Skip to content

Security optimized for VMware virtual environments

Pinterest
More Options

The ideal security for your VMware Infrastructure

VMware

Trend Micro works closely with VMware to provide comprehensive security across your entire VMware infrastructure. With Trend Micro™ Deep Security™, you can automatically secure workloads from the moment they are provisioned, reduce administrative effort with policies that are applied consistently across environments, and manage all security controls through a central dashboard. Our automated security solutions are optimized to minimize the impact on your CPUs, network, and storage.

Securing VMware vSphere

Virtualization through VMware vSphere can help your organization achieve significant savings in data center hardware costs, operational expenditures, and energy demands while achieving improvements in quality of service and business agility. As data centers continue to transition from physical to virtual and now increasingly to cloud environments, traditional security can slow down provisioning, cause performance lag, and become difficult to manage. As you scale your virtual environment, evolving your approach to security can reduce time, effort, and impact on CPU, network, and storage.

 

Trend Micro Deep Security with VMware vSphere delivers:

  • Anti-malware protection via hypervisor level agentless deployment.
  • Comprehensive security via a combined agentless and agent-based deployment mode.
  • Improved performance and VM densities while reducing administrative effort.
  • Complete set of security capabilities to protect sensitive applications and data.


Securing VMware NSX

The NSX platform represents VMware’s latest step forward to securing the modern data center. The combination of NSX and Trend Micro Deep Security, which was the first offering on the market to deliver both file and network-based security controls for NSX, furthers the automation of security while increasing protection for your virtual environment.

The software-defined data center with NSX micro-segmentation solves some of the most critical challenges of perimeter security. Deep Security extends the benefits of micro-segmentation with security policies and capabilities that automatically follow VMs no matter where they go. This approach results in the complete independence of a VM’s security posture, giving you the flexibility to run workloads with sensitive data next to workloads with no sensitive information. You no longer have to worry about threats moving laterally through the data center.

 

vmWare-nsx

Trend Micro Deep Security and VMware NSX enable you to:

  • Greatly enhance your security posture through micro-segmentation.
  • Simplify deployment and provisioning of security via agentless deployment.
  • Automate work flow across protection layers.

  • Provide elastic protection and scalability.


Security management with VMware vRealize

VMware and Trend Micro have partnered to deliver the first security and operations management solution designed for virtualized environments. The Trend Micro Deep Security for vRealize Operations Management allows the operations team to see the security status, security-related events, and overall health of the virtual data center from a single view. So the operations team can correlate system activity with security activity and address problems in the virtual data center holistically.

 

Trend Micro Deep Security with VMware vRealize Operations delivers:

  • A real-time unified dashboard that allows the operations team to correlate IT and security incidents in their environment and be more effective in responding to these events
  • Correlation between security incidents and virtual machine operations that can save hours or days of debugging and prevent costly downtime of decommissioned VMs.
  • A quick visual representation, through a heat map, that shows which computers have had security events triggered.


Securing VMware Horizon VDI

Trend Micro Deep Security offers comprehensive, VDI-centric security for virtualized computers that can help improve the security and performance of your VMware Horizon VDI environment. In the process, you’ll maximize consolidation ratios with security solutions designed specifically to handle the rigors of desktop virtualization. Results like these have helped make Trend Micro the leading provider of virtualization security.

Whether you are extending your virtualization successes from servers to desktops or looking for a unified approach for all your physical and virtual desktops, Trend Micro can help you maximize protection and performance.

 

Trend Micro Deep Security with VMware Horizon VDI delivers:

  • Agentless technology to optimize performance and increase VM densities.
  • Vulnerability shielding (“virtual patching”), to address known patch management issues and protect against zero-day attacks.
  • Network-level vulnerability shields to plug software holes.


Securing VMware vCloud

As security in the cloud is a shared responsibility, VMware delivers the secure underlying infrastructure for VMware vCloud, while you are responsible for protecting your applications and data, meeting compliance regulations, and ensuring business continuity. Trend Micro Deep Security lets vCloud users fulfill their shared security responsibilities by easily extending on-premises security to cloud workloads.

 

Trend Micro Deep Security interoperability with VMware vCloud Director

  • Enables administrators to automatically detect virtual machines (VMs).
  • Allows you to apply context-based security policies.
  • Ensures consistent security across the data center and into the cloud.


Comprehensive Security for VMware

The tight partnership between Trend Micro and VMware, the recognized leaders in virtualization, means that Trend Micro can provide you with a comprehensive range of security across all VMware environments. Trend Micro Deep Security for physical, virtual, cloud, and hybrid cloud environments has proven its ability to improve security, manageability, and VM density.

 

Advanced layered security capabilities include:

  • Anti-malware with web reputation. Get timely protection against the constant malware attacks on your systems and data.
  • Intrusion detection and prevention. Shield unpatched vulnerabilities like Shellshock and Heartbleed from attack with security policies that update automatically.
  • Advanced host firewall. Create a firewall perimeter around each server to block attacks and limit communication to only the ports and protocols necessary.
  • Application control. Provide organizations with increased visibility into applications running on a system to detect and block unauthorized software.
  • Integrity monitoring. Ensure unauthorized or out-of-policy changes—across files, ports, registries, and more—are detected and reported.
  • Log inspection. Use the centralized security console to identify important security events buried in multiple log entries.



Connect with us on