Page 1 of 4 • DATASHEET • SMART PROTECTION COMPLETEDATASHEET
Traditional security solutions can’t keep up with today’s threats. Turning to multiple
point products to address the myriad of challenges only increases complexity,
slows your users, and may leave gaps in your security. To further complicate
matters, you’re moving to the cloud and need flexible security deployment options
that will adapt as your needs change. You need multidimensional security that
consolidates your view across all layers of protection and all deployment models.
Trend Micro™ Smart Protection Complete is a connected suite of security capabilities that protects
your users no matter where they go or what they do. This modern security delivers the best
protection at multiple layers: endpoint, application, and network, which work together to stop threats
across your organization. Core to the suite is XGen
™
endpoint security that infuses high-fidelity
machine learning into a blend of threat protection techniques to eliminate security gaps across
any user activity. Plus, you can evolve your protection along with your business using flexible on-
premises, cloud, and hybrid deployment models that fit your IT environment today and tomorrow.
Administrative overhead is minimized with central management across multiple threat vectors from
a single “pane of glass,” giving you complete visibility of the security of your environment.
Multiple layers of connected threat protection
This comprehensive suite integrates security across protection layers with flexible cloud
deployment, simplified licensing, and central management for network-wide visibility and control
of threats and data. The following layers of security are included in this suite:
••ENDPOINT SECURITY. XGen
™
endpoint security synthesizes machine learning with other
techniques for maximum protection. Secure user activity on physical and virtual desktops,
laptops, or mobile devices with threat and data protection, application control, vulnerability
protection, and encryption.
••MOBILE SECURITY. Secure, track, monitor, and manage your employees’ mobile devices and
company data with mobile security that balances consumerization with IT control.
••EMAIL AND COLLABORATION SECURITY . Get superior protection against spam, phishing,
malware, and targeted attacks at the mail server, gateway, and for cloud-based applications
like Office 365.
••WEB SECURITY. Protect your users’ web activity on any device in any location. They gain
secure
access to the latest web and social media applications, and you get complete visibility and
control
of employee web usage in a cloud-based SaaS or on-site secure web gateway solution.
••CENTRALIZED SECURITY MANAGEMENT . Manage multiple layers of connected threat and
data protection for complete, user-centric visibility across the entire threat life cycle.
Protection Points
••
Endpoints
••Smartphones and tablets
••USB and removable drives
••Mail servers
••File servers
••Messaging gateway
••Web gateway
••Collaboration portals
••IM servers
••Cloud email and file sharing
Threat and Data Protection
••
Ransomware
••Unknown malware
••Targeted attacks
••Endpoint firewall and
host intrusion prevention
••Vulnerability shielding
••Application control
••Inappropriate content
••Phishing attacks
••Spam and bots
••Spyware and rootkits
••Virus and Trojan malware
••Web threats
Data Protection and Compliance
••
Compliance risks
••Lost devices
••Accidental data loss
••Data theft
Key Benefits
••
Regain control of your end-user IT
environment by centralizing threat and
data protection across security layers
••Stops ransomware from encrypting
your endpoints
••Block zero-day malware with
signature-less techniques
••Enable your users to securely
work from the platforms they
find most productive
••Protect data with no increase in
management or client footprint
••Minimize risks with any mix of real-
time, proactive cloud-based security
••Reduce management complexity
and overall costs
Trend Micro
™
SMART PROTECTION COMPLETE
Maximum Trend Micro
™
XGen
™
endpoint security from your proven security partner
Page 2 of 4 • DATASHEET • SMART PROTECTION COMPLETE
ADVANTAGES
Maximum Protection
XGen
™
endpoint security
Infuses high-fidelity machine learning with other detection techniques for the broadest protection against ransomware and advanced attacks
Web and File Reputation
Exploit Prevention
Application Control
Variant Protection
Pre-execution Machine Learning
Behavioral Analysis
Runtime Machine Learning
Safe files
allowed Malicious
files blocked
Known
Good Data
Known
Bad Data
Unknown
Data
Noise
Cancellation
LEGEND
••Progressively filters out threats using the most efficient technique for maximum detection without false positives.
••Blends signature-less techniques including machine learning, behavioral analysis, variant protection, census check, application control, exploit
prevention, and good-file check with other techniques like file reputation, web reputation, and command and control (C&C) blocking.
••High-fidelity machine learning uses both pre-execution and run-time analysis, unlike other machine learning vendors who only use one technique.
••Deploys noise cancellation techniques like census and whitelist checking at each layer to reduce false positives.
••Leverages Trend Micro’s 11 years of experience using machine learning in spam filtering and website analysis.
Data Protection
••
Safeguards data with full disk, file, and folder encryption to keep data private.
••Device control to prevent information from moving to where it doesn’t belong, such as USB memory sticks or cloud storage.
••Mobile security secures your employees’ mobile devices and company data with mobile device management (MDM) and data protection.
••Integrated, template-based Data Loss Prevention (DLP) to protect sensitive data across endpoint, web, email, and SaaS apps.
Email and Web Protection
••
Consistently top rated email security stops targeted email attacks, spam, phishing, ransomware, and unknown malware from impacting your business.
••Stops threats before they reach users with advanced detection techniques including document exploit detection and sandbox malware analysis.
••Security for the email server, gateway, collaboration portal, instant messaging, and cloud-based applications such as Office 365.
••Secure web gateway protects users from web-borne threats and provides granular control and visibility of web usage.
Connect Threat Defense
••
Instantly share information on suspicious network activity and files with other security layers to stop subsequent attacks.
••Reduce time to protect against emerging and targeted attacks.
Page 3 of 4 • DATASHEET • SMART PROTECTION COMPLETE
Minimum Impact
Data Protection
High performance and accurate detection:
••
Lightweight and optimized security uses the right detection technique at the right time to ensure minimal impact on devices and network.
••Multiple methods and checks against false positives reduce IT help desk calls.
Central management and visibility:
••
Comprehensive central view of user security lets you quickly and efficiently analyze data and threats across the whole solution.
••User-centric visibility across both cloud and on-premises allows you to easily understand how threats are affecting a particular user across multiple systems.
••Automatic sharing of threat intelligence across security layers enables protection from emerging threats across the whole organization.
••Customizable dashboards to fit different administration responsibilities.
Flexible management and licensing:
••
Flexibility to deploy endpoint security the way that best supports your changing business models—on-premises, in the cloud.
••Mix and match cloud or on-premises products without a change to the commercial agreement.
Outstanding support
••
24×7 support means that if a problem arises, Trend Micro is there to resolve it quickly.
Proven Security Partner
Trend Micro has a history of constantly innovating to provide the most effective and efficient security technologies.
We are always looking ahead to develop the technology needed to fight tomorrow’s ever changing threats.
••Over 25 years of security innovation
••Protects over 155 million endpoints
••Trusted by 45 of the top 50 global corporations
••A Leader since 2002 in the Gartner Magic Quadrant for Endpoint Protection Platforms and placed furthest to the right
in “Completeness of Vision” for 2016
Page 4 of 4 • DATASHEET • SMART PROTECTION COMPLETE
TREND MICRO SMART PROTECTION COMPLETE
Build a solid security foundation across your network for complete end-user protection with broad platform support that provides security for
heterogeneous environments and protection for your unique network configuration.
SUITE COMPONENTS
MULTILAYERED PROTECTION PL ATFORM COVERAGE ADVANTAGE
Central Management
Control Manager Software: Windows Centrally manages security
Endpoint Security
OfficeScan
Software: Windows,
Apple Macintosh
Proactive threat protection infused with machine learning for physical and virtual Windows clients.
An expandable plug-in architecture that is deployed and managed from a single console.
Vulnerability Protection Software: Windows
Shield against vulnerabilities in operating systems and client applications with a network-level Host
Intrusion Prevention System (HIPS).
Endpoint Application Control Software: Windows
Safeguard your data and machines against unauthorized access and user error, and lock down
endpoints to prevent unwanted and unknown applications from being executed. Dynamic
whitelisting and system lockdown.
Endpoint Encryption
PCs, laptops, CDs, DVDs,
and USB
Secure data stored on PCs, laptops, CDs, DVDs, and USB drives with full disk, folder, file, and
removable media encryption with multi-OS key management and policies.
Worry-Free Services Cloud-based SaaS Proactive SaaS managed threat protection for Windows, Mac, and Android clients.
Server Protect Windows/Netware, Linux Keeps malware out of file servers.
Mobile Security
Mobile Security
iOS, Android, Blackberry,
Symbian, and Windows Mobile
Mobile Device Management (MDM), data security, mobile antimalware and web security,
and application management.
Email and Collaboration Security
Hosted Email Security
Cloud-based SaaS: protects
email traffic to cloud or
on-premises email systems
Continuously updated protection stops spam and viruses before the network.
Cloud App Security
Cloud-based SaaS: Office 365
email, SharePoint Online,
Box for Business, Dropbox for
Business, Google Drive
Strengthens Office 365 security with sandbox malware analysis and data loss prevention.
Protects file sharing from malware and compliance risks.
InterScan Messaging Security
• Software Virtual Appliance:
VMware, Hyper-V, Software
Appliance
• Software: Windows, Linux
Safeguards the email gateway from spam and other email threats.
ScanMail Suite for
Microsoft Exchange
Software: Windows Blocks spam, malware, and other email threats at the mail server.
ScanMail Suite for IBM Domino
• Software: Windows, Linux for
x86, IBM AIX, IBM i5 OS, Sun
• Solaris
™
, Linux on IBM
®
zSeries, IBM z/OS
Blocks spam, malware, and other email threats at the mail server.
PortalProtect for
Microsoft SharePoint
Software: Windows on
SharePoint server
Secure your collaborations in SharePoint against malware, web threats, and compliance risks.
IM Security for Microsoft Lync
Software: Windows on Lync
server
Safeguard IM communications against malware, web threats, and compliance risks.
Secure Web Gateway
InterScan Web Security
• Software Virtual Appliance:
VMware, Hyper-V, Software
Appliance
• Cloud-based SaaS
Secure your users’ web activity. Features leading anti-malware and real-time web reputation.
Provides complete visibility and control with granular application control, flexible URL filtering, and
comprehensive reporting.
Integrated Data Protection
Data Loss Prevention
Integrated across endpoints,
email and collaboration, and
secure web gateway
Enforces DLP policies across the enterprise using simple and customizable templates.
©2016 by Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro
t-ball logo, Control Manager, InterScan, OfficeScan, ServerProtect, ScanMail, and
TrendLabs are trademarks or registered trademarks of Trend Micro Incorporated. All
other company and/or product names may be trademarks or registered trademarks of
their owners. Information contained in this document is subject to change without notice.
[DS07_Smart_Protection_Complete_161016US] trendmicro.com
SMART PROTECTION COMPLETE
RNW LIZ 24M – 0251 – 0500 USER
Επιπλέον πληροφορίες
Βάρος | 0,00 κ. |
---|---|
Μάρκα |