Skip to content

InterScan Web Security

Pinterest
More Options

Deeper Visibility for Maximum Control

Faced with today's advanced Internet threats and the growing use of cloud-based consumer applications in the workplace, application visibility is essential to understanding network risks. InterScanTM Web Security is a software virtual appliance that combines application control with zero-day exploit detection, advanced anti-malware scanning, real-time web reputation, and flexible URL filtering to provide superior Internet threat protection.

Delivers unparalleled visibility and control

  • Allows deeper visibility into end-user Internet activity
  • Centralizes management for maximum control
  • Monitors web use as it happens
  • Enables on-the-spot remediation
  • Reduces appliance sprawl and energy costs

open all

Superior Threat Protection and Control Over Cloud-based Applications

InterScan Web Security is a software virtual appliance that dynamically protects against the ever-growing flood of advanced threats at the Internet gateway—exclusively designed to secure you against traditional and emerging blended threats at the Internet gateway.

Application control combines with industry leading zero-day exploit detection, anti-malware scanning, real-time web reputation, URL filtering and enhanced anti-botnet detection to protect systems and keep users productive.

  • An optional Data Loss Prevention module with easy-to-use and customizable templates helps you stay in compliance by securing outbound data
  • Centralizes management of distributed web gateways across the WAN
  • Enables granular policy creation to control all web activities and user time spent on the internet

Award-winning Gateway Antivirus and Antispyware

  • Scans inbound and outbound traffic for malware
  • Prevents malware from entering your network, relieving the burden on endpoint security
  • Stops virus and spyware downloads, botnets, malware callback attempts, and malware tunneling
  • Closes the HTTPS security loophole by decrypting and inspecting encrypted content
  • Allows enterprises to selectively decrypt HTTPS traffic to balance content security with user privacy needs

Web Reputation with Correlated Threat Data

  • Trend Micro™ Smart Protection Network™ web reputation technology blocks access to web sites with malicious activity to protect against new threats and suspicious activity in real time
  • Identifies and blocks botnet and target attack Command and Control (C&C) communications using global and local threat intelligence

Advanced Threat Detection (with optional Deep Discovery Advisor)

  • Applies additional threat intelligence when suspicious files are inspected offline using sandbox execution analysis
  • Detonates files in customer-defined sandbox environment(s) and monitors for risky behavior
  • Correlates full forensic analysis with Trend Micro threat intelligence to provide information on the attack and attacker
  • Enables InterScan Web Security to use adaptive security updates to block new Command & Control servers found during analysis
  • Identifies attacks using Smart Protection Network intelligence and dedicated threat research provides continually updated detection intelligence and correlation rules

Powerful URL and Active Code Filtering

  • Leverages real-time URL categorization and reputation to identify inappropriate or malicious sites
  • Offers six different policy actions for web access control, including: monitor, allow, warn, block, block with password override, enforce time quota
  • Supports object-level blocking within dynamic web pages, such as Web 2.0 mashups
  • Stops drive-by downloads and blocks access to spyware and phishing-related websites

open all

Delivers Unparalleled Visibility and Control

InterScan Web Security offers unmatched protection at the Internet gateway and provides the visibility and control required for IT administrators to keep their networks safe and their users productive.

  • Monitors and reports on more than 1,000 Internet protocols and applications, including instant messaging, peer-to-peer, social networking applications, and streaming media
  • Allows users to access cloud-based applications, while enforcing acceptable user policies to mitigate risks and conserve resources
  • Enables granular policy creation to control all web activities and user time spent on the internet

Simplifies Installation and Optimizes Resources

  • Deploys as a virtual appliance or software appliance, supporting datacenter consolidation and standardization
  • Increases utilization rates of existing servers, reducing appliance sprawl and energy costs
  • Improves security levels with quick deployment of new capacity as needed
  • Speeds recovery from unplanned outages with native failover and redundancy functions
  • Simplifies OS and security updates, version control, and testing

Flexible Deployment and Integration

  • Offers multiple network deployment options for scalability, performance, and reliability, including transparent bridge, ICAP, WCCP, forward or reverse proxy
  • Ensures scalability, performance, and reliability without the cost of adding external load balancers
  • Supports LDAP, Active Directory™, Syslog, and SNMP for tighter network integration and lower TCO

Data Loss Prevention Module

Data Loss Prevention Module for InterScan Web Security is an optional component with easy-to-use and customizable templates to help you stay in compliance by securing outbound data. With integrated Data Loss Prevention, you can:

  • Scan outbound traffic for content that includes sensitive corporate data
  • Create and modify policies using predefined templates to better meet regulatory privacy requirements in various countries by filtering personally identifiable information
  • Provide reports on which DLP policies have been violated by certain users
  • Provide auditing functions for administrators to measure the effectiveness of the DLP policies

open all

Targeted Attacks Need a Custom Defense

Part of the Trend Micro™ Custom Defense Solution, Trend Micro web security products provide protection against targeted attacks with enhanced web reputation, a new detection engine, and new threat analysis appliance to block highly targeted attacks by using exploit detection and sandboxing. Integration of these components provides a custom defense that enables you to detect, analyze, adapt and respond to targeted attacks.

Enhanced Web Reputation

  • Web reputation is powered by the big data analytics and predictive technology of Smart Protection Network global threat intelligence
  • Enhanced technology scans and blocks URLs leading to malicious sites
     

Deep Discovery Advisor, a component of the Trend Micro™ Custom Defense Solution

  • Provides automatic in-depth simulation and analysis of potentially malicious attachments including executables and common office documents in a secure sandbox environment
  • Allows customers to create and analyze multiple fully custom target images that precisely match their host environments
  • Analyzes logs of Trend Micro products and third-party solutions combined with Trend Micro threat intelligence to provide in-depth insights for risk-based incident assessment, containment and remediation
  • Issues custom security updates for adaptive protection and remediation by other Trend Micro products and other third-party security layers


Choose Security That Fits

InterScan Web Security can be deployed as a virtual appliance or software appliance.

Virtual Appliance

Virtualized deployments via Hypervisor technologies

  • Microsoft® Hyper-V Virtual Appliance
  • VMware Ready Virtual Appliance: Rigorously tested and validated by VMware, the only messaging gateway solution to achieve VMware Ready validation. Supports VMware ESX or ESXi v3.5 and vSphere.

VMware ReadyCitrix Ready

Software Appliance

Bare metal installation with tuned, security-hardened OS

Certified by Trend Micro
Through extensive testing and validation, Trend Micro certifies platforms for compatibility with Trend Micro software virtual appliance solutions.
See certified server platforms


 

 

  InterScan Web Security
Server Platform Compatibility Virtual Appliances:
VMware ESX/ESXi v3.5 and higher; Microsoft Hyper-V Windows 2008 SP1 or Windows 2008 R2; Windows Server 2012 Hyper-V

Software Appliances:
for the latest Certified by Trend Micro platforms, please go to www.trendmicro.com/go/certified
CPU Minimum:
Single 2.0 GHz Intel™ Core2Duo™ 64-bit processor supporting Intel VT™ or equivalent

Recommended:
  • For up to 4000 users: Dual 2.8 GHz Intel Core2Duo 64-bit processor or equivalent
  • For up to 9500 users: Dual 3.16 GHz Intel QuadCore™ 64-bit processor or equivalent
Memory Minimum:
4GB RAM

Recommended:
  • For up to 4000 users: 6GB RAM
  • For up to 9500 users: 24GB RAM
  • For up to 15,000 users: 32GB RAM
Disk Space Minimum:
20GB of disk space

Recommended:
At least 300GB of disk space for 90 days of logs; depends on number of users and log verbosity

(automatically partitions the detected disk space as required)

 

Administrator Web Browser Requirements

  • Windows XP SP3: Internet Explorer (IE) 8.0 and Firefox 15.0 or higher
  • Windows 7 SP1: IE 8.0, IE 10.0, Google Chrome 22.0 or higher and Firefox 15.0 or higher
  • Red Hat Enterprise Linux 6: Firefox 15.0 or higher

 

Hardware Specifications

The minimum requirements specified provide enough resources to properly evaluate the product under light traffic loads. The recommended requirements specified provide general production sizing guidance. For more detailed sizing information for production environments, search for “sizing guide” in the IWSVA Sizing Guide.


Connect with us on