Four Million Shipped: Trend Micro Reaches Host Intrusion Defense Milestone
Customers rely on advanced protection for virtualization security initiatives, virtual patching, PCI compliance, and defense-in-depth security strategies.
CUPERTINO, Calif., June 15 /PRNewswire/ -- Since 2005, Trend Micro has been providing advanced, network-level host intrusion detection and prevention (IDS/IPS) capabilities to enterprises, protecting servers, desktops and laptops from attacks that target application and operating system vulnerabilities. Customers include Fortune 1000 and Global 100 organizations in financial services, retail, energy and defense, as well as small to mid-sized companies in a broad range of sectors, such as education, healthcare and governments. The largest deployment is 200,000 hosts.
Trend Micro™ Deep Security provides comprehensive modular protection, in a single solution, to protect a broad range of operating systems and applications. Protection modules include firewall and IDS/IPS, Web application protection, application control, file and system integrity monitoring, log inspection and anti-malware. Protection modules are licensed individually, providing customers with maximum flexibility. As well, the IDS/IPS and firewall modules are available as a plug-in to Trend Micro™ OfficeScan for organizations that want to complement their anti-malware protection for Windows endpoints.
"Because Deep Security has been architected and designed to address the needs of both the IT operations and security teams, it's delivered substantial business value and has had a strong impact in a broad range of customer environments," said Dan Glessner, vice president of enterprise marketing, Trend Micro.
The key applications of Trend Micro Deep Security include:
|
Virtual patching: It shields vulnerabilities in critical systems allowing customers to deploy patches on a more scheduled, planned basis, thereby reducing the costs and frustration associated with patch management. It has also allowed them to deploy IT resources to higher value tasks, and to avoid or delay significant costs associated with patching. |
|
In a joint project with its affiliated medical center, Beth Israel Deaconess Physician Organization (BIDPO) set out to provide a secure, robust, and cost-effective electronic health records (EHR) infrastructure for its 200-300 independent physicians at 173 locations in eastern Massachusetts. |
||
"Deep Security protects our healthcare system by proactively shielding vulnerabilities in Electronic Health Record web applications and operating systems from targeted attacks until patches can be deployed," said Bill Gillis, director of clinical application services and technical director for the Beth Israel Deaconess Medical Center. |
||
|
Defense-in-depth: It complements traditional perimeter security, with quick-to-deploy and easy-to-manage protection for a broad range of operating systems, including Windows, Linux, Solaris and Unix. Organizations that have been unhappy with the features or support of their existing host intrusion defense system have switched to Deep Security, and improved their security operations. |
|
"Lots of tools produce reams and reams of data. Deep Security is different—it actually helps us focus in on the right issues," said Ralph Michaelis, CIO, Carleton University. |
||
|
PCI compliance: For credit card merchants with a distributed environment, such as retail, hotel, restaurant, and hospitals, where the cost and complexity of PCI compliance is too high, Deep Security is a single "universal agent" that addresses multiple PCI requirements, cost-effectively. Deep Security was the first product to pass NSS Labs' PCI Suitability testing for Host Intrusion Prevention Systems (HIPS). NSS Labs verified support for 57 of 58 relevant PCI DSS requirements. Deep Security blocked 100 percent of attacks against the protected Windows server. NSS Labs is a globally recognized leader in independent security and performance testing and certification. |
|
"We chose Trend Micro Deep Security because it helps us address the major PCI compliance requirements with features like file integrity monitoring," said Nick Fields, senior systems administrator, IT, Noodles & Company. |
||
|
Virtualization Security: For enterprises that have deployed VMware, Deep Security provides comprehensive, next-generation, virtual appliance- and guest-based security solutions. Deep Security is tightly integrated with, and leverages, VMware APIs and technologies, and has been architected to fully leverage the VMware platform for delivering better-than-physical security. |
|
"From Nemertes' research we define eight key components of a comprehensive virtualization security solution. Based on an exhaustive evaluation of the market, Trend Micro meets each of these requirements," said Ted Ritter, senior research analyst at Nemertes Research. |
||
Common Criteria
Deep Security is currently being evaluated for the Common Criteria Evaluation Assurance Level 4 augmented (EAL 4+) certification. As well, Deep Security was the first host intrusion prevention system to achieve certification for Evaluation Assurance Level 3 Augmented (EAL 3+) and it has achieved certification across more platforms than any other host-based intrusion prevention product. Common Criteria is an internationally recognized, independent third party evaluation and certification service for measuring the trustworthiness of IT security products and systems.
Trend Micro Deep Security is part of Trend Micro™ Enterprise Security – a tightly integrated offering of content security products, services and solutions which is powered by the Trend Micro Smart Protection Network™. Trend Micro Enterprise Security delivers maximum protection from emerging threats while minimizing the cost and complexity of security management.
For more information on Trend Micro Deep Security, please visit: http://us.trendmicro.com/us/solutions/enterprise/security-solutions/virtualization/deep-security/
About Trend Micro:
Trend Micro Incorporated, a global leader in Internet content security, focuses on securing the exchange of digital information for businesses and consumers. A pioneer and industry vanguard, Trend Micro is advancing integrated threat management technology to protect operational continuity, personal information, and property from malware, spam, data leaks and the newest Web threats. Visit TrendWatch at www.trendmicro.com/go/trendwatch to learn more about the latest threats. Trend Micro's flexible solutions, available in multiple form factors, are supported 24/7 by threat intelligence experts around the globe. Many of these solutions are powered by the Trend Micro™ Smart Protection Network™ infrastructure, a next-generation cloud-client innovation that combines sophisticated cloud-based reputation technology, feedback loops, and the expertise of TrendLabs(SM) researchers to deliver real-time protection from emerging threats. A transnational company, with headquarters in Tokyo, Trend Micro's trusted security solutions are sold through its business partners worldwide. Please visit www.trendmicro.com.
SOURCE Trend Micro Incorporated
Share this article