|  | 
        
          | Trend Micro Deep Security
              
              Trend Micro Deep Security delivers comprehensive, adaptive, highly efficient agentless and agent-based protection, including anti-malware, intrusion detection and prevention, firewall, web application protection, integrity monitoring, and log inspection. Advanced Protection for Physical, Virtual, and  Cloud Servers              
                Accelerate virtualization investmentsMinimize security impactEnsure cost-effective complianceMove safely to the cloud Virtual Appliance/Agentless support pending Vmware vSphere & vSphere Endpoint compatibility READ DATASHEET | WATCH VIDEO | DEVISE A STRATEGY 
 
                
                  What It DoesWhy It's Better!How It WorksOptimize ItWho's Using ItSystem Requirements 
                  
                    The following tightly integrated modules easily expand the platform to ensure server, application, and data security across physical, virtual, and cloud servers, as well as virtual desktops. 
                      
                        Anti-Malware Integrates with VMware environments for agentless protection, or provides an agent to defend physical servers and virtual desktops in local mode Integrates new VMware vShield Endpoint APIs to provide agentless anti-malware protection for VMware virtual machines with zero in-guest footprint. Helps avoid security brown-outs commonly seen in full system scans and pattern updates. Also provides agent-based anti-malware to protect physical servers, Hyper-V and Xen-based virtual servers, public cloud servers as well as virtual desktops in local mode. Coordinates protection with both agentless and agent-based form factors to provide adaptive security to defend virtual servers as they move between the data center and public cloud. 
                      
                        Web Reputation Strengthens protection against web threats for servers and virtual desktops Integrates with the Trend Micro™ Smart Protection Network™ web reputation capabilities to safeguard users and applications by blocking access to malicious urls. Provides same capability in virtual environments in agentless mode through the same virtual appliance that also delivers agentless security technologies for greater security without added footprint. 
                      
                        Integrity Monitoring Detects and reports malicious and unexpected changes to files and systems registry in real time. Now available in agentless form factor Helps achieve timely protection against known and zero-day attacks. Uses vulnerability rules shield a known vulnerability—for example those disclosed monthly by Microsoft—from an unlimited number of exploits. Offers out-of-the-box vulnerability protection for over 100 applications, including database, web, email and FTP servers. Automatically delivers rules that shield newly discovered vulnerabilities within hours, and can be pushed out to thousands of servers in minutes, without a system reboot. 
                      
                        Intrusion Detection and Prevention Shields known vulnerabilities from unlimited exploits until they can be patched Helps achieve timely protection against known and zero-day attacks. Uses vulnerability rules shield a known vulnerability—for example those disclosed monthly by Microsoft—from an unlimited number of exploits. Offers out-of-the-box vulnerability protection for over 100 applications, including database, web, email and FTP servers. Automatically delivers rules that shield newly discovered vulnerabilities within hours, and can be pushed out to thousands of servers in minutes, without a system reboot.
                         Defends against web application vulnerabilities Enables compliance with PCI Requirement 6.6 for the protection of web applications and the data that they process. Defends against SQL injections attacks, cross-site scripting attacks, and other web application vulnerabilities. Shields vulnerabilities until code fixes can be completed. Identifies malicious software accessing the network Increases visibility into, or control over, applications accessing the network. Identifies malicious software accessing the network and reduces the vulnerability exposure of your servers. 
                      
                        Firewall Decreases the attack surface of your physical and virtual servers Centralizes management of server firewall policy using a bi-directional stateful firewall. Supports virtual machine zoning and prevents Denial of Service attacks. Provides broad coverage for all IP-based protocols and frame types as well as fine-grained filtering for ports and IP and MAC addresses. 
                      
                        Log Inspection Provides visibility into important security events buried in log files Optimizes the identification of important security events buried in multiple log entries across the data center. Forwards suspicious events to a SIEM system or centralized logging server for correlation, reporting and archiving. Leverages and enhances open-source software available at OSSEC . 
                    
                      
                        Accelerates Virtualization, VDI and Cloud ROI Provides a lighter, more manageable way to secure VMs to help you make the most out of your virtualization and cloud investments 
                        
                          Strengthens security without additional footprint through agentless integrity monitoring, intrusion prevention, firewall and anti-malwareFrees staff from continually configuring, updating, and patching agentsProtects virtual servers and virtual desktops as they move between data center and public cloud 
                      
                        Lowers Costs Maximizes efficiency to reduce operational costs with lower overhead, fewer staff hours, and higher VM consolidation rates 
                        
                          Allows greater machine consolidation in virtual environments with agentless configuration for anti-malware and other securityEliminates the cost of deploying multiple software clients with a centrally managed, multi-purpose agent or virtual applianceProvides vulnerability protection to prioritize secure coding and cost-effective implementation of unscheduled patchingReduces security management costs by automating repetitive and resource intensive security tasks 
                      
                        Prevents Data Breaches Minimizes business disruptions with advanced protection that enables self-defending servers and virtual desktops 
                        
                          Detects and removes malware from virtual servers in real timeShields known and unknown vulnerabilities in enterprise applications and operating systemsLeverages one of the world's largest domain-reputation databases to protect systems from accessing compromised websitesNEW: Integrity monitoring of the hypervisor via Intel TPM/TXT technology to meet evolving compliance needs 
                        
                          Helps Achieve Compliance Addresses major requirements for standards such as PCI DSS 2.0, HIPAA, NIST, SAS 70, and many others 
                          
                            Provides detailed, auditable reports that document prevented attacks and policy compliance statusReduces the preparation time and effort required to support auditsSupports internal compliance initiatives to increase visibility 
                    
                      Architecture Deep Security is a comprehensive agentless server security platform designed to protect dynamic data centers comprising physical, virtual, and cloud servers as well as virtual desktops. The solution consists of: the Deep Security Virtual Appliance, Deep Security Agent, and Deep Security Manager. 
                      
                        Deep Security Virtual Appliance Transparently enforces security policies on VMware vSphere virtual machines This virtual appliance provides agentless integrity monitoring, anti-malware, IDS/IPS, web application protection, application control, and firewall protection—coordinating with Deep Security Agent, if desired, for log inspection and defense in depth. 
                      
                        Deep Security Agent Deploys protection on a server or virtual machine This small software component is deployed on the server or virtual machine being protected to help enforce security policies. Enables anti-malware, IDS/IPS, web application protection, application control, firewall, integrity monitoring, and log inspection. 
                      
                        Deep Security Manager Allows administrators to create security profiles and apply them to servers 
                        This powerful management system has a centralized console for monitoring alerts and preventive actions taken in response to threats. The Manager can be configured to automate or distribute security updates to servers on demand. It also generates reports to gain visibility into activity and meet compliance requirements. Event Tagging functionality streamlines the management of high-volume events and enables workflow of incident response. 
                      
                        Security Center Provides constant security updates to keep you ahead of the latest threats This dedicated team of security experts rapidly develops and delivers security updates that address newly discovered vulnerabilities. The Security Center manages the customer portal used for accessing these security updates and information. Security updates can be delivered to Deep Security Manager automatically, or on-demand for deployment to thousands of servers within minutes. 
                    Make your virtualization and cloud security work harder for you.Maximize your protection and your return on investment with Technical Account Management Services for Deep Security. Your Technical Account Manager (TAM) is a seasoned security professional who will help you use all the features and functionality of Deep Security in a way that works best for your business. As a single point of contact for your security team, TAMs will have access to the resources that will help you with: 
                      Implementation SupportImplementation is critical to the effectiveness of your Deep Security solution. Your TAM will conduct a series of pre-implementation planning meetings to ensure that Deep Security is optimized for your specific virtualized infrastructure. After the installation, your TAM will continue testing and tuning to help ensure maximum protection.
User TrainingYour TAM will provide tailored training sessions on the Deep Security user interface with particular emphasis on how you can more effectively manage the solution.
Problem ResolutionTo escalate resolution, your TAM will bypass the regular escalation process and provide you with a single point of contact throughout the process. They will engage core support and the software development teams if needed to assist in resolving the problem. Backup TAMs may also assist in providing 24x7 support.
Upgrade AssistanceSimilar to the initial installation, your TAM will continue to work with you to ensure that your Deep Security solution is installed correctly and optimized to your specific infrastructure. If an upgrade is recommended, your TAM will assess your needs and develop a plan to maximize the effectiveness of Deep Security.
 TAM Services maximize the ROI on your investment to protect your virtualized IT environment. Having a TAM on your side enhances your protection, minimizes the time you spend dealing with problems and adds an expert security consultant to your team.   “In my 20+ years in IS, and working with many top companies, this is the first time I have experienced a real partnership. Our TAM works as part of our team. We have a very supportive, very positive relationship for tackling challenges. I’m so impressed with the way that Trend Micro helps us resolve issues in such a professional manner. It’s the best experience I have ever had—working with Trend Micro is what everybody would want to experience as a customer.” —Eric Huguet, Senior Manager, Global High-End Services and Computing, VMware 
                    AHOLD
 Industry: Retail Food
                        
                        Location : Greenville, South Carolina
                        
                        # Employees : 100,000, 800 stores, 35,000 systems
                        
                        www.ahold.com 
                        Challenge: Maximize point-of-sale protection without impacting critical sales transactions Results: Data security and integrity, cost savings, and PCI compliance 
 GODADDY.COM
 Industry: Web site hosting
                        
                        Location : Scottsdale, Arizona
                        
                        # Employees : 3,000+
                        
                        www.GoDaddy.com 
                        Challenge: Block continually changing threats that could compromise customer data Results: Improved protection, enhanced visibility, and minimized performance impact 
 YAPI KREDI
 
                        Challenge: Secure virtual environment, maintain compliance, and maximize consolidation Results: Excellent performance and consolidation with strict security controls for compliance 
 DODD (Ohio Department of Developmental Disabilities)
 Industry: State Government/Healthcare
                        
                        Location : Columbus, Ohio
                        
                        # Employees : 3,200
                        
                        dodd.ohio.gov 
                        Challenge: Minimize user complaints by providing thin-client users with a desktop experience equivalent to traditional PCs. Results: Transparent security, with no user complaintsdue to slowing of applications LOGICSONE
                    Industry
 : IT Services
                    
                    Location : Atlanta, Georgia
                    
                    # Employees : N/A 
                    
                    www.logicsone.com 
                      
                        Challenge: Extend data security into the private and public cloud Results: Increased confidence in cloud services with hosted key management 
 
                      CITY OF OULU
                        Industry: Municipal Government
                        
                        Location : Oulu, Finland
                        
                        # Employees : 10,000 
                        
                        www.ouka.fi 
                        Challenge: Merge infrastructures of four surrounding cities, while reducing costs and complexity Results: Protection of virtual desktop infrastructure (VDI) that is easy to deploy, administer, and scale 
 
                      
                        
                                                      
                            BETH ISRAEL DEACONESSIndustry: Healthcare
 
 Location: Boston, Massachusetts
 
 # Employees: 350 primary care physicians, 1150 specialists
 
 www.bidpo.org
 
                            Challenge: Secure new SaaS electronic healthcare services for physician network Results: Increased security and reduced costs for virtualized cloud applications 
 
                    PlatformsMicrosoft® Windows®
                         
                          Windows 7, 8* (32 & 64 bit)XP (32 & 64 bit)XP embeddedWindows Vista (32 & 64 bit)Windows Server 2003 (32 & 64 bit)Windows Server 2008 R2 (64 bit)Windows 2012* (64 bit) 
                      *Support for Windows 8, 2012 available in 2013
                       Oracle Solaris™ 
                        Trend Micro Deep Security supports Oracle Exadata Database Machine, Oracle Exalogic Elastic Cloud and SPARC Super Cluster via the supported Solaris operating systems.Oracle Solaris 9 and 10, (64-bit Sparc), Solaris 10 and 11, (64-bit x86) 
                      Linux
                       Red Hat 4, 5, 6 (32-bit and 64-bit) SuSE 10, 11 Ubuntu 10.04, 12.04** LTS (64-bit), CentOS 5, 6 (32-bit and 64-bit) Amazon Linux (see the latest Agent release notes for supported versions). Oracle Linux 5**, 6** (32-bit and 64 bit, Redhat kernel only) *Anti-Malware support for Linux for on-demand scan. RHEL 5, 6 (64 bit only), SLEX 10, 11 (32 and 64 bit)**Support for Ubuntu 12.04 LTS, Oracle Linux available in 2013
 Unix*  
                        AIX 5.3, 6.1 on IBM Power SystemsHP-UX 10, 11i v3 (11.31) 
                      *Only Integrity Monitoring and Log Inspection modules are available on these UNIX-based platforms.Virtualization
                       
                        VMware®: VMware ESX/ESXi 3.x*, ESX/ESXi 4.0**, ESX/ESXi/VMware vShield Endpoint 4.1, ESXi 5.0/5.1/vCloud Networking and Security 5.1, View 4.5/5.0/5.1Citrix®: XenServer **Microsoft®: HyperV ** 
                      * Protection via Deep Security Agent only  
** Agent-less protection on firewall and DPI only       |  |  |