Skip to content

InterScan Web Security Virtual Appliance

More Options

Deeper visibility for maximum control

Trend Micro™ InterScan™ Web Security Virtual Appliance is a secure web gateway that combines application control with zero-day exploit detection, advanced anti-malware and ransomware scanning, real-time web reputation, and flexible URL filtering to provide superior Internet threat protection.

InterScan Web Security is also available as a cloud-based service offering that extends security to your users beyond your corporate network.

Fits your current IT strategy but can seamlessly evolve

  • Stops threats and ransomware before they affect your network or users
  • Manages staff Internet activity
  • Centralizes control
  • Enables on-the-spot remediation
  • Reduces appliance sprawl and energy costs
  • Provides flexibility with three deployment options

Stops threats before they can affect your network and end-users

InterScan Web Security defends against the evolving web threat landscape. It also provides application visibility and control to help you manage how your employees use the web and cloud-based applications.

The key capabilities of InterScan Web Security include:


  • Safeguards against everything from traditional malware to zero-day attacks, advanced malware, and ransomware

Targeted attack protection

  • Protects against targeted cyber attacks in which an attacker tries to steal specific information from an organization

Web reputation

  • With one of the largest domain-reputation databases in the world, Trend Micro tracks the credibility of web domains and controls access to malicious sites

URL filtering and application control

  • Provides complete control over the types of content users can access

Management and reporting

  • Features intuitive management of all users across all locations in real time, from a single console
  • Monitors web use as it happens, enabling on-the-spot remediation
  • Offers standard and fully customizable reporting, so you can focus on the information that is pertinent to your business

Ransomware Protection

InterScan Web Security Virtual Appliance is part of Trend Micro’s multi-layered approach to block ransomware at the gateway level before reaching your users. It provides:

  • Scanning for zero-day exploits and browser exploits
  • Botnet and command and control (C&C) callback detection to block ransomware botnet and C&C sites
  • Integration with Trend Micro™ Deep Discovery™ for sandbox analysis (optional)
  • Real-time web reputation to determine if a URL is a known delivery vehicle for ransomware

Comprehensive protection against the full scope of web threats

  • Anti-malware and ransomware
  • Advanced threat protection
  • URL filtering
  • Real-time web reputation

Strongest advanced threat protection

  • Zero-day exploit detection
  • Command and control callback detection
  • Optional Deep Discovery integration for on-premises sandbox analysis and adaptive blacklist blocking

Real-time protection powered by the Trend Micro Smart Protection Network infrastructure

The Smart Protection Network is a cloud data-mining infrastructure that rapidly and accurately identifies new threats, delivering global threat intelligence to all Trend Micro products and services.

Easy-to-use, fully integrated data loss prevention

  • Template-based and easy to implement
  • Fully integrated requiring no extra server or management console

Protection for every user–any device, anywhere

  • PCs and mobile devices on the corporate network, branch office, or remote
    Enforces acceptable web use policies on any device so users can take advantage of their devices, the web and cloud-based applications of their choice without sacrificing security
  • Granular application control for a broad range of application categories, including:
    • Instant messaging
    • Peer-to-peer
    • Social networking apps
    • Streaming media

Transparent, clientless authentication, and high performance that doesn’t affect the user experience

  • Processing takes place at the gateway without any impact on the performance of your users’ devices
  • SaaS offering
    • High-performance, high-availability cloud with a global footprint and points of presence close to wherever your users may be, for guaranteed uptime, and near-zero latency, that doesn’t slow down the web experience
  • Comprehensive visibility because you can’t manage what you can’t measure—InterScan Web Security allows you to view all web activity historically and as it happens with standard and custom report creation

Interactive and customizable dashboard that gives you a snapshot of the web use and security information that is most useful to you

  • Full range of customizable, real-time widgets give you an easy-to-understand picture
  • Drill down from the dashboard to further investigate incidents of interest

Choose the procurement and IT management model that best meets your needs

  • On-premises capital purchase where you fully own deployment and ongoing maintenance of the solution as part of your virtual infrastructure
  • SaaS subscription-based model with elastic capacity, where Trend manages the infrastructure, freeing your resources to focus on adding value to your business

Targeted Attacks Need a Network Defense

As a key part of the Trend Micro Network Defense Solution, InterScan Web Security protects against targeted attacks using enhanced web reputation, a new detection engine, and a new threat analysis appliance that uses exploit detection and sandboxing.

The integration of these components creates a custom defense, so that you can detect, analyze, adapt, and respond to highly targeted attacks.

Enhanced Web Reputation

  • Web reputation is powered by the big data analytics and predictive technology of Smart Protection Network™ global threat intelligence
  • Enhanced technology scans and blocks URLs leading to malicious sites

Deep Discovery Analyzer, a component of the Trend Micro Network Defense Solution

  • Provides automatic in-depth simulation and analysis of potentially malicious attachments including executables and common office documents in a secure sandbox environment
  • Allows customers to create and analyze multiple fully custom target images that precisely match their host environments
  • Analyzes logs of Trend Micro products and third-party solutions combined with Trend Micro threat intelligence to provide in-depth insights for risk-based incident assessment, containment and remediation
  • Issues custom security updates for adaptive protection and remediation by other Trend Micro products and other third-party security layers

Choose Security That Fits

  • InterScan Web Security Virtual Appliance – Deployed on-premises, it is fully managed by you and since it is a virtual appliance it supports data center consolidation and standardization
    See the datasheet

  • InterScan Web Security as a Service – A cloud-based software-as-service (SaaS) offering that extends security to users beyond your corporate network, including mobile, branch-office and home-based workers - all without the need to backhaul web traffic, saving you considerable networking expense. 
    • Since it’s a SaaS solution, it is fully managed by Trend Micro in the cloud eliminating the need to purchase, manage, or maintain software or hardware  
      See the datasheet

  InterScan Web Security
Server Platform Compatibility Virtual Appliances:
VMware ESX/ESXi v3.5 and higher; Microsoft Hyper-V Windows 2008 SP1 or Windows 2008 R2; Windows Server 2012 Hyper-V

Software Appliances:
for the latest Certified by Trend Micro platforms, please go to
CPU Minimum:
Single 2.0 GHz Intel™ Core2Duo™ 64-bit processor supporting Intel VT™ or equivalent

  • For up to 4000 users: Dual 2.8 GHz Intel Core2Duo 64-bit processor or equivalent
  • For up to 9500 users: Dual 3.16 GHz Intel QuadCore™ 64-bit processor or equivalent
Memory Minimum:

  • For up to 4000 users: 6GB RAM
  • For up to 9500 users: 24GB RAM
  • For up to 15,000 users: 32GB RAM
Disk Space Minimum:
20GB of disk space

At least 300GB of disk space for 90 days of logs; depends on number of users and log verbosity

(automatically partitions the detected disk space as required)


Administrator Web Browser Requirements

  • Windows XP SP3: Internet Explorer (IE) 8.0 and Firefox 15.0 or higher
  • Windows 7 SP1: IE 8.0, IE 10.0, Google Chrome 22.0 or higher and Firefox 15.0 or higher
  • Red Hat Enterprise Linux 6: Firefox 15.0 or higher


Connect with us on