4
ENDPOINT SECURITY OVERVIEW Page 1 of 4 ENDPOINT SECURITY OVERVIEW Many organizations have found out the hard way that traditional signature-based antivirus approaches to security are no match for today’s advanced threats and targeted attacks. There is no one type of security that will protect against every threat. Instead, organizations need to look to a holistic protection strategy to secure data on endpoints, mobile devices, and in the cloud. It’s critical to deploy comprehensive, adaptive endpoint protection that covers the full security lifecycle to prevent, detect, analyze, and respond to threats. This security must also be easy to manage and provide visibility into security activity of all users and endpoints, regardless of location or device. And finally, this security has to be built for speed so user experience is not impacted. Trend Micro endpoint solutions provide the most complete user protection available against today’s evolving threat landscape. With the broadest range of anti-malware techniques to secure virtual and physical desktops, Trend Micro delivers multiple layers of threat protection and data protection to secure your users and your corporate informationacross every device and application. Plus, we give you the ultimate flexibility to deploy your endpoint security on-premises, in the cloud, or using a combination of both. A single management console lets you manage users across threat vectors and deployment models, giving you complete visibility into the security of your environment. All this is delivered via a light, lean client with optimized architecture to ensure the lowest impact possible to your endpoints and your network traffic. SMARTER PROTECTION AGAINST EVOLVING MALWARE, ZERO-DAY, AND TARGETED ATTACKS Trend Micro endpoint security solutions ensure complete mobile and desktop protection against everything from traditional threats to the latest sophisticated targeted attacks. We help you defend both virtual and physical endpoints with multiple layers of anti-threat capabilities. You get advanced threat protection for anti-malware, packer variant protection, device control, vulnerability shielding, command-and-control (C&C) blocking, breach detection sandbox integration, browser exploit protection, application whitelisting, behavior monitoring with ransomware protection, web threat protection, web/file reputation, census data, and more. Third-party testing like AV-TEST confirms that Trend Micro anti-malware protection, performance, and usability scores are the top in the industrygiving you better a better user and administrator experience as well as better protection. Trend Micro Endpoint Security Solutions (available as part of our Smart Protection suites) offer comprehensive, layered security controls including: Anti-malware, ransomware Behavior monitoring Firewall Web threats Data loss prevention (DLP) Device control Endpoint encryption Application whitelisting Vulnerability shielding Mac, PC, Linux, mobile, and point-of-sale (POS) security Flexible deployment options: on-premises or as a service Centralized, scalable management Trend Micro ENDPOINT SECURITY Safeguard Your Corporate Endpoints and Mobile Employees

trend Micro enDPoInT SecurITy · endpoint security overview ... Sandbox malware analysis detects zero-day malware and malicious code hidden in office and PDF documents. And all of

  • Upload
    others

  • View
    19

  • Download
    0

Embed Size (px)

Citation preview

Page 1: trend Micro enDPoInT SecurITy · endpoint security overview ... Sandbox malware analysis detects zero-day malware and malicious code hidden in office and PDF documents. And all of

endpoint security overview

Page 1 of 4 • endpoint security overview

Many organizations have found out the hard way that traditional signature-based antivirus approaches to security are no match for today’s advanced threats and targeted attacks. There is no one type of security that will protect against every threat. Instead, organizations need to look to a holistic protection strategy to secure data on endpoints, mobile devices, and in the cloud. It’s critical to deploy comprehensive, adaptive endpoint protection that covers the full security lifecycle to prevent, detect, analyze, and respond to threats. This security must also be easy to manage and provide visibility into security activity of all users and endpoints, regardless of location or device. And finally, this security has to be built for speed so user experience is not impacted.

trend Micro endpoint solutions provide the most complete user protection available against today’s evolving threat landscape. With the broadest range of anti-malware techniques to secure virtual and physical desktops, Trend Micro delivers multiple layers of threat protection and data protection to secure your users and your corporate information—across every device and application. Plus, we give you the ultimate flexibility to deploy your endpoint security on-premises, in the cloud, or using a combination of both. A single management console lets you manage users across threat vectors and deployment models, giving you complete visibility into the security of your environment. All this is delivered via a light, lean client with optimized architecture to ensure the lowest impact possible to your endpoints and your network traffic.

SMArTer ProTecTIon AgAInST evolvIng MAlWAre, Zero-DAy, AnD TArgeTeD ATTAckSTrend Micro endpoint security solutions ensure complete mobile and desktop protection against everything from traditional threats to the latest sophisticated targeted attacks. We help you defend both virtual and physical endpoints with multiple layers of anti-threat capabilities. you get advanced threat protection for anti-malware, packer variant protection, device control, vulnerability shielding, command-and-control (c&c) blocking, breach detection sandbox integration, browser exploit protection, application whitelisting, behavior monitoring with ransomware protection, web threat protection, web/file reputation, census data, and more.

Third-party testing like Av-TeST confirms that Trend Micro anti-malware protection, performance, and usability scores are the top in the industry—giving you better a better user and administrator experience as well as better protection.

trend Micro endpoint security solutions (available as part of our smart protection suites) offer comprehensive, layered security controls including:

• Anti-malware, ransomware

• Behavior monitoring

• Firewall

• Web threats

• Data loss prevention (DlP)

• Device control

• endpoint encryption

• Application whitelisting

• vulnerability shielding

• Mac, Pc, linux, mobile, and point-of-sale (PoS) security

• Flexible deployment options: on-premises or as a service

• centralized, scalable management

trend Micro™

enDPoInT SecurITySafeguard your corporate endpoints and Mobile employees

Page 2: trend Micro enDPoInT SecurITy · endpoint security overview ... Sandbox malware analysis detects zero-day malware and malicious code hidden in office and PDF documents. And all of

Page 2 of 4 • endpoint security overview

Trend Micro also gives you better information for data protection and compliance.

• integrated data loss prevention (dLp) and device control ensure information is protected not only at the endpoint and removable media, but across multiple layers including web and email gateway, and instant messaging (IM).

• endpoint encryption makes sure only authorized eyes can see your data, especially important in the event of loss or theft.

• Application whitelisting prevents your users from executing dangerous or malicious applications on your endpoints by locking down to only the legitimate applications you are allowing.

• vulnerability shielding (virtual patching) and application lockdown protect your endpoints from vulnerabilities before there is a patch deployed, or indefinitely in cases of end-of-life or unpatchable systems.

• Behavior monitoring provides an extra layer of protection against new, unknown, and emerging threats with malware behavior blocking and event monitoring.

• web reputation stops access to malicious websites, including those employing c&c and data exfiltration.

• Browser exploits proactively prevents web browser vulnerabilities from exploits, including zero-day attacks.

BreAch detection And sAndBoxing When a new threat is detected locally, Deep Discovery network breach detection and sandboxing enables faster time-to-protection and reduces the spread of malware by delivering real-time signature updates to your endpoints.

endpoint sensor records detailed system-level activities to allow threat investigators to rapidly assess the nature and extent of targeted attacks and respond quickly and appropriately.

cloud App security is a cloud-based service that supplements office 365 security with advanced controls that strengthen your breach detection and compliance efforts. Sandbox malware analysis detects zero-day malware and malicious code hidden in office and PDF documents.

And all of this interconnected endpoint protection is powered by the trend Micro™ smart protection network™, which correlates threat data from 100’s of millions of sensors and 16 billion threat queries daily. So you get global and local real-time threat intelligence correlated across a global network. These real-time updates ensure faster protection and keep your endpoints light and lean with a lower network impact than traditional signature approaches.

Trend Micro also offers smarter protection for virtual environments, recognizing whether an endpoint is physical or virtual, and optimizing protection and performance for its specific environment. We further preserve host resources by integrating with the hypervisor management interface to serialize scans and updates, as well as whitelisting base images and previously scanned content.

device poLicy weB reputAtion Browser expLoit protection

BehAvior Monitoring

coMMAnd & controL BLocK

vuLnerABiLity shieLding

sAndBoxing

encryption AppLicAtion whiteListing

dAtA Loss prevention sig-BAsed

vulnerability exploits

employee data Leaks

traditional Malware

Advanced Malware

targeted Attacks

trend Micro delivers better protection

Page 3: trend Micro enDPoInT SecurITy · endpoint security overview ... Sandbox malware analysis detects zero-day malware and malicious code hidden in office and PDF documents. And all of

Page 3 of 4 • endpoint security overview

Trend Micro advantage

• Broadest real-time protection against full scope of endpoint threats

• unified, user-based central management

• lightweight, optimized security for low impact on the network and client

• Flexible deployment options that can change with requirements

cutting-edge ransomware protection ransomware is running rampant and traditional signature-based protection is not effective. We have taken the next step to stop it with a new advanced behavioral approach that monitors for suspicious file encryption activities at the endpoint. If a certain threshold is reached, the malicious encryption activity will be stopped by terminating/quarantining the process.

connecTeD ThreAT DeFenSehaving advanced security controls is not enough to adequately protect against the current threat landscape. you need a multi-layered endpoint protection platform that delivers a full lifecycle of threat defense. As the diagram below shows, this consists of four stages: prevent, detect, Analyze, and respond. each of these stages uses a series of techniques that together give you the best security posture.

For the best possible security posture, you need connections between the quadrants of the lifecycle. This connected threat defense ensures that threat intelligence gained by techniques in one quadrant is automatically and rapidly shared with the other quadrants. our endpoint solutions integrate with Deep Discovery network breach detection to deliver rapid response (real-time signature updates) to endpoints when a new threat is detected locally by the sandbox, enabling faster time-to-protection and reducing the spread of malware.

enable rapid response through delivery of

real-time signatures and security updates

Assess potential vulnerabilities and proactively protect endpoints, servers, and applications

Analyze risk and nature of attack and attacker,

and assess impact of threats retrospectively

detect advanced malware, behavior, and communications invisible to standard defenses

respond prevent

AnAlyze detect

insight & control

FlexIBle oPTIonS For hyBrID (clouD AnD on-PreMISeS) envIronMenTSIT models are rapidly evolving; what is on-premises today, may be in the cloud tomorrow. Surprisingly, it’s difficult to find security that can seamlessly evolve throughout this process. So you’re forced to choose between on-premises and cloud-based security. even worse, you may be forced to pay for both separately, which still doesn’t solve your problem. you need one solution that covers both to respond to the dynamic needs of your business.

With Trend Micro endpoint security, you can deploy and change security solutions in whatever way best supports your changing business models. endpoint security can be deployed on-premises, in the cloud, or in a hybrid model, and the mix can be altered at any time with no changes to your commercial agreement. Bottom line, you get the flexibility to fit the needs of your IT environment today and tomorrow.

Page 4: trend Micro enDPoInT SecurITy · endpoint security overview ... Sandbox malware analysis detects zero-day malware and malicious code hidden in office and PDF documents. And all of

Page 4 of 4 • endpoint security overview

coMPrehenSIve uSer-cenTrIc vIeW oF SecurITy AcroSS your orgAnIZATIonour centralized security management console gives you user-centric management that provides visibility into all of a user’s activities across different threat vectors both in the cloud and on-premises from a single management console. It ensures consistent security management and complete visibility and reporting across multiple layers of interconnected security. centralized management combines with user-based visibility to improve protection, reduce complexity, and eliminate redundant and repetitive tasks in security administration. But, perhaps the biggest benefit is that with complete visibility, you can easily understand how threats are spreading for a particular user across multiple systems.

TrenD MIcro enDPoInT SecurITy SoluTIonSTrend Micro endpoint security solutions are part of our Smart Protection Suites. Additional Trend Micro solutions extend your protection from advanced attacks with endpoint forensics + analysis.

• trend Micro™ officescan™ delivers comprehensive endpoint security with real-world protection against the latest advanced threats. you get modern threat protection from anti-malware, packer variants, device control, command-and-control (c&c) traffic, browser exploits, behavior monitoring, web threats, census-based control, and more.

• trend Micro integrated data loss prevention (idlp) secures data on- or off-network, protecting against data leaks across the broadest range of devices, applications, and file types.

• trend Micro security for Mac provides a layer of protection for Apple Mac clients on your network by preventing them from accessing malicious sites and distributing malware—even if the malware is not targeted at Mac oS x.

• trend Micro™ worry-Free™ Business security services protects Windows, Mac, and Android devices with cloud-based anti-malware and threat protection, managed via a secure, web-based console.

• trend Micro™ serverprotect protects against viruses, rootkits, and data-stealing malware while simplifying and automating security operations on linux servers.

• trend Micro™ endpoint Application control safeguards against unwanted and unknown applications executing on endpoints.

• trend Micro™ vulnerability protection delivers intelligent vulnerability shielding via host-based IPS to block network-based exploits and zero-day threats.

• trend Micro™ endpoint encryption ensures data privacy by encrypting data stored on your endpoints—including Pcs, Macs, DvDs, and uSB drives, which can easily be lost or stolen.

• trend Micro™ control Manager™ gives you complete visibility with centralized, user-based security management.

• trend Micro™ Mobile security provides visibility, control, and security for mobile devices and data in motion.

Trend Micro endpoint security delivers exponential gains in protection as all layers of security work together and are managed together to better correlate threat data and give visibility to advanced malware and threats. At the end of the day, we’ll help you stop more threats, more often.

©2015 by Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, and Smart Protection network are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their owners. Information contained in this document is subject to change without notice. [ov02_endpoint_Security_150820uS]

securing your Journey to the cloud

””

With Trend Micro endpoint encryption, we’ve been able to reduce our management expenses and cut our customers’ costs.

tim Maliyil Founder and ceo, AlertBoot

Figure: user-centric threat timeline