Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Trend Micro Web Security Data Sheet

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

DATASHEET

Trend MicroTM

WEB SECURITY
Advanced protection against internet threats; featuring cloud app access control,
flexible deployment

The rising sophistication and complexity of web threats, coupled with the new ways your employees work,
have eroded the effectiveness of traditional web security solutions. In addition to blocking malicious code,
inappropriate websites, and targeted attacks, security managers also need to protect an increasingly mobile
workforce who frequently adopts new cloud-based applications.

Trend Micro™ Web Security protects against cyber threats before they reach your users. It uses cross-
generational defense techniques to catch known and unknown threats, giving you visibility and access control
on unsanctioned cloud applications for each of your users. Our unique deployment model provides you with
the flexibility to deploy gateways on-premises, in the cloud, or both—protecting your users no matter where
they are. One cloud-based management console simplifies your workload, letting you set up policy, manage
users, and access reporting across a single pane of glass.

KEY BENEFITS
• Delivers Superior Protection — Any Device, Anywhere: Trend Micro Web Security stops threats directly in the cloud
before they get to your endpoints. Your users will be protected across any device—including desktop and mobile
platforms—at any location, whether on the corporate network or not. It delivers comprehensive real-time protection
against the full scope of web threats by using anti-malware, web reputation, and the strongest advanced threat
protection that includes sandboxing and predictive machine learning. Leveraging the real-time protection provided
by our global Trend Micro™ Smart Protection Network™, this solution even has the capacity to defend against new
emerging threats.

• Cloud Application Access Control: Trend Micro Web Security has the ability to identify more than 30,000 cloud
services in use and executes the granular access policy set up by admin. This powerful capability allows you to
configure access control on unsanctioned cloud apps for different users or user groups within a defined schedule,
boosting your organization’s security and productivity.

To make Trend Micro Web Security even more powerful, cloud service filters block personal account access to
sanctioned apps. For example, employees can only use their corporate account to log on to Dropbox™, but are
prohibited from signing in via their personal account, preventing sensitive data from leaking.

• Flexible Deployment Options to Fit Your Needs: This unique deployment model allows you to choose how you
deploy the product, allowing our customers to choose between on-premises, cloud, or both. Cloud-based deployment
for all users, including on-site, branch offices, and remote/mobile users, eliminates the expense and resource
drain associated with backhauling traffic or managing multiple separate on-premises secure web gateways. Hybrid
deployment allows you to deploy the on-premises virtual appliances for large corporate sites while using cloud
web gateway to secure the activity of your smaller branch offices and mobile users. In addition, pure on-premises
deployment can be adopted for on-site users who prefer it.

• Single, Centralized Management Console: One cloud-based management console allows you to manage and
monitor web use in real time. This single pane of glass lets you to manage centralized and unified policies across both
on-premises and cloud-based deployment instances. Interactive and customizable dashboards and reports give you
complete visibility of web usage and security information.

Page 1 of 2 • DATASHEET • TREND MICROTM WEB SECURITY


KEY FEATURES

Gateway Anti-Malware and HTTPS Decryption

• 
Prevents malware from entering your network, relieving the burden on endpoint security.

• 
Stops virus and spyware downloads, botnets, malware callback attempts, and malware tunneling.

• 
Closes the HTTPS security loophole by decrypting and inspecting encrypted content.

Web Reputation with Correlated Threat Data

• Trend Micro Smart Protection Network web reputation technology blocks access to websites containing malicious activity.

• Protects against new threats and suspicious activity in real time.

• Identifies and blocks botnet and targeted attack command and control (C&C) communications using global and local threat intelligence.

URL Filtering and Categorization

• Uses real-time URL categorization and reputation to identity inappropriate or malicious sites.

• Stops drive-by downloads and blocks access to spyware and phishing-related websites.

Application Visibility and Control

• Monitors and reports on more than 30,000 cloud applications and 1,000 internet protocols and applications, including instant messaging, peer-
to-peer, social networking applications, and streaming media.

• Enables granular policy creation to control all web activity.

• User or user groups, gateways, and schedule-based policy enforcement.

Cloud Sandboxing and Predictive Machine Learning

• Cloud sandboxing provides automatic in-depth simulation and analysis of potentially malicious attachments, including executables and
common office documents, in a secure Trend Micro-hosted sandbox environment.

• Predictive machine learning uses mathematical algorithms to act as an extra layer of scanning to filter unknown files before sending the
suspicious files to the cloud sandbox. It increases efficiency and reduces false positives of cloud sandboxing.

Cloud DLP (Data Loss Prevention)

• Uses more than 240 global data loss prevention templates to safeguard digital assets against accidental or deliberate leakage.

• Integrated with Trend Micro Web Security and hosted by Trend Micro, the cloud DLP can be managed in the unified management console.

COMPARISON TABLE: TREND MICRO WEB SECURITY


CAPABILITY STANDARD ADVANCED
• On-premises proxy, cloud proxy, or both Yes Yes
• Authentication (on-premises AD, Microsoft Azure AD,
® ™
Yes Yes
Okta, ADFS)
• SSL inspection/HTTPS decryption Yes Yes ©2019 by Trend Micro Incorporated. All rights reserved. Trend Micro, and
the Trend Micro t-ball logo, OfficeScan and Trend Micro Control Manager
are trademarks or registered trademarks of Trend Micro Incorporated. All
• Real-time reporting, logging, audit logs Yes Yes other company and/or product names may be trademarks or registered
trademarks of their owners. Information contained in this document is
• Role-based access control No Yes subject to change without notice.

• Syslog for exporting logs No Yes For details about what personal information we collect and why, please see
our Privacy Notice on our website at: https://www.trendmicro.com/privacy
• URL filtering and application control Yes Yes [DS00_Trend_Micro_Web_Security_Datasheet_191119US]

• Anti-malware and web reputation service Yes Yes


• Predictive machine learning (PML) for unknown
No Yes
malware
• Cloud sandboxing for unknown malware after PML No Yes
• Data loss prevention with 240+ global templates No Yes
• Cloud app access control for 30,000 apps No Yes
• Cloud service filters block personal account access to
No Yes
sanctioned apps

Page 2 of 2 • DATASHEET • TREND MICROTM WEB SECURITY

You might also like