Shopping Cart

Licensing Partners Program

Spacer
Trend Micro Deep Security 8
Comprehensive Server Security Platform

Deep Security protects enterprise applications and data from breaches and business disruptions without emergency patching. Tightly integrated modules easily expand the platform to ensure server, application, and data security across physical, virtual, and cloud servers, as well as virtual desktops. This comprehensive, centrally managed platform helps you simplify security operations while enabling regulatory compliance and accelerating the ROI of virtualization and cloud projects.


Trend Micro Deep Security 8 Datasheet

Anti-Malware - Integrates with VMware environments for agentless protection, or provides an agent to defend physical servers and virtual desktops in local mode.

Integrates new VMware vShield Endpoint APIs to provide agentless anti-malware protection for VMware virtual machines with zero in-guest footprint. Helps avoid security brown-outs commonly seen in full system scans and pattern updates. Also provides agent-based anti-malware to protect physical servers, Hyper-V and Xen-based virtual servers, public cloud servers as well as virtual desktops in local mode. Coordinates protection with both agentless and agent-based form factors to provide adaptive security to defend virtual servers as they move between the data center and public cloud.

Integrity Monitoring - Detects and reports malicious and unexpected changes to files and systems registry in real time. Now available in agentless form factor.

Detects malicious and unexpected changes. Leverages an agentless configuration to add greater security to virtual machines without additional footprint. Also protects the hypervisor from exploits with the innovative new hypervisor integrity monitoring using Intel TPM/TXT technology. Event tagging and cloud-based whitelisting reduce the complexity of administrative operations. Also includes real-time, on-demand, or scheduled detection of change and provides auditable reports.

Intrusion Detection and Prevention - Shields known vulnerabilities from unlimited exploits until they can be patched.

Helps achieve timely protection against known and zero-day attacks. Uses vulnerability rules shield a known vulnerability-for example those disclosed monthly by Microsoft-from an unlimited number of exploits. Offers out-of-the-box vulnerability protection for over 100 applications, including database, web, email and FTP servers. Automatically delivers rules that shield newly discovered vulnerabilities within hours, and can be pushed out to thousands of servers in minutes, without a system reboot.

Web Application Protection - Defends against web application vulnerabilities.

Enables compliance with PCI Requirement 6.6 for the protection of web applications and the data that they process. Defends against SQL injections attacks, cross-site scripting attacks, and other web application vulnerabilities. Shields vulnerabilities until code fixes can be completed.

Application Control - Identifies malicious software accessing the network

Increases visibility into, or control over, applications accessing the network. Identifies malicious software accessing the network and reduces the vulnerability exposure of your servers.

Firewall - Decreases the attack surface of your physical and virtual servers

Centralizes management of server firewall policy using a bi-directional stateful firewall. Supports virtual machine zoning and prevents Denial of Service attacks. Provides broad coverage for all IP-based protocols and frame types as well as fine-grained filtering for ports and IP and MAC addresses.

Log Inspection - Provides visibility into important security events buried in log files.

Optimizes the identification of important security events buried in multiple log entries across the data center. Forwards suspicious events to a SIEM system or centralized logging server for correlation, reporting and archiving. Leverages and enhances open-source software available at OSSEC.