Delivers comprehensive, adaptive, highly efficient agentless and agent-based protection, including anti-malware, intrusion detection and prevention, firewall, web application protection, integrity monitoring, and log inspection.
Deep Security provides advanced server security for physical, virtual, and cloud servers. It protects enterprise applications and data from breaches and business disruptions without requiring emergency patching. This comprehensive, centrally managed platform helps you simplify security operations while enabling regulatory compliance and accelerating the ROI of virtualization and cloud projects.
Get mature technology from the recognized leader in virtualization security. With integrated security designed for virtual servers, you can remain secure without sacrificing performance or management. Deep Security helps you secure your virtual environment for the increased efficiencies of cloud computing. Virtualization-aware security preserves performance, and increases VM densities.
Get comprehensive protection for virtual desktops while preserving performance and consolidation ratios. Built specifically to handle the rigors of virtual desktop environments, Deep Security maximizes protection for a broad spectrum of virtual desktop scenarios. True agentless security for VMware VDI environments—antimalware, intrusions prevention, web application protection, firewall, and more—ensures no extra footprint from a security agent to impact the virtual desktops and the underlying host.
And agent-based security protects non-VMware VDI and virtual desktops in local mode. These flexible VDI security options let you can maximize both the protection and ROI of your company’s unique VDI investment.
Hundreds of software vulnerabilities are exposed each month, and timely patching is expensive, prone to error and often impossible. Trend Micro virtual patching solutions deliver immediate protection while eliminating the operational pains of emergency patching, frequent patch cycles, and costly system downtime. Deep Security virtual patching keeps your servers and endpoints protected while preventing costly emergency patching and upgrades as well as reducing the risk of breach disclosure costs. It even helps to extend the life of legacy systems and applications.
Whether you’re deploying a private, public, or hybrid cloud, Trend Micro provides you with cloud protection that’s optimized for virtual and cloud environments.Deep Security integrates with SecureCloud for encryption and policy-based key management for cloud environments. So you get better protection, less administrative complexity, and increased performance. Agentless and agent-based deployments provide flexible cloud implementation options with cross-cloud management to secure your servers, application, and data.
The complexity and fluidity of desktop and server virtualization pose security, compliance, and performance risks that require specialized, virtualization-optimized protection and performance. Deep Security provides integrated security and compliance for business systems operating in physical, virtual, and cloud environments. Deep Security addresses 8 PCI DSS requirements and provides core security controls with a unique approach that economically solves the toughest compliance challenges.
Monitors critical operating system and application files, such as directories, registry keys, and values, to detect and report malicious and unexpected changes in real time. Adds greater security to virtual machines without additional footprint through an agentless configuration. Protects the hypervisor from exploits with innovative new hypervisor integrity monitoring technology. Reduces administrative overhead with trusted event tagging that automatically replicates actions for similar events across the entire data center.
Helps achieve timely protection against known and zero-day attacks. Uses vulnerability rules to shield a known vulnerability—for example those disclosed monthly by Microsoft—from an unlimited number of exploits. Offers out-of-the-box vulnerability protection for over 100 applications, including database, web, email and FTP servers. Automatically delivers rules that shield newly discovered vulnerabilities within hours, and can be pushed out to thousands of servers in minutes, without a system reboot.
Defends against web application vulnerabilities
Enables compliance with PCI Requirement 6.6 for the protection of web applications and the data that they process. Defends against SQL injections attacks, cross-site scripting attacks, and other web application vulnerabilities. Shields vulnerabilities until code fixes can be completed.
Identifies malicious software accessing the network
Increases visibility into, or control over, applications accessing the network. Identifies malicious software accessing the network and reduces the vulnerability exposure of your servers.
Optimizes the identification of important security events buried in multiple log entries across the data center. Forwards suspicious events to a SIEM system or centralized logging server for correlation, reporting and archiving. Leverages and enhances open-source software available at OSSEC.
As organizations move to the cloud, they take on shared risk with their cloud partner. For those using Amazon Web Services, Trend Micro Deep Security as a Service provides the most complete set of recommended security capabilities, delivered in AWS with tight integration to make it fast and easy to realize the full benefits of the cloud. Learn more
Maximize your protection and your return on investment with Technical Account Management Services for Deep Security. Your Technical Account Manager (TAM) is a seasoned security professional who will help you use all the features and functionality of Deep Security in a way that works best for your business. As a single point of contact for your security team, TAMs will have access to the resources that will help you with:
TAM Services maximize the ROI on your investment to protect your virtualized IT environment. Having a TAM on your side enhances your protection, minimizes the time you spend dealing with problems and adds an expert security consultant to your team.
1Anti-malware not available
2Anti-malware support for on-demand scan only
3Only Integrity Monitoring and Log Inspection modules are available on these UNIX-based platforms.
4Protection via Deep Security Agent only