- Products
- Network Defense
- Advanced Threat Protection & Detection
-
- Deep Discovery Inspector
- Deep Discovery Analyzer & Sandboxing
- Network Analytics and Threat Sharing
|
|
---|---|
Capacity |
|
Supported File Types |
|
Supported Operating Systems |
|
Form Factor |
|
Weight |
31.5 kg (69.45 lbs) |
Dimensions |
Width 48.2cm (18.98”) x Depth 75.58cm (29.75”) x Height 8.73cm (3.44”) |
Management Ports |
10/100/1000 Base-T RJ45 Port x 1 |
Data Ports |
10/100/1000 Base-T RJ45 x 3 |
AC Input Voltage |
100 to 240 VAC |
AC Input Current |
10A to 5A |
Hard Drives |
2 x 4 TB 3.5 inch SATA |
RAID Configuration |
RAID 1 |
Power Supply |
750W Redundant |
Power Consumption (Max.) |
847W (Max.) |
Heat |
2891 BTU/hr (Max.) |
Frequency |
50/60 Hz |
Operating Temp. |
50-95 °F (10 to 35 °C) |
Hardware Warranty |
3 Years |
Deep Discovery Analyzer is a turnkey appliance that uses virtual images of endpoint configurations to analyze and detect targeted attacks. By applying an XGen™ security blend of cross-generational detection techniques at the right place and time, it detects targeted attacks designed to evade standard security solutions.
Organizations are increasingly becoming victims of targeted ransomware when advanced malware gets around traditional security, encrypts data, and demands payment to release the data. Deep Discovery Analyzer uses known and unknown patterns and reputation analysis to detect the latest ransomware attacks, including WannaCry. The customized sandbox detects mass file modifications, encryption behavior, and modifications to backup and restore processes.
Many organizations have invested lots of money to deploy security solutions such as next-gen firewalls, IPS, endpoint security, and security gateways. Unfortunately, targeted attacks are designed to bypass these solutions. Deep Discovery Analyzer bridges solutions that provide security for known threats with protection from unknown threats and shares threat information back to these solutions.
The appliance extends the value of existing security and speeds up the time to detect and remediate targeted attacks. Incident response time is reduced and costs of remediation are lowered.
"Trend Micro Connected Threat Defense helps GHS to proactively protect against sophisticated attacks."...more
Chris Schmidt,
Manager of Information Security,
Greenville Health System
success story