19
Trend Micro Total Product Catalogue

Trend Micro Total Product Catalogue"Trend Micro Online Storage SafeSync™" released Acquisition of Identum Ltd. (UK) "Trend Micro LeakProof™" released (presently Trend Micro Data

  • Upload
    others

  • View
    9

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Trend Micro Total Product Catalogue"Trend Micro Online Storage SafeSync™" released Acquisition of Identum Ltd. (UK) "Trend Micro LeakProof™" released (presently Trend Micro Data

Trend MicroTotal Product Catalogue

Page 2: Trend Micro Total Product Catalogue"Trend Micro Online Storage SafeSync™" released Acquisition of Identum Ltd. (UK) "Trend Micro LeakProof™" released (presently Trend Micro Data

* Trend Micro EPS…Trend Micro Enterprise Protection Strategy™

1988

1991

1996

2001

2004

2005

2007

2008

2009

2010

2011

1988 Founded

1991

1996

2001

2004

2005

2007

2008

2009

2010

2011

2012

2012

2013

E v o l v i n g t h r e a t sTrend MicroInterScan VirusWall™

Trend MicroNetwork VirusWall™Trend MicroNetwork VirusWall™

Trend Micro EPS*Trend Micro EPS*

Trend MicroServerProtect™Trend MicroServerProtect™

Trend MicroSmart Protection NetworkTrend MicroSmart Protection Network

Trend Micro SecureCloudTMTrend Micro SecureCloudTM

Trend Micro SSLTMTrend Micro SSLTM

Penetration of mobile usage

Penetration of mobile usage

VirusBuster™VirusBuster™

Computer viruses appear

Computer viruses appear

Server-level risk from the spread of LANs

Server-level risk from the spread of LANs

Spread of virus infection through email

Spread of virus infection through email

Spread of damage from viruses exploiting security holes

Spread of damage from viruses exploiting security holes

Explosive growth of network virus infections

Explosive growth of network virus infections

Spread of damage from spyware and spam emailSpread of damage from spyware and spam email

Appearance of threats from the Web

Appearance of threats from the Web

Spread of threats from the Web

Spread of threats from the Web

Diversification of infection routes

Diversification of infection routes

Cloud usage expandsCloud usage expands

Expansion of targeted attacks

Expansion of targeted attacks

Trend MicroInterScan VirusWall™

InterMute Inc. and Kelkea Inc. become subsidiaries and services are expanded

InterMute Inc. and Kelkea Inc. become subsidiaries and services are expanded

"Total Web Threat Protection" counters threats from the Web"Total Web Threat Protection" counters threats from the Web

Third Brigade becomes a subsidiary and services are expanded

Third Brigade becomes a subsidiary and services are expanded

humyo becomes a subsidiary and services are expandedhumyo becomes a subsidiary and services are expanded

1988 8

1989 10

Founded in Los Angeles, USA

Trend Micro Incorporated established

Fukuoka office established

Nagoya office established

Stock offered to the public as over-the-counter issues

Listed in the first section of the Tokyo Stock Exchange

1997 12

1998 6

1998 8

2000 8

Selected for Nikkei Stock Average (Nikkei 225) stock composition

Centralized management tool "Trend Micro Control Manager" released

2002 9

2003 1

Acquisition of InterMute Inc. (USA)

Acquisition of Kelkea Inc. (USA)

Provision of Network Reputation Service begins

Privacy Mark certification gained

2005 5

2005 6

2005 10

2005 1 1

"Trend Micro Vulnerability Management Services™" released

"Trend Micro SecureCloud™" released

"VirusBuster™ Mobile for Android™" released

TrendLabs Philippines gains ISO20000 standard

201 1 6

201 1 7

201 1 8

201 1 1 1

Provision of Web Security Service, including Web Reputation Service, begins

Acquisition of Provilla, Inc. (USA)

2007 6

2007 10

2004 5

2004 6

Network virus countermeasures device (Trend Micro Network VirusWall Family) released

Comprehensive contract relating to network virus prevention solutions signed with Cisco Systems, Inc.

"VirusBuster" developed and distributed

Osaka office established

Internet server virus countermeasure product "InterScan VirusWall" developed and distributed

1991 4

1996 3

1996 10

Acquisition of Third Brigade (Canada)2009 4

2010 1

2010 3

2010 6

2010 12

Listed in Global 100 Most Sustainable Corporations in the World

"Trend Micro Deep Security™" released

Acquisition of humyo (UK)

"Trend Micro Online Storage SafeSync™" released

Acquisition of Identum Ltd. (UK)

"Trend Micro LeakProof™" released (presently Trend Micro Data Loss Prevention™)

"Trend Micro Mobile Security™" released

2008 2

2008 5

2008 7

"Deep Discovery™" released

Provision of "Trend Micro SSLTM" begins 2012 5

2012 6

"Deep Security as a Service for Amazon Web Services" announced

2013 1 1

2 3

Our Vision

Our

Com

pany

A world safe for exchanging digital information

Our MissionDefend against threats that would impact user’s digital life or IT infrastructure

ManagementEva ChenCEO & Co-Founder

Mahendra NegiCOO& CFO

Steve ChangChairman & Founder

TradedTokyo StockExchange 4704

ASIA-PACIFIC8F, No. 198,

Tun-Hwa S. Road, Sec. 2,

Taipei , Taiwan (106)

+886-2-2378-9666

http://apac.trendmicro.com

JAPANShinjuku MAYNDS Tower

2-1-1 Yoyogi, Shibuya-ku

Tokyo, Japan 151-0053

+81-3-5334-3600

www.trendmicro.com/jp

NORTH AMERICA10101 N. De Anza Blvd.

Cupertino, CA 95014

USA

408-257-1500

www.trendmicro.com

LATIN AMERICAInsurgentes Sur 813, Pisoll

Colonia Napoles

C.P. 03810 - Mexico D.F.

5255-3067-6000

www.trendmicro.com/la

EMEABusiness and Technology Park

Model Farm Road

Cork, Ireland

+353 21-7307-300

www.trendmicro.co.uk

Eva ChenCEO & Co-Founder

Our History

Our

Com

pany

Our StrategyBe the threat defense expert that adapts quickly to evolving user behaviors, infrastructure and threat vectors

Our HistoryTrend Micro has continuously defended against security threats since its inception.In the era of cloud computing, nobody else can deliver such complete peace of mind.

Our CompanyCompany Introduction

Since the company started in 1988, Trend Micro has pioneered innovative security software and services, and constantly adapted to a rapidly changing threat landscape and evolving IT infrastructures.

Unlike many competitors, Trend Micro saw a particular need for network and gateway security in the 1990s. As web threats began to overtake other forms of malicious software, Trend Micro saw an opportunity to use cloud computing as a defense mechanism, and launched the Trend Micro Smart Protection Network. This online framework now lets Trend Micro respond more quickly to new threats faster than any other security vendor.

Trend Micro also delivered the very first "agentless" solution specifically for companies switching to virtual servers and desktops, which includes agentless integritymonitoring and virtual patching. Most recently, Trend Micro introduced the world's first multi-tenant cloud and data center security solution for large organizations and service providers.

Today, cloud computing and the proliferation of consumer mobile devices pose new challenges to IT management. Trend Micro has responded with integrated device management systems with Mobile App Reputation technology that dynamically tests mobile applications for malicious activity, resource usage, and privacy risks. Trend Micro has also introduced the first comprehensive security solution for Amazon Web Services with fully automatic protection.

Page 3: Trend Micro Total Product Catalogue"Trend Micro Online Storage SafeSync™" released Acquisition of Identum Ltd. (UK) "Trend Micro LeakProof™" released (presently Trend Micro Data

4 5

Our

Com

pany

Our

Com

pany

Trend Micro Smart Protection NetworkTM

Security Infrastructure in the Age of Targeted Attacks and Personal Mobile Devices

Our CompanyGlobal Network - Global Map Global Network - Smart Protection Network

Ireland

France

UK

Germany

China

Philippines(Headquarters)

Taiwan

Japan(Head Office)

USA(California)

USA(Texas)

Brazil

Development Sites

Major Overseas Bases

TrendLabs Philippines received ISO 20000-12005 certification for adhering to IT service excellence in compiling malicious software information, detection and cleanupprocedures, and technical services.

Brazil

Originally founded in California in 1988, Trend Micro has since become a truly transnational company. Now based in Japan, Trend Micro has offices across Asia, Australia, the Middle East, Europe, and the Americas to help monitor both worldwide and regional emerging threats and provide solutions as quickly as possible.

The Trend Micro Smart Protection Network cloud security infrastructure quickly and accurately identifies the latest threats and provides optimum solutions. By analyzing attacks using proprietary cloud technology and techniques, the Trend Micro Smart Protection Network swiftly identifies the latest threats and circulates solutions proactively.

Global Protection Against Dangers That Know No BordersBecause threats can appear anywhere and spread everywhere, Trend Micro's network spans the globe.

Trend Micro Global Network

Japan

Philippines(Headquarters)

Japan USA Canada Germany UK Taiwan China Australia

AustriaNew Zealand Belgium Netherlands Denmark UAE(Dubai) Norway Russia Indonesia

Egypt Saudi Arabia South AfricaVietnam Philippines

Panama

Poland Spain Sweden Turkey

China(Hong Kong) India Korea Italy UK Australia

Canada SingaporeThailand BrazilMalaysiaSwitzerland

Head Office

TrendLabsRegional Trend Labs

Major Overseas Bases

Development Sites

Overseas Subsidiary

USA Japan Taiwan Germany Ireland China France UK

USA Ireland GermanyChina(Beijing)

China(Shanghai) Taiwan France

Mexico

Brazil

India Ireland France Brazil

Singapore

Trend Micro Smart Protection Network BenefitsTotally new and highly complex security threats now appear at an astonishing rate, so Trend Micro has developed a multi-faceted security solution to rapidly and comprehensively identify, analyze, and resolve them.

Trend Micro Smart Protection Network NumbersBy employing an independent cloud infrastructure to collect and analyze a vast amount of threat data from around the world, Trend Micro can provide customers with nimble yet powerful security solutions. The Smart Protection Network also reduces the burden on company networks by relying on the cloud to do much of the heavy lifting.

● File reputation● Web reputation● Email reputation● Mobile App Reputation● Smart Protection Server● Network traffic rules

● Amount of threat data processed per day: 6 terabytes● Number of queries processed per day: 1.6 billion● Number of threats blocked per day: 200 million

● Vulnerability rules● White lists● Cyber criminal intelligence● Correlation analysis● Smart feedback

Summary of Trend Micro Smart Protection Network features

Delivering professional peace of mind in the consumerization, cloud and, cyber attack era.

Trend Micro's cloud security infrastructure quickly identifies the latest threats and immediately provides the optimum solutions with a minimal burden on businesses.

Collection of threatinformation

Identification and analysis of threats

Customer protection

Collecting threat information from around the world

Solutions based on analyzed threat information provided from

the cloud

Solutions based on analyzed threat

URLsVulnerabilitiesFilesDomainsNetwork traffic

Cyber attackersMobile applicationsIP addressesExploit kits

Email reputationWeb reputationFile reputationWhite-listing

Vulnerabilities and exploitsMobile App ReputationNetwork traffic rulesCyber criminal intelligence

Approximately 180,000 pieces of threat information identified daily 15TB of data is correlated

1 A global threat detection network

Real-time protection through global threat intelligence

Big data analysis

Collection of threat information Identification and analysis of threats

Customer protection

2 3Honeypots, communities, customers and threat research collect 1.15 billion samples and over 10TB of threat information daily.

<Types of information collected>

Threat information and safe information is identified and analyzed from the data collected daily through data mining, machine learning, modeling and correlation analysis.

Real-time threat protection with solutions based on analyzed threat information provided from the cloud.

<Amount of data analyzed daily><Technology to support protection>

* Trend Micro study, 2012

Page 4: Trend Micro Total Product Catalogue"Trend Micro Online Storage SafeSync™" released Acquisition of Identum Ltd. (UK) "Trend Micro LeakProof™" released (presently Trend Micro Data

6 7

Our

Com

pany

Our

Com

pany

Our CompanyChanging Security Landscape Security for Today

Trend Micro Smart Protection Strategy

For the first time ever, mobile devices now outsell PCs*1. Organizations of all sizes have started embracing cloud-based solutions for storing data and business applications.The unprecedented amount of data now generated and stored online can now help more and more people make critical decisions, discover new opportunities, reduce customer churn, and promote greater operational efficiency.

This new environment has also resulted in a much more complex IT landscape with many more support requirements. At this moment, a new security threat appears almost every second. Over 90% of organizations have suffered from some sort of malicious software, but more than half never become aware of the intrusions.*2

Hackers and cyber-attackers have clearly kept up with the new technology and still know exactly how to access protected customer data, credit card numbers, and private intellectual property.

The Changing Threat LandscapeEveryone now recognizes that information requires protection regardless of the storage location or which devices and platforms transmit it. Administrators need inexpensive yet effective security solutions that they can easily manage and deploy with flexibility.

Trend Micro Smart Protection Strategy

Trend Micro products support the Smart Protection Strategy

3 Critical Strategies for Security Today

Consumerization

Cyber Threats

Employees

Cloud and Virtualization

IT

Attackers

Information no longer protected by traditional defenses

Smart protection for information

Point solutions; limited visibility, de-centralized administration

Simple yet flexible to manage and deploy

Dynamic, complex environment; many new apps and platforms

Security that fits an evolving ecosystem

T h e N e w R e a l i t y … C u s t o m e r s N e e d …

* 1 Asymco.com, June 2012 *2 Trend Micro 2012 survey

Smart Layered security from mobile devices to gateways Transparent, real-time protection

Simple Unified dashboard with centralized policy control Modular, lightweight and efficient Flexible deployment: on-premise or security as a service Purpose-built for enterprise, mid-market, service providers

Security that fits Specialized plug-ins for Exchange, Domino, SharePoint Open: Win, Mac, iOS, Android, Blackberry… Powers IBM Endpoint Protection

Enterprise Security Suite Worry Free Series Mobile Security SafeSync for Enterprise Endpoint Encryption ScanMail Series PortalProtect Hosted Email Security InterScan Series Integrated DLP

Smart Comprehensive protection across physical, virtual, cloud Automated protection from vulnerabilities with virtual patching

Simple Single platform and administration with modular deployment Agent-less security for VMware; efficient, high consolidation Easy multi-tenant and service provider management

Security that fits Optimized, automated security for VMware and Amazon Web Services Open: Microsoft, Linux, Solaris, Unix, VMware, Citrix…

Smart Advanced, targeted threat detection Customizable sandboxes for accurate analysis Actionable insight from global threat intelligence

Simple Single appliance monitors multiple ports/protocols Automated, customized security updates

Security that fits Sandbox analysis and custom signatures available to other security products

S m a r t P r o t e c t i o n S t r a t e g y P r o d u c t s / S e r v i c e s t h a t fi t

Endpoint Security

Collaboration Security

Gateway Security

Integrated Data Loss Prevention

ServerProtect Series

SecureCloud Trend Micro Deep Security

Server/Storage Security

Cloud Security

Custom Defense Services

Deep Discovery Network VirusWall Enforcer ScanMail Series InterScan Messaging Security InterScan Web Security

OfficeScan Deep Security

Services

Network Security

Collaboration Security

Gateway Security

Endpoints/Server Security

Security Then

Company issued PC connected solely to the organization’s network with access to finite set of applications.

Data center servers were physically in the company data center.

Corporate systems had the latest antivirus pattern file to protect them from the most recent broad-based attack.

Security Now

Consumerization: Users no longer have a one-to-one relationship with their company-issued device or the corporate applications and network.

Cloud and Virtualization: The move away from data centers towards a more agile IT environment with virtualization and the use of cloud-based computing is occurring in every organization.

Cyber Threats: The social, sophisticated and stealthy nature of cyber threats to targeted attacks is having a dramatic impact on businesses.

Data center servers were physically in the company

Corporate systems had the latest antivirus pattern

COMPLETE USER PROTECTION

CLOUD & DATA CENTER SECURITY

CUSTOM DEFENSE

Page 5: Trend Micro Total Product Catalogue"Trend Micro Online Storage SafeSync™" released Acquisition of Identum Ltd. (UK) "Trend Micro LeakProof™" released (presently Trend Micro Data

Product Map

8 9

Trend Micro Product Matrix

Pro

duct

Map

Pro

duct

Map

Enterprise Security for Endpoints Advanced

Endpoint Security

Server / Storage Security

Security Suites

Cloud & Virtualization Security

Data Protection

Enterprise Security for Endpoints Standard

Worry Free Business Security Advanced

Worry Free Business Security Standard

Worry Free Business Security Services

ServerProtect for NT/NW

ServerProtect Linux

ServerProtect for EMC

ServerProtect for NetApp

ServerProtect for Hitachi Data Systems

Enterprise Security for Enterprise and Mail Servers

Enterprise Security Suite

Enterprise Security and Data Protection

Deep Security

Deep Security as a Service

Deep Security for SAP systems

SecureCloud

Enterprise Data Protection

LogInspectionFIM VDIIDS / IPS

Vulnerability / Intrusion Virtuali-zationData ProtectionAnti-

spamFor Web ThreatsAnti-

malware

FirewallEndpointEncryption

EmailEncryption

MobileSecurity

Data LossPrevention

Encryption

EncryptionAnti-spam

URLFiltering

WebReputationAntivirusProductsCategories

ScanMail Suite for Microsoft Exchange

Collaboration Security

Gateway Security(Email / Web)

ScanMail Suite for Lotus Domino

PortalProtect for Microsoft Sharepoint

InterScan Messaging Security Virtual Appliance

InterScan Web Security Virtual Appliance

Enterprise Security for Gateways

Hosted Email Security

Data LossPrevention

Anti-spam

Web Reputation Data LossPreventionAnti-PhishingAnti-spamAnti-Phishing

For Web ThreatsAnti-malware

Antivirus URL FilteringProductsCategories

Deep DiscoveryCyber Threats Security

Network VirusWall Enforcer

QuarantineAnalysis ReportC&C callback blacklist detectionand sharing

BehaviorMonitoring

Unknown Threats

Anti-malware For Web Threats Data Loss Prevention Vulnerability /Intrusion

Antivirus Web Reputation URL Filtering Encryption Device Control Remote Lock Remote Wipe Firewall

Known ThreatsProductsCategories

Mobile SecurityMobile Security

ProductsCategories

File Sharing Data Protection

On premise Private Cloud Data LossPrevention

Audit Logs /Reports

File Encryption

SafeSync for EnterpriseOnline Storage

ProductsCategories

Complete Intelligent ApplicationScanning

Integrated Detection andProtection

Unlimited SSL Certificates

Deep Security for Web AppsWeb Application Security

ProductsCategories

Virus Spyware SpamWeb

Threats Phishing

Trend MicroHosted Email Security

Virus Spyware

Spam Phishing

ManagementServer

Email ReputationServices

FileReputationService

Trend MicroCollaboration Security- ScanMail Suite for Microsoft Exchange - PortalProtect - Trend Micro IM Security

Virus Spyware Spam Phishing

Trend MicroServerProtect Series

Trend MicroNetwork VirusWall Enforcer

Server Storage

Switch

Appliance for analyze suspicious behavior in network and respond to unknown threats

Firewall

Mobile Devices

Router

VirusQuarantine

NetworkVirusVirus Spyware Intrusion

WebThreats

Trend MicroDeep Discovery

Virus

Virus

Spyware SpamWeb

Threats Phishing

WebThreats

Trend MicroWorry-Free Business Security

Small– Medium Environment– Medium Environment–

Customer Datacenter

Medium– Enterprise Environment– Enterprise Environment–

Trend Micro ScanMail for Groupware- ScanMail Suite for Microsoft Exchange- ScanMail Suite for Lotus Domino

Virus Spyware Spam Phishing

Appliance for analyze suspicious

Switch

Trend MicroDeep Security

Mobile Security

Intrusion

Trend Micro InterScan Messaging SecurityVirtual Appliance

Virus Spyware Spam

Trend Micro InterScan Web SecurityVirtual Appliance

SafeSync for Enterprise

Virus SpywareWeb

Threats Phishing

URLFiltering

Trend MicroEnterprise Security for Endpoints- OfficeScan- ServerProtect for Windows/Linux- Control Manager- OfficeScan plug-in IDF- OfficeScan plug-in Macintosh

Customer DatacenterCustomer Datacenter

“For the Cloud”Scalable from Physical server to Cloud environment

Trend MicroDeep Security

“For the Cloud”

Firewall

RouterRouter

ERS

WRS FRS

Virus

Virus

Trend MicroDeep Security for SAP Systems

IntrusionVirus

Data LossMobile

SecurityURL

Filtering

Data Loss

Data Loss

Data Loss

Data Loss

Data Loss

MobileSecurity

Data Share/Sync

WebReputationService

Trend Micro

“From the Cloud”

Trend MicroDeep Security as a service

Trend MicroDeep Security for Web Apps

VirusWeb

ProtectionSSL

WebThreats

LogInspection

IntegrityMonitoringFirewall

WebThreats

LogInspection

IntegrityMonitoringFirewall

WebThreats

LogInspection

IntegrityMonitoringFirewall Intrusion

IntrusionLog

InspectionIntegrity

MonitoringFirewallWeb

Threats

Page 6: Trend Micro Total Product Catalogue"Trend Micro Online Storage SafeSync™" released Acquisition of Identum Ltd. (UK) "Trend Micro LeakProof™" released (presently Trend Micro Data

OfficeScan Endpoint Securitywith plug-in modules: Intrusion Defense Firewall Security for Mac Virtual Desktop Infrastructure(VDI)

Endpoint SecurityEndpoint and Suites

10 1 1

Enterprise Security for Endpoints AdvancedEnterprise Security for Endpoints StandardGet maximum security and high performance from endpoints both on and off the network with award-winning protection against malicious software, web reputation technology that blocks access to suspicious websites, and HIPS protection, all powered by the cloud-based Smart Protection Network. Further customize your protection with add-on options for data protection, mobile security, and desktop virtualization—all coordinated through a single management console.

Advantages

SMART: Get consistent security that delivers proactive protection across all endpointsSimple: Increase security at lower costs with a consolidated, cloud-client architecture, and simplified managementSecurity That Fits: Streamline administration by enforcing threat protection policies from a single console

Enterprise Security SuiteTrend Micro Enterprise Security Suite is a tightly integratedsuite of products that secure your network from gateway toendpoint. With comprehensive threat protection andcentralized management, you can close security gapswhile decreasing costs and complexity. Powered by TrendMicro Smart Protection Network cloud-based security, thisend-to-end suite delivers global threat intelligence and fasterperformance.

Advantages

Enterprise Security for Endpoints and Mail ServersTrend Micro Enterprise Security for Endpoints and MailServers is an integrated, centrally-managed suite that delivers adaptive threat protection with award-winning antimalware, antispam, host intrusion prevention (HIPs), web reputation, and optional data security. Powered by Trend Micro's cloud-based Smart Protection Network, this suite can reduce risks and costs with a single solution offering united and integrated management of security for enterprise desktop computers, laptops, file servers, and mail servers.

Maximizes ProtectionReduces risk with comprehensive multilayered, multi-threat protectionDelivers immediate protection with in-the-cloud threat intelligenceImproves productivity with #1 rated spam blocking and web filtering

Lowers endpoint infection rates by 62%Slashes IT security management costs by 40%

Reduces time to acquire, deploy, and manage with integrated solutionStreamlines administration with web-based centralized management

Lowers Costs

Minimizes Complexity

InterScan Web Security Virtual Appliance

InterScan Messaging Security Virtual Appliance VMware

VMware Virtualized web gateway security blocks web threats and includes URL filtering

Virtualized email gateway security stops spam and email threats

Maximum Protection and Minimum Complexity across Protections Points and Platforms

GATEWAY

ScanMail Suite for Lotus Domino

ScanMail Suite for Microsoft Exchange Windows

Windows, Linux Blocks spam, malware and spyware at the mail server

Blocks spam, malware and spyware at the mail server

MAIL SERVER

ServerProtect for Microsoft Windows / Novell Netware

OfficeScan Windows

Windows, NetWare Secures Windows and NetWare file servers

ServerProtect for Linux Linux Secures Linux file servers

Secures Windows servers

FILE SERVER

Control Manager Advanced Windows Centrally manages security

MANAGEMENT

Intrusion Defense Firewall

OfficeScan Windows

Windows Proactive HIPS and vulnerability shielding

Data Loss Prevention __ Protects your sensitive data

Security for Mac Apple Macintosh Protects Macintosh clients from malware and blocks malicious websites

Secures Windows clients

CLIENT / MOBILE DEVICE

Multilayered Protection Platform Coverage Advantage

En

dpo

int

Sec

uri

ty

En

dpo

int

Sec

uri

ty

ScanMail Suite for Lotus Domino

ScanMail Suite for Microsoft Exchange Windows

Windows, Linux Blocks spam and spyware at the mail server

Blocks spam and spyware at the mail server

Maximum Protection across Endpoints and Mail Servers

MAIL SERVER

ServerProtect for Microsoft Windows / Novell Netware

OfficeScan Windows

Windows, NetWare Secures Windows and NetWare file servers

ServerProtect for Linux Linux Secures Linux file servers

Secures Windows servers

FILE SERVER

Control Manager Advanced Windows Centrally manages security

MANAGEMENT

Intrusion Defense Firewall

OfficeScan Windows

Windows Proactive HIPS and vulnerability shielding

Security for Mac Apple Macintosh Protects Macintosh clients from malware and blocks malicious websites

VDI __ Secure virtual desktop environment

Secures Windows clients

CLIENT

Multilayered Protection Platform Coverage Advantage

Standard Standard

Advanced

COMPARISON CHART

Advanced

EnterpriseSecurity forEndpoints

OfficeScanOfficeScan Plug-Ins

Intrusion DefenseFirewall

Security for Mac VDI

ServerProtectfor Windows,

NetWare, Linux

Trend MicroControl Manager

FILE SERVERSOfficeScanServerProtect for Microsoft Windows / Novell NetwareServerProtect for Linux

CLIENTS CENTRALIZEDMANAGEMENT

Control Manager

OfficeScan Endpoint Security with plug-in modules: Intrusion Defense Firewall Security for Mac Virtual Desktop Infrastructure(VDI)

FILE SERVERSOfficeScanServerProtect for Microsoft Windows / Novell NetwareServerProtect for Linux

MAIL SERVERSScanMail Suite forMicrosoft ExchangeScanMail Suite forLotus Domino

CLIENTSCENTRALIZEDMANAGEMENT

Control Manager

OfficeScan Endpoint Security with plug-in modules: Intrusion Defense Firewall Security for Mac Virtual Desktop Infrastructure(VDI)

FILE SERVERSOfficeScan Endpoint SecurityServerProtect for Microsoft Windows / Novell NetwareServerProtect for Linux

MAIL SERVERSScanMail Suite forMicrosoft ExchangeScanMail Suite forLotus Domino

GATEWAYInterScan Messaging SecurityInterScan Web Security

CLIENTS

CENTRALIZEDMANAGEMENT

Control Manager

Page 7: Trend Micro Total Product Catalogue"Trend Micro Online Storage SafeSync™" released Acquisition of Identum Ltd. (UK) "Trend Micro LeakProof™" released (presently Trend Micro Data

12 13

OfficeScan Virtual Desktop InfrastructureBuilt specifically to handle the rigors of virtual desktop environments, Trend Micro Virtual Desktop Security maximizes protection for a broad spectrum of virtual desktop scenarios.

Advantages

Agentless anti-malwareNo security agent in the VMLeverage VMware vShield APIs

VDI optimized agentsPrevent resource contentionCleans, scans memory and monitors behavior.

Intrusion Defense FirewallThe Intrusion Defense Firewall, a plug-in for Trend Micro Enterprise Security for Endpoints, supplements Trend Micro's highly effective OfficeScan client-level security with anetwork-level Host Intrusion Prevention System (HIPS).

Advantages

Protects endpoints with minimal impact on network throughput, performance, or user productivity.Blocks attacks before they enter the endpoint’s application and execution layer.Provides protection before patches are deployed .

Security for MacintoshBy leveraging the Trend Micro Smart Protection Network, the Trend

Micro Security for Mac plug-in for OfficeScan proactively limits

exposure to threats and prevents both users and applications from

accessing malicious websites.

Advantages

Blocks malware for all systems, including both Mac OS and Windows.

Mobile SecurityTrend Micro Mobile Security extends protection beyond PCs to secure mobile devices and data stored on them. This solution helps organizations reduce costs by providinga single point of visibility and control for device management. It helps prevent data loss by enforcing the use of passwords, encrypting data, and remotely wiping data off lost or stolen devices.

Advantages

Threat ProtectionMalwareSpywareWeb Threats

Reduced Operational CostsLimit Data LossReduced Security Risk

Users

Monitor

Control

Manager

Users

Users

Users

Android

iPhone / iPad

BlackBerry

Windows Mobile

En

dpo

int

Sec

uri

ty

En

dpo

int

Sec

uri

ty

Endpoint SecurityEndpoint and Suites OfficeScan plug-ins

Enterprise Security and Data ProtectionEnterprise Data ProtectionTrend Micro Enterprise Security and Data Protection can secure your network from the gateway all the way to mobile devices and completely protect end users. This comprehensive integrated suite combines multi-layer adaptive threat protection with Trend Micro Enterprise Data Protection to help you efficiently reduce the risk ofattacks and data breaches on all end-user platforms, including smartphones, tablets, desktop computers, laptops, and removable drives.

Trend Micro Enterprise Data Protection simplifies data security in complex mobile environments by integrating data loss prevention (DLP), encryption, mobile security, andmobile device management (MDM) with your current Trend Micro security suite. Combining threat and data protection in a flexible, centrally-managed solution significantly lowers the cost and effort of deployment and management.

Trend Micro Integrated Data Loss Prevention

Trend Micro Mobile Security

Trend Micro Endpoint Encryption

Trend Micro Email Encryption Gateway

Data Protection

SolutionEnterprise

Data ProtectionEnterprise Security and Data Protection

Components

Centralized Management Trend Micro Control Manager

Gateway ProtectionInterScan Messaging Security

InterScan Web Security

Mail Server ProtectionScanMail Suite for Microsoft Exchange

ScanMail Suite for Lotus Domino

Mail Server Protection

OfficeScan Endpoint Security

Server Protect for Microsoft Windows / Novell Netware

ServerProtect for Linux

Endpoint Protection

OfficeScan Endpoint Security

Intrusion Defense Firewall

Trend Micro Security for Mac

VDI Security

FILE SERVERSOfficeScanServerProtectIntegrated DLP

MAIL SERVERSScanMail SuitesEmail EncryptionIntegrated DLP

GATEWAYInterScan Massaging SecurityInterScan Web SecurityIntegrated DLP

CLIENTSOfficeScan Intrusion Defense Firewall Security for Mac VDI SecurityMobile SecurityEndpoint EncryptionIntegrated DLP

CENTRALIZEDMANAGEMENT

Control Manager

Page 8: Trend Micro Total Product Catalogue"Trend Micro Online Storage SafeSync™" released Acquisition of Identum Ltd. (UK) "Trend Micro LeakProof™" released (presently Trend Micro Data

14 15

En

cryp

tio

n

En

cryp

tio

n

Internet

Internet

Endpoint EncryptionTrend Micro Email Encryption efficiently secures email delivered to anyone with an email address. Client-based encryption allows the end user to select which messages should be encrypted just by clicking a button on the desktop. This ability for end users to encrypt specific emails with unique data complements policy-based encryption which automatically encrypts general content types. Together they offer a complete email encryption solution. The Trend Micro Email Encryption software plug-in for popular email clients deploys without modifying existing business processes and integrates seamlessly with the existing email infrastructure.

Endpoint Encryption encrypts data on a wide range ofdevices—laptops, desktops, tablets, CDs, DVDs, USB drives andany other removable media. This solution offersenterprise-wide full disk, file/folder, and removable mediaencryption, combined with granular port and device control toprevent unauthorized access and use of private information.A single management console handles both hardware and software encryption—enterprise-wide—for entire hard drives, specific files, folders, removable media, and storage devices.

Email Encryption Client

Enterprise gateway encryption augments email security by combining policy-based encryption and integration with a messaging security infrastructure.This solution offers simple deployment and administration without altering existing business processes. When combined with content security, it enables enterprises to encrypt emails and attachments automatically, without having to rely on individual users to secure private information.

Email Encryption Gateway

This policy-based encryption service seamlessly integrates with the content filtering capabilities of Hosted Email Security to identify particular types of content and encrypts email messages when the rules are triggered.

* Must use Hosted Email Security with outbound content filtering. No additional hardware or software is required.

Hosted Email Encryption

Advantages

Maximize Platform Coverage for Data & Device Encryption Encrypt private data with fully integrated full disk, file folder, USB, and removable media encryptionLower TCO with Centralized Policy Administration & Key Management Simplify operations with a unified data repository with single management server and consoleSimplify Remote Device Management Maintain compliance and protect your data without disrupting users in the event of a lost device or forgotten password. Manage policies and protect data on PCs, laptops, tablets, USBs, CDs, DVDs

FIPS 140-2 encryption certification

Centralized policy and key management

Level 2Level 2Level 2

Trend Micro

Key Features Endpoint Encryption Full Disk Encryption File Encryption

File and folder encryption

AES 256-bit encryption

Granular port and device control

Removable media (CD/DVD/USB) encryption

Full disk encryption

Automatic Synchronization and sharing

Self-encrypting drive management

Network-aware pre-boot authentication

Hosted CentralTrust Authority

Trend Micro Email EncryptionClient

Users

Users

Users

Users

Trend Micro Email EncryptionGateway

Messaging SecurityGateway

Features

Advanced Reporting & Auditing Automate enforcement of regulatory compliance with policy-based encryption Receive detailed auditing and reporting by individual, organizational unit, and devicePre-Boot Multi-Factor Authentication Gain flexible authentication, including fixed password, CAC, PIV, Pin, and ColorCode®

Trigger lockout feature in response to incorrect authentication attemptsAdministrative Tools & Active Directory Integration Leverage Active Directory and existing IT infrastructure for deployment and management Take the burden off IT staff by allowing users to change and reset passwords and accounts.

Encryption

Page 9: Trend Micro Total Product Catalogue"Trend Micro Online Storage SafeSync™" released Acquisition of Identum Ltd. (UK) "Trend Micro LeakProof™" released (presently Trend Micro Data

16 17

En

dpo

int

Sec

uri

ty

Worry-Free Business Security AdvancedWorry-Free Business Security StandardWorry-Free Business Security ServicesGet fast, effective, and simple protection against web viruses, cybercriminals, and data loss to stay focused on business instead of worrying about Internet security. Worry-Free ranked at #1 in independent tests at blocking Internet threats BEFORE they can reach PCs, Mac computers; file and mail servers — increasing protection, whilepreventing computer slowdowns.

Advantages

Web Threat ProtectionSmart Scan

Data Loss PreventionComprehensive spam preventionDevice ControlZero update effort (Services only)

Scans faster and updates quicker

Management server location

Updates and patches pushed to users

Easy-to-use, easy-to-access web console

CENTRALIZED MANAGEMENT

Worry-FreeBusiness SecurityServices

Worry-FreeBusiness SecurityStandard

Worry-FreeBusiness SecurityAdvanced

Via VPN

On Premise

Automatic

Hosted by Trend Micro No server

or maintenance required

Via VPN

On Premise

Manual with complete control

Manual with complete control

Mac clients and servers 

Android Devices (each seat comes with additional protection for 2 Android devices) 

PCs, laptops, Windows servers

PLATFORMS

UNIQUE - Advanced URL Filtering blocks inappropriate websites 

Web threat protection stops viruses and threats before they reach your business 

Defends against viruses, spyware and other malware

ANTIVIRUS AND WEB SECURITY

Blocks spam from entering POP3 mail accounts 

Stops spam and email-based viruses before they reach mail servers 

Threat protection and multi-layer antispam for Microsoft Exchange Servers 

Real-time scan for POP3 mail accounts

MESSAGING SECURITY AND ANTISPAM

UNIQUE - Data Loss Prevention via business email messages, sent accidentally or deliberately

Device control - limits access of USB drives and other attached devices to prevent data loss and block threats

DATA PROTECTION

Phishing

Spam Mails

URL Filtering

Data Loss

Viruses

Web ThreatsSpyware

Mobile Security

Worry FreeEndpoint Security

Trend Micro integrated DLP with central policy management simplifies data protection across multiple layers of the existing IT security infrastructure, streamlining administration and providing more consistent enforcement to increase data protection and compliance with little additional effort or cost.

Integrated Data Loss PreventionAdvantages

Integrated Data Loss PreventionData protection capabilities integrated within traditional enterprise security solutions, from endpoint to messaging and network, simplify deployment, reduce infrastructure cost, and provide peace-of-mind for data complianceCentral DLP Policy ManagementCentral configuration and application of pre-defined policy templates across protection layers reduces initial and ongoing administrative effort and provides consistent policy enforcement enterprise-wideCustomizable, Consolidated Displays and ReportsAggregated logs, reports and dashboard views provide real-time, enterprise-wide visibility into potential data breaches and data policy violations

Internet

Firewall

SharePoint

WebGateway

Endpoints

Exchange

Trend MicroControl Manager

=Trend Micro iDLP

Mail Gateway

1. Centrally configure DLP policies2. Centrally monitor DLP violation

Integrated Data Loss PreventionData Loss Prevention

Dat

a Lo

ss P

reve

ntio

n

Via Hosted EmailSecurityPurchase

Via includedHosted

Email Security

Page 10: Trend Micro Total Product Catalogue"Trend Micro Online Storage SafeSync™" released Acquisition of Identum Ltd. (UK) "Trend Micro LeakProof™" released (presently Trend Micro Data

18 19

En

dpo

int

Sec

uri

ty

Server / Storage SecurityEndpoint Security

Prevent viruses from spreading through your network byblocking them before they reach the end user. Trend MicroServerProtect for Microsoft Windows and Novell NetWarescans, detects, and removes virus from files and compressedfiles in real time. ServerProtect delivers 24x7 antivirussupport and protection with automatic, incremental virusupdates. Centralized management of servers via a Web-basedconsole simplifies network protection.

ServerProtect for Microsoft Windows and Novell NetWareAdvantages

Certified with Microsoft Windows Server 2000/2003 to deliver high performance, reliability, security, scalability and availabilityEnables real-time, high-performance scanning with minimal impact to servers

Protect your Linux file servers from becoming unwitting hostsfor viruses, trojans, bots and all sorts of other malware.Trend Micro ServerProtect for Linux offers real-timeprotection, high performance and low processing overhead,and supports all common Linux distributions. ServerProtectfor Linux adds another powerful solution to your enterprise'ssecurity and compliance strategy.

ServerProtect LinuxAdvantages

Prevents Linux servers from spreading threats to other servers and personal computersMaximizes performance and lowers processor overhead with multi-threaded, kernel-based scanning

Trend Micro ServerProtect for Storage, the industry’s mostreliable, high-performing security solution for storageplatforms, safeguards file storage systems by detecting and removing viruses and spyware in real time.

ServerProtect for EMC ServerProtect for NetAppServerProtect for Hitachi Data Systems

Advantages

Integrates tightly with EMC Celerra, NetApp Filers or Hitachi NAS.Enables real-time, high-performance scanning with minimal impact to servers and no impact to end users

NAS

1

Trend Micro ServerProtectfor NetAppfor EMC Celerra

Users

Access Files

2 Scan Request

3 Scan Result

4 Allow/Deny access

for Hitachi Data Systems

Online Storage

On

line

Sto

rage

SafeSync for EnterpriseTrend Micro Safesync for Enterprise provides file sharing and sync capabilitieswith data protection to give IT managers stewardship of sensitive data.Deployed both on the premises and in a private cloud, enhanced data protectionfeatures such as DLP, persistent file encryption and document tagging provideunprecedented data protection while still enabling user productivity withintegrated file sync and share capabilities. Combine control with cost savings by deploying the solution on your own infrastructure. SafeSync for Enterprise complements your overall mobility and data protection from Trend Micro to increase the value of DLP throughout your organization.

Features

File sharing from anywhere, any devicesSophisticated data protectionVisualize and control information assets

Advantages

Maximize Data Protection for Synchronized Files

Control where sensitive corporate data resides and how many copies existTag and safeguard sensitive data to reduce risk and achieve compliance mandatesApply data loss prevention (DLP) to mobile data and set policy based on data sensitivity

Maintain Productivity Gains without Inhibiting Collaboration

Allow users to simply drop a file into a folder for automatic replication to specific folders in the cloud, and on other PCs and devicesFree up mail server storage with a Microsoft Outlook plug-in that sends a sharing link instead of attaching files to email messages

Improve Security and Lower Costs with an Onsite Solution

Retain ownership and control of data sharing by deploying on premise private cloudLower your risk exposure to data loss or compliance violation with detailed audit and log information

Mobile Devices

2Case

Share, sync data within formobile devices

1Case

Share, sync data within organization network

Customer/Partner

Organization Network

ActiveDirectory

3Case

Share, sync data within external parties

Internet

Trend Micro SafeSync for Enterprise

Page 11: Trend Micro Total Product Catalogue"Trend Micro Online Storage SafeSync™" released Acquisition of Identum Ltd. (UK) "Trend Micro LeakProof™" released (presently Trend Micro Data

Comprehensive and integrated protection Protect AWS instance with anti-malware, Integrity monitoring, Web reputation, Intrusion Detection and Prevention, Bidirectional stateful Firewall, and Log inspection. Detects and removes malware in real time with minimal performance impact. Shields known and unknown vulnerabilities. Detects and alerts suspicious or malicious activity to trigger proactive, preventative actions.Developed for Cloud services Avoids set-up and hardware costs by hosting on Amazon Web Services (AWS). Saves the effort to deploy and manage disparate products with a single suite of security capabilities. Reduces admin workload with AWS Autosync’s automatic recognition of new instances.Achieve Cost effective Compliance Addresses major compliance requirements for PCI DSS 2.0, as well as HIPAA, NIST, and SAS 70 with one integrated and cost-effective solution.Instant-On Security Deep Security’s AWS Autosync capability means that new instances are automatically recognized when launched and security initiated, dramatically reducing the risk of any instances being unprotected at any point.

20 21

Clo

ud

& V

irtu

aliz

atio

n S

ecu

rity

Clo

ud

& V

irtu

aliz

atio

n S

ecu

rity

Deep SecurityTrend Micro Deep Security provides a comprehensive server security platform designed to protect virtualized data centers from data breaches and business disruptionswhile enabling compliance. This agentless solution simplifies security operations while accelerating the ROI from virtualization and cloud projects.Tightly integrated modules easily expand the platform to ensure server, application, and data security across physical, virtual, and cloud servers, as well as virtual desktops.Customize your security with any combination of agentless and agent-based protection,including anti-malware, web reputation, firewall, intrusion prevention, integrity monitoring, and log inspection. This adaptive and efficient server security platform protects mission-critical enterprise applications and data from breaches and business disruptions without expensive emergency patching.

Features

Anti-MalwareIntegrity MonitoringWeb ReputationIntrusion Detection and PreventionBidirectional Stateful FirewallLog Inspection

Advantages

Accelerate Virtualization, VDI, and Cloud ROI Provides a lighter, more manageable way to secure VMsMaximize Operational Cost ReductionsPrevent Data Breaches and Business Disruptions Detects and removes malware in real time with minimal performance impactAchieve Cost-effective Compliance Addresses major compliance requirements for PCI DSS 2.0, as well as HIPAA, NIST, and SAS 70

Multi-TenantHypervisor Integrity MonitoringAWS and vCloud IntegrationvSphere 5.5 readyIPv6 ready

IT InfrastructureIntegration

CLOUD DESKTOP/LAPTOPVIRTUALPHYSICAL

Deep Security as a Service – Cloud Security for Amazon Web Services (AWS)

Amazon Web Services (AWS) has emerged as a leading Infrastructure as a Service provider for cloud computing.Like most cloud providers, to ensure an end-to-end secure computing environment, AWS employs a shared securityresponsibility model with their customers. While Amazon provides secure facilities and processes, AWS customers must protect their operating systems, applications and data running on AWS.

The Deep Security service provides a complete suite ofsecurity capabilities including firewall, intrusion detection and prevention, anti-malware, integrity monitoring, webreputation and Log Inspection.

Developed specifically for securing AWS workloads, this optimized security offering sets up quickly and easily on AWS and automates security operations for AWS instances. Like AWS, Deep Security as a Service is elastic, dynamic and flexible – all characteristics necessary to enable organizations to fully exploit the benefits of cloud computing while remaining protected.

VMVM

VMVM

VMVM

VMVM

Trend Micro Deep Security Manager

Trend Micro Deep Security Virtual Appliance

Trend Micro Deep Security as a service

Administrator Administrator

Administrator

Reports

Reports

Reports

Alerts

Security Profile

Security Center

Deep Security Agent Deep Security Agent Deep Security Agent

PUBLIC CLOUD

VMVM

VMVM

AWS Instances Deep Security Manager(Hosted in AWS)

Integrated Dashboard

VMVM

VMVM

Deep Security AgentDeep Security Manager

Deep Security Agent

Alerts

Alerts

Cloud & Virtualization SecurityDeep Security family

Features & Advantages

Page 12: Trend Micro Total Product Catalogue"Trend Micro Online Storage SafeSync™" released Acquisition of Identum Ltd. (UK) "Trend Micro LeakProof™" released (presently Trend Micro Data

Scans the content uploaded to the SAP NetWeaver technology platform to determine its true type.

Reports information to SAP systems via the NetWeaver-VSI interface.Content scanning protects against possible malicious script content that might be embedded or disguised inside documents. SAP administrators can then set policy according to which actual document types should be allowed.

22 23

Clo

ud

& V

irtu

aliz

atio

n S

ecu

rity

Clo

ud

& V

irtu

aliz

atio

n S

ecu

rity

Deep Security for SAP systemsSAP systems contain highly sensitive financial, HR, customerand supply chain data that requires strong protection fromcybercriminals. With business systems becoming increasinglyaccessible from the web, attackers can more readily target and exploit vulnerabilities in operating systems, web servers and the business applications themselves. Despite the availability of vendor-supplied patches, all web-facing systems remain at risk if patches are not applied on a timely basis. The growing prevalence of zero-day exploits makes staying ahead of the latest threats increasingly difficult.

Trend Micro Deep Security for SAP systems can protect SAPsystems from breaches and business disruptions withintegrated anti-malware, Web reputation, and firewall inaddition to intrusion prevention, integrity monitoring, and loginspection.

Leveraging SAP VirusScan Interface, Deep Security for SAPsystems achieved SAP-certified integration with the SAPNetWeaver platform. It protects SAP deployments, helping tosecure critical information from attack, including a widevariety of threats like malware, cross-site scripting and SQL injection.

Cloud & Virtualization SecurityDeep Security family

SecureCloudCompanies that turn to cloud computing and virtualization to provide rapid provisioning, agility, and cost savings must also deal with new privacy and security risks, since they may not always know the exact location and accessibility of their data.

Trend Micro SecureCloud provides strong protection for data in the cloud and virtual environments using encryption with policy-based key management and unique server validation systems. It secures sensitive data stored on leading cloud services like Amazon EC2, Dell, Eucalyptus, and NTT America, as well as VMware VCloud and almost any other virtual environment. SecureCloud protects critical information from theft, unauthorized exposure, and unapproved migrations to other data centers.

These features help support internal governance and ensure compliance with regulations like HIPAA, HITECH, Sarbanes-Oxley, GLB, and PCI DSS. SecureCloud also has FIPS140-2 certification to support government agencies and companies with high security standards or mandates.

Features & Advantages

Advanced Security Techniques Features FIPS 140-2 certification and FIPS approved AES encryption Encrypts and decrypts information in real time, so data at rest is always protected Applies whole volume encryption to secure all data, metadata, and associated structures without impacting application functionalityAccess and Authentication Controls Employs role-based management to help ensure proper separation of duties Automates key release and virtual machine authorization for rapid operations or requires manual approval for increased security Offers cloud provider credential rotationPolicy-driven Key Management Uses identity- and integrity-based policy enforcement to ensure only authorized virtual machines receive keys and access secure volumes Enables the use of policies to determine when and where information is accessedRobust Auditing, Reporting, and Alerting Logs actions in the management console for audit purposes Provides detailed reporting and alerting features with incident-based and interval-based notifications

Features & Advantages

VMVM

VM

Hypervisor

Shared Storage

Randomsession key

over SSL

Key will be deployed per volumes

Kernel level encryption on writing data.

Encryption will be done for per volumes which connects to virtual instance server OS.

Authentication for key deployment done by rule base policy per VMs.

Trend Micro SecureCloud agent

Cloud Platform

Users Access VM

Trend Micro Deep Security for SAP Systems

SAP VirusScanInterface

SAPAdministrator

SAP Users ContentDocumentsEmailsEmbedded ImagesActive Content

SAP administrators can set policy which document types should be allowed.

Scan the contents uploaded to SAP systems

SAP NetWeaver

Page 13: Trend Micro Total Product Catalogue"Trend Micro Online Storage SafeSync™" released Acquisition of Identum Ltd. (UK) "Trend Micro LeakProof™" released (presently Trend Micro Data

24 25

Trend Micro Network VirusWall Enforcer protects corporate networks by ensuring that all devices comply with the corporate security policy before entry. This agentless NAC solution can scan any device—managed or unmanaged, local or remote—for the most up-to-date security and critical Microsoft patches. Non-compliant devices get quarantined and sent through a remediation process automatically. Once a device meets the security requirements, it may access the network. Network VirusWall Enforcer also filters network traffic to detect and block network worms—with zero false positives. The easy-to-manage appliance isolates infected areas from the rest of the network so threats cannot spread.

Network VirusWall Enforcer

Advantages

Lowers security risksChecks every deviceSecures network trafficMinimizes damageSimplifies management

Trend Micro Network VirusWall Enforcer

Block unknown viruses.

Quarantine devices.

Users

Web

App

licat

ion

Sec

uri

ty

Net

wo

rk S

ecu

rity

& S

ecu

rity

Man

agem

ent

Streamline administration of Trend Micro security solutions with the latest version of Control Manager. This web-based management console tracks security performance, reports malware events and policy violations, and automates routine tasks. New features include a customizable dashboard and at-a-glance access to threat statistics from the Trend Micro Smart Protection Network, Trend Micro's cloud-based security infrastructure.

Trend Micro Control ManagerAdvantages

Reduce risksGain security insight and controlLowers costsSimplify security managementMinimize complexityCreate an integrated, centrally managed security framework for a unified defense

Customizable Dashboard, Ad Hoc Query, Alerts

Web-based Centralized Security Management

Smart Protection Network Threat Statistics

Visibility into Clients

Multi-Tiered Management

Customizable Reporting

License Management

Control Manager is available in two versions: Standard and Advanced

Trend Micro Control Manager AdvancedStandard

Web Application SecurityDeep Security for Web Apps

Network Security &Security Management

As organizations rely more and more on web applications to deliver services to their employees, partners and customers, thethreat landscape broadens and security challenges become increasingly complex.Trend Micro Deep Security for Web Apps provides comprehensive application vulnerability detection and protection offering in a single, integrated console to help protect sensitive data from attack and meet government and regulatory requirements.This SaaS security offering continuously detects application vulnerabilities, delivers actionable security insights, and protects websites from attack. Automated scanning is enhanced with hands on expertise to remove false positives and test business logic. Vulnerabilities are quickly mitigated with WAF rule integration and an intrusion prevention system. Unlimited SSL certificates, including extended validation, are also included.

Deep Security for Web Apps

Comprehensive, Intelligent , vulnerability ScanningAutomated: Application and platform vulnerability

scanningValidation: Expert vetting of scanning results to

eliminate false positives and prioritization of issues to focus mitigation resources

Hands on testing: Checks for business logical flaws Comprehensive malware scanning Monitoring web application reputation helps customers off from blacklistsIntegrated Detection and Automated Protection Protection against known and zero-day attacks Virtual patching shields discovered vulnerabilities Coverage for all major Web servers and operating systems Web App Firewall (WAF) rules to defend against

application exploits which can be exported to leading WAFs

Features & Advantages

Unlimited SSL Deploy unlimited SSL certificates including Extended Validation (EV) at dramatic cost savings versus traditional SSL suppliers Expand use of SSL to internal applications and protect all Web ApplicationsSingle Integrated Management Console All detection and protection functions are managed through a single cloud-based console

Security Experts

Scanners

Security Experts

Cloud-based SecurityOperation Center

Enterprises’ / Organizations’Web Systems

Integrated ManagementConsole

Security / IT

AlertsReports

Page 14: Trend Micro Total Product Catalogue"Trend Micro Online Storage SafeSync™" released Acquisition of Identum Ltd. (UK) "Trend Micro LeakProof™" released (presently Trend Micro Data

26 27

Co

llabo

rati

on

Sec

uri

ty

Co

llabo

rati

on

Sec

uri

ty

ScanMail Suite for Microsoft ExchangeScanMail Suite for Lotus DominoScanMail Suitefor Microsoft ExchangeScanMail Suite for Microsoft Exchange not only stops traditional spam and malware but also detects malicious URLs, highly targeted attacks, and advanced persistent threats (APTs). With a combination of web, email, and file reputation, plus exploit detection and sandboxing, ScanMail Suite is the most comprehensive mail server security. No other solution offers this kind of enterprise-level protection.

Advantages

Guards against APTs and highly targeted attacksBlocks phishing emails with malware or bad web linksPrevents data loss and simplifies complianceCuts administration time in halfSpeeds throughput—up to 57% faster than other solutions

ScanMail Suitefor Lotus DominoScanMail Suite for IBM Lotus Domino stops traditional email threats with the correlated intelligence of Trend Micro Smart Protection Network cloud-based security. It also protects data with optional Data Loss Prevention and blocks targeted email attacks when integrated with Trend Micro Deep Discovery Advisor. ScanMail and Deep Discovery Advisor are both components of the Trend Micro Custom Defense Solution. ScanMail Suite is an easy-to-manage solution supporting nearly all Domino platforms.

Advantages

Customizes protection against highly targeted attacksBlocks phishing emails with malware or bad web linksPrevents data loss and simplifies complianceLowers administration with better controls and optimization

Trend Micro PortalProtect secures collaborations with adedicated layer of protection that guards against malware,malicious links, and other threats often unfamiliar to SharePoint administrators. Its web reputation technology blocks malicious links from entering web portals, while its powerful content filtering scans both the files and web components of SharePoint.

PortalProtect for MicrosoftAdvantages

Protects SharePoint users and dataStops a wide range of malicious files and URLsFilters inappropriate content from social aspects of SharePointControls sensitive data for compliance and risk managementTakes half the time to manageScales to any deployment sizeThe integrated Data Loss Prevention protects your sensitive data

Collaboration SecurityGroupware

Secure real-time IM communications by stoppingfast-moving attacks designed to spread malware, lure victimsto malicious sites, and steal data. Powered by Trend MicroSmart Protection Network and its unique cloud-clientarchitecture, IM Security blocks links to malicious sites beforethe links can be delivered. Signature-independent zero-daysecurity, leading antivirus protection, and new antispyware features work together to stop malware before threats can cause any damage. Plus, flexible content filtering ensures appropriate IM use and helps prevent data theft.

IM Security for Microsoft Lync and Office Communications ServerFeatures & Advantages

Unique! Blocks malicious links—before delivery—using Web ReputationIdentifies and blocks zero-day threats with proprietary IntelliTrap technologyStops more spyware, with dedicated inspection, before it can infect PCsFilters content to protect against data loss and undesirable languageReduces administration with tight platform integration and robust central control

Trend Micro Communication & Collaboration Security protects Microsoft email, collaboration, and IM systems by stopping threats in real time—before they can strike. The unique cloud-client architecture of the Trend Micro SmartProtection Network powers real-time threat protection (likeEmail and Web Reputation) that work in concert with leadingconventional content security technologies— allowing forall sorts of connections without the usual risks.

Enterprise Security for Communication and Collaboration

Communication & Collaboration Security

CollaborationServer

Trend MicroPortalProtectfor MicrosoftSharePoint

Central Management

Trend MicroControlManager

MailServer

Trend MicroScanMail Suitefor MicrosoftExchange

Instant Messaging Server

Trend MicroIM Security forMicrosoft OfficeCommunicationsServer

ScanMail

Anti-spam

Anti-phishing

Antivirus

EnhancedWeb Reputation

Advanced Threat Scan

Deep Discovery Advisor

Threat Analysis

Adaptive Security Updates

Threat Intelligence

Sandboxes

Feedback

Sandboxes

Quarantine

“Suspicious’’

Trend Micro and third-party security products

Page 15: Trend Micro Total Product Catalogue"Trend Micro Online Storage SafeSync™" released Acquisition of Identum Ltd. (UK) "Trend Micro LeakProof™" released (presently Trend Micro Data

28 29

Gat

eway

Sec

uri

ty

Gat

eway

Sec

uri

ty

InterScan Messaging Security Virtual ApplianceTrend Micro InterScan Messaging Security stops traditional threats in the cloud with global threat intelligence, provides data loss prevention and encryption, and identifies targeted email attacks as part of a custom APT defense. The hybrid SaaS deployment combines the privacy and control of an on-premise virtual appliance with the proactive protection of a cloud-based pre-filter service.

Enterprise Security for GatewaysKeep data confidential and employees safe without sacrificing rich Internet content. Trend Micro Enterprise Security for Gateways integrates virtualized web and messaging gateway security—proven to maximize protection while minimizing complexity and lowering total costs up to 40 percent.1 In-the-cloud web and email reputation combined with industry-leading antispam, antivirus, and URL filtering provide multilayered, multi-threat protection that blocks malware, malicious links, and unwanted content before they can enter a network. Real-time reporting offers an unprecedented view of current web activity,making it possible to stop risky behavior immediately. Outbound filtering and email encryption* protect confidential data and support compliance for complete gateway security.

1 Osterman Research, Why You Should Consider Virtualization, February 2009

* Trend Micro Encryption for Gateway Add-on is an optional purchase

Advantages

Detect and block APTs and targeted attacks Thwart targeted phishing attacks and advanced malware Simplify data protection and encryption Block more spam—proven #1 in independent tests

InterScan Web Security Virtual ApplianceGiven today's advanced Internet threats and the growinguse of cloud-based consumer applications in the workplace,application visibility is essential to understanding network risks. The Interscan Web Security virtual appliance combinesapplication control with advanced anti-malware scanning, real-time web reputation, and flexible URL filtering to provide superior Internet threat protection.

Advantages

Get instant visibility and control with Advanced Reporting and ManagementStop web threats before they penetrate the perimeterLower your TCOThe integrated Data Loss Prevention protects sensitive data

InterScan Web Security Virtual Appliance

InterScan Messaging Security Virtual Appliance

Virtualized web gateway security blocks web threats and includes URL filtering

Trend Micro Encryption for Email Gateway Virtualized email gateway security encrypts email content and file attachments

Virtualized email gateway security stops spam, phishing and email threats

Maximum Protection and Minimum Complexity at the Gateway

GATEWAY

Multilayered Protection Advantage

Hosted Email SecurityTrend Micro Hosted Email Security is a no maintenance solution that delivers continuously updated protection to stop spam and viruses before they get inside a network.

Advantages

Reclaim productivity and bandwidthFree up time to implement critical business initiativesGet peace of mind

Viruses

Spam Mail

Spyware

Trend Micro InterScan

Anti-virus

Anti-spyware

Contents Filtering

AdvancedThreat Detection

Data Loss

Users

Viruses

Spam Mail

Spyware

Phishing

Trend Micro InterScan

Anti-virus

Anti-spyware

Anti-phishing

URL Filtering

Web Reputation

AdvancedThreat Detection

Data Loss

URL Filtering

Users

Customers’ site

Clean Mails

Mails

Internet

Trend Micro Hosted Email Security

APT

APT

Gateway SecurityGateways

Spear-phishing

Page 16: Trend Micro Total Product Catalogue"Trend Micro Online Storage SafeSync™" released Acquisition of Identum Ltd. (UK) "Trend Micro LeakProof™" released (presently Trend Micro Data

30 31

Cyb

er T

hre

at S

olu

tio

n

Cyb

er T

hre

at S

olu

tio

n

Deep Discovery SolutionToday’s most damaging attacks target specific people, systems, vulnerabilities, and data. Advanced persistent threats (APTs) are more stealthy and sophisticated than ever, using insidious social engineering techniques to quietly penetrate organizations and deploy custom malware that go undetected for months. Cybercriminals can then remotely and covertly steal valuable information - from credit card numbers to intellectual property to government secrets - potentially wiping out a competitive advantage or even putting national security at risk.

Custom Defense Services help customers to detect, analyze, adapt and respond to recent attacks by targeted attacks and APTs.

Trend Micro Deep Discovery provides network-wide visibility, insight and control that enterprises and government organizations need to reduce the risk of Advanced Persistent Threats (APTs) and targeted attacks. Deep Discovery uniquely detects and identifies evasive threats in real-time, and provides in-depth analysis and actionable intelligence needed to prevent, discover and contain attacks against corporate data.

Custom Defense ServicesAdvantages

Command and Control callback blacklist local updateSharing new C&C callback blacklist (IP addresses/URLs) found during sandbox analysis to customer’s current security solution to block the targeted attack communications.APT & Targeted Attack DetectionReduces the risk of damages and data loss from APTsNetwork-Wide VisibilityReveals and tracks your true security postureDeep targeted attack insight and recommendationDelivers real-time threat profiling and remediation informationIntegration capabilityIntegrates results with the blocking device and exports as security policies, that improves enterprise-wide threat detection and prevention

How Deep Discovery Works

Server Farm

InterScan Messaging Security Virtual Appliance

InterScan Web Security Virtual Appliance

AttackersMalicious Sites

Malicious Content

Emails containing embedded document exploitsDrive-by downloadsZero-day & known malware

Decode & decompress embedded filesSandbox simulation of suspicious filesBrowser exploit kit detectionMalware scan (Signature & Heuristic)

Suspect Communication

C&C communication for all malware: bots,downloaders, data stealing, worms, andblended threatsBackdoor activity by attacker

Destination analysis (URL, IP, domain, email, IRCchannel, …) via dynamic blacklisting, white listingSmart Protection Network URL reputationCommunication fingerprinting rules

Attack Behavior

Malware activity: propagation, downloading,spamming...Attacker activity: scan, brute force, service exploitation...Data exfiltration

Rule-based heuristic analysisIdentification and analysis of usage of 100’ s ofprotocols & apps including HTTP-based apps

Attack Detection Detection Methods

Deep Discovery Inspector

Deep Security

Network VirusWallOfficeScan

Deep Discovery Advisor

InspectionDetection

Block

Analysis

BackdoorsVisualize

Deep Discovery solution includes 1 .Deep Discovery Inspector 2.Deep Discovery Advisor

Cyber Threat SolutionDeep Discovery and Custom Defense Services

Onsite critical systems for their health check.

Provide assessment report and recommendations for breach prevention.

Service components and advantages

Service overview

Services AdvantagesComponents

Critical System Assessment

Visibility of hidden malicious activities with one time assessment service deploying Deep Discovery Inspector.

Monitoring network and endpoints.

Network Assessment

Monthly AdvisoryQuarterly advisory meeting based on data collected through Deep Discovery.

Monthly Advisory report and recommendation based on data collected through Deep Discovery.

Detect

Analyze

Monitoring & Alert24x7 monitoring through Deep Discovery.

Email and phone notification for potential risks.

Custom Signature SLOCustomized pattern files based on malicious files specifically collected in customer sites.

6 hours SLO.

Breach Investigation Onsite investigation and analysis of suspected systems by the security experts.

System CleanupThe tool to mitigate and cleanup compromised systems.

Clean up compromised systems on which Deep Discovery detects suspicious C&C activities.

Adapt

Respond

Assessment Analysis andAdvisory

Monitoring andAlert

Investigation andMitigation

DETECT ANALYZE ADAPT RESPOND

Share local threats intelligence from Deep Discovery Advisor with Trend Micro products and 3rd party security products to prevent connections to malicious sites including C&C (Command & Control) servers.

Detect

Adapt

Respond

Attack Mails

Page 17: Trend Micro Total Product Catalogue"Trend Micro Online Storage SafeSync™" released Acquisition of Identum Ltd. (UK) "Trend Micro LeakProof™" released (presently Trend Micro Data

32 33

Services

Priority Case Handling

Annual Proactive Security Planning

2-Hours SLA for Malware Support

Crisis Management Planning Assistance

Multi-Region Support Capabilities

Access to Advanced Engineers

Dedicated Technical Account Manager (TAM)

Response Time 4 hours 2 hours 1 hour

Telephone Access to Support Engineers 24x7 24x7 24x7

Remote Problem Diagnosis and Remediation Support

Proactive Threat Alerts

Rely on the Trend Micro Premium Support Program to leverage the full value of your Trend Micro solutions and achieve optimum IT service levels. Enjoy proactive security resources for customer advocacy and expert advice to implement the very best security for your technology, processes, and people.

Trend Micro Technical Account Managers (TAMs) have extensive product knowledge, threat expertise, and familiarity with the entire Trend Micro ecosystem to help you make the most of your investment with Trend Micro.

Premium Support Program

Advantages

Proactive security services with regular touch pointsTrusted security expertise that augments your team resourcesFully optimized security posture that reduces your risk exposure

Service Level and Feature Matrix

SILVER GOLD PLATINUMDescription

Project Consulting ServiceWith Trend Micro Project Consulting Services, your IT staff can rely on a trusted advisor and partner to help meet your company’s goals. Our experts have the insight and security expertise needed to design the optimal architecture for maximizing the effectiveness of your Trend Micro solutions. Analyzing your security requirements and working closely with your team, our experts will craft a detailed plan specifically tailored to meet your needs.

Expert ServicesTrend Micro’s best-of-breed antivirus products enable an organization to cover messaging, Web, endpoint , and network security. Trend Micro's Expert-on-Guard (EoG) service uses these products and technologies to proactively detect threats and vulnerabilities that compromise the confidentiality, integrity, and availability of an organization's data, applications, and operating systems.

Trend Micro Project Consulting Service

ASSESS PLAN BUILD MANAGE

Ser

vice

s

Ser

vice

s

Page 18: Trend Micro Total Product Catalogue"Trend Micro Online Storage SafeSync™" released Acquisition of Identum Ltd. (UK) "Trend Micro LeakProof™" released (presently Trend Micro Data

34

Mar

ket

Lead

ersh

ip

Market Leadership

Recognized by market analysts, and proven through a dominant market share

Trend Micro leads the world in securitySE

RVER SECURITY

M

ARKET SHARE

GLO

BA

L CLOUD SECUR

ITY

M

ARKET SHARE

Trend Micro has 27% global share, almost twice the market share of the next two vendors - IDC 2012 Worldwide Corporate Endpoint Server Security Revenue Share by Vendor, 2011

GLO

BA

L VIRTUALIZATION

MA

RKET LEADER

“Trend Micro is able to dominate the market because of its diversified geographic reach, established customer base, and brand reputation.” Technavio 2011, Global Virtualization Security Management Solutions

GLO

BAL C

ONTENT SECURITY

SM

ALL BUSINESS

Trend Micro extends its market share lead over closest competitor Canalys – 2012 Small Business Segment Content Security Market Trends, March 2013

Market Leadership

Datacenter Security

Global 500 accounts

Trend Micro

Company A

Company B

Company C

Company DCompany E

Company F

Company G

Company H

Company I

Others

Trend Micro

Company A

Company B

Company C

Company D

Others

Trend Micro

Company A

Company B

Company C

Company D

Company ECompany FCompany G

Company H

Company I

Others

Source: 2012 Technavio – Global Cloud Security Software Market�

SERV

ER SECURITY

M

ARKET SHARE

Worldwide Endpoint Security�Revenue Share by Vendor, 2010 �Source: IDC, 2011

VIR

TUAL

IZATION SECURITY

M

ARKET LEADER

Source: 2011 Technavio – Global Virtualization Security Management Solutions�

  48 of the top 50 Global Corporations  10 of the top 10 Automotive companies  10 of the top 10 Telecom companies  8 of the top 10 Banks  9 of the top 10 Oil companies

trust Trend Micro security solutions

Trend Micro protects�96% of the top 50 global corporations.

Trend Micro protects�100% of the top 10 automotive companies.

Trend Micro protects�100% of the top 10 telecom companies.

Trend Micro protects�80% of the top�10 banks.

Trend Micro protects�90% of the top�10 oil companies.

Page 19: Trend Micro Total Product Catalogue"Trend Micro Online Storage SafeSync™" released Acquisition of Identum Ltd. (UK) "Trend Micro LeakProof™" released (presently Trend Micro Data

http://www.trendmicro.co.krTrend Micro Trademarks Notice©2014 by Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, Deep Discovery Advisor, Deep Discovery Inspector, Enterprise Security For Gateways, Hosted Email Security, InterScan Messaging Security Virtual Appliance, InterScan Web Security Virtual Appliance, Messaging Security Virtual Appliance, Network Viruswall Enforcer, Officescan, SafeSync, Scanmail, SecureCloud, ServerProtect, Trend Labs, Trend Micro Control Manager, Trend Micro Deep Security, and Smart Protection Network are trademarks or registered trademarks of Trend Micro Incorporated. All other product and/or company names may be service marks, trademarks or registered trademarks of their owners. Information contained in this document is subject to change without notice.

P/N TOPE-SE-0006