Trend MicroTM. Total Product Catalogue

Similar documents
Copyright 2011 Trend Micro Inc.

Stopping Advanced Persistent Threats In Cloud and DataCenters

Commercial Product Matrix

Cisco Firepower NGFW. Anticipate, block, and respond to threats

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Securing the Modern Data Center with Trend Micro Deep Security

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Securing Today s Mobile Workforce

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

CloudSOC and Security.cloud for Microsoft Office 365

Trend Micro and IBM Security QRadar SIEM

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

SYMANTEC DATA CENTER SECURITY

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Securing Your Amazon Web Services Virtual Networks

Security in a Virtualized Environment with TrendMicro

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Trend Micro deep security 9.6

CA Security Management

The Top 6 WAF Essentials to Achieve Application Security Efficacy

Securing Your Microsoft Azure Virtual Networks

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

Imperva Incapsula Website Security

converged agile practical Design Your Security We build tailored, converged security for you.

Dynamic Datacenter Security Solidex, November 2009

IBM Security Network Protection Solutions

Building Resilience in a Digital Enterprise

Symantec Endpoint Protection 14

PCI DSS Compliance. White Paper Parallels Remote Application Server

ALIENVAULT USM FOR AWS SOLUTION GUIDE

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and the Case For Automated Sandboxing

The Evolution of Data Center Security, Risk and Compliance

Office 365 Buyers Guide: Best Practices for Securing Office 365

Agile Security Solutions

Seamless Security in the Age of Cloud Services: Securing SaaS Applications & Cloud Workloads

SentinelOne Technical Brief

ForeScout ControlFabric TM Architecture

Combating APTs with the Custom Defense Solution. Hans Liljedahl Peter Szendröi

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?

Protecting Your Digital World

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

TREND MICRO SMART PROTECTION SUITES

Integrated Access Management Solutions. Access Televentures

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

BUILDING A NEXT-GENERATION FIREWALL

SO YOU THINK YOU ARE PROTECTED? THINK AGAIN! NEXT GENERATION ENDPOINT SECURITY

Securing Office 365 with SecureCloud

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY

for businesses with more than 25 seats

AKAMAI CLOUD SECURITY SOLUTIONS

Total Threat Protection. Whitepaper

Trend Micro. Apex One as a Service / Apex One. Best Practice Guide for Malware Protection. 1 Best Practice Guide Apex One as a Service / Apex Central

IPS-1 Robust and accurate intrusion prevention

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load

ATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK

Cisco s Appliance-based Content Security: IronPort and Web Security

McAfee Public Cloud Server Security Suite

with Advanced Protection

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

SentinelOne Technical Brief

ATTIVO NETWORKS THREATDEFEND INTEGRATION WITH MCAFEE SOLUTIONS

TREND MICRO SMART PROTECTION SUITES

Securing the Software-Defined Data Center

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

How to Identify Advanced Persistent, Targeted Malware Threats with Multidimensional Analysis

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Trend Micro Deep Discovery and Custom Defence

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity

Outwit Cyber Criminals with Comprehensive Malware and Exploit Protection.

Securing Your Most Sensitive Data

SIEMLESS THREAT MANAGEMENT

McAfee Advanced Threat Defense

A Unified Threat Defense: The Need for Security Convergence

Best Practices in Securing a Multicloud World

Symantec Protection Suite Add-On for Hosted Security

Why ESET. We help more than 100,000,000 users worldwide to Enjoy Safer Technology. The only vendor with record-breaking protection

SaaS Flyer for Trend Micro

PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Symantec Endpoint Protection Family Feature Comparison

TRUE SECURITY-AS-A-SERVICE

SIEMLESS THREAT DETECTION FOR AWS

Cato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN

SIEM: Five Requirements that Solve the Bigger Business Issues

Automating the Top 20 CIS Critical Security Controls

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

BUFFERZONE Advanced Endpoint Security

THE ACCENTURE CYBER DEFENSE SOLUTION

The threat landscape is constantly

Juniper Sky Advanced Threat Prevention

Snort: The World s Most Widely Deployed IPS Technology

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

Transcription:

TM Total Product Catalogue

Our Company Company Introduction Our History Our Company Management Eva Chen CEO Mahendra Negi CFO Steve Chang Chairman has continuously defended against security threats since its inception. As modern network environments have grown more complex and diverse, the threats against them have become steadily more sophisticated. has kept pace with the evolution of both, providing strong yet flexible solutions. Our Company Eva Chen CEO Jenny Chang Co-Founder and CCO 연락처 서울시강남구대치동 945-1 홍우빌딩 6층 TEL. 02-561-0990 FAX. 02-561-0660 never stops innovating to deal with emerging new threats Cyber Threats & Targeted Attacks Closed-System Infrastructure Mobility & BYOD Virtualization & Cloud Computing Age of Internet Proliferation of Email Usage Servers & Storage Our Vision A world safe for exchanging digital information Our Mission Defend against threats that would impact user s digital life or IT infrastructure. Desktop/PC Era 1988 1991 Antivirus product Titanium TM (Known as PC Cillin) 1991 Server solution ServerProtect TM 1996 Block Emails with malware attached InterScan TM VirusWall TM 2004 Inspect packets to prevent malicious virus intrusion and malicious traffic NetWork VirusWall TM Family Fighting against new threats 2008 Cloud-based Global Threat Intelligence Smart Protection Network TM 2010 Agentless security in the virtual environment Deep TM Encrypt the data on the cloud SecureCloud TM* *Released in 2011 2012 Protection against targeted attacks Deep Discovery TM Deep Discovery Email Inspector * *Released in 2014 2013 Virus detection and cleanup tool for Off-line device Portable Protect control system (ICS), embedded device and devices for specific purpose in closed environment Safe Lock 2014 for smartphone / Device management Delivering the best solutions for the latest IT environments Mobile * *Released in 2008 technology for comfort and safety of Mobile Apps Mobile App Safe Mobile Workspace Our Strategy Be the threat defense expert that adapts quickly to evolving user behaviors, infrastructure and threat vectors. 1988 Founded in Los Angeles, USA 1989 Incorporated established 1991 VirusBuster developed and distributed 1996 Osaka office established Internet server virus countermeasure product "InterScan VirusWall" developed and distributed 1997 Fukuoka office established 1998 Nagoya office established Stock offered to the public as over-the-counter issues 2000 Listed in the first section of the Tokyo Stock Exchange 2002 Selected for Nikkei Stock Average (Nikkei 225) stock composition 2003 Centralized management tool " Control Manager " released Network virus countermeasures device (Network VirusWall Family) released Comprehensive contract relating to network virus prevention solutions signed with Cisco Systems, Inc. Acquisition of InterMute Inc. (USA) Acquisition of Kelkea Inc. (USA) Provision of Network Service begins Privacy Mark certification gained Provision of Service, including Service, begins Acquisition of Provilla, Inc. (USA) Acquisition of Identum Ltd. (UK) LeakProof released (presently Data Loss Prevention ) Mobile released 2009 Acquisition of Third Brigade (Canada) 20 10 Listed in Global 100 Most Sustainable Corporations in the World Deep released Acquisition of humyo (UK) Online Storage SafeSync released 201 1 Vulnerability Management Services released SecureCloud released VirusBuster Mobile for Android released TrendLabs SM Philippines gains ISO20000 standard 20 1 2 Deep Discovery released Provision of " SSL " begins 2013 Deep as a Service for Amazon Services released 2014 Deep Discovery Email Inspector released 2 3 2004 2005 2007 2008

Our Company Global Network - Smart Protection Network Global Protection Against Dangers That Know No Borders The world s most advanced global threat intelligence Because threats can appear anywhere and spread everywhere, 's network spans the globe. Delivering professional peace of mind in the age of mass consumerization, cloud-based security, and secretive cyber attacks Originally founded in California in 1988, has since become a truly transnational company. Now headquartered in Japan, has offices across Asia, Australia, the Middle East, Europe, and the Americas to help monitor both worldwide and regional emerging threats and provide solutions as quickly as possible. 's cloud security infrastructure quickly identifies the latest threats and immediately provides the optimum solutions with a minimal burden on businesses. Our Company Our Company Global Network - Global Map Threat Information Collected Worldwide Global Network Ireland Collection of threat information UK France Germany Identification and analysis of threats USA (California) Japan China USA (Head Office) (Texas) Taiwan Customer protection Cloud-Based Solutions Based on Rapid Threat Analysis Philippines (Headquarters) Brazil 1 Collection of threat information Global Sensor Network 2 Identification and analysis of threats Global Threat Intelligence 3 Customer protection Proactive Protection Development Sites Collects More Information in More Places Hundreds of millions of sensors 16 billion threat queries daily Major Overseas Bases TrendLabs Philippines received ISO 20000-12005 certification for adhering to IT service excellence in compiling malicious software information, detection and cleanup procedures, and technical services. Japan <Information Collected> URLs Vulnerabilities Files Domains Network traffic Cyber attackers Mobile applications IP addresses Exploit kits Accurately Analyzes & Identifies Threats Faster Identifies new threats 50x faster than average (NSS Labs) <Data Analyzed> Approximately 180,000 pieces of threat information identified daily 100TB of data is correlated Blocks Real-World Threats Sooner 250M threats blocked daily 500k new threats identified per day <Supporting Technology> Email reputation reputation File reputation White-listing Vulnerabilities and exploits Mobile App Network traffic rules Cyber criminal intelligence Head Office Philippines TrendLabs Regional Trend Labs Development Sites Overseas Subsidiary (Headquarters) Japan USA USA Japan Canada Taiwan Germany Germany UK Ireland Taiwan China China France India Brazil Australia Ireland Germany China China (Beijing) (Shanghai) Taiwan France Panama (Hong Kong) India Korea Italy UK Australia Netherlands Canada Thailand Switzerland Malaysia Singapore Brazil New Zealand Austria Belgium Denmark UAE(Dubai) Norway Sweden Turkey Vietnam Philippines Egypt USA Ireland Mexico China Infrastructure in the Age of Targeted Attacks and Personal Mobile Devices Singapore France Brazil The Smart Protection Network cloud security infrastructure quickly and accurately identifies the latest threats and provides optimum solutions. By analyzing attacks using proprietary cloud technology and techniques, the Smart Protection Network swiftly identifies the latest threats and circulates solutions proactively. Smart Protection Network Benefits Smart Protection Network Numbers Totally new and highly complex security threats now appear at an astonishing rate, so has developed a multi-faceted security solution to rapidly and comprehensively identify, analyze, and resolve them. By employing an independent cloud infrastructure to collect and analyze a vast amount of threat data from around the world, can provide customers with nimble yet powerful security solutions. The Smart Protection Network also reduces the burden on company networks by relying on the cloud to do much of the heavy lifting. Summary of Smart Protection Network features Major Overseas Bases 4 Russia Saudi Arabia South Africa Indonesia Poland Israel Finland Spain File reputation reputation Email reputation Mobile App Smart Protection Server Network traffic rules Vulnerability rules White lists Cyber criminal intelligence Correlation analysis Smart feedback Amount of threat data correlated per day: 100 terabytes Number of queries processed per day: 16 billion Number of threats blocked per day: 250 million * study, 2012 5

Our Company Changing Landscape for Today Smart Protection Strategy Our Company The Changing Threat Landscape For the first time ever, mobile devices now outsell PCs* 1. Organizations of all sizes have started embracing cloud-based solutions for storing data and business applications. The unprecedented amount of data now generated and stored online can now help more and more people make critical decisions, discover new opportunities, reduce customer churn, and promote greater operational efficiency. Smart Protection Strategy Everyone now recognizes that information requires protection regardless of the storage location or which devices and platforms transmit it. Administrators need inexpensive yet effective security solutions that they can easily manage and deploy with flexibility. Our Company This new environment has also resulted in a much more complex IT landscape with many more support requirements. At this moment, a new security threat appears almost every second. Over 90% of organizations have suffered from some sort of malicious software, but more than half never become aware of the intrusions.* 2 Hackers and cyber-attackers have clearly kept up with the new technology and still know exactly how to access protected customer data, credit card numbers, and private intellectual property. Cyber Threats Critical Strategies for Today The New Reality Information no longer protected by traditional defenses Endpoint solutions with limited visibility and de-centralized administration Customers Need Smart protection for information Simple yet flexible to manage and deploy Attackers Complex and dynamic environments with many new apps and platforms that fits an evolving ecosystem Consumerization Cloud and Virtualization products support the Smart Protection Strategy CUSTOM DEFENSE Smart Protection Strategy Smart Advanced, targeted threat detection Customizable sandboxes for accurate analysis Actionable insight from global threat intelligence Integration with leading SIEM solutions Simple Single appliance monitors multiple ports/protocols Automated, customized security updates that fits Sandbox analysis and custom signatures available to other security products Products/Services that fit Network Collaboration Gateway Endpoints/Server Service Deep Discovery Network VirusWall Enforcer ScanMail TM Series InterScan TM Messaging InterScan TM TM Deep Custom Defense Services Then Employees Company issued PC connected solely to the organization s network with access to a finite set of applications. Data center servers were physically located in the company data center. Corporate systems had the latest antivirus pattern file to protect them from the most recent broad-based attack. * 1 Asymco.com, June 2012 *2 2012 survey Now IT Consumerization: no longer have a one-to-one relationship with their company-issued device or the corporate applications and network. Cloud and Virtualization: Many organizations have moved away from data centers in favor of a more agile network environment that includes virtualization and cloud-based computing. Cyber Threats: Sophisticated, stealthy, and social cyber threats now target businesses like never before. CLOUD & DATA CENTER SECURITY COMPLETE USER PROTECTION Smart Comprehensive protection across physical, virtual, cloud Automated protection from vulnerabilities with virtual patching Simple Single platform and administration with modular deployment Agent-less security for VMware TM ; efficient, high consolidation Easy multi-tenant and service provider management that fits Optimized, automated security for VMware, Amazon Services and Microsoft TM Azure Open: Microsoft, Linux TM, Solaris TM, Unix, VMware, Citrix Smart Layered security from mobile devices to gateways Transparent, real-time protection Simple Unified dashboard with centralized policy control Modular, lightweight and efficient Flexible deployment: on-premise or security as a service Purpose-built for enterprise, mid-market, service providers that fits Specialized plug-ins for Exchange, Domino, SharePoint TM Open: Win, Mac, ios, Android, Blackberry Powers IBM TM Endpoint Protection Server/Storage Cloud and viurtualization Endpoint Collaboration Gateway Integrated Data Loss Prevention ServerProtect Series SecureCloud Deep Enterprise Suite Worry Free TM Series Mobile SafeSync for Enterprise Endpoint Encryption Endpoint Application Control Vulnerability Protection ScanMail Series PortalProtect TM Hosted Email InterScan TM Series Integrated DLP 6 7

Product Map ERS WRS Mobile Email Services Deep FRS Service File Service For the Cloud Scalable from Physical server to Cloud environment Mobile Devices Customer Datacenter Deep for SAP Systems InterScan Virtual Appliance Deep Product Map Safe Lock Deep for Apps InterScan Messaging Virtual Appliance Router - ScanMail Suite for MicrosoftTM Exchange - PortalProtect - IM Deep Discovery Analyzer Firewall Portable 2 Deep Discovery Inspector TM Network VirusWall Enforcer Deep Discovery Endpoint Sensor ServerProtect Series ScanMail for Groupware Virus Switch Data Loss - - ServerProtect for Windows/Linux - Control Manager - plug-in IDF - plug-in Macintosh Worry-Free Business Cyber Threat Deep Discovery Inspector Deep Discovery Analyzer Deep Discovery Email Inspector Deep Discovery Endpoint Sensor Network & Management Network VirusWall Enforcer Entry Point C&C Lateral Movement Known Threats Respond Adapt Unknown Threats C&C callback blacklist sharing Corp IOC / YARA Offline Blocking Categories Endpoint Protection Products Endpoint Application Control Endpoint Encryption Vulnerability Protection Portable 2 Safe Lock Antimalware For Threats Antivirus Cloud & Data Center Products Anti-malware For Threats Encryption Antivirus Encryption Email & Collaboration 8 File Sharing Vulnerability / Intrusion Firewall FIM IDS / IPS Log Inspection Complete Intelligent Application Scanning Deep Deep as a Service Deep for SAP Systems Deep for Apps SecureCloud ServerProtect for NT/NW ServerProtect for Linux ServerProtect for Storage Data Loss Prevention Data Loss Prevention Endpoint Encryption Vulnerability / Intrusion Firewall Phishing URL Filtering Mobile Quarantine Network Virus Intrusion SSL Integrity Monitoring Spear Phishing Threat Behavior Blacklisting Firewall System Blacklisting Whitelisting Lockdown Application Control IDS/ IPS *1 Products Hosted Email InterScan Messaging Virtual Appliance PortalProtect for Microsoft IM for Lync and Office Communications Server Enterprise for Communication and Collaboration ScanMail Suite for Microsoft Exchange ScanMail Suite for IBM Lotus Domino Email Encryption Client Email Encryption Gateway Hosted Email Encryption Data Protection Integrated Unlimited Detection and SSL Protection Certificates Categories Whitelisting System Lockdown *2 Mobility Products Antivirus Categories Small Business Antivirus For Threats Anti-spam Products Antivirus URL Filtering AntiPhishing Antispam AntiPhishing Data Loss Prevention Email Encryption Gateway Products Antivirus Suite Remote Lock Remote Wipe Secure File Sharing Firewall Anti-spam URL Filtering Anti-spam Data Protection Data Loss Prevention Mobile Vulnerability / Intrusion Firewall For Threats Data Loss Prevention URL Filtering Data Loss Prevention Anti-Phishing InterScan Virtual Appliance InterScan as a Service Anti-malware Categories Device Control Worry-Free Business Standard Worry-Free Business Advanced Worry-Free Business Services Data Loss Prevention Categories Encryption For Threats Anti-malware For Threats Vulnerability / Intrusion Data Loss Prevention URL Filtering Mobile Safe Sync for Enterprise Anti-malware Antimalware Categories Threats *1 Execution prevention by Application Control *2 Network Virus Protection Anti-malware Categories Spam Log Data Protection Inspection Share/Sync Management Server Suspicious Object Analyze Detect Spyware Server Storage Product Matrix Products Small Medium Environment - ScanMail Suite for Microsoft Exchange - ScanMail for IBM LotusTM DominoTM Endpoint Application Control Categories Hosted Email Collaboration Deep Discovery Email Inspector Enterprise for Endpoints From the Cloud Medium Enterprise Environment SafeSync for Enterprise Solution for analyzing networks for suspicious behavior/ suspicious objects and to respond to unknown threats Deep as a Service Product Map Standalone / Closed Environment Products Antivirus For Threats URL Filtering Vulnerability / Intrusion Data Protection Anti-spam Anti-spam Data Loss Prevention Mobile Endpoint Encryption Email Encryption Firewall IDS/ IPS Enterprise for Endpoints Enterprise for Endpoints and Mail Servers Enterprise Suite Enterprise and Data Protection Enterprise Data Protection Smart Protection Complete Smart Protection for Endpoints 9

Cyber Threat Deep Discovery Solution Deep Discovery Inspector Deep Discovery Analyzer Cyber Threat Deep Discovery Solution Deep Discovery provides 360 degree network-wide visibility, insight and control that enterprises and government organizations need to reduce the risk of Advanced Persistent Threats (APTs) and targeted attacks. Deep Discovery uniquely detects and identifies evasive threats in real-time, and provides in-depth analysis and actionable intelligence needed to prevent, discover and contain attacks against corporate data. Refer to trendlab APT report, 95% APT attacks come from spear-phishing attacks. The new member of Deep Discovery family-deep Discovery email inspector is a completed anti-spear-phishing solution to detect, analysis and block the spear-phishing email into enterprise. Deep Discovery solution includes 1.Deep Discovery Inspector 2.Deep Discovery Analyzer 3.Deep Discovery Email Inspector 4.Deep Discovery Endpoint Sensor How Deep Discovery Works Malicious Content Suspect Communication Attack Behavior Attack Detection Emails containing embedded document exploits Drive-by downloads Zero-day & known malware C&C communication for all malware: bots, downloaders, data stealing, worms, and blended threats Backdoor activity by attacker Malware activity: propagation, downloading, spamming... Attacker activity: scan, brute force, service exploitation... Data exfiltration Detection Methods Decode & decompress embedded files Sandbox simulation of suspicious files Browser exploit kit detection Malware scan (Signature & Heuristic) Destination analysis (URL, IP, domain, email, IRC channel, ) via dynamic blacklisting, white listing Smart Protection Network URL reputation Communication fingerprinting rules Rule-based heuristic analysis Identification and analysis of usage of 100 s of protocols & apps including HTTP-based apps Cyber Threat Smart Protection Network Internet Deep Discovery Inspector Big Branch Deep Discovery Inspector Monitors branch network Router Deep Discovery Inspector provides network-wide visibility, insight, and control needed to combat APTs and targeted attacks. For advanced threat protection, Deep Discovery Inspector uniquely detects and identifies evasive threats in real time, then provides in-depth analysis and relevant actionable intelligence to assess, remediate, and defend organizations against targeted attacks. Hypervisors Storage Control Manager NG FW/IPS Deep Discovery Email Inspector Email DNS App Public-DMZ APT & Targeted Attack Detection Zero-day malware and document exploits detection Attacker network activity threats (exploits, drive-by-downloads) Bots, trojans, worms, keyloggers 360 degree Network-Wide Visibility More than 80 protocols analyzed GeoTrack identifies the origins of malicious communication Quick access widgets provide critical information at a glance In-Depth Contextual Analysis & Insight Provides the threat intelligence needed to understand and respond to an attack Includes a customizable sandbox fully reflects true operating environments like support non-en OS platform in the production network Detects targeted attacks threats which come through executable files, PDF files, Flash files, RTF files and other objects File Exchange DB App Deep Discovery Analyzer Sandbox analysis in-depth Internal Servers Forensics/ Team Deep Discovery Inspector Monitors lateral movement Human Resources Deep Discovery Inspector Monitors ingress/egress Deep Discovery Endpoint Sensor Marketing Pre-deployed Deep Discovery Endpoint Sensor agents monitor workstations. Note: recommends deploying Deep or agents on workstations for optimal protection. Deep Discovery Analyzer Deep Discovery Analyzer provides open, scalable custom sandbox analysis to offer in-depth simulations of potentially malicious sample files, including executables and common Microsoft Office documents, and security update exports all in a unified intelligence platform. Threat Analyzer In-depth threat simulation and analysis uses sandbox simulation and other advanced detection engines to classify and deeply analyze submitted files Custom sandbox execution environments allow customers to create and analyze multiple fully custom target images that precisely match the host environments Intelligence Update Server Export useful security blocking information learned from Threat Analyzer simulation intelligence includes newly identified malicious IP/ URL addresses and file hash codes Integration capabilities Integration with Deep Discovery Inspector and other products provides expanded detection and analysis options to customers Integrated with its own threat intelligence portal to further understand and remediate an attack Integration with leading SIEM platforms delivers improved enterprise-wide threat management from a single SIEM console Provides a web service interface/api for customer to customize their own system integration 10 1 1

Cyber Threat Deep Discovery Email Inspector Deep Discovery Endpoint Sensor Network & Management Network VirusWall Enforcer Cyber Threat Deep Discovery Email Inspector Deep Discovery Email Inspector stops sophisticated targeted attacks and cyber threats by scanning, simulating, and analyzing suspicious links and attachments in email messages before they can threaten networks. Designed to integrate into existing anti-spam/antivirus network topology, Deep Discovery Email Inspector can act as a Mail Transfer Agent in the mail traffic flow or as an out-of-band appliance silently monitoring for cyber threats. Cover most Spear-phishing attack detection in a single appliance Password derivation for zipped/protected files Embedded URL analysis via sandboxing, reputation, page analysis Document exploit detection and sandboxing for accurate detection of malicious attachments Custom Defense integration and intelligence sharing Co-exists with other email security products Exporting IP/URL/File SHA-1 blacklist for other security solution integration Powerful policy management & investigation functions Provides schedules and on-demand incident and sandbox reports Policy definition by different security risk level Geo-map dashboard and widget design are easy to investigate the security incident Document exploit detection & custom sandboxing Custom sandbox execution environments allow the customer to create and analyze multiple fully custom target images that precisely match their host environments Multi-OS platform support like win7 and win XP with 32-bit and 64-bit Attachments analyzed include a wide range of win_exe, Microsoft Office, PDF, Zip, content and compressed file types Support up to 24 sandboxes in a device Network VirusWall Enforcer Network VirusWall Enforcer protects corporate networks by ensuring that all devices comply with the corporate security policy before entry. This agentless NAC solution can scan any device managed or unmanaged, local or remote for the most up-to-date security and critical Microsoft patches. Non-compliant devices get quarantined and sent through a remediation process automatically. Once a device meets the security requirements, it may access the network. Network VirusWall Enforcer also filters network traffic to detect and block network worms with zero false positives. The easy-to-manage appliance isolates infected areas from the rest of the network so threats cannot spread. Lowers security risks Checks every device Secures network traffic Minimizes damage Simplifies management Network VirusWall Enforcer Blocks unknown viruses Quarantines devices Network & Management Deep Discovery Endpoint Sensor Deep Discovery Endpoint Sensor is a context-aware endpoint security monitor that records and reports detailed system-level activities, allowing threat investigators to rapidly assess the nature and extent of an attack. Deep Discovery Endpoint Sensor uses Indicators of Compromise (IOC) information from Deep Discovery and other sources to perform multi-level searches across user endpoints and servers. Endpoint-resident Event Recording Deep Discovery Endpoint Sensor uses a lightweight agent to record significant activities and communication events at the kernel level Agents index and store information locally for the server's search and analysis activities Agents respond to a variety of real-time requests, including memory and registry snapshots Centralized Search and Analysis Searches can be executed directly from the Deep Discovery Endpoint Sensor web console or from Control Manager Endpoints can be queried for specific communications, specific malware, registry activity, account activity, running processes, and more. Search parameters can be individual parameters, OpenIOC files, or YARA files Interactive dashboards allow you to view and analyze system activities over time, assess enterprise-wide activity timelines, and export investigation results Integration capabilities Deep Discovery Endpoint Sensor can coexist with any endpoint/server antivirus software Deep Discovery IOC data can be used by Endpoint Sensor to verify endpoint infiltrations and discover the full context, timeline, and extent of an attack Deep Discovery Endpoint Sensor integrates with Control Manager for centralized investigations that leverage IOC data from other products, enabling investigators to take immediate action in response to an attack 12 1 3

Cloud & Data Center Deep Deep as a Service Deep Deep as a Service Public Cloud Services Cloud & Data Center Deep provides a comprehensive server security platform designed to protect virtualized data centers from data breaches and business disruptions while enabling compliance. This agentless solution simplifies security operations while accelerating the ROI from virtualization and cloud projects. Tightly integrated modules easily expand the platform to ensure server, application, and data security across physical, virtual, and cloud servers, as well as virtual desktops. Customize your security with any combination of agentless and agent-based protection,including anti-malware, web reputation, firewall, intrusion prevention, integrity monitoring, and log inspection. This adaptive and efficient server security platform protects mission-critical enterprise applications and data from breaches and business disruptions without expensive emergency patching. Deep Virtual Appliance Features Agentless Anti-Malware with Integrity Monitoring Intrusion Detection and Prevention Bidirectional Stateful Firewall Log Inspection Multi-Tenant Hypervisor Integrity Monitoring Secures AWS, Microsoft Azure, and vcloud Air Integration NSX API and Service Composer Integration Virtual Patching vsphere 5.5 Support IPv6 Support Linux Support (real-time anti-malware) Accelerates Virtualization, VDI, and Cloud adoption Provides a lighter, more manageable way to secure VMs Maximizes Operational Cost Reductions Offload 500MB of pattern file from hundreds of VMs to 1 virtual appliance Prevents Data Breaches and Business Disruptions File and network security in real time with minimal performance impact Provides Cost-effective Compliance for Private and Hybrid Cloud Environments Addresses major compliance requirements for PCI DSS 2.0, as well as HIPAA, NIST, and SAS 70 Extends micro segmentation to provide layer security for VMware NSX Deep as a Service Amazon Services (AWS), Microsoft Azure, and VMware vcloud Air have emerged as leading Infrastructure as a Service providers for cloud computing. To ensure a complete end-to-end secure computing environment, these public cloud services employ a shared security responsibility model with their customers. The customers are responsible for protecting their operating systems, applications, and data that are hosted on public cloud services. While they provide secure facilities and processes, public cloud service customers must protect their operating systems, applications and data running on public cloud service. The Deep service provides a complete suite of security capabilities including firewall, intrusion detection and prevention, anti-malware, integrity monitoring, web reputation and Log Inspection. Developed specifically for securing public cloud service workloads, Deep 's optimized security provides quick and easy set up, and automated security operations for public cloud services. Like the public cloud services it protects, Deep as a Service is elastic, dynamic and flexible all characteristics necessary to enable organizations to fully realize the benefits of cloud computing while remaining protected. Features & Correspondence to Amazon Services, Microsoft Azure, VMware, vcloud Air Comprehensive and integrated protection Protects VM instances using Anti-malware, Integrity Monitoring,, Intrusion Detection and Prevention, Bidirectional Stateful Firewall, and Log Inspection Detects and removes malware in real time with minimal performance impact Shields known and unknown vulnerabilities Detects and alerts suspicious or malicious activity to trigger proactive, preventative actions Developed for Cloud services Avoids set-up and hardware costs by hosting on Amazon Services (AWS) Saves the effort to deploy and manage disparate products with a single suite of security capabilities Reduces administrative workload using the automatic instance recognition of Autosync Achieve Cost effective Compliance Addresses major compliance requirements for PCI DSS 2.0, as well as HIPAA, NIST, and SAS 70 with one integrated and cost-effective solution Instant-On Deep s Autosync capability means that new instances are automatically recognized when launched and security initiated, dramatically reducing the risk of any instances being unprotected at any point Cloud & Data Center PHYSICAL VIRTUAL VM VM VM VM CLOUD VM VM VM VM DESKTOP/LAPTOP PUBLIC CLOUD VM VM VM VM Data Center PUBLIC CLOUD PHYSICAL VIRTUAL VM VM VM VM VM VM VM VM Deep Agent Deep Agent Deep Agent Deep Agent Deep Agent Deep Manager Profile Single Infrastructure for Hybrid Cloud Alerts IT Infrastructure Integration Alerts Reports Reports Deep Agent Administrator Deep Manager Center Administrator Deep (On Premise or SaaS) Alerts Reports Administrator Deep Manager Deep Agentless Virtual Appliance 14 15

Cloud & Data Center Deep for SAP Systems Deep for Apps Deep Deployment Services Deep for SAP Systems Deep for Apps Cloud & Data Center SAP systems contain highly sensitive financial, HR, customer and supply chain data that requires strong protection from cybercriminals. With business systems becoming increasingly accessible from the web, attackers can more readily target and exploit vulnerabilities in operating systems, web servers and the business applications themselves. Despite the availability of vendor-supplied patches, all web-facing systems remain at risk if patches are not applied on a timely basis. The growing prevalence of zero-day exploits makes staying ahead of the latest threats increasingly difficult. Deep for SAP Systems can protect SAP systems from breaches and business disruptions with integrated anti-malware, reputation, and firewall in addition to intrusion prevention, integrity monitoring, and log inspection. By leveraging the SAP VirusScan Interface, Deep for SAP Systems achieved SAP-certified integration with the SAP NetWeaver platform. It protects SAP deployments, helping to secure critical information from attack, including a wide variety of threats like malware, cross-site scripting and SQL injection. Features & Scans the content uploaded to the SAP NetWeaver technology platform to determine its true type Reports information to SAP systems via the NetWeaver- VSI interface Content scanning protects against possible malicious script content that might be embedded or disguised inside documents SAP administrators can then set policy according to which actual document types should be allowed As organizations rely more and more on web applications to deliver services to their employees, partners and customers, the threat landscape broadens and security challenges become increasingly complex. Deep for Apps provides comprehensive application vulnerability detection and protection offering in a single, integrated console to help protect sensitive data from attack and meet government and regulatory requirements. This SaaS security offering continuously detects application vulnerabilities, delivers actionable security insights, and protects websites from attack. Automated scanning enhanced by hands-on expertise can prevent false positives while testing business logic. Vulnerabilities can be quickly mitigated with WAF rule integration and an intrusion prevention system. Unlimited SSL certificates, including extended validation, are also included. Features & Comprehensive, Intelligent, vulnerability Scanning Automated: Application and platform vulnerability scanning Validation: Expert vetting of scanning results to eliminate false positives and prioritization of issues to focus mitigation resources Hands on testing: Checks for business logical flaws Comprehensive malware scanning Monitoring web application reputation helps customers off from blacklists Integrated Detection and Automated Protection Protection against known and zero-day attacks Virtual patching shields discovered vulnerabilities Coverage for all major servers and operating systems App Firewall (WAF) rules to defend against application exploits which can be exported to leading WAFs Unlimited SSL Deploy unlimited SSL certificates including Extended Validation (EV) at dramatic cost savings versus traditional SSL suppliers Expand use of SSL to internal applications and protect all Applications Single Integrated Management Console All detection and protection functions are managed through a single cloud-based console Cloud & Data Center SAP VirusScan Interface Scan the contents uploaded to SAP systems Deep for SAP Systems Cloud-based Operation Center Scanners Enterprise or Organizational Systems Integrated Management Console SAP Content Documents Emails Embedded Images Active Content SAP NetWeaver SAP administrators can set policy which document types should be allowed SAP Administrator Experts Alerts Deep Deployment Services Deep Deployment Services offers direct access to specialists with the expertise to optimize your Deep solution, whether onsite or offsite. Rely on to handle every stage from the initial assessment through construction to ongoing maintenance. / IT Reports Features Assess your current security environment Plan and design Deep to meet your objectives Build and implement Deep Manage, optimize and migrate your Deep ASSESS PLAN BUILD MANAGE 16 17

Cloud & Data Center SecureCloud ServerProtect for Microsoft Windows and Novell NetWare ServerProtect for Linux ServerProtect for Storage SecureCloud ServerProtect for Microsoft Windows and Novell TM NetWare TM Cloud & Data Center Companies that turn to cloud computing and virtualization to provide rapid provisioning, agility, and cost savings must also deal with new privacy and security risks, since they may not always know the exact location and accessibility of their data. SecureCloud provides strong protection for data in the cloud and virtual environments using encryption with policy-based key management and unique server validation systems. It secures sensitive data stored on leading cloud services like Amazon EC2, Dell, Eucalyptus, and NTT America, as well as VMware VCloud and almost any other virtual environment. SecureCloud protects critical information from theft, unauthorized exposure, and unapproved migrations to other data centers. These features help support internal governance and ensure compliance with regulations like HIPAA, HITECH, Sarbanes-Oxley, GLB, and PCI DSS. SecureCloud also has FIPS 140-2 certification to support government agencies and companies with high security standards or mandates. SecureCloud agent Cloud Platform VM VM VM Features & Advanced Techniques Features FIPS 140-2 certification and FIPS approved AES encryption Encrypts and decrypts information in real time, so data at rest is always protected Applies whole volume encryption to secure all data, metadata, and associated structures without impacting application functionality Access and Authentication Controls Employs role-based management to help ensure proper separation of duties Automates key release and virtual machine authorization for rapid operations or requires manual approval for increased security Offers cloud provider credential rotation Policy-driven Key Management Uses identity- and integrity-based policy enforcement to ensure only authorized virtual machines receive keys and access secure volumes Enables the use of policies to determine when and where information is accessed Robust Auditing, Reporting, and Alerting Logs actions in the management console for audit purposes Provides detailed reporting and alerting features with incident-based and interval-based notifications Authentication for key deployment done by rule base policy per VMs Prevent viruses from spreading through your network by blocking them before they reach the end user. ServerProtect for Microsoft Windows and Novell NetWare scans, detects, and removes virus from files and compressed files in real time. ServerProtect delivers 24x7 antivirus support and protection with automatic, incremental virus updates. Centralized management of servers via a -based console simplifies network protection. ServerProtect for Linux Protect your Linux file servers from becoming unwitting hosts for viruses, trojans, bots and all sorts of other malware. ServerProtect for Linux offers real-time protection, high performance and low processing overhead, and supports all common Linux distributions. ServerProtect for Linux adds another powerful solution to any security and compliance strategy. ServerProtect for Storage ServerProtect for Storage is designed to provide network-wide, comprehensive anti-malware scanning for the EMC Celerra and VNX/VNXe series, NetApp, and Hitachi Data Systems (HDS) lines of data storage systems. Managed through an intuitive, portable console, ServerProtect provides centralized malware scanning, cleanup, pattern file updates, and event reporting with enterprise-class performance and automation. Certified with Microsoft Windows Server 2000/2003 to deliver high performance, reliability, security, scalability and availability Enables real-time, high-performance scanning with minimal impact to servers Prevents Linux servers from spreading threats to other servers and personal computers Maximizes performance and lowers processor overhead with multi-threaded, kernel-based scanning Integrates tightly with EMC Celerra, NetApp Filers or Hitachi NAS Enables real-time, high-performance scanning with minimal impact to servers and no impact to end users Cloud & Data Center Hypervisor Random session key over SSL 2 Scan Request ServerProtect for Storage Access VM Shared Storage 1 Access Files NAS 3 Scan Result Kernel level encryption on writing data Encryption will be done for per volumes which connects to virtual instance server OS Key will be deployed per volumes 4 Allow/Deny Access 5 Notify filer clients upon infection 18 19

Centralized Management Control Manager Email & Collaboration Hosted Email InterScan Messaging Virtual Appliance Control Manager Hosted Email Centralize threat and data protection policy management with a single management console that manages, monitors, and reports across multiple layers of security, as well as across on-premise and cloud deployment models. Better Protection Integrate security management and analysis across multiple layers of protection-critical to defending against advanced threats that exploit multiple threat vectors Simple, Enterprise-wide Visibility Rapidly understand your security posture, identify threats, and respond to incidents with up-to-the-minute situational awareness across your environment Simplified, User-based Management Manage multiple security layers, whether deployed on-premise on in the cloud, so you don't have to hop from console to console to ensure that protection is properly defined across the enterprise Hosted Email is a no maintenance solution that delivers continuously updated protection to stop spam and viruses before they get inside a network. Internet Mails Reclaim productivity and bandwidth Free up time to implement critical business initiatives Get peace of mind Hosted Email Control Manager is available in two versions: Standard and Advanced Control Manager Standard Advanced Centralized Management -based Centralized Management Customizable Dashboard, Ad Hoc Query, Alerts Smart Protection Network Threat Statistics Visibility into Clients Multi-Tiered Management Customizable Reporting License Management Customers site Clean Mails Email & Collaboration InterScan Messaging Virtual Appliance InterScan Messaging stops traditional threats in the cloud with global threat intelligence, provides data loss prevention and encryption, and identifies targeted email attacks as part of a custom APT defense. The hybrid SaaS deployment combines the privacy and control of an on-premise virtual appliance with the proactive protection of a cloud-based prefiltering service. Detect and block APTs and targeted attacks Thwart targeted phishing attacks and advanced malware Simplify data protection and encryption Block more spam proven #1 in independent tests Viruses Spam Mail InterScan Messaging Virtual Appliance Spyware APT Anti-virus Anti-spyware Contents Filtering Advanced Threat Detection Data Loss Spearphishing 20 21

Email & Collaboration PortalProtect for Microsoft IM for Microsoft Lync and Office Communications Server Enterprise for Communication and Collaboration ScanMail Suite for Microsoft Exchange ScanMail Suite for IBM Lotus Domino Email & Collaboration PortalProtect for Microsoft PortalProtect secures collaborations with a dedicated layer of protection that guards against malware, malicious links, and other threats often unfamiliar to SharePoint administrators. Its web reputation technology blocks malicious links from entering web portals, while its powerful content filtering scans both the files and web components of SharePoint. IM for Microsoft Lync and Office Communications Server Secure real-time IM communications by stopping fast-moving attacks designed to spread malware, lure victims to malicious sites, and steal data. Powered by Smart Protection Network and its unique cloud-client architecture, IM blocks links to malicious sites before the links can be delivered. Signature-independent zero-day security, leading antivirus protection, and new antispyware features work together to stop malware before threats can cause any damage. Plus, flexible content filtering ensures appropriate IM use and helps prevent data theft. Communication & Collaboration protects Microsoft email, collaboration, and IM systems by stopping threats in real time before they can strike. The unique cloud-client architecture of the Smart Protection Network powers real-time threat protection (like Email and ) that work in concert with leading conventional content security technologies allowing for all sorts of connections without the usual risks. Protects SharePoint users and data Stops a wide range of malicious files and URLs Filters inappropriate content from social aspects of SharePoint Controls sensitive data for compliance and risk management Takes half the time to manage Scales to any deployment size The integrated Data Loss Prevention protects your sensitive data Features & Blocks malicious links before delivery using Identifies and blocks zero-day threats with proprietary IntelliTrap technology Stops more spyware, with dedicated inspection, before it can infect PCs Filters content to protect against data loss and undesirable language Reduces administration with tight platform integration and robust central control Enterprise for Communication and Collaboration ScanMail Suite for Microsoft Exchange ScanMail Suite for IBM Lotus Domino ScanMail Suite for Microsoft Exchange ScanMail Suite for Microsoft Exchange not only stops traditional spam and malware but also detects malicious URLs, highly targeted attacks, and advanced persistent threats (APTs). With a combination of web, email, and file reputation, plus exploit detection and sandboxing, ScanMail Suite provides the most comprehensive mail server security. No other solution offers this kind of enterprise-level protection. Guards against APTs and highly targeted attacks Blocks phishing emails with malware or bad web links Prevents data loss and simplifies compliance Cuts administration time in half Speeds throughput up to 57% faster than other solutions ScanMail Anti-spam Anti-phishing Enhanced Antivirus Advanced Threat Scan Suspicious Quarantine ScanMail Suite for IBM Lotus Domino ScanMail Suite for IBM Lotus Domino stops traditional email threats with the correlated intelligence of Smart Protection Network cloud-based security. It also protects data with optional Data Loss Prevention and blocks targeted email attacks when integrated with Deep Discovery Analyzer. ScanMail and Deep Discovery Analyzer are both components of the Custom Defense Solution. ScanMail Suite is an easy-to-manage solution supporting nearly all Domino platforms. Customizes protection against highly targeted attacks Blocks phishing emails with malware or bad web links Prevents data loss and simplifies compliance Lowers administration with better controls and optimization Feedback Deep Discovery Analyzer Sandboxes Sandboxes Threat Analysis Threat Intelligence Adaptive Updates Email & Collaboration Communication & Collaboration and third-party security products Central Management Control Manager Collaboration Server PortalProtect for Microsoft SharePoint Mail Server ScanMail Suite for Microsoft Exchange Instant Messaging Server IM for Microsoft Office Communications Server 22 23

Email & Collaboration Email Encryption Client Email Encryption Gateway Hosted Email Encryption Endpoint Protection Intrusion Defense Firewall Virtual Desktop Infrastructure (VDI) Module for Macintosh Email Encryption Client Email Encryption efficiently secures email delivered to anyone with an email address. Client-based encryption allows the end user to select which messages should be encrypted just by clicking a button on the desktop. This ability for end users to encrypt specific emails with unique data complements policy-based encryption which automatically encrypts general content types. Together they offer a complete email encryption solution. The Email Encryption software plug-in for popular email clients deploys without modifying existing business processes and integrates seamlessly with the existing email infrastructure. Hosted Central Trust Authority Internet Email Encryption Client secures both physical and virtual endpoints with immediate protection against threats delivered through leading malware protection and cloud-based global threat intelligence. Optional modules allow instant deployment of data loss prevention, virtual desktop infrastructure and Mac protection. also works in conjunction with proactive security technologies like application control, vulnerability protection, mobile security, and endpoint encryption to further enhance your threat protection. Secures data on physical and virtual desktops from a central management platform defends your endpoints, both physical and virtual, from an ever-increasing number of attacks and provides complete user visibility and integration through a single web console Secures endpoints with the broadest range of superior malware protection Protects endpoints on or off the corporate network, against viruses, trojans, worms, spyware, advanced persistent threats (APTs) and new variant as they emerge Enables Consumerization and BYOD without compromising security When deployed with, Mobile extends your endpoint protection to include smart phones and tablets-enabling centralized management, policy deployment, and visibility of all endpoint security through Control Manager Email & Collaboration Email Encryption Gateway Enterprise gateway encryption augments email security by combining policy-based encryption and integration with a messaging security infrastructure. This solution offers simple deployment and administration without altering existing business processes. When combined with content security, it enables enterprises to encrypt emails and attachments automatically, without having to rely on individual users to secure private information. Messaging Gateway Internet Intrusion Defense Firewall Intrusion Defense Firewall, a plug-in for Trend Micro Enterprise for Endpoints, supplements Trend Micro's highly effective client-level security with a network-level Host Intrusion Prevention System (HIPS). Virtual Desktop Infrastructure (VDI) Module Built specifically to handle the rigors of virtual desktop environments, Virtual Desktop maximizes protection for a broad spectrum of virtual desktop scenarios. Protects endpoints with minimal impact on network throughput, performance, or user productivity Blocks attacks before they enter the endpoint s application and execution layer Provides protection before patches are deployed Agentless anti-malware No security agent in the VM Leverage VMware vshield APIs VDI optimized agents Prevent resource contention Cleans, scans memory and monitors behavior Endpoint Protection Email Encryption Gateway Hosted Email Encryption This policy-based encryption service seamlessly integrates with the content filtering capabilities of Hosted Email to identify particular types of content and encrypts email messages when the rules are triggered. * Must use Hosted Email with outbound content filtering. No additional hardware or software is required. for Macintosh By leveraging the Smart Protection Network, the Trend Micro for Mac plug-in for proactively limits exposure to threats and prevents both users and applications from accessing malicious websites. Blocks malware for all systems, including both Mac OS and Windows 24 25

Endpoint Protection Endpoint Application Control Endpoint Encryption Integrated Data Loss Prevention Vulnerability Protection Endpoint Application Control Integrated Data Loss Prevention Defend against attacks by preventing endpoints from launching unwanted and unknown applications. Reduce risks with flexible and easily-managed policies, whitelists, and blacklists that work in tandem with a global, cloud-based application database. Features Enhanced protection defends against malware, targeted, and zero-day threats Using the latest protection from real-time threat intelligence correlated across a global network, this solution provides the most up-to-date endpoint application protection against malware, targeted attacks and zero-day threats Simplified management speeds protection Streamlined dashboard and management console offers greater insight into threat outbreaks and standardizes end-user configurations from one centralized location Endpoint Encryption Prevents users and machines from executing malicious software Provides advanced features to enforce corporate policies Uses correlated threat data from billions of records daily Helps support compliance requirements In-depth whitelisting and blacklisting blocks unknown and unwanted applications Block unknown and unwanted applications with fully customizable application whitelisting and blacklisting options, including an unparalleled database of applications and good file data Compliance with internal IT policies helps reduce legal and financial liabilities Reduce risks by limiting application usage to a specific list supported by data loss prevention products and prevent new applications from executing integrated DLP with central policy management simplifies data protection across multiple layers of the existing IT security infrastructure, streamlining administration and providing more consistent enforcement to increase data protection and compliance with little additional effort or cost. Exchange Integrated Data Loss Prevention Data protection capabilities integrated within traditional enterprise security solutions, from endpoint to messaging and network, simplify deployment, reduce infrastructure cost, and provide peace-of-mind for data compliance Central DLP Policy Management Central configuration and application of pre-defined policy templates across protection layers reduces initial and ongoing administrative effort and provides consistent policy enforcement enterprise-wide Customizable, Consolidated Displays and Reports Aggregated logs, reports and dashboard views provide real-time, enterprise-wide visibility into potential data breaches and data policy violations SharePoint Endpoint Encryption encrypts data on a wide range of devices laptops, desktops, tablets, CDs, DVDs, USB drives and any other removable media. This solution offers enterprise-wide full disk, file/folder, and removable media encryption, combined with granular port and device control to prevent unauthorized access and use of private information. A single management console handles both hardware and software encryption enterprise-wide for entire hard drives, specific files, folders, removable media, and storage devices. Internet Firewall Features Advanced Reporting & Auditing Automate enforcement of regulatory compliance with policy-based encryption Receive detailed auditing and reporting by individual, organizational unit, and device Pre-Boot Multi-Factor Authentication Gain flexible authentication, including fixed password, CAC, PIV, Pin, and ColorCode Trigger a lockout feature in response to incorrect authentication attempts Administrative Tools & Active Directory Integration Leverage Active Directory and existing IT infrastructure for deployment and management Take the burden off IT staff by allowing users to change and reset passwords and accounts Endpoint Protection Maximize Platform Coverage for Data & Device Encryption Encrypt private data with fully integrated full disk, file folder, USB, and removable media encryption Lower TCO with Centralized Policy Administration & Key Management Simplify operations with a unified data repository with single management server and console Simplify Remote Device Management Maintain compliance and protect your data without disrupting users in the event of a lost device or forgotten password Manage policies and protect data on PCs, laptops, tablets, USBs, CDs, DVDs Centralized policy and key management FIPS 140-2 encryption certification AES 256-bit encryption File and folder encryption Granular port and device control Level 2 Key Features Endpoint Encryption Full Disk Encryption File Encryption Removable media (CD/DVD/USB) encryption Self-encrypting drive management Full disk encryption Network-aware pre-boot authentication Level 2 Level 2 Mail Gateway Gateway Vulnerability Protection Vulnerability Protection shields endpoints until patches can be deployed and can protect "un-patchable" or "end-of-support" endpoints indefinitely. Easy-to-use and quickly deployed filters prevent vulnerabilities from being exploited providing full protection to your endpoints until you can deploy patches in a timely sensible manner for your business. Eliminates risk exposure due to missing patches Extends the life of legacy and end-of-support operating systems like Windows XP Reduces downtime for recovery with incremental protection against zero-day attacks Allows patching on your own terms and timelines Endpoints Control Manager 1. Centrally configure DLP policies 2. Centrally monitor DLP violation = idlp Features Defend against advanced threats Blocks known and unknown vulnerability exploits before patches are deployed on systems that hold sensitive data, critical to regulatory and corporate policy compliance Remove bad data from business-critical traffic Ensures delivery of business-critical communications with by filtering out forbidden network traffic and ensuring only allowed traffic is delivered Get earlier protection Provides protection before patches are deployed using attack blocking, vulnerability shielding, and malicious traffic detection Deploy and manage within your existing infrastructure Simply and easily deploys with existing endpoint security solutions and streamlines management with a simplified dashboard and management console Endpoint Protection Automatic Synchronization and sharing 26 27

Endpoint Protection Portable 2 Safe Lock Mobility Mobile SafeSync for Enterprise Endpoint Protection Portable 2 A malware scanning and cleanup tool shaped like a USB flash drive for environments where an Internet connection is not available or anti-malware software cannot be installed. Features Centralized Management Manages configurations of the scanning tools for multiple locations, malware pattern files, and logs Easy Operation Scans status and result notifications with an LED indicator Using only the scanning tool, malware can be scanned and removed, and the malware pattern file can be updated No installation required Scans target terminals without installing scanning software Safe Lock By locking down the system, Safe Lock prevents the intrusion and execution of malware with little impact on system performance and without the need of updating pattern files. Features Application Whitelisting By only allowing applications added to the Whitelisting to run, malware is unable to execute with little performance impact Safe Lock does not affect a system s important communications or require the system to be restarted during operation No Internet Connection Required Since routine updates of pattern files are not necessary, Safe Lock can protect terminals in environments that are not connected to the Internet Exploit Protection Through its intrusion and execution prevention functions, Safe Lock prevents exploit attacks via networks, external storage devices (such as USB memory), and running processes, thereby ensuring a low risk of malware infection or unauthorized execution Unregistered applications Malware Centralized management type operation Closed system Closed system data center Configures the scanning tool, and aggregates and manages logs Execution Prevention Prevents exploit attacks on running processes Scans and removes malwares, and obtains logs Management computer Exploit Protection Registered applications Application Whitelisting Prevents the execution of malware and applications not added to the Approved List Internet Obtain the latest malware pattern file Intrusion Prevention Prevents exploit attacks from external devices or networks Mobile Mobile extends protection beyond PCs to secure mobile devices and data stored on them. This solution helps organizations reduce costs by providing a single point of visibility and control for device management. It helps prevent data loss by enforcing the use of passwords, encrypting Monitor data, and remotely wiping data off lost or stolen devices. Threat Protection Malware Spyware Threats Reduced Operational Costs Limit Data Loss Reduced Risk SafeSync for Enterprise Safesync for Enterprise provides file sharing and sync capabilities with data protection to give IT managers stewardship of sensitive data. Deployed both on the premises and in a private cloud, enhanced data protection features such as DLP, persistent file encryption and document tagging provide unprecedented data protection while still enabling user productivity with integrated file sync and share capabilities. Combine control with cost savings by deploying the solution on your own infrastructure. SafeSync for Enterprise complements your overall mobility and data protection from to increase the value of DLP throughout your organization. Maximize Data Protection for Synchronized Files Control where sensitive corporate data resides and how many copies exist Tag and safeguard sensitive data to reduce risk and achieve compliance mandates Apply data loss prevention (DLP) to mobile data and set policy based on data sensitivity Organization Network SafeSync for Enterprise Manager Maintain Productivity Gains without Inhibiting Collaboration Allow users to simply drop a file into a folder for automatic replication to specific folders in the cloud, and on other PCs and devices Free up mail server storage with a Microsoft Outlook plug-in that sends a sharing link instead of attaching files to email messages Internet Android Control Features File sharing from anywhere, any devices Sophisticated data protection Visualize and control information assets Improve and Lower Costs with an Onsite Solution Retain ownership and control of data sharing by deploying on premise private cloud Lower your risk exposure to data loss or compliance violation with detailed audit and log information Mobile Devices Case iphone / ipad 2 Share, sync data within for mobile devices Customer/Partner BlackBerry Windows Mobile TM Mobility Case 1 Share, sync data within organization network ActiveDirectory Case 3 Share, sync data within external parties 28 29

Small Business Worry Free Business Gateway InterScan Virtual Appliance InterScan as a Service Small Business Worry-Free Business Standard Worry-Free Business Advanced Worry-Free Business Services More small businesses worldwide trust Worry-Free Business than any other security vendor to protect their livelihoods because it is the only solution that provides complete user protection. Lets you concentrate on your business, not your IT security Installs easily and requires no IT expertise to maintain - ideal for small businesses Stops threats in the cloud before they can reach your network and devices Spam Mails Blocks access to inappropriate websites Prevents business data from being shared via email messages* or USB drives Safeguards against phishing as well as social engineering attacks Includes easy mobile device security management Phishing Stops spam before it can reach mail servers with included Hosted Email CENTRALIZED MANAGEMENT Management Console Management server location Updates and patches pushed to users Policy pushed to users PLATFORMS PCs, laptops, Windows servers Mac clients (imacs and MacBooks) and servers Android devices (each seat comes with anti-virus protection for two Android devices) NEW and UNIQUE - Mobile device security (for Microsoft Exchange ActiveSync users only)** ANTIVIRUS AND WEB SECURITY Viruses Spyware Worry-Free Business Standard Via LAN or VPN On-premises Manual with complete control Via LAN or VPN Mobile Threats Worry-Free Business Advanced Via LAN or VPN On-premises Manual with complete control Via LAN or VPN GLOBAL CONTENT SECURITY S M ALL BUSIN ESS Source: Canalys, Worldwide IT Market 2013 URL Filtering Data Loss Worry-Free Business Services Hosted by. Can be accessed anywhere via Internet Hosted by server maintenance free Automatic Via Internet. Can be pushed anywhere. InterScan Virtual Appliance Given today's advanced Internet threats and the growing use of cloud-based consumer applications in the workplace, application visibility is essential to understanding network risks. The Interscan virtual appliance combines application control with advanced anti-malware scanning, real-time web reputation, and flexible URL filtering to provide superior Internet threat protection. Viruses Spam Mail Phishing Spyware APT InterScan Virtual Appliance Anti-virus Anti-spyware Anti-phishing URL Filtering Advanced Threat Detection InterScan as a Service InterScan as a Service dynamically protects any user, in any location, on any device. And because it s hosted in the cloud, you don t need to buy, manage, or maintain software or hardware. Furthermore, this solution is flexible and will grow with your business. Get instant visibility and control with Advanced Reporting and Management Stop web threats before they penetrate the perimeter Lower your TCO The integrated Data Loss Prevention protects sensitive data Data Loss URL Filtering Delivers superior protection on any device, anywhere Gives users freedom while you maintain visibility and control Provides simple but powerful management and reporting Maximizes the cloud advantage -cost effectiveness and flexibility Defends against viruses, spyware and other malware UNIQUE - Advanced URL filtering blocks inappropriate websites threat protection stops viruses and threats before they reach your business DATA PROTECTION Device control - limits access of USB drives and other attached devices to prevent data loss and block threats UNIQUE - Data loss prevention via business email messages, sent accidentally or deliberately MESSAGING SECURITY AND ANTISPAM Real-time scan for POP3 mail accounts Blocks spam from entering POP3 mail accounts Stops spam and email-based viruses before they reach mail servers Threat protection and multi-layer antispam for Microsoft Exchange Servers Via included Hosted Email Via Hosted Email purchased separately Remote/Mobil Employees HTTP Requests Filter Inspect InterScan as a Service Analyze URL Consulted Manage Approved Traffic Allowed InterScan Administration Open Gateway * Worry-Free Business Advanced only **Mobile Device Features in Worry-Free Business Advanced [ Device access control / Remote wipe / policy (Enhanced password, Lock after inactivity timeout, Wipe after retry limit, Enforced exchange encryption) Supports Android, ios, Blackberry, and Windows Phone] In Office 30 31

Suite Enterprise for Endpoints Enterprise for Endpoints and Mail Servers Enterprise Suite Enterprise for Endpoints Enterprise for Endpoints secures your endpoints, both on and off the network with award-winning anti-malware, host intrusion prevention (HIPs), and malicious website protection. This comprehensive endpoint security is powered by Smart Protection Network cloud-based security delivering global threat intelligence and faster performance. It also offers the flexibility to customize your endpoint protection with add-on options for desktop virtualization, data protection, and mobile device security. Regardless of how you deploy this endpoint security for your business, unified management helps you lower management costs and deliver the industry s best protection from today s evolving threats. *Secure your data from gateway to mobile devices by adding Enterprise Data Protection, a full set of data security products that integrate within Enterprise for Endpoints. Please refer to P.34. CLIENTS with plug-in modules: Intrusion Defense Firewall for Mac Virtual Desktop Infrastructure(VDI) SMART: Lower your risks with proactive threat protection Simple: Get the most out of your IT staff and infrastructure That Fits: Streamline administration by enforcing threat protection policies from a single console Intrusion Defense Firewall Plug-Ins for Mac COMPONENTS VDI ServerProtect for Windows, NetWare, Linux FILE SERVERS ServerProtect for Microsoft TM Windows TM / Novell TM Netware TM ServerProtect for Linux CENTRALIZED MANAGEMENT Control Manager Control Manager Enterprise Suite Enterprise Suite is a tightly integrated suite of products that secure your network from gateway to endpoint. With comprehensive threat protection and centralized management, you can close the security gaps while decreasing costs and complexity. Powered by Trend Micro Smart Protection Network cloud-based security, this end-to-end suite delivers global threat intelligence and faster performance. You gain a secure foundation from gateway to endpoint with the following products included in the sure. *Secure your data from gateway to mobile devices by adding Enterprise Data Protection, a full set of data security products that integrate within Enterprise for Endpoints. Please refer to P.34. CENTRALIZED MANAGEMENT Control Manager FILE SERVERS ServerProtect for Microsoft Windows / Novell Netware ServerProtect for Linux Maximizes Protection Reduces risk with comprehensive multilayered, multi-threat protection Delivers immediate protection with in-the-cloud threat intelligence Improves productivity with #1 rated spam blocking and web filtering Lowers Costs Lowers endpoint infection rates by 62% Slashes IT security management costs by 40% Minimizes Complexity Reduces time to acquire, deploy, and manage with an integrated solution Streamlines administration with web-based centralized management Suite Enterprise for Endpoints and Mail Servers Enterprise for Endpoints and Mail Servers is an integrated, centrally managed suite that delivers adaptive threat protection with award-winning anti-malware, antispam, host intrusion prevention (HIPs), web reputation, and optional data security. This suite is powered by Smart Protection Network cloudbased security for global threat intelligence and faster performance. Reduce risks and costs with a single solution offering unified management of integrated security across enterprise desktops, laptops, file servers, and mail servers. *Secure your data from gateway to mobile devices by adding Enterprise Data Protection, a full set of data security products that integrate within Enterprise for Endpoints. Please refer to P.34. Maximum Protection across Endpoints and Mail Servers Multilayered Protection Platform Coverage Advantage MAIL SERVER ScanMail Suite for Microsoft Exchange Windows Blocks spam and spyware at the mail server ScanMail Suite for IBM Lotus Domino Windows, Linux Blocks spam and spyware at the mail server FILE SERVER ServerProtect for Microsoft Windows / Novell Netware Windows Windows, NetWare Secures Windows servers Secures Windows and NetWare file servers ServerProtect for Linux Linux Secures Linux file servers CLIENT Windows CLIENTS : Intrusion Defense Firewall for Mac Virtual Desktop Infrastructure(VDI) Secures Windows clients FILE SERVERS ServerProtect for Microsoft Windows / Novell Netware ServerProtect for Linux MAIL SERVERS ScanMail Suite for Microsoft Exchange ScanMail Suite for IBM Lotus Domino CENTRALIZED MANAGEMENT Control Manager Intrusion Defense Firewall Windows Proactive HIPS and vulnerability shielding for Mac Apple Macintosh Protects Macintosh clients from malware and blocks malicious websites GATEWAY InterScan Messaging InterScan Maximum Protection and Minimum Complexity across Protections Points and Platforms Multilayered Protection Platform Coverage Advantage GATEWAY InterScan Messaging Virtual Appliance VMware Virtualized email gateway security stops spam and email threats InterScan Virtual Appliance VMware Virtualized web gateway security blocks web threats and includes URL filtering MAIL SERVER ScanMail Suite for Microsoft Exchange Windows Blocks spam, malware and spyware at the mail server ScanMail Suite for IBM Lotus Domino Windows, Linux Blocks spam, malware and spyware at the mail server FILE SERVER ServerProtect for Microsoft Windows / Novell Netware Windows Windows, NetWare Secures Windows servers Secures Windows and NetWare file servers ServerProtect for Linux Linux Secures Linux file servers CLIENT / MOBILE DEVICE Windows Secures Windows clients Intrusion Defense Firewall Windows Proactive HIPS and vulnerability shielding Data Loss Prevention Protects your sensitive data for Mac Apple Macintosh Protects Macintosh clients from malware and blocks malicious websites MANAGEMENT MAIL SERVERS ScanMail Suite for Microsoft Exchange ScanMail Suite for IBM Lotus Domino CLIENTS with plug-in modules: Intrusion Defense Firewall for Mac Virtual Desktop Infrastructure(VDI) Control Manager Advanced Windows Centrally manages security Suite VDI Secure virtual desktop environment MANAGEMENT Control Manager Advanced Windows Centrally manages security 32 33

Suite Enterprise and Data Protection Enterprise Data Protection Smart Protection Complete Smart Protection for Endpoints Enterprise and Data Protection Enterprise Data Protection Complete end-user protection from threats and data loss from the gateway to mobile devices. Over time, many enterprises have deployed various point products from multiple security vendors resulting in increased management complexity, compatibility problems, and gaps in security that could result in data breaches. To decrease risk, costs, and management complexity, enterprises need integrated security solutions with centralized management for network-wide visibility and control of threats and data. Enterprise and Data Protection is an integrated suite of products that secure your network from the gateway to mobile devices for complete end-user protection. With adaptive threat and data security, you can help prevent data breaches by deploying protection wherever end users access sensitive data. With centralized management, you can decrease costs and complexity while gaining enterprise-wide visibility. Powered by Smart Protection Network cloud-based security, this comprehensive suite blocks threats by leveraging global threat intelligence. Its cloud-based reputation services reduce the client footprint on endpoints for faster performance. This comprehensive suite includes Enterprise Data Protection to help mitigate the risks of attacks and data breaches across end user platforms, from smartphones to tablets, laptops to removable drives. Solution Data Protection Centralized Management Gateway Protection Components Integrated Data Loss Prevention Mobile Endpoint Encryption Email Encryption Gateway Control Manager InterScan Messaging InterScan ScanMail Suite for Microsoft Exchange ScanMail Suite for IBM Lotus Domino MAIL SERVERS ScanMail Suites Email Encryption Integrated DLP GATEWAY InterScan Massaging InterScan Integrated DLP CENTRALIZED MANAGEMENT Control Manager Enterprise and Data Protection FILE SERVERS ServerProtect Integrated DLP CLIENTS Intrusion Defense Firewall for Mac VDI Mobile Endpoint Encryption Integrated DLP Enterprise Data Protection Smart Protection Complete This interconnected suite of security delivers the best protection at multiple layers using the broadest range of anti-malware techniques available. Plus, you can evolve your protection along with your business using flexible on-premise, cloud and hybrid deployment models making changes on the fly without the hassles of new licenses. And you can manage users across multiple threat vectors from a single pane of glass with a complete view of your security. Features Smart Protection for Endpoints This high-performance endpoint security suite protects virtual and physical desktops against today s evolving threat landscape using the broadest range of anti-malware techniques available. Multiple layers of threat and data security protect your users and corporate information across all devices and applications. Plus, you get the same cloud flexibility and user-centric management benefits of Smart Protection Complete. Management Endpoint Central Management 24/7 Support On-premise, cloud or hybrid Data Loss Prevention Anti-malware Vulnerability Protection, Virtual Desktop Integration, Mac, Server Application Control Endpoint Encryption Mobile Device Mgmt Massaging Gateway & Mail Server Microsoft Sharepoint and Lync IM Secure Gateway Smarter Protection Against today's evolving threats The broadest range of advanced threat protection techniques and protection points secures all user activities, reducing the risk of sensitive information loss More flexible management and licensing Ultimate flexibility in deployment models provides seamless support for your ever-changing mix of on-premise and cloud security Simple management and strong performance Multiple layers of inter-connected security are managed from a single management console Smarter protection for your endpoints The broadest range of endpoint protection techniques secures all user activities, reducing the risk of sensitive information loss More flexible management and licensing Deploy endpoint security in the way that best supports your changing business model (on-premise, in the cloud, or a combination) and change the mix at any time Simple management and strong performance Multiple layers of inter-connected security are managed from a single management console Smart Protection Complete Smart Protection for Endpoints Suite Mail Server Protection Mail Server Protection Endpoint Protection Server Protect for Microsoft Windows / Novell Netware ServerProtect for Linux Intrusion Defense Firewall for Mac VDI Messaging and Collaboration Suite 34 35

Services Custom Defense Services Premium Support Program Project Consulting Services Expert Services Custom Defense Services Today s most damaging attacks target specific people, systems, vulnerabilities, and data. Advanced persistent threats (APTs) are more stealthy and sophisticated than ever, using insidious social engineering techniques to penetrate organizations and deploy custom malware that can go undetected for months. Cybercriminals can then remotely and covertly steal valuable information - from credit card numbers to intellectual property to government secrets - potentially wiping out a competitive advantage or even putting national security at risk. Custom Defense Services help customers detect, analyze, adapt, and respond to targeted attacks and APTs. Respond Adapt Detect Premium Support Program Rely on the Premium Support Program to leverage the full value of your solutions and achieve optimum IT service levels. Enjoy proactive security resources for customer advocacy and expert advice to implement the very best security for your technology, processes, and people. Technical Account Managers (TAMs) have extensive product knowledge, threat expertise, and familiarity with the entire ecosystem to help you make the most of your investment with. Proactive security services with regular touch points Trusted security expertise that augments your team resources Fully optimized security posture that reduces your risk exposure Service overview DETECT ANALYZE ADAPT RESPOND Description Designated Technical Account Manager Premium Support Services Level Feature Matrix SILVER GOLD PLATINUM Assessment Analysis and Advisory Monitoring and Alert Investigation and Mitigation Onsite Support for Emergency Incidents Priority Response Time 4 hours 2 hours 1 hour Allotted Support Hours 24x7 *1 24x7 24x7 Remote Problem Diagnosis and Remediation Support Services Detect Components Critical System Assessment Network Assessment Service components and advantages Conducts health checks of critical onsite systems Provides assessment reports and recommendations for preventing security breaches Makes hidden malicious activities visible with a one-time assessment during the deployment of Deep Discovery Inspector Monitors both the network and endpoints Priority Case Handling Proactive Threat Alerts Bi-Annual Planning 2-Hour Malware Response SLA Crisis Management Planning Assistance Analyze Monthly Advisory Schedules a quarterly advisory meeting based on data collected through Deep Discovery Delivers a monthly advisory report with recommendations based on data collected through Deep Discovery Multi-Region Support Capabilities *1 Emergency access only after business hours Adapt Monitoring & Alert Monitors systems 24x7 with Deep Discovery Delivers notifications of potential risks by email and telephone Project Consulting Services Services Respond Breach Investigation System Cleanup Custom Signature SLO Includes onsite investigations and analysis of suspect systems by security experts Provides tools to mitigate compromised systems Cleans up compromised systems where Deep Discovery detects suspicious activities Creates customized pattern files based on malicious files collected in specific customer sites. Includes 6 hour response service level agreement With Project Consulting Services, your IT staff can rely on a trusted advisor and partner to help meet your company s goals. experts have the insight and skills needed to design the optimal architecture for maximizing the effectiveness of solutions. experts can carefully analyze security requirements and craft a detailed plan that meets any unique needs. Project Consulting Services ASSESS PLAN BUILD MANAGE Services Expert Services s best-of-breed antivirus products enable an organization to cover messaging,, endpoint, and network security. 's Expert-on-Guard (EoG) service uses these products and technologies to proactively detect threats and vulnerabilities that compromise the confidentiality, integrity, and availability of an organization's data, applications, and operating systems. 36 37

Market Leadership Sales office Market Leadership leads the world in security Recognized by market analysts, and proven through a dominant market share #1 in protection and performance http://www.av-test.org (Sept 2013 Feb 2014 test results, Corporate Solutions on Win XP,7, 8 Systems) SERVER SECURITY M ARKET SHARE IDC, Worldwide Endpoint 2013-1017 Forecast and 2012 Vendor Shares, August 2013 experton Group, Cloud Vendor Benchmark, June 2014 Global 500 accounts 48 of the top 50 global corporations 10 of the top 10 automotive companies 10 of the top 10 telecom companies 8 of the top 10 banks 9 of the top 10 oil companies Trust Solutions Market Leadership Position 2014 NSS Labs Breach Detection Tests protects 96% of the top 50 global corporations. protects 100% of the top 10 automotive companies. protects 100% of the top 10 telecom companies. protects 80% of the top 10 banks. protects 90% of the top 10 oil companies. North America Region USA Headquarters Incorporated 225 E. John Carpenter Freeway, Suite 1500 Irving, Texas 75062 U.S.A. Phone: +1 (817) 569-8900 Toll-free: (888) 762-8736 Canada Headquarters Canada Technologies Inc. 40 Hines Road, Suite 200 Ottawa, Ontario, Canada K2K 2M5 Phone: +1 (613) 599-4505 Cupertino, California 10101 N. De Anza Blvd Cupertino, California 95014 U.S.A. Phone: +1 (408) 257-1500 Toll-free: (800) 228-5651 Jersey City, New Jersey 101 Hudson Street Suite 2202 Jersey City, New Jersey 07424 U.S.A. Phone: +1 (201) 479-5376 Australia and New Zealand Australia Sydney Level 3, 2-4 Lyon Park Road, North Ryde, NSW 2113, Australia Phone: +61-2-9870-4888 Melbourne Level 9, 606 St Kilda Road, Melbourne VIC 3004, Australia Phone: +61-3-9692-7444 Perth 45 Ventor Avenue West Perth, WA 6005, Australia Phone: +61 1800 642 421 New Zealand Auckland CBD Business Centre Level 4, 17 Albert Street, Auckland, New Zealand Phone: +64-9-303-9097 Asia-Pacific Region China Beijing Room 1803, SK Tower Beijing 100022, China Phone: +86 10 85252277 Shanghai 8/F, Century Ba-shi Building 398 Huai Hai Road(M) Shanghai 200020, China Phone: +86 21 63848899 Guangzhou Room 3702, Metro Plaza, 183 Tian He Bei Road Guangzhou, Zipcode:510075 Phone: +86-20-8755-3895 Hong Kong Wanchai 917 9/F Shui On Centre, 6-8 Harbour Road Wanchai, Hong Kong Phone: +852-2866-4362 India Delhi India Pvt. Ltd. 10th floor, EROS Corporate Tower, Nehru Place, New Delhi - 110019 Phone: +91-11-66213200 Mumbai India Pvt. Ltd. Ground Floor, Platina, Plot No C-59, Bandra Kurla Complex, Bandra East, Mumbai - 400051 Phone: +91-22-26509938 Bangalore India Pvt. Ltd. Units No. 701 702, 7th Floor. PRESTIGE MERIDIAN I, No. 29, Mahatma Gandhi Road, (M.G. Road), Bangalore - 560001, Phone: +91-080-45118700 Korea Seoul 6th FL., Hongwoo BD, 522 Teheran-ro, Gangnam-gu, Seoul, Korea(135-846). Phone: +82-2-561-0990 Indonesia Jakarta The Plaza Office Tower, 21st Floor, Jl. MH. Thamrin Kav. 28-30 Jakarta 10350 - Indonesia Phone: +62-21-2992-2177 Philippines Manila 8/F The Rockwell Business Center Tower 2 Ortigas Avenue Pasig City, Metro Manila Philippines 1600 Phone: +632-9956200 Southeast Asia Singapore 8 Temasek Boulevard #09-04/05 Suntec Tower Three, Singapore 038988 Phone: +65 6379 2060 Malaysia Malaysia Sdn Bhd (661143-T) Suite 31-01, 31st Floor, Menara Keck Seng, No. 203 Jalan Bukit Bintang, 55100 Kuala Lumpur, Malaysia Phone: +603 2772 2288 Thailand (Thailand) Ltd. The Offices at Central World Tower, 999/9, 44th Floor, Unit 4410-4412, Rama I Rd.,Pathumwan, Bangkok 10330 Thailand Phone: +66 2 646 1968 Taiwan Taipei 8F, No. 198, Tun-Hwa S. Road, Sec. 2, Taipei 106, Taiwan Phone: +886-2-23789666 Vietnam 10th Floor, VINACONEX Building, 34 Lang Ha Street, Dong Da District Hanoi, Vietnam Phone: +84 4 37186424 Europe, The Middle East, and Africa Region Belgium Mechelen Campus Mechelen Building H Floor 2 Schalienhoevedreeft 20 2800 Mechelen Phone +32 15 281 480 Denmark Rodøvre (EMEA) Ltd Egegårdsvej 39 DK-2610 Rødovre Phone: +45 36 36 01 01 Egypt Cairo (EMEA) Ltd - Egypt 19 Helmy El-Masry St. Almaza Heliopolis Cairo Phone: +20 (0)2 2291 2218 France Paris 85, rue Albert Premier 92500 Rueil Malmaison Paris France Phone: 33 (0) 176 68 55 00 Phone: +33 (0) 176 68 55 00 Germany, Austria & Switzerland Bavaria Deutschland GmbH Zeppelinstrasse 1 85399 Hallbergmoos Bavaria, Germany Phone: +49 (0) 811 88990-700 Israel Ramat Hasharon (EMEA) Ltd - Tamir Segal 56 Osishkin st. Ramat Hasharon, Israel 47209 Phone: +972 548343411 Italy Milan Edison Park Center Viale Edison 110 - Edifico C 20099 Sesto San Giovanni (MI) Phone: +39 02 925931 Rome Via Tiburtina 912 00156 Rome Phone: + 39 02 925931 Netherlands NJ Vianen Kantorenpark "La Palissade Gebouw Le Cèdre Lange Dreef 13h, NJ Vianen 4131 The Netherlands Phone: +31 347358 430 Norway Oslo Karenslyst álle 2 0278 Oslo Norway Phone: +47 22 1285 00 Poland Warsaw (EMEA) Limited Warsaw Trade Tower Ul. Chlodna 51 00-867 Warszawa Phone: +48 (22) 486 34 50 Russia Moscow (EMEA) Limited 125009, Russian Federation, Moscow B. Nikitskaya, 12-12/A1 build. 1 Phone: +7 495 6297514 Saudi Arabia Riyadh Saudi Arabia 3rd Floor, Al Hoshan Building, Al Ahsa Road, 11623 Riyadh, Saudi Arabia Phone: +966 1-4727972 South Africa Bryanston EMEA Ltd. The Campus, 57 Sloane Street, Bryanston 2021 P.O.Box 76302, Bryanston 2021, South Africa Phone: +27 (0) 11 5757991 Spain Madrid Plaza de las Cortes 4-8a Izquierda 28014 Madrid Phone: + 33 1 76 68 65 00 Sweden Kista Sweden Jan Stenbecks torg 17 SE-164 40 Kista Sweden Phone: +46 8545 298 38 Switzerland Glattbrugg (Schweiz) GmbH Schaffhauserstr. 104 8152 Glattbrugg Switzerland Phone: +49 811 88990 700 Turkey Instanbul EMEA Ltd. Turkiye İrtibat Bürosu Macka Cad. Yeni Macka Han No. 14 Kat. 3 Daire 4 Maçka Istanbul Phone: +902123297955 United Arab Emirates Dubai Ltd (Middle East Branch) Units No. 3201 & 3202 Jumeirah Business Center 5 Plot No. W1 Jumeirah Lakes Towers Dubai, United Arab Emirates Phone: +971(0)4 3900340 United Kingdom & Ireland (UK) Limited Podium Level (East), 2 Kingdom Street, Paddington Central, London, W2 6BD United Kingdom Phone: +44 (0) 203 549 3300 Cork Meridan House, IDA Cork Business & Technology Park, Model Farm Road, Cork, Ireland. Phone: +353 (0) 21 730 7300 Japan Japan Headquarters Tokyo Shinjuku MAYNDS Tower, 2-1-1 Yoyogi, Shibuya-ku, Tokyo Japan ZIP 151-0053 Phone: +81-3-5334-3600 Fukuoka San F Bldg. 7F 2-3-7 Hakataeki-mae, Hakata-ku, Fukuoka-shi, Fukuoka Japan ZIP 812-0011 Phone: +81-92-471-0562 Osaka Nissei Sin-Osaka Bldg. 13F 3-4-30 Miyahara, Yodogawa-ku, Osaka Japan ZIP 532-0003 Phone: +81-6-6350-0330 Nagoya Nagoya Sakura Dori Bldg. 7F 3-22-24 Marunouchi, Naka-ku, Nagoya-City, Aichi Japan ZIP 460-0002 Phone: +81-52-955-1221 Latin America Region Brasil Porto Alegre Av. Carlos Gomes, 222-8 andar - Centro ZIP code (CEP): 90480-000 Porto Alegre, RS Phone: +55 51 3378-1025 Rio de Janeiro Av. Rio Branco 1 12º andar Grupo 1201 - Centro ZIP code (CEP): 20030-021 Rio de Janeiro, RJ Phone: +55 21 2588-8220 Sao Paulo R. Joaquim Floriano, 1120 2o andar - Itaim Bibi ZIP code (CEP): 04534-004 São Paulo, SP Phone: +55-11-2149-5655 Mexico Mexico City Insurgentes Sur, 688 - piso 6 Col Del Valle, C.P. 03100, México, D.F. Mexico Phone: +52-55-3067-6000 Sales office 38 39