Trend Micro Smart Protection Complete, Full, 101 - 250U, MULTI Data Sheet
Advertisement
Advertisement
datasheet
Trend Micro
™
sMart ProtectIon coMPLete
complete user protection provides better, simpler, more flexible security
traditional security solutions can’t keep up with new trends in user behavior. turning to point products to address discrete challenges only serves to increase complexity and may inadvertently leave gaps in your security. Plus, you need to consider how you will secure users as your It philosophy progresses from on-premise to the cloud. to effectively counter today’s evolving threat landscape, you need a tightly woven mesh of security that consolidates your view across all layers of protection and all deployment models.
trend micro ™ Smart Protection complete is an interconnected suite of security that protects your users no matter where they are going or what they are doing. this modern security delivers the best protection at multiple layers: endpoint, application, and network using the broadest range of anti-malware techniques available. Plus, you can evolve your protection along with your business using flexible on-premise, cloud and hybrid deployment models that fit your It environment today and tomorrow. and you can manage users across multiple threat vectors from a single pane of glass, giving you complete visibility of the security of your environment.
multiple layers of interconnected threat protection this comprehensive suite integrates security across protection layers with flexible cloud deployment, simplified licensing, and central management for network-wide visibility and control of threats and data. the following layers of security are included in this suite:
• endpoint Security secure user activity on physical and virtual desktops, laptops, or mobile devices with threat and data protection, application control, vulnerability protection, and encryption.
• mobile Security secure, track, monitor, and manage your employee’s mobile devices and company data with mobile security that balances consumerization with It control.
• email and collaboration Security
Get superior protection against spam, phishing, malware, and targeted attacks at the mail server, gateway, and communications portal,
• Web Security
Protect your users’ web activity on any device in any location. they gain secure access to the latest web and social media applications, and you get complete visibility and control of employee web usage in a cloud-based saas on on-site secure web gateway solution.
• centralized Security management
Manage multiple layers of interconnected threat and data protection for complete, usercentric visibility across the entire threat lifecycle.
ProtectIon PoInts
• endpoints
• smartphones and tablets
• UsB and removable drives
• Mail servers
• File servers
• Messaging gateway
• Web gateway
• collaboration portals
• IM servers threat and data ProtectIon
• endpoint firewall and host intrusion prevention
• Virtual patching for endpoints
• Inappropriate content
• Phishing attacks
• spam and bots
• spyware and rootkits
• Virus and trojan malware
• Web threats
• targeted attacks data Loss PreVentIon
• compliance risks
• data loss
• data theft
Page 1 of 4 • datasheet • Smart Protection SUite comPLete
adVantaGes
Smarter Protection against today’s evolving threats the broadest range of advanced threat protection techniques and protection points secures all user activities, reducing the risk of sensitive information loss.
• Multiple layers of anti-threat techniques prevent everything from traditional attacks to the latest sophisticated threats
• advanced threat protection includes integrated threat sandboxing, command & control detection, application control, behavior monitoring, and host intrusion protection
• comprehensive view of user security lets you analyze data and threats across the whole solution
• Integrated, template-based data loss prevention ensures information is protected at multiple layers
• endpoint and email encryption ensures only authorized eyes have visibility of your information
• application and port control so users can’t send information where it doesn’t belong
• real-time interconnected threat intelligence correlates threat data from our global threat intelligence network
• 24x7 support ensures that when a problem arises, trend Micro is there to resolve it more flexible management and licensing
Ultimate flexibility in deployment models provides seamless support for your ever-changing mix of on-premises and cloud security.
• Flexible deployment lets you move from on-premises to cloud with no need to make changes to your commercial agreement
• Blended licensing for sass and on premises lets you refine the mix without additional costs or increased management complexity
• User-centric visibility and centralized management across saas and on-premises lets you manage cloud and on-premise deployments from a single pane of glass.
Simple management and strong performance
Multiple layers of inter-connected security are managed from a single management console.
• a single view of all threat information delivers comprehensive visibility of user security in a timely and efficient manner
• User-centric visibility across both cloud and on-premises allows you to easily understand how threats are spreading for a particular user across multiple systems
• simplified threat investigation provides visibility across entire threat lifecycle with comprehensive standard and customizable reports
• Fast and easy deployment and configuration means only one solution to install and manage for multiple layers of protection.
• Lightweight and optimized security ensures no impact on device, application or network performance
• optimized performance leverages features such as deferred scanning, file scanning caching and modularization of the agent
KeY BeneFIts
• regain control of your end user It environment by centralizing threat and data protection across security layers
• enable your end users to securely work from the platforms they find most productive
• Protect data with no increase in management or client footprint
• Minimize risks with any mix of real-time, proactive cloud-based security
• reduce management complexity and overall costs
Page 2 of 4 • datasheet • Smart Protection SUite comPLete
KeY FeatUres
centralized User-centric Management centrally manage threat and data policies across multiple layers of your It infrastructure, and streamline security administration, and policy enforcement across your enterprise.
endpoint security
Maximize your endpoint security and performance with cloud-based, proactive threat protection. an expandable plug-in architecture builds all technologies into a single endpoint agent that is deployed and managed from a single console.
• Security for mac endpoints. support consistent security deployment across all endpoints with enterprise-class threat protection for apple
Mac laptops and desktops.
• VDi Security. optimize virtual desktop performance with agent-based virtual desktop security that’s easy to deploy across a range of hypervisors.
• Vulnerability Protection. shield against vulnerabilities in operating systems and client applications with a network-level host Intrusion
Prevention system (hIPs).
• endpoint application control. safeguard your data and machines against unauthorized access and user error and lock down endpoints to prevent unwanted and unknown applications from being executed.
• endpoint encryption. secure data stored on Pcs, laptops, cds, dVds, and UsB drives with full disk, folder, file, and removable media encryption with granular device control, data and key management.
• Hosted endpoint Security. secure Windows, Mac, and android endpoints with enterprise-class hosted protection managed from a secure, centralized, web-based console. Get all the benefits of an on premises solution with no server and no maintenance.
Mobile security
Integrate mobile device management (MdM), mobile security, data protection, and application control—for ios, android, Blackberry, symbian, and Windows Mobile.
email and collaboration security messaging Gateway Security
Protect your email gateway with powerful software or an integrated hybrid solution that combines the privacy and control of an on-premise virtual appliance with the proactive protection of an optional cloud-based pre-filter.
Security for microsoft ® exchange safeguard your mail server with leading antivirus, antispam, and antiphishing protection combined with innovative email and web reputation technologies.
Security for Lotus ™ Domino ™
Implement email security as a native IBM® Lotus domino server application, and block viruses, spam, and other email threats while reducing administration with strong group management, centralized control, and cluster support.
Hosted email Security easily deploy software as a service (saas) email security that delivers continuously updated protection to stop spam and viruses before they reach your network.
Security for microsoft SharePoint secure your collaborations with web reputation technology to block malicious links, and content filtering to scan both the files and web components of sharePoint for malware and other threats.
Security for microsoft Lync safeguard your IM communications by blocking links to malicious sites and applying leading antivirus and antispyware. enable flexible content filtering, ethical walls, and integrated dLP to ensure appropriate IM use and to prevent data theft.
secure Web Gateway secure your users’ web activity with an on premises or cloud-based secure web gateway that features, leading anti-malware, real-time web reputation, provides you with complete visibility and control with granular application control, flexible UrL filtering and comprehensive reporting.
Integrated data Loss Prevention secure data by enforcing dLP policies across multiple layers of security—from endpoint to gateway, across UsB, email and web.
Page 3 of 4 • datasheet • Smart Protection SUite comPLete
trend MIcro sMart ProtectIon coMPLete
Build a solid security foundation across your network for complete end-user protection with broad platform support that provides security for heterogeneous environments and protection for your unique network configuration.
MInIMUM sYsteMs reQUIreMents
Multilayered Protection PlatforM coverage central management control manager endpoint Security
Software: Windows officeScan Software: Windows, Apple Macintosh
Vulnerability Protection endpoint application control endpoint encryption
Worry-Free Business
Security Services mobile Security mobile Security
Software: Windows
Software: Windows
PCs, laptops, CDs, DVDs, and USB
Cloud-based Software as a Service iOS, Android, Blackberry, Symbian, and Windows Mobile advantage
Centrally manages security
Protects physical and virtual
Windows and Macintosh clients
Provides proactive HIPS and virtual patching
Whitelisting and system lockdown
Device control, data, and key management
Protects Windows, Mac, and
Android clients
MDM, data security, mobile security, and application management email and collaboration Security interScan messaging Security
• Software Virtual Appliance:
VMware, Hyper-V, Software
Appliance
• Software: Windows, Linux
Safeguards the email gateway from spam and other email threats
Scanmail Suite for microsoft exchange
Software: Windows
Blocks spam, malware, and other email threats at the mail server
Scanmail Suite for
Lotus Domino
• Software: Windows, Linux for x86,
IBM AIX, IBM i5 OS, Sun
• Solaris ™ , Linux on IBM® zSeries,
IBM z/OS
Blocks spam, malware, and other email threats at the mail server
Hosted email Security
PortalProtect for microsoft SharePoint im Security for microsoft Lync
Secure Web Gateway
Cloud-based SaaS
Software: Windows
Software: Windows
Continuously updated protection stops spam and viruses before the network
Secure your collaborations in
SharePoint
Safeguard IM communications interScan Web Security
• Software Virtual Appliance:
VMware, Hyper-V, Software
Appliance
• Cloud-based SaaS
Safeguards the web gateway from web threats, including URL filtering integrated Data Protection
Data Loss Prevention
Integrated across endpoints, email and collaboration, and secure web gateway
Enforces DLP policies across the enterprise
©2014 by trend Micro, Incorporated. all rights reserved. trend Micro, the trend Micro t-ball logo, officescan and trend Micro control Manager are trademarks or registered trademarks of trend Micro, Incorporated. all other product or company names may be trademarks or registered trademarks of their owners. [ds03_smart_Protection_suite_140618Us]
Page 4 of 4 • datasheet • Smart Protection SUite comPLete

Public link updated
The public link to your chat has been updated.
Advertisement