Trend Micro Web Security Data Sheet
Trend Micro Web Security Data Sheet
Trend Micro Web Security Data Sheet
Trend MicroTM
WEB SECURITY
Advanced protection against internet threats; featuring cloud app access control,
flexible deployment
The rising sophistication and complexity of web threats, coupled with the new ways your employees work,
have eroded the effectiveness of traditional web security solutions. In addition to blocking malicious code,
inappropriate websites, and targeted attacks, security managers also need to protect an increasingly mobile
workforce who frequently adopts new cloud-based applications.
Trend Micro™ Web Security protects against cyber threats before they reach your users. It uses cross-
generational defense techniques to catch known and unknown threats, giving you visibility and access control
on unsanctioned cloud applications for each of your users. Our unique deployment model provides you with
the flexibility to deploy gateways on-premises, in the cloud, or both—protecting your users no matter where
they are. One cloud-based management console simplifies your workload, letting you set up policy, manage
users, and access reporting across a single pane of glass.
KEY BENEFITS
• Delivers Superior Protection — Any Device, Anywhere: Trend Micro Web Security stops threats directly in the cloud
before they get to your endpoints. Your users will be protected across any device—including desktop and mobile
platforms—at any location, whether on the corporate network or not. It delivers comprehensive real-time protection
against the full scope of web threats by using anti-malware, web reputation, and the strongest advanced threat
protection that includes sandboxing and predictive machine learning. Leveraging the real-time protection provided
by our global Trend Micro™ Smart Protection Network™, this solution even has the capacity to defend against new
emerging threats.
• Cloud Application Access Control: Trend Micro Web Security has the ability to identify more than 30,000 cloud
services in use and executes the granular access policy set up by admin. This powerful capability allows you to
configure access control on unsanctioned cloud apps for different users or user groups within a defined schedule,
boosting your organization’s security and productivity.
To make Trend Micro Web Security even more powerful, cloud service filters block personal account access to
sanctioned apps. For example, employees can only use their corporate account to log on to Dropbox™, but are
prohibited from signing in via their personal account, preventing sensitive data from leaking.
• Flexible Deployment Options to Fit Your Needs: This unique deployment model allows you to choose how you
deploy the product, allowing our customers to choose between on-premises, cloud, or both. Cloud-based deployment
for all users, including on-site, branch offices, and remote/mobile users, eliminates the expense and resource
drain associated with backhauling traffic or managing multiple separate on-premises secure web gateways. Hybrid
deployment allows you to deploy the on-premises virtual appliances for large corporate sites while using cloud
web gateway to secure the activity of your smaller branch offices and mobile users. In addition, pure on-premises
deployment can be adopted for on-site users who prefer it.
• Single, Centralized Management Console: One cloud-based management console allows you to manage and
monitor web use in real time. This single pane of glass lets you to manage centralized and unified policies across both
on-premises and cloud-based deployment instances. Interactive and customizable dashboards and reports give you
complete visibility of web usage and security information.
•
Prevents malware from entering your network, relieving the burden on endpoint security.
•
Stops virus and spyware downloads, botnets, malware callback attempts, and malware tunneling.
•
Closes the HTTPS security loophole by decrypting and inspecting encrypted content.
• Trend Micro Smart Protection Network web reputation technology blocks access to websites containing malicious activity.
• Identifies and blocks botnet and targeted attack command and control (C&C) communications using global and local threat intelligence.
• Uses real-time URL categorization and reputation to identity inappropriate or malicious sites.
• Stops drive-by downloads and blocks access to spyware and phishing-related websites.
• Monitors and reports on more than 30,000 cloud applications and 1,000 internet protocols and applications, including instant messaging, peer-
to-peer, social networking applications, and streaming media.
• Cloud sandboxing provides automatic in-depth simulation and analysis of potentially malicious attachments, including executables and
common office documents, in a secure Trend Micro-hosted sandbox environment.
• Predictive machine learning uses mathematical algorithms to act as an extra layer of scanning to filter unknown files before sending the
suspicious files to the cloud sandbox. It increases efficiency and reduces false positives of cloud sandboxing.
• Uses more than 240 global data loss prevention templates to safeguard digital assets against accidental or deliberate leakage.
• Integrated with Trend Micro Web Security and hosted by Trend Micro, the cloud DLP can be managed in the unified management console.
• Syslog for exporting logs No Yes For details about what personal information we collect and why, please see
our Privacy Notice on our website at: https://www.trendmicro.com/privacy
• URL filtering and application control Yes Yes [DS00_Trend_Micro_Web_Security_Datasheet_191119US]