware Centralized management type operation Closed system Closed system data center Configures the scanning tool, and aggregates and manages logs Execution Prevention Prevents exploit attacks on running processes Scans and removes malwares, and obtains logs Management computer Exploit Protection Registered applications Application Whitelisting Prevents the execution of malware and applications not added to the Approved List Internet Obtain the latest malware pattern file Intrusion Prevention Prevents exploit attacks from external devices or networks Mobile Mobile extends protection beyond PCs to secure mobile devices and data stored on them. This solution helps organizations reduce costs by providing a single point of visibility and control for device management. It helps prevent data loss by enforcing the use of passwords, encrypting Monitor data, and remotely wiping data off lost or stolen devices. Threat Protection Malware Spyware Threats Reduced Operational Costs Limit Data Loss Reduced Risk SafeSync for Enterprise Safesync for Enterprise provides file sharing and sync capabilities with data protection to give IT managers stewardship of sensitive data. Deployed both on the premises and in a private cloud, enhanced data protection features such as DLP, persistent file encryption and document tagging provide unprecedented data protection while still enabling user productivity with integrated file sync and share capabilities. Combine control with cost savings by deploying the solution on your own infrastructure. SafeSync for Enterprise complements your overall mobility and data protection from to increase the value of DLP throughout your organization. Maximize Data Protection for Synchronized Files Control where sensitive corporate data resides and how many copies exist Tag and safeguard sensitive data to reduce risk and achieve compliance mandates Apply data loss prevention (DLP) to mobile data and set policy based on data sensitivity Organization Network SafeSync for Enterprise Manager Maintain Productivity Gains without Inhibiting Collaboration Allow users to simply drop a file into a folder for automatic replication to specific folders in the cloud, and on other PCs and devices Free up mail server storage with a Microsoft Outlook plug-in that sends a sharing link instead of attaching files to messages Internet Android Control Features File sharing from anywhere, any devices Sophisticated data protection Visualize and control information assets Improve and Lower Costs with an Onsite Solution Retain ownership and control of data sharing by deploying on premise private cloud Lower your risk exposure to data loss or compliance violation with detailed audit and log information Mobile Devices Case iphone / ipad 2 Share, sync data within for mobile devices Customer/Partner BlackBerry Windows Mobile TM Mobility Case 1 Share, sync data within organization network ActiveDirectory Case 3 Share, sync data within external parties 28 29

16 Small Business Worry Free Business Gateway InterScan Virtual Appliance InterScan as a Service Small Business Worry-Free Business Standard Worry-Free Business Advanced Worry-Free Business Services More small businesses worldwide trust Worry-Free Business than any other security vendor to protect their livelihoods because it is the only solution that provides complete user protection. Lets you concentrate on your business, not your IT security Installs easily and requires no IT expertise to maintain - ideal for small businesses Stops threats in the cloud before they can reach your network and devices Spam Mails Blocks access to inappropriate websites Prevents business data from being shared via messages* or USB drives Safeguards against phishing as well as social engineering attacks Includes easy mobile device security management Phishing Stops spam before it can reach mail servers with included Hosted CENTRALIZED MANAGEMENT Management Console Management server location Updates and patches pushed to users Policy pushed to users PLATFORMS PCs, laptops, Windows servers Mac clients (imacs and MacBooks) and servers Android devices (each seat comes with anti-virus protection for two Android devices) NEW and UNIQUE - Mobile device security (for Microsoft Exchange ActiveSync users only)** ANTIVIRUS AND WEB SECURITY Viruses Spyware Worry-Free Business Standard Via LAN or VPN On-premises Manual with complete control Via LAN or VPN Mobile Threats Worry-Free Business Advanced Via LAN or VPN On-premises Manual with complete control Via LAN or VPN GLOBAL CONTENT SECURITY S M ALL BUSIN ESS Source: Canalys, Worldwide IT Market 2013 URL Filtering Data Loss Worry-Free Business Services Hosted by. Can be accessed anywhere via Internet Hosted by server maintenance free Automatic Via Internet. Can be pushed anywhere. InterScan Virtual Appliance Given today's advanced Internet threats and the growing use of cloud-based consumer applications in the workplace, application visibility is essential to understanding network risks. The Interscan virtual appliance combines application control with advanced anti-malware scanning, real-time web reputation, and flexible URL filtering to provide superior Internet threat protection. Viruses Spam Mail Phishing Spyware APT InterScan Virtual Appliance Anti-virus Anti-spyware Anti-phishing URL Filtering Advanced Threat Detection InterScan as a Service InterScan as a Service dynamically protects any user, in any location, on any device. And because it s hosted in the cloud, you don t need to buy, manage, or maintain software or hardware. Furthermore, this solution is flexible and will grow with your business. Get instant visibility and control with Advanced Reporting and Management Stop web threats before they penetrate the perimeter Lower your TCO The integrated Data Loss Prevention protects sensitive data Data Loss URL Filtering Delivers superior protection on any device, anywhere Gives users freedom while you maintain visibility and control Provides simple but powerful management and reporting Maximizes the cloud advantage -cost effectiveness and flexibility Defends against viruses, spyware and other malware UNIQUE - Advanced URL filtering blocks inappropriate websites threat protection stops viruses and threats before they reach your business DATA PROTECTION Device control - limits access of USB drives and other attached devices to prevent data loss and block threats UNIQUE - Data loss prevention via business messages, sent accidentally or deliberately MESSAGING SECURITY AND ANTISPAM Real-time scan for POP3 mail accounts Blocks spam from entering POP3 mail accounts Stops spam and -based viruses before they reach mail servers Threat protection and multi-layer antispam for Microsoft Exchange Servers Via included Hosted Via Hosted purchased separately Remote/Mobil Employees HTTP Requests Filter Inspect InterScan as a Service Analyze URL Consulted Manage Approved Traffic Allowed InterScan Administration Open Gateway * Worry-Free Business Advanced only **Mobile Device Features in Worry-Free Business Advanced [ Device access control / Remote wipe / policy (Enhanced password, Lock after inactivity timeout, Wipe after retry limit, Enforced exchange encryption) Supports Android, ios, Blackberry, and Windows Phone] In Office 30 31

17 Suite Enterprise for Endpoints Enterprise for Endpoints and Mail Servers Enterprise Suite Enterprise for Endpoints Enterprise for Endpoints secures your endpoints, both on and off the network with award-winning anti-malware, host intrusion prevention (HIPs), and malicious website protection. This comprehensive endpoint security is powered by Smart Protection Network cloud-based security delivering global threat intelligence and faster performance. It also offers the flexibility to customize your endpoint protection with add-on options for desktop virtualization, data protection, and mobile device security. Regardless of how you deploy this endpoint security for your business, unified management helps you lower management costs and deliver the industry s best protection from today s evolving threats. *Secure your data from gateway to mobile devices by adding Enterprise Data Protection, a full set of data security products that integrate within Enterprise for Endpoints. Please refer to P.34. CLIENTS with plug-in modules: Intrusion Defense Firewall for Mac Virtual Desktop Infrastructure(VDI) SMART: Lower your risks with proactive threat protection Simple: Get the most out of your IT staff and infrastructure That Fits: Streamline administration by enforcing threat protection policies from a single console Intrusion Defense Firewall Plug-Ins for Mac COMPONENTS VDI ServerProtect for Windows, NetWare, Linux FILE SERVERS ServerProtect for Microsoft TM Windows TM / Novell TM Netware TM ServerProtect for Linux CENTRALIZED MANAGEMENT Control Manager Control Manager Enterprise Suite Enterprise Suite is a tightly integrated suite of products that secure your network from gateway to endpoint. With comprehensive threat protection and centralized management, you can close the security gaps while decreasing costs and complexity. Powered by Trend Micro Smart Protection Network cloud-based security, this end-to-end suite delivers global threat intelligence and faster performance. You gain a secure foundation from gateway to endpoint with the following products included in the sure. *Secure your data from gateway to mobile devices by adding Enterprise Data Protection, a full set of data security products that integrate within Enterprise for Endpoints. Please refer to P.34. CENTRALIZED MANAGEMENT Control Manager FILE SERVERS ServerProtect for Microsoft Windows / Novell Netware ServerProtect for Linux Maximizes Protection Reduces risk with comprehensive multilayered, multi-threat protection Delivers immediate protection with in-the-cloud threat intelligence Improves productivity with #1 rated spam blocking and web filtering Lowers Costs Lowers endpoint infection rates by 62% Slashes IT security management costs by 40% Minimizes Complexity Reduces time to acquire, deploy, and manage with an integrated solution Streamlines administration with web-based centralized management Suite Enterprise for Endpoints and Mail Servers Enterprise for Endpoints and Mail Servers is an integrated, centrally managed suite that delivers adaptive threat protection with award-winning anti-malware, antispam, host intrusion prevention (HIPs), web reputation, and optional data security. This suite is powered by Smart Protection Network cloudbased security for global threat intelligence and faster performance. Reduce risks and costs with a single solution offering unified management of integrated security across enterprise desktops, laptops, file servers, and mail servers. *Secure your data from gateway to mobile devices by adding Enterprise Data Protection, a full set of data security products that integrate within Enterprise for Endpoints. Please refer to P.34. Maximum Protection across Endpoints and Mail Servers Multilayered Protection Platform Coverage Advantage MAIL SERVER ScanMail Suite for Microsoft Exchange Windows Blocks spam and spyware at the mail server ScanMail Suite for IBM Lotus Domino Windows, Linux Blocks spam and spyware at the mail server FILE SERVER ServerProtect for Microsoft Windows / Novell Netware Windows Windows, NetWare Secures Windows servers Secures Windows and NetWare file servers ServerProtect for Linux Linux Secures Linux file servers CLIENT Windows CLIENTS : Intrusion Defense Firewall for Mac Virtual Desktop Infrastructure(VDI) Secures Windows clients FILE SERVERS ServerProtect for Microsoft Windows / Novell Netware ServerProtect for Linux MAIL SERVERS ScanMail Suite for Microsoft Exchange ScanMail Suite for IBM Lotus Domino CENTRALIZED MANAGEMENT Control Manager Intrusion Defense Firewall Windows Proactive HIPS and vulnerability shielding for Mac Apple Macintosh Protects Macintosh clients from malware and blocks malicious websites GATEWAY InterScan Messaging InterScan Maximum Protection and Minimum Complexity across Protections Points and Platforms Multilayered Protection Platform Coverage Advantage GATEWAY InterScan Messaging Virtual Appliance VMware Virtualized gateway security stops spam and threats InterScan Virtual Appliance VMware Virtualized web gateway security blocks web threats and includes URL filtering MAIL SERVER ScanMail Suite for Microsoft Exchange Windows Blocks spam, malware and spyware at the mail server ScanMail Suite for IBM Lotus Domino Windows, Linux Blocks spam, malware and spyware at the mail server FILE SERVER ServerProtect for Microsoft Windows / Novell Netware Windows Windows, NetWare Secures Windows servers Secures Windows and NetWare file servers ServerProtect for Linux Linux Secures Linux file servers CLIENT / MOBILE DEVICE Windows Secures Windows clients Intrusion Defense Firewall Windows Proactive HIPS and vulnerability shielding Data Loss Prevention Protects your sensitive data for Mac Apple Macintosh Protects Macintosh clients from malware and blocks malicious websites MANAGEMENT MAIL SERVERS ScanMail Suite for Microsoft Exchange ScanMail Suite for IBM Lotus Domino CLIENTS with plug-in modules: Intrusion Defense Firewall for Mac Virtual Desktop Infrastructure(VDI) Control Manager Advanced Windows Centrally manages security Suite VDI Secure virtual desktop environment MANAGEMENT Control Manager Advanced Windows Centrally manages security 32 33

18 Suite Enterprise and Data Protection Enterprise Data Protection Smart Protection Complete Smart Protection for Endpoints Enterprise and Data Protection Enterprise Data Protection Complete end-user protection from threats and data loss from the gateway to mobile devices. Over time, many enterprises have deployed various point products from multiple security vendors resulting in increased management complexity, compatibility problems, and gaps in security that could result in data breaches. To decrease risk, costs, and management complexity, enterprises need integrated security solutions with centralized management for network-wide visibility and control of threats and data. Enterprise and Data Protection is an integrated suite of products that secure your network from the gateway to mobile devices for complete end-user protection. With adaptive threat and data security, you can help prevent data breaches by deploying protection wherever end users access sensitive data. With centralized management, you can decrease costs and complexity while gaining enterprise-wide visibility. Powered by Smart Protection Network cloud-based security, this comprehensive suite blocks threats by leveraging global threat intelligence. Its cloud-based reputation services reduce the client footprint on endpoints for faster performance. This comprehensive suite includes Enterprise Data Protection to help mitigate the risks of attacks and data breaches across end user platforms, from smartphones to tablets, laptops to removable drives. Solution Data Protection Centralized Management Gateway Protection Components Integrated Data Loss Prevention Mobile Endpoint Encryption Encryption Gateway Control Manager InterScan Messaging InterScan ScanMail Suite for Microsoft Exchange ScanMail Suite for IBM Lotus Domino MAIL SERVERS ScanMail Suites Encryption Integrated DLP GATEWAY InterScan Massaging InterScan Integrated DLP CENTRALIZED MANAGEMENT Control Manager Enterprise and Data Protection FILE SERVERS ServerProtect Integrated DLP CLIENTS Intrusion Defense Firewall for Mac VDI Mobile Endpoint Encryption Integrated DLP Enterprise Data Protection Smart Protection Complete This interconnected suite of security delivers the best protection at multiple layers using the broadest range of anti-malware techniques available. Plus, you can evolve your protection along with your business using flexible on-premise, cloud and hybrid deployment models making changes on the fly without the hassles of new licenses. And you can manage users across multiple threat vectors from a single pane of glass with a complete view of your security. Features Smart Protection for Endpoints This high-performance endpoint security suite protects virtual and physical desktops against today s evolving threat landscape using the broadest range of anti-malware techniques available. Multiple layers of threat and data security protect your users and corporate information across all devices and applications. Plus, you get the same cloud flexibility and user-centric management benefits of Smart Protection Complete. Management Endpoint Central Management 24/7 Support On-premise, cloud or hybrid Data Loss Prevention Anti-malware Vulnerability Protection, Virtual Desktop Integration, Mac, Server Application Control Endpoint Encryption Mobile Device Mgmt Massaging Gateway & Mail Server Microsoft Sharepoint and Lync IM Secure Gateway Smarter Protection Against today's evolving threats The broadest range of advanced threat protection techniques and protection points secures all user activities, reducing the risk of sensitive information loss More flexible management and licensing Ultimate flexibility in deployment models provides seamless support for your ever-changing mix of on-premise and cloud security Simple management and strong performance Multiple layers of inter-connected security are managed from a single management console Smarter protection for your endpoints The broadest range of endpoint protection techniques secures all user activities, reducing the risk of sensitive information loss More flexible management and licensing Deploy endpoint security in the way that best supports your changing business model (on-premise, in the cloud, or a combination) and change the mix at any time Simple management and strong performance Multiple layers of inter-connected security are managed from a single management console Smart Protection Complete Smart Protection for Endpoints Suite Mail Server Protection Mail Server Protection Endpoint Protection Server Protect for Microsoft Windows / Novell Netware ServerProtect for Linux Intrusion Defense Firewall for Mac VDI Messaging and Collaboration Suite 34 35

19 Services Custom Defense Services Premium Support Program Project Consulting Services Expert Services Custom Defense Services Today s most damaging attacks target specific people, systems, vulnerabilities, and data. Advanced persistent threats (APTs) are more stealthy and sophisticated than ever, using insidious social engineering techniques to penetrate organizations and deploy custom malware that can go undetected for months. Cybercriminals can then remotely and covertly steal valuable information - from credit card numbers to intellectual property to government secrets - potentially wiping out a competitive advantage or even putting national security at risk. Custom Defense Services help customers detect, analyze, adapt, and respond to targeted attacks and APTs. Respond Adapt Detect Premium Support Program Rely on the Premium Support Program to leverage the full value of your solutions and achieve optimum IT service levels. Enjoy proactive security resources for customer advocacy and expert advice to implement the very best security for your technology, processes, and people. Technical Account Managers (TAMs) have extensive product knowledge, threat expertise, and familiarity with the entire ecosystem to help you make the most of your investment with. Proactive security services with regular touch points Trusted security expertise that augments your team resources Fully optimized security posture that reduces your risk exposure Service overview DETECT ANALYZE ADAPT RESPOND Description Designated Technical Account Manager Premium Support Services Level Feature Matrix SILVER GOLD PLATINUM Assessment Analysis and Advisory Monitoring and Alert Investigation and Mitigation Onsite Support for Emergency Incidents Priority Response Time 4 hours 2 hours 1 hour Allotted Support Hours 24x7 *1 24x7 24x7 Remote Problem Diagnosis and Remediation Support Services Detect Components Critical System Assessment Network Assessment Service components and advantages Conducts health checks of critical onsite systems Provides assessment reports and recommendations for preventing security breaches Makes hidden malicious activities visible with a one-time assessment during the deployment of Deep Discovery Inspector Monitors both the network and endpoints Priority Case Handling Proactive Threat Alerts Bi-Annual Planning 2-Hour Malware Response SLA Crisis Management Planning Assistance Analyze Monthly Advisory Schedules a quarterly advisory meeting based on data collected through Deep Discovery Delivers a monthly advisory report with recommendations based on data collected through Deep Discovery Multi-Region Support Capabilities *1 Emergency access only after business hours Adapt Monitoring & Alert Monitors systems 24x7 with Deep Discovery Delivers notifications of potential risks by and telephone Project Consulting Services Services Respond Breach Investigation System Cleanup Custom Signature SLO Includes onsite investigations and analysis of suspect systems by security experts Provides tools to mitigate compromised systems Cleans up compromised systems where Deep Discovery detects suspicious activities Creates customized pattern files based on malicious files collected in specific customer sites. Includes 6 hour response service level agreement With Project Consulting Services, your IT staff can rely on a trusted advisor and partner to help meet your company s goals. experts have the insight and skills needed to design the optimal architecture for maximizing the effectiveness of solutions. experts can carefully analyze security requirements and craft a detailed plan that meets any unique needs. Project Consulting Services ASSESS PLAN BUILD MANAGE Services Expert Services s best-of-breed antivirus products enable an organization to cover messaging,, endpoint, and network security. 's Expert-on-Guard (EoG) service uses these products and technologies to proactively detect threats and vulnerabilities that compromise the confidentiality, integrity, and availability of an organization's data, applications, and operating systems

20 Market Leadership Sales office Market Leadership leads the world in security Recognized by market analysts, and proven through a dominant market share #1 in protection and performance (Sept 2013 Feb 2014 test results, Corporate Solutions on Win XP,7, 8 Systems) SERVER SECURITY M ARKET SHARE IDC, Worldwide Endpoint Forecast and 2012 Vendor Shares, August 2013 experton Group, Cloud Vendor Benchmark, June 2014 Global 500 accounts 48 of the top 50 global corporations 10 of the top 10 automotive companies 10 of the top 10 telecom companies 8 of the top 10 banks 9 of the top 10 oil companies Trust Solutions Market Leadership Position 2014 NSS Labs Breach Detection Tests protects 96% of the top 50 global corporations. protects 100% of the top 10 automotive companies. protects 100% of the top 10 telecom companies. protects 80% of the top 10 banks. protects 90% of the top 10 oil companies. North America Region USA Headquarters Incorporated 225 E. John Carpenter Freeway, Suite 1500 Irving, Texas U.S.A. Phone: +1 (817) Toll-free: (888) Canada Headquarters Canada Technologies Inc. 40 Hines Road, Suite 200 Ottawa, Ontario, Canada K2K 2M5 Phone: +1 (613) Cupertino, California N. De Anza Blvd Cupertino, California U.S.A. Phone: +1 (408) Toll-free: (800) Jersey City, New Jersey 101 Hudson Street Suite 2202 Jersey City, New Jersey U.S.A. Phone: +1 (201) Australia and New Zealand Australia Sydney Level 3, 2-4 Lyon Park Road, North Ryde, NSW 2113, Australia Phone: Melbourne Level 9, 606 St Kilda Road, Melbourne VIC 3004, Australia Phone: Perth 45 Ventor Avenue West Perth, WA 6005, Australia Phone: New Zealand Auckland CBD Business Centre Level 4, 17 Albert Street, Auckland, New Zealand Phone: Asia-Pacific Region China Beijing Room 1803, SK Tower Beijing , China Phone: Shanghai 8/F, Century Ba-shi Building 398 Huai Hai Road(M) Shanghai , China Phone: Guangzhou Room 3702, Metro Plaza, 183 Tian He Bei Road Guangzhou, Zipcode: Phone: Hong Kong Wanchai 917 9/F Shui On Centre, 6-8 Harbour Road Wanchai, Hong Kong Phone: India Delhi India Pvt. Ltd. 10th floor, EROS Corporate Tower, Nehru Place, New Delhi Phone: Mumbai India Pvt. Ltd. Ground Floor, Platina, Plot No C-59, Bandra Kurla Complex, Bandra East, Mumbai Phone: Bangalore India Pvt. Ltd. Units No , 7th Floor. PRESTIGE MERIDIAN I, No. 29, Mahatma Gandhi Road, (M.G. Road), Bangalore , Phone: Korea Seoul 6th FL., Hongwoo BD, 522 Teheran-ro, Gangnam-gu, Seoul, Korea( ). Phone: Indonesia Jakarta The Plaza Office Tower, 21st Floor, Jl. MH. Thamrin Kav Jakarta Indonesia Phone: Philippines Manila 8/F The Rockwell Business Center Tower 2 Ortigas Avenue Pasig City, Metro Manila Philippines 1600 Phone: Southeast Asia Singapore 8 Temasek Boulevard #09-04/05 Suntec Tower Three, Singapore Phone: Malaysia Malaysia Sdn Bhd ( T) Suite 31-01, 31st Floor, Menara Keck Seng, No. 203 Jalan Bukit Bintang, Kuala Lumpur, Malaysia Phone: Thailand (Thailand) Ltd. The Offices at Central World Tower, 999/9, 44th Floor, Unit , Rama I Rd.,Pathumwan, Bangkok Thailand Phone: Taiwan Taipei 8F, No. 198, Tun-Hwa S. Road, Sec. 2, Taipei 106, Taiwan Phone: Vietnam 10th Floor, VINACONEX Building, 34 Lang Ha Street, Dong Da District Hanoi, Vietnam Phone: Europe, The Middle East, and Africa Region Belgium Mechelen Campus Mechelen Building H Floor 2 Schalienhoevedreeft Mechelen Phone Denmark Rodøvre (EMEA) Ltd Egegårdsvej 39 DK-2610 Rødovre Phone: Egypt Cairo (EMEA) Ltd - Egypt 19 Helmy El-Masry St. Almaza Heliopolis Cairo Phone: +20 (0) France Paris 85, rue Albert Premier Rueil Malmaison Paris France Phone: 33 (0) Phone: +33 (0) Germany, Austria & Switzerland Bavaria Deutschland GmbH Zeppelinstrasse Hallbergmoos Bavaria, Germany Phone: +49 (0) Israel Ramat Hasharon (EMEA) Ltd - Tamir Segal 56 Osishkin st. Ramat Hasharon, Israel Phone: Italy Milan Edison Park Center Viale Edison Edifico C Sesto San Giovanni (MI) Phone: Rome Via Tiburtina Rome Phone: Netherlands NJ Vianen Kantorenpark "La Palissade Gebouw Le Cèdre Lange Dreef 13h, NJ Vianen 4131 The Netherlands Phone: Norway Oslo Karenslyst álle Oslo Norway Phone: Poland Warsaw (EMEA) Limited Warsaw Trade Tower Ul. Chlodna Warszawa Phone: +48 (22) Russia Moscow (EMEA) Limited , Russian Federation, Moscow B. Nikitskaya, 12-12/A1 build. 1 Phone: Saudi Arabia Riyadh Saudi Arabia 3rd Floor, Al Hoshan Building, Al Ahsa Road, Riyadh, Saudi Arabia Phone: South Africa Bryanston EMEA Ltd. The Campus, 57 Sloane Street, Bryanston 2021 P.O.Box 76302, Bryanston 2021, South Africa Phone: +27 (0) Spain Madrid Plaza de las Cortes 4-8a Izquierda Madrid Phone: Sweden Kista Sweden Jan Stenbecks torg 17 SE Kista Sweden Phone: Switzerland Glattbrugg (Schweiz) GmbH Schaffhauserstr Glattbrugg Switzerland Phone: Turkey Instanbul EMEA Ltd. Turkiye İrtibat Bürosu Macka Cad. Yeni Macka Han No. 14 Kat. 3 Daire 4 Maçka Istanbul Phone: United Arab Emirates Dubai Ltd (Middle East Branch) Units No & 3202 Jumeirah Business Center 5 Plot No. W1 Jumeirah Lakes Towers Dubai, United Arab Emirates Phone: +971(0) United Kingdom & Ireland (UK) Limited Podium Level (East), 2 Kingdom Street, Paddington Central, London, W2 6BD United Kingdom Phone: +44 (0) Cork Meridan House, IDA Cork Business & Technology Park, Model Farm Road, Cork, Ireland. Phone: +353 (0) Japan Japan Headquarters Tokyo Shinjuku MAYNDS Tower, Yoyogi, Shibuya-ku, Tokyo Japan ZIP Phone: Fukuoka San F Bldg. 7F Hakataeki-mae, Hakata-ku, Fukuoka-shi, Fukuoka Japan ZIP Phone: Osaka Nissei Sin-Osaka Bldg. 13F Miyahara, Yodogawa-ku, Osaka Japan ZIP Phone: Nagoya Nagoya Sakura Dori Bldg. 7F Marunouchi, Naka-ku, Nagoya-City, Aichi Japan ZIP Phone: Latin America Region Brasil Porto Alegre Av. Carlos Gomes, andar - Centro ZIP code (CEP): Porto Alegre, RS Phone: Rio de Janeiro Av. Rio Branco 1 12º andar Grupo Centro ZIP code (CEP): Rio de Janeiro, RJ Phone: Sao Paulo R. Joaquim Floriano, o andar - Itaim Bibi ZIP code (CEP): São Paulo, SP Phone: Mexico Mexico City Insurgentes Sur, piso 6 Col Del Valle, C.P , México, D.F. Mexico Phone: Sales office 38 39

Copyright 2011 Trend Micro Inc.

Copyright 2011 Trend Micro Inc. Copyright 2011 Trend Micro Inc. 2008Q1 2008Q2 2008Q3 2008Q4 2009Q1 2009Q2 2009Q3 2009Q4 2010Q1 2010Q2 2010Q3 2010Q4 2011Q1 2011Q2 2011Q3 2011Q4 M'JPY Cloud Security revenue Q to Q Growth DeepSecurity/Hosted/CPVM/IDF

More information

Stopping Advanced Persistent Threats In Cloud and DataCenters

Stopping Advanced Persistent Threats In Cloud and DataCenters Stopping Advanced Persistent Threats In Cloud and DataCenters Frederik Van Roosendael PSE Belgium Luxembourg 10/9/2015 Copyright 2013 Trend Micro Inc. Agenda How Threats evolved Transforming Your Data

More information

Commercial Product Matrix

Commercial Product Matrix PRODUCT MATRIX 1H2016 FOR INTERNAL USE ONLY Trend Micro Commercial Product Matrix SELLING TREND MICRO SECURITY SOLUTIONS Small Business or /Medium Business? < 100 Users > 100 Users Trend Micro Customer

More information

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Cisco Firepower NGFW. Anticipate, block, and respond to threats Cisco Firepower NGFW Anticipate, block, and respond to threats You have a mandate to build and secure a network that supports ongoing innovation Mobile access Social collaboration Public / private hybrid

More information

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION

More information

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Cisco Firepower NGFW. Anticipate, block, and respond to threats Cisco Firepower NGFW Anticipate, block, and respond to threats Digital Transformation on a Massive Scale 15B Devices Today Attack Surface 500B Devices In 2030 Threat Actors $19T Opportunity Next 10 Years

More information

Securing the Modern Data Center with Trend Micro Deep Security

Securing the Modern Data Center with Trend Micro Deep Security Advania Fall Conference Securing the Modern Data Center with Trend Micro Deep Security Okan Kalak, Senior Sales Engineer okan@trendmicro.no Infrastructure change Containers 1011 0100 0010 Serverless Public

More information

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION BREACH & ATTACK SIMULATION THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION Cymulate s cyber simulation platform allows you to test your security assumptions, identify possible security gaps and receive

More information

Securing Today s Mobile Workforce

Securing Today s Mobile Workforce WHITE PAPER Securing Today s Mobile Workforce Secure and Manage Mobile Devices and Users with Total Defense Mobile Security Table of Contents Executive Summary..................................................................................

More information

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

The SANS Institute Top 20 Critical Security Controls. Compliance Guide The SANS Institute Top 20 Critical Security Controls Compliance Guide February 2014 The Need for a Risk-Based Approach A common factor across many recent security breaches is that the targeted enterprise

More information

CloudSOC and Security.cloud for Microsoft Office 365

CloudSOC and  Security.cloud for Microsoft Office 365 Solution Brief CloudSOC and Email Security.cloud for Microsoft Office 365 DID YOU KNOW? Email is the #1 delivery mechanism for malware. 1 Over 40% of compliance related data in Office 365 is overexposed

More information

Trend Micro and IBM Security QRadar SIEM

Trend Micro and IBM Security QRadar SIEM Trend Micro and IBM Security QRadar SIEM Ellen Knickle, PM QRadar Integrations Robert Tavares, VP IBM Strategic Partnership February 19, 2014 1 Agenda 1. Nature of the IBM Relationship with Trend Micro

More information

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW: SOLUTION OVERVIEW: ALERT LOGIC THREAT MANAGER WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE Protecting your business assets and sensitive data requires regular vulnerability assessment,

More information

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux EU GENERAL DATA PROTECTION: TIME TO ACT Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux Is this the WAY you handle GDPR today 2 3 area s to consider

More information

SYMANTEC DATA CENTER SECURITY

SYMANTEC DATA CENTER SECURITY SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information

More information

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.

More information

Securing Your Amazon Web Services Virtual Networks

Securing Your Amazon Web Services Virtual Networks Securing Your Amazon Web Services s IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up a workload,

More information

Security in a Virtualized Environment with TrendMicro

Security in a Virtualized Environment with TrendMicro Security in a Virtualized Environment with TrendMicro Bob van der Werf Partner Systems Engineer Andre Noordam Trend Micro Agenda VMware vshield VMware VMSafe API TrendMicro solutions integration Smart

More information

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson Delivering Integrated Cyber Defense for the Generation Darren Thomson Vice President & CTO, EMEA Region Symantec In 2009 there were 2,361,414 new piece of malware created. In 2015 that number was 430,555,582

More information

Trend Micro deep security 9.6

Trend Micro deep security 9.6 datasheet Trend Micro deep security 9.6 Comprehensive security platform for physical, virtual, and cloud servers Virtualization has already transformed the data center and now, organizations are moving

More information

CA Security Management

CA Security Management CA Security CA Security CA Security In today s business environment, security remains one of the most pressing IT concerns. Most organizations are struggling to protect an increasing amount of disparate

More information

The Top 6 WAF Essentials to Achieve Application Security Efficacy

The Top 6 WAF Essentials to Achieve Application Security Efficacy The Top 6 WAF Essentials to Achieve Application Security Efficacy Introduction One of the biggest challenges IT and security leaders face today is reducing business risk while ensuring ease of use and

More information

Securing Your Microsoft Azure Virtual Networks

Securing Your Microsoft Azure Virtual Networks Securing Your Microsoft Azure Virtual Networks IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up

More information

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1 CISCO BORDERLESS NETWORKS 2009 Cisco Systems, Inc. All rights reserved. 1 Creating New Business Models The Key Change: Putting the Interaction Where the Customer Is Customer Experience/ Innovation Productivity/

More information

Imperva Incapsula Website Security

Imperva Incapsula Website Security Imperva Incapsula Website Security DA T A SH E E T Application Security from the Cloud Imperva Incapsula cloud-based website security solution features the industry s leading WAF technology, as well as

More information

converged agile practical Design Your Security We build tailored, converged security for you.

converged agile practical Design Your Security We build tailored, converged security for you. converged Technology. Strategy. People. The synergetic collaboration. agile Design Your Security Hackers sleep - we don t. We re ready whenever, wherever. We build tailored, converged security for you.

More information

Dynamic Datacenter Security Solidex, November 2009

Dynamic Datacenter Security Solidex, November 2009 Dynamic Datacenter Security Solidex, November 2009 Deep Security: Securing the New Server Cloud Virtualized Physical Servers in the open Servers virtual and in motion Servers under attack 2 11/9/09 2 Dynamic

More information

IBM Security Network Protection Solutions

IBM Security Network Protection Solutions Systems IBM Security IBM Security Network Protection Solutions Pre-emptive protection to keep you Ahead of the Threat Tanmay Shah Product Lead Network Protection Appliances IBM Security Systems 1 IBM Security

More information

Building Resilience in a Digital Enterprise

Building Resilience in a Digital Enterprise Building Resilience in a Digital Enterprise Top five steps to help reduce the risk of advanced targeted attacks To be successful in business today, an enterprise must operate securely in the cyberdomain.

More information

Symantec Endpoint Protection 14

Symantec Endpoint Protection 14 Symantec Endpoint Protection Cloud Security Made Simple Symantec Endpoint Protection 14 Data Data Sheet: Sheet: Endpoint Endpoint Security Security Overview Last year, we saw 431 million new malware variants,

More information

PCI DSS Compliance. White Paper Parallels Remote Application Server

PCI DSS Compliance. White Paper Parallels Remote Application Server PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3

More information

ALIENVAULT USM FOR AWS SOLUTION GUIDE

ALIENVAULT USM FOR AWS SOLUTION GUIDE ALIENVAULT USM FOR AWS SOLUTION GUIDE Summary AlienVault Unified Security Management (USM) for AWS is a unified security platform providing threat detection, incident response, and compliance management

More information

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER Bret Hartman Cisco / Security & Government Group Session ID: SPO1-W25 Session Classification: General Interest 1 Mobility Cloud Threat Customer centric

More information

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and the Case For Automated Sandboxing

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and the Case For Automated Sandboxing WHITE PAPER Endpoint Security and the Case For Automated Sandboxing A World of Constant Threat We live in a world of constant threat. Every hour of every day in every country around the globe hackers are

More information

The Evolution of Data Center Security, Risk and Compliance

The Evolution of Data Center Security, Risk and Compliance #SymVisionEmea #SymVisionEmea The Evolution of Data Center Security, Risk and Compliance Taha Karim / Patrice Payen The Adoption Curve Virtualization is being stalled due to concerns around Security and

More information

Office 365 Buyers Guide: Best Practices for Securing Office 365

Office 365 Buyers Guide: Best Practices for Securing Office 365 Office 365 Buyers Guide: Best Practices for Securing Office 365 Microsoft Office 365 has become the standard productivity platform for the majority of organizations, large and small, around the world.

More information

Agile Security Solutions

Agile Security Solutions Agile Security Solutions Piotr Linke Security Engineer CISSP CISA CRISC CISM Open Source SNORT 2 Consider these guys All were smart. All had security. All were seriously compromised. 3 The Industrialization

More information

Seamless Security in the Age of Cloud Services: Securing SaaS Applications & Cloud Workloads

Seamless Security in the Age of Cloud Services: Securing SaaS Applications & Cloud Workloads Seamless Security in the Age of Cloud Services: Securing SaaS Applications & Cloud Workloads Kimmo Vesajoki, Country Manager Finland & Baltics Trend Micro EMEA Ltd. Copyright 2016 Trend Micro Inc. Cross-generational

More information

SentinelOne Technical Brief

SentinelOne Technical Brief SentinelOne Technical Brief SentinelOne unifies prevention, detection and response in a fundamentally new approach to endpoint protection, driven by behavior-based threat detection and intelligent automation.

More information

ForeScout ControlFabric TM Architecture

ForeScout ControlFabric TM Architecture ForeScout ControlFabric TM Architecture IMPROVE MULTI-VENDOR SOLUTION EFFECTIVENESS, RESPONSE AND WORKFLOW AUTOMATION THROUGH COLLABORATION WITH INDUSTRY-LEADING TECHNOLOGY PARTNERS. The Challenge 50%

More information

Combating APTs with the Custom Defense Solution. Hans Liljedahl Peter Szendröi

Combating APTs with the Custom Defense Solution. Hans Liljedahl Peter Szendröi Combating APTs with the Custom Defense Solution Hans Liljedahl Peter Szendröi RSA Attack Overview : 1. Two spear phishing emails were sent over a two-day period targeted at low to mid- xls attachment with

More information

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client

More information

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Enhancing the Cybersecurity of Federal Information and Assets through CSIP TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3

More information

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT? WHAT IS FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT? While firewalls started life simply protecting networks from outside hacks and attacks, the role of the firewall has greatly evolved to take

More information

Protecting Your Digital World

Protecting Your Digital World Protecting Your Digital World C O R P O R A T E O V E R V I E W With revenues of more than $105 Billion, cybercrime generates more revenue than the illegal drug trade. Source: U.S. Treasury, reported by

More information

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance. Real-time Visibility Network Access Control Endpoint Compliance Mobile Security ForeScout CounterACT Continuous Monitoring and Mitigation Rapid Threat Response Benefits Rethink IT Security Security Do

More information

TREND MICRO SMART PROTECTION SUITES

TREND MICRO SMART PROTECTION SUITES SOLUTION BROCHURE TREND MICRO SMART ROTECTION SUITES Maximum Trend Micro XGen security from your proven security partner Get smarter security that goes where your users go The threat landscape is constantly

More information

Integrated Access Management Solutions. Access Televentures

Integrated Access Management Solutions. Access Televentures Integrated Access Management Solutions Access Televentures Table of Contents OVERCOMING THE AUTHENTICATION CHALLENGE... 2 1 EXECUTIVE SUMMARY... 2 2 Challenges to Providing Users Secure Access... 2 2.1

More information

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief Cato Cloud Software-defined and cloud-based secure enterprise network Solution Brief Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise Cato Networks: Software-defined and Cloud-based

More information

BUILDING A NEXT-GENERATION FIREWALL

BUILDING A NEXT-GENERATION FIREWALL How to Add Network Intelligence, Security, and Speed While Getting to Market Faster INNOVATORS START HERE. EXECUTIVE SUMMARY Your clients are on the front line of cyberspace and they need your help. Faced

More information

SO YOU THINK YOU ARE PROTECTED? THINK AGAIN! NEXT GENERATION ENDPOINT SECURITY

SO YOU THINK YOU ARE PROTECTED? THINK AGAIN! NEXT GENERATION ENDPOINT SECURITY SO YOU THINK YOU ARE PROTECTED? THINK AGAIN! NEXT GENERATION ENDPOINT SECURITY www.securelink.net BACKGROUND Macro trends like cloud and mobility change the requirements for endpoint security. Data can

More information

Securing Office 365 with SecureCloud

Securing Office 365 with SecureCloud Securing Office 365 with SecureCloud 1 Introduction Microsoft Office 365 has become incredibly popular because of the mobility and collaboration it enables. With Office 365, companies always have the latest

More information

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002 ISO 27002 COMPLIANCE GUIDE How Rapid7 Can Help You Achieve Compliance with ISO 27002 A CONTENTS Introduction 2 Detailed Controls Mapping 3 About Rapid7 8 rapid7.com ISO 27002 Compliance Guide 1 INTRODUCTION

More information

BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY

BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY SOLUTION OVERVIEW BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY Every organization is exploring how technology can help it disrupt current operating models, enabling it to better serve

More information

for businesses with more than 25 seats

for businesses with more than 25 seats for businesses with more than 25 seats ESET Business Solutions 1/6 Whether your business is just starting out or is established, there are a few things that you should expect from the software you use

More information

AKAMAI CLOUD SECURITY SOLUTIONS

AKAMAI CLOUD SECURITY SOLUTIONS AKAMAI CLOUD SECURITY SOLUTIONS Whether you sell to customers over the web, operate data centers around the world or in the cloud, or support employees on the road, you rely on the Internet to keep your

More information

Total Threat Protection. Whitepaper

Total Threat Protection. Whitepaper Total Threat Protection Whitepaper Organizations Are Caught Between a Growing Threat Landscape and Resource Limitations Today s organizations continue to struggle with providing adequate protection in

More information

Trend Micro. Apex One as a Service / Apex One. Best Practice Guide for Malware Protection. 1 Best Practice Guide Apex One as a Service / Apex Central

Trend Micro. Apex One as a Service / Apex One. Best Practice Guide for Malware Protection. 1 Best Practice Guide Apex One as a Service / Apex Central Trend Micro Apex One as a Service / Apex One Best Practice Guide for Malware Protection 1 Best Practice Guide Apex One as a Service / Apex Central Information in this document is subject to change without

More information

IPS-1 Robust and accurate intrusion prevention

IPS-1 Robust and accurate intrusion prevention Security Check Point security solutions are the marketleading choice for securing the infrastructure. IPS-1 Robust and accurate intrusion prevention Today s s operate in an environment that is ever changing,

More information

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load Complete User Protection Consumerization IT Work Load 2 Then... File/Folder & Removable Media Email & Messaging Web Access Employees IT Admin 3 Now! File/Folder & Removable Media Email & Messaging Web

More information

ATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK

ATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK PARTNER BRIEF ATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK INTRODUCTION Attivo Networks has partnered with Cisco Systems to provide advanced real-time inside-the-network

More information

Cisco s Appliance-based Content Security: IronPort and Web Security

Cisco s Appliance-based Content Security: IronPort  and Web Security Cisco s Appliance-based Content Security: IronPort E-mail and Web Security Hrvoje Dogan Consulting Systems Engineer, Security, Emerging Markets East 2010 Cisco and/or its affiliates. All rights reserved.

More information

McAfee Public Cloud Server Security Suite

McAfee Public Cloud Server Security Suite McAfee Public Cloud Server Security Suite Comprehensive security for AWS and Azure cloud workloads As enterprises shift their data center strategy to include and often lead with public cloud server instances,

More information

with Advanced Protection

with Advanced  Protection with Advanced Email Protection OVERVIEW Today s sophisticated threats are changing. They re multiplying. They re morphing into new variants. And they re targeting people, not just technology. As organizations

More information

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors Protecting Against Modern Attacks Protection Against Modern Attack Vectors CYBER SECURITY IS A CEO ISSUE. - M C K I N S E Y $4.0M 81% >300K 87% is the average cost of a data breach per incident. of breaches

More information

SentinelOne Technical Brief

SentinelOne Technical Brief SentinelOne Technical Brief SentinelOne unifies prevention, detection and response in a fundamentally new approach to endpoint protection, driven by machine learning and intelligent automation. By rethinking

More information

ATTIVO NETWORKS THREATDEFEND INTEGRATION WITH MCAFEE SOLUTIONS

ATTIVO NETWORKS THREATDEFEND INTEGRATION WITH MCAFEE SOLUTIONS PARTNER BRIEF ATTIVO NETWORKS THREATDEFEND INTEGRATION WITH MCAFEE SOLUTIONS INTRODUCTION Attivo Networks has partnered with McAfee to detect real-time in-network threats and to automate incident response

More information

TREND MICRO SMART PROTECTION SUITES

TREND MICRO SMART PROTECTION SUITES SOLUTION BROCHURE TREND MICRO SMART ROTECTION SUITES Maximum endpoint security from your proven security partner Get smarter security that goes where your users go The threat landscape is constantly changing,

More information

Securing the Software-Defined Data Center

Securing the Software-Defined Data Center Securing the Software-Defined Data Center The future of the data center is software defined Key Advantages McAfee Network Platform 8.4 Delivers best-in-class IPS security across physical and softwaredefined

More information

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Service SM Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Product Protecting sensitive data is critical to being

More information

How to Identify Advanced Persistent, Targeted Malware Threats with Multidimensional Analysis

How to Identify Advanced Persistent, Targeted Malware Threats with Multidimensional Analysis White paper How to Identify Advanced Persistent, Targeted Malware Threats with Multidimensional Analysis AhnLab, Inc. Table of Contents Introduction... 1 Multidimensional Analysis... 1 Cloud-based Analysis...

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS 1 Business drivers and their impact on IT AGILITY Move fast, be nimble and flexible 66% of business owners identify business agility as a priority EFFICIENCY

More information

Trend Micro Deep Discovery and Custom Defence

Trend Micro Deep Discovery and Custom Defence Trend Micro Deep Discovery and Custom Defence Protection from Targeted Attacks 23 May 2013 James Walker Snr. EMEA Product Marketing Manager How threats have evolved! Patterns Reputation Heuristics Custom

More information

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security.  #truecybersecurity Borderless security engineered for your elastic hybrid cloud Kaspersky Hybrid Cloud Security www.kaspersky.com #truecybersecurity Borderless security engineered for your hybrid cloud environment Data

More information

Outwit Cyber Criminals with Comprehensive Malware and Exploit Protection.

Outwit Cyber Criminals with Comprehensive Malware and Exploit Protection. Singtel Business Product Brochure Managed Advanced Threat Prevention Outwit Cyber Criminals with Comprehensive Malware and Exploit Protection. As cyber criminals outwit businesses by employing ever-new

More information

Securing Your Most Sensitive Data

Securing Your Most Sensitive Data Software-Defined Access Securing Your Most Sensitive Data Company Overview Digital Growth Means Digital Threats Digital technologies offer organizations unprecedented opportunities to innovate their way

More information

SIEMLESS THREAT MANAGEMENT

SIEMLESS THREAT MANAGEMENT SOLUTION BRIEF: SIEMLESS THREAT MANAGEMENT SECURITY AND COMPLIANCE COVERAGE FOR APPLICATIONS IN ANY ENVIRONMENT Evolving threats, expanding compliance risks, and resource constraints require a new approach.

More information

McAfee Advanced Threat Defense

McAfee Advanced Threat Defense Advanced Threat Defense Detect advanced malware Advanced Threat Defense enables organizations to detect advanced, evasive malware and convert threat information into immediate action and protection. Unlike

More information

A Unified Threat Defense: The Need for Security Convergence

A Unified Threat Defense: The Need for Security Convergence A Unified Threat Defense: The Need for Security Convergence Udom Limmeechokchai, Senior system Engineer Cisco Systems November, 2005 1 Agenda Evolving Network Security Challenges META Group White Paper

More information

Best Practices in Securing a Multicloud World

Best Practices in Securing a Multicloud World Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers

More information

Symantec Protection Suite Add-On for Hosted Security

Symantec Protection Suite Add-On for Hosted  Security Symantec Protection Suite Add-On for Hosted Email Security Overview Malware and spam pose enormous risk to the health and viability of IT networks. Cyber criminal attacks are focused on stealing money

More information

Why ESET. We help more than 100,000,000 users worldwide to Enjoy Safer Technology. The only vendor with record-breaking protection

Why ESET. We help more than 100,000,000 users worldwide to Enjoy Safer Technology. The only vendor with record-breaking protection Why ESET The only vendor with record-breaking protection ESET has the longest unbroken run of VB100 awards for malware detection of any IT security vendor. We ve been excelling at VB100 tests since May

More information

SaaS Flyer for Trend Micro

SaaS Flyer for Trend Micro SaaS Flyer for Trend Micro Prices Effective July 1, 2008 1 Internet Security 2008 Trend Micro Internet Security 2008 makes it easy to protect your home or small business network, personal identity, and

More information

PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY OUR MISSION Make the digital world a sustainable and trustworthy environment

More information

Symantec Endpoint Protection Family Feature Comparison

Symantec Endpoint Protection Family Feature Comparison Symantec Endpoint Protection Family Feature Comparison SEP SBE SEP Cloud SEP Cloud SEP 14.2 Device Protection Laptop, Laptop Laptop, Tablet Laptop Tablet & & Smartphone Smartphone Meter Per Device Per

More information

TRUE SECURITY-AS-A-SERVICE

TRUE SECURITY-AS-A-SERVICE TRUE SECURITY-AS-A-SERVICE To effectively defend against today s cybercriminals, organizations must look at ways to expand their ability to secure and maintain compliance across their evolving IT infrastructure.

More information

SIEMLESS THREAT DETECTION FOR AWS

SIEMLESS THREAT DETECTION FOR AWS SOLUTION OVERVIEW: ALERT LOGIC FOR AMAZON WEB SERVICES (AWS) SIEMLESS THREAT DETECTION FOR AWS Few things are as important to your business as maintaining the security of your sensitive data. Protecting

More information

Cato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN

Cato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN Cato Cloud Software-defined and Cloud-based Secure Enterprise Network Solution Brief NETWORK + SECURITY IS SIMPLE AGAIN Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise The

More information

SIEM: Five Requirements that Solve the Bigger Business Issues

SIEM: Five Requirements that Solve the Bigger Business Issues SIEM: Five Requirements that Solve the Bigger Business Issues After more than a decade functioning in production environments, security information and event management (SIEM) solutions are now considered

More information

Automating the Top 20 CIS Critical Security Controls

Automating the Top 20 CIS Critical Security Controls 20 Automating the Top 20 CIS Critical Security Controls SUMMARY It s not easy being today s CISO or CIO. With the advent of cloud computing, Shadow IT, and mobility, the risk surface area for enterprises

More information

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief 5 Trends That Will Impact Your IT Planning in 2012 Layered Security Executive Brief a QuinStreet Excutive Brief. 2011 Layered Security Many of the IT trends that your organization will tackle in 2012 aren

More information

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS Overview Cyberattacks are increasingly getting more frequent, more sophisticated and more widespread than ever

More information

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited Technology Risk Management in Banking Industry Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited Change in Threat Landscape 2 Problem & Threats faced by Banking Industry

More information

BUFFERZONE Advanced Endpoint Security

BUFFERZONE Advanced Endpoint Security BUFFERZONE Advanced Endpoint Security Enterprise-grade Containment, Bridging and Intelligence BUFFERZONE defends endpoints against a wide range of advanced and targeted threats with patented containment,

More information

THE ACCENTURE CYBER DEFENSE SOLUTION

THE ACCENTURE CYBER DEFENSE SOLUTION THE ACCENTURE CYBER DEFENSE SOLUTION A MANAGED SERVICE FOR CYBER DEFENSE FROM ACCENTURE AND SPLUNK. YOUR CURRENT APPROACHES TO CYBER DEFENSE COULD BE PUTTING YOU AT RISK Cyber-attacks are increasingly

More information

The threat landscape is constantly

The threat landscape is constantly A PLATFORM-INDEPENDENT APPROACH TO SECURE MICRO-SEGMENTATION Use Case Analysis The threat landscape is constantly evolving. Data centers running business-critical workloads need proactive security solutions

More information

Juniper Sky Advanced Threat Prevention

Juniper Sky Advanced Threat Prevention Juniper Sky Advanced Threat Prevention Product Overview Juniper Sky Advanced Threat Prevention is a cloud-based service that provides complete advanced malware protection. Integrated with SRX Series Services

More information

Snort: The World s Most Widely Deployed IPS Technology

Snort: The World s Most Widely Deployed IPS Technology Technology Brief Snort: The World s Most Widely Deployed IPS Technology Overview Martin Roesch, the founder of Sourcefire and chief security architect at Cisco, created Snort in 1998. Snort is an open-source,

More information

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large Executive Summary As a County Government servicing about 1.5 million citizens, we have the utmost responsibility to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

More information