Trend Micro Deep Security Acceleration Kit
Simplifies security operations while accelerating
the ROI of virtualization.
Trend Micro Deep Security is designed for virtual environments. Its agentless architecture provides comprehensive protection from advanced threats, simplifies operational complexity, improves business continuity and allows organizations to accelerate virtualization and cloud adoption. Developed in close collaboration with VMware, Deep Security offers support for VMware vSphere 5.1 and VMware vShield Endpoint 5.1. Deep Security also provides full backward compatibility with vSphere 4.1 and 5.0 environments.
Zones is your trusted provider of Trend Micro and other security solutions. To place an order or for more information, contact your Zones account manager or call 800.408.9663
Deep Security Acceleration Kits
You get everything you need to deploy virtualization security quickly — including expert remote deployment services to get you off to the right start:
Anti-malware
- Integrates with VMware vShield Endpoint APIs to protect VMware virtual machines against viruses, spyware, Trojans and other malware, with zero in-guest footprint
- Delivers an anti-malware agent to extend protection to other hypervisors as well as to physical and cloud servers
- Improves performance through ESX level caching and deduplication
- Optimizes security operations to avoid performance degradation (antivirus storms) commonly seen in full system scans and pattern updates
Web reputation
- Integrates with the Trend Micro Smart Protection Network for web-reputation capabilities that block access to compromised websites to strengthen protection for servers and virtual desktops
- Provides agentless web reputation on the same virtual appliance as agentless anti-malware and intrusion prevention, for greater virtual server security without added footprint
Intrusion prevention and firewall
- Protects against known and zero-day attacks by virtually patching (shielding) known vulnerabilities
- Examines all incoming and outgoing traffic for protocol deviations, policy violations, or content that signals an attack
- Automatically shields newly discovered vulnerabilities within hours, pushing protection to thousands of servers in minutes without a system reboot
- Assists compliance (PCI DSS 6.6) to protect web applications and the data they process
- Defends against SQL injection, cross-site scripting, and other web application vulnerabilities.
Integrity monitoring
- Monitors critical operating system and application files, such as directories, registry keys, and values, to detect and report malicious and unexpected changes in real time
- Employs Intel TPM/TXT technology to perform hypervisor integrity monitoring. Monitors for any unauthorized changes to the hypervisor, thereby extending security and compliance of virtualized systems to the hypervisor.
- Reduces administrative overhead with trusted event tagging that automatically replicates actions for similar events across the entire data center