Delivers comprehensive, adaptive, highly efficient agentless and agent-based protection, including anti-malware, intrusion detection and prevention, firewall, web application protection, integrity monitoring, and log inspection.
Deep Security provides advanced server security for physical, virtual, and cloud servers. It protects enterprise applications and data from breaches and business disruptions without requiring emergency patching. This comprehensive, centrally managed platform helps you simplify security operations while enabling regulatory compliance and accelerating the ROI of virtualization and cloud projects.
Get mature technology from the recognized leader in virtualization security. With integrated security designed for virtual servers, you can remain secure without sacrificing performance or management. Deep Security helps you secure your virtual environment for the increased efficiencies of cloud computing. Virtualizatyion-aware security preserves performance, and increase VM densities.
Get comprehensive protection for virtual desktops while preserving performance and consolidation ratios. Built specifically to handle the rigors of virtual desktop environments, Deep Security maximizes protection for a broad spectrum of virtual desktop scenarios. True agentless security for VMware VDI environments—antimalware, intrusions prevention, web application protection, firewall, and more—ensures no extra footprint from a security agent to impact the virtual desktops and the underlying host.
And agent-based security protects non-VMware VDI and virtual desktops in local mode. These flexible VDI security options let you can maximize both the protection and ROI of your company’s unique VDI investment.
Hundreds of software vulnerabilities are exposed each month, and timely patching is expensive, prone to error and often impossible. Trend Micro virtual patching solutions deliver immediate protection while eliminating the operational pains of emergency patching, frequent patch cycles, and costly system downtime. Deep Security virtual patching keeps your servers and endpoints protected while preventing costly emergency patching and upgrades as well as reducing the risk of breach disclosure costs. It even helps to extend the life of legacy systems and applications.
Whether you’re deploying a private, public, or hybrid cloud, Trend Micro provides you with cloud protection that’s optimized for virtual and cloud environments.Deep Security integrates with SecureCloud for encryption and policy-based key management for cloud environments. So you get better protection, less administrative complexity, and increased performance. Agentless and agent-based deployments provide flexible cloud implementation options with cross-cloud management to secure your servers, application, and data.
The complexity and fluidity of desktop and server virtualization pose security, compliance, and performance risks that require specialized, virtualization-optimized protection and performance. Deep Security provides integrated security and compliance for business systems operating in physical, virtual, and cloud environments. Deep Security addresses 8 PCI DSS requirements and provides core security controls with a unique approach that economically solves the toughest compliance challenges.
Helps achieve timely protection against known and zero-day attacks. Uses vulnerability rules shield a known vulnerability—for example those disclosed monthly by Microsoft—from an unlimited number of exploits. Offers out-of-the-box vulnerability protection for over 100 applications, including database, web, email and FTP servers. Automatically delivers rules that shield newly discovered vulnerabilities within hours, and can be pushed out to thousands of servers in minutes, without a system reboot.
Defends against web application vulnerabilities
Enables compliance with PCI Requirement 6.6 for the protection of web applications and the data that they process. Defends against SQL injections attacks, cross-site scripting attacks, and other web application vulnerabilities. Shields vulnerabilities until code fixes can be completed.
Identifies malicious software accessing the network
Increases visibility into, or control over, applications accessing the network. Identifies malicious software accessing the network and reduces the vulnerability exposure of your servers.
Optimizes the identification of important security events buried in multiple log entries across the data center. Forwards suspicious events to a SIEM system or centralized logging server for correlation, reporting and archiving. Leverages and enhances open-source software available at OSSEC.
As organizations move to the cloud, they take on shared risk with their cloud partner. For those using Amazon Web Services, Trend Micro Deep Security as a Service provides the most complete set of recommended security capabilities, delivered in AWS with tight integration to make it fast and easy to realize the full benefits of the cloud. Learn more
Location: Boston, Massachusetts
# Employees: 350 primary care physicians, 1150 specialistshttp://www.bidpo.org
CHALLENGE: Secure new SaaS electronic healthcare services for physician network
RESULTS: Increased security and reduced costs for virtualized cloud applications
Industry: Municipal Government
Location: Oulu, Finland
# Employees: 10,000http://www.ouluntietotekniikka.fi
CHALLENGE: Merge infrastructures of four surrounding cities, while reducing costs and complexity
RESULTS: Protection of virtual desktop infrastructure (VDI) that is easy to deploy, administer, and scale
Jussi Tarkkonen talks about merging multiple municipal security infrastructures. [05:13 min]
Location: Columbus, Ohio
# Employees: 12,000+
Industry: Iron and Steel
Location: Istanbul, Turkey
# Employees: 10,000http://www.icdas.com.tr
CHALLENGE: : Secure virtualized data center with a software solution that could use VMware vShield APIs and that would have minimal impact on server performance.
RESULTS: The investment paid off. After ICDAS examined total investment and maintenance costs, it found Deep Security to be 40% more economical.
Industry: State Government/Healthcare
Location: Columbus, Ohio
# Employees: 3,200http://odmrdd.state.oh.us
CHALLENGE: Minimize user complaints by providing thin-client users with a desktop experience equivalent to traditional PCs.
RESULTS: Transparent security, with no user complaintsdue to slowing of applications
Location: Levent-Istanbul Besiktas, Turkey
# Employees: 17,000http://www.yapikredi.com.tr
CHALLENGE: Secure virtual environment, maintain compliance, and maximize consolidation
RESULTS: Excellent performance and consolidation with strict security controls for compliance
Industry: Web site hosting
Location: Scottsdale, Arizona
# Employees: 3,000+http://www.GoDaddy.com
CHALLENGE: Block continually changing threats that could compromise customer data
RESULTS: Improved protection, enhanced visibility, and minimized performance impact
Industry: Retail Food
Location: Greenville, South Carolina
# Employees: 100,000, 800 stores, 35,000 systemshttp://www.ahold.com
CHALLENGE: Maximize point-of-sale protection without impacting critical sales transactions
RESULTS: Data security and integrity, cost savings, and PCI compliance
*Support for Windows 8, 2012 available in 2013
Red Hat 4, 5, 6 (32-bit and 64-bit)
SuSE 10, 11
Ubuntu 10.04, 12.04** LTS (64-bit),
CentOS 5, 6 (32-bit and 64-bit)
Amazon Linux (see the latest Agent release notes for supported versions).
Oracle Linux 5**, 6** (32-bit and 64 bit, Redhat kernel only)
*Anti-Malware support for Linux for on-demand scan. RHEL 5, 6 (64 bit only), SLEX 10, 11 (32 and 64 bit)
**Support for Ubuntu 12.04 LTS, Oracle Linux available in 2013
*Only Integrity Monitoring and Log Inspection modules are available on these UNIX-based platforms.
* Protection via Deep Security Agent only
** Agent-less protection on firewall and DPI only