Protecting Your Digital World

Similar documents
Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

How to Test Outbreak Commander

CA Security Management

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

T E C H N I C A L S A L E S S E R V I C E S

Symantec Client Security. Integrated protection for network and remote clients.

Symantec Security Monitoring Services

CA Host-Based Intrusion Prevention System r8

Symantec Protection Suite Add-On for Hosted Security

Continuous protection to reduce risk and maintain production availability

SOLUTION MANAGEMENT GROUP

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement

Symantec Network Access Control Starter Edition

Symantec Network Access Control Starter Edition

TREND MICRO SMART PROTECTION SUITES

Symantec Network Access Control Starter Edition

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

Symantec Small Business Solutions

Symantec Endpoint Protection

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Kaspersky Security. The Power to Protect Your Organization

Commercial Product Matrix

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Symantec Enterprise Support Services Manage IT Risk. Maximize IT Performance.

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Cisco Security: Advanced Threat Defense for Microsoft Office 365

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

TREND MICRO SMART PROTECTION SUITES

CROWDSTRIKE FALCON FOR THE PUBLIC SECTOR

Best Practices in Securing a Multicloud World

Total Protection for Compliance: Unified IT Policy Auditing

AKAMAI CLOUD SECURITY SOLUTIONS

SIEM Solutions from McAfee

Cisco Network Admission Control (NAC) Solution

Get more out of technology starting day one. ProDeploy Enterprise Suite

Cisco Start. IT solutions designed to propel your business

RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.

Total Threat Protection. Whitepaper

SaaS Flyer for Trend Micro

Future-ready security for small and mid-size enterprises

Enabling Innovation in the Digital Economy

Archiving. Services. Optimize the management of information by defining a lifecycle strategy for data. Archiving. ediscovery. Data Loss Prevention

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

CAS Quick Deployment Guide January 2018

Understanding Network Access Control: What it means for your enterprise

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

Why Converged Infrastructure?

Trend Micro Deep Discovery for Education. Identify and mitigate APTs and other security issues before they corrupt databases or steal sensitive data

IBM Internet Security Systems Proventia Management SiteProtector

Symantec Enterprise Solution Product Guide

with Advanced Protection

The threat landscape is constantly

Digital Renewable Ecosystem on Predix Platform from GE Renewable Energy

SIEM: Five Requirements that Solve the Bigger Business Issues

McAfee Public Cloud Server Security Suite

THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE

The McAfee MOVE Platform and Virtual Desktop Infrastructure

Trend Micro and IBM Security QRadar SIEM

Network Security Protection Alternatives for the Cloud

A Government Health Agency Trusts Tenable to Protect Patient Data and Manage Expanding Attack Surface

Services solutions for Managed Service Providers (MSPs)

Symantec Endpoint Protection 11.0

Your Enterprise is Only as Secure as Your Macs

Security-as-a-Service: The Future of Security Management

AT&T Endpoint Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

DIGITAL LIFE E-GUIDE. A Guide to 2013 New Year s Resolutions

Security in a Virtualized Environment with TrendMicro

INSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

IBM Security Network Protection Solutions

Novell ZENworks 7.2 Linux Management

Managed IT Services Eliminating technology pains for SMBs

Cisco Incident Control System

2017 Company Profile

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Management Information Systems. B15. Managing Information Resources and IT Security

Correlation and Phishing

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

trend micro smart Protection suites

SMASHING THE TOP 7 VIRTUALIZATION SECURITY MYTHS

INTELLIGENCE DRIVEN GRC FOR SECURITY

Smart Data Center Solutions

IPS with isensor sees, identifies and blocks more malicious traffic than other IPS solutions

Build application-centric data centers to meet modern business user needs

Virtustream Managed Services Drive value from technology investments through IT management solutions. Tim Calahan, Manager Managed Services

A company built on security

Symantec Multi-tier Protection

Managed Endpoint Defense

Reducing the Cost of Incident Response

Symantec Endpoint Protection 14

Berdon Ledger Shows Net Gains in Productivity, Scalability Due to Symantec Security and Data Protection Solutions

Integrated Switching: Cisco Blade Switch Modules for HP BladeSystem Enclosures. Reduce data center complexity

Product Line Guide Corporate Antimalware PLUS Network Visibility PLUS Systems Management

Sage Data Security Services Directory

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim

Office 365 Buyers Guide: Best Practices for Securing Office 365

Unified Communications from West

ProDeploy Suite. Accelerate enterprise technology adoption with expert deployment designed for you

Transcription:

Protecting Your Digital World C O R P O R A T E O V E R V I E W

With revenues of more than $105 Billion, cybercrime generates more revenue than the illegal drug trade. Source: U.S. Treasury, reported by Reuters If customers don t feel that their confidential information and transactions are secure, all electronic communication and commerce may be undermined, with devastating effects to the economy. Businesses and consumers alike must take every possible precaution to secure their systems and data to stem the erosion of trust in the Internet. Source: Computer Economics 2004 2

T R E N D M I C R O I N C. Each year, advancing technologies offer new ways to streamline business transactions and enable seamless communication among customers, partners, and employees. As businesses become more responsive, it s almost as if internal and external boundaries disappear. Trend Micro A leader in threat management software, hardware and services that is committed to protecting customers of all sizes from the growing range of digital threats. OUR VISION: OUR MISSION: OUR STRATEGY: A world that s safe for exchanging digital information Ensuring operational continuity through comprehensive protection against malicious threats Delivering timely intelligence and customer- driven innovations that seamlessly integrate with the network information flow. But as the line between the enterprise and the Internet blurs and fades, organizations and individuals alike are exposed to new kinds of security threats. And these security threats aren t from the old-fashioned hackers who simply want to brag that they shut down a business or a network node. Motivated solely by profits, this new breed of hackers uses extraordinary skills to lurk undetected in your network, monitoring business transactions, mining confidential data, and hosting illicit Web pages and malicious code on your own servers or personal computers. To keep pace, the public needs security solutions that protect against the expanding range of threats: the viruses, spam, phishing, pharming, spyware, rootkits, and other emerging types of malicious code designed to compromise business operations, personal information, and property. Don t wait until your systems are under attack to make sure that your security vendor can answer these three key questions about malicious code: Where is the threat coming from? How quickly was I informed of the threat? How well are my systems protected? By providing timely and complete answers to those three key questions, Trend Micro delivers exceptional security to individuals and organizations of all sizes. 3

Our Approach INNOVATIVE, CUSTOMER FOCUSED SOLUTIONS FROM A TRUSTED INDUSTRY LEADER. Trend Micro is focused on delivering strategies, services, and technologies to ensure that you always know the source of any threat, the speed of its detection, and the depth of your protection the answers to the three fundamental security questions. At Trend Micro, we know that the security paradigm must constantly evolve to keep pace with the changing threats. It s no longer sufficient to simply secure individual systems within an enterprise organizations need comprehensive protection for the network infrastructure itself as well as for the information flowing through it. Through deep integration with the network infrastructure and new technologies including next-generation IP filtering, network content inspection, network access control, and more, Trend Micro secures both the network infrastructure and individual machines. For home and home-office users, Trend Micro provides the freedom to use their computers as they desire, without worrying about protecting systems and data against a growing range of threats. Our goal is to deliver seamless content and data security that enables organizations to focus on their core competencies and individuals to focus on their desired tasks. To achieve this goal, we ve organized our company to make it easier to do business with us. We ve expanded our offerings to include a choice of form factors software, services, hardware, network integration, and more to ensure that our customers can tailor a security solution to their exact needs. We re leveraging our strategic partnerships and alliances to deliver the most value to our customers. We ve developed a comprehensive range of home and home-office products so that individuals can use their systems for work or play with peace of mind. And we re continually investing in innovative technologies and services that help ensure continuity in the face of the shifting threat environment. LAN Server Virus Protection ServerProtect Gateway Virus Protection InterScan Server-based Email Virus Protection ScanMail Threat Lifecycle Management Strategy Enterprise Protection Strategy (EPS) 1995 1996 1997 1998 1999 2000 2001 Internet Outsourcing Services Web-based Centralized Management Trend Micro Virus Control System Building on a history of industry firsts, Trend Micro s latest technology innovations include extending protection into the network itself. 4

The Advantage CONTINUOUS INNOVATION. CONSISTENT PROTECTION. CUSTOMER SATISFACTION. 2002 2003 2004 2005 2006 2-Hour Virus Response SLA Integrated Gateway Content Security InterScan Messaging Security Suite with Spam Prevention Solution Trend Micro and Cisco Integrated Security in the Network Network Reputation Services Network Access Control Network VirusWall Since our inception, Trend Micro has consistently been at the forefront of threat management with innovations that protect customers from emerging threats. We were the first to extend antivirus protection from the desktop to the gateway. The first to offer a centralized Web-based management console. The first to deliver antivirus protection for email and file servers. The first to deliver a comprehensive, customer-centric approach for managing the complete threat lifecycle. And through our strategic partnerships with leading technology vendors such as Cisco Systems, we are the first to integrate our threat management technology and expertise directly into the network information flow. But comprehensive protection requires more than just security hardware and software products it demands expert service with rapid deployment of intelligence about new threats. Through TrendLabs TM, our global network of threat research and product service and support centers, we offer continuous round-the-clock coverage to Trend Micro customers around the world. More than 800 engineers, researchers, and support personnel in 15 dedicated service centers around the globe monitor potential security threats and mount rapid responses to major security incidents and urgent support requests. Our timely threat intelligence and ongoing technological innovations combine to help customers minimize damage, reduce administration costs, and most important ensure continuity in the face of increasing and ever-changing security threats. Trend Micro is a premium partner: thoughtful, reactive, with the ability to evolve and listen to our needs. Trend Micro enables us to have global visibility of the antivirus and content security situation throughout our IT infrastructure. We benefit from timely updates and enhance our productivity. Bruno Martini, IT Infrastructure Manager Aéroports de Paris, France 5

I O N Enterprise Protection Strategy COMPREHESIVE PROTECTION. INTEGRATED MANAGEMENT. A SECURE ENTERPRISE. Trend Micro s Enterprise Protection Strategy (EPS) combines multiple layers of products and services to deliver intelligent, comprehensive protection against known and unknown threats. The multilayered security of EPS is deployed to gateways, email and file servers, desktops, and mobile devices, protecting the organization from viruses, spyware, spam, phishing, pharming, botnets, and more, while seamless inter-product communication ensures a rapid and coordinated response to threats. EPS enables the following key functions: Trend Micro Enterprise Protection Strategy gives us the foundation for a complete threat management solution protecting our complex, distributed networks from a wide range of attacks. By ensuring business continuity and ease of management, EPS provides a significant return on investment. Udo-Peter Meyer, Team Lead Virus Protection Bayer Business Services ITO-GDC Monitoring. Through TrendLabs, our global threat research and support organization, and the Network Security Services Group, EPS provides ongoing real-time detection and identification of known and unknown threats. Enforcement. EPS makes it easy to limit network access to users who comply with security policies, and prevent computers from attaching to the network or otherwise communicating until they re at current levels of protection and authentication. Prevention. With multilayered protection at the desktops, servers, and gateways throughout the network, EPS ensures that new patterns are deployed quickly and prevents threats from spreading and interrupting business operations. Recovery. EPS is designed to bring businesses back to normal as quickly as possible by rapidly repairing damages caused by network intrusion, spyware, or malware. Our agent-based and agentless offerings provide automatic client remediation and enable recovery from even the most malicious code, such as rootkits. MONITOR MONITOR RECOVER E N T E R P R S T R AT E G Y I S E P R O T E C T ENFORCE ENFORCE PREVENT PREVENT C E N T R A L M A N A G E M E N T Integrated centralized management. Through Trend Micro Control Manager, EPS provides an intuitive Web console for centralized management of Trend Micro products and services, simplifying enterprise-wide security policy deployment and coordination. Trend Micro Enterprise Protection Strategy offers multilayered, intelligent protection against known and unknown threats. 6

Small and Mid-Sized Business WORRY LESS. ACCOMPLISH MORE. The smaller the organization, the greater the need for a worry-free infrastructure the financial impact of a security incident can be proportionally greater for small and mid-sized businesses (SMBs) than for larger companies. Trend Micro delivers a range of solutions in a variety of form factors that address SMB s unique operating environments, including: Automatic Threat Protection that continuously protects businesses from viruses and other malicious code by detecting vulnerabilities, preventing threats, assessing damage and cleaning up all without intervention. All-in-one Integrated Defense that simplifies installation, deployment, and management of security against multiple threats. Zero-administration solutions that proactively deliver critical information, including real-time notification, at-a-glance live status, and detailed pulse-point reporting, to ensure business continuity without creating administrative burden. Trend Micro s integrated solutions are available in a range of form factors (such as software, managed services, appliances, and more) that can be tailored to meet any business s specific requirements. Your digital safety and security are paramount to Trend Micro. With our constant innovations, we strive to continuously provide comprehensive protection against today s ever-increasing malicious threats and deliver exceptional security to individuals and organizations of all sizes. Your mission-critical information and systems stay safe and secure for your peace of mind. And that peace of mind enables you to focus on your continued organizational success. Trend Micro's Worry-Free solution is one thing that I don't have to worry about. The automatic threat protection is 100 percent true across our grocery chain. Every time I turn on a PC it's automatically updated without requiring me to do anything. Frank Geer, IT manager Nijiya Market 7

TREND MICRO INCORPORATED Trend Micro Incorporated provides individuals and organizations of all sizes with market-leading threat management software, hardware and services. The Tokyo-based corporation has operations in more than 30 countries. Trend Micro solutions are sold through corporate and value-added resellers and service providers worldwide. For additional information visit our Web site at www.trendmicro.com. Trend Micro Incorporated 10101 N. De Anza Blvd., Cupertino, CA 95014 USA 1-877-268-4847 www.trendmicro.com 2006 by Trend Micro Incorporated. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the prior written consent of Trend Micro Incorporated. Trend Micro, the t-ball logo, Control Manager, InterScan, TScanMail, ServerProtect, InterScan Messaging Security Suite, VirusWall, and TrendLabs are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their owners. Information contained in this document is subject to change without notice. [BR06CORP050816US]