complete user protection - trend micro...get better protection against today’s evolving threats...

4
COMPLETE USER PROTECTION Better, More Complete Protection for Your Users Get smarter security that goes where your users go Your users are accessing corporate resources in the office, at home, on the road, or anywhere in between. And they are not always working on a corporate network, device, or application. So it’s increasingly challenging to protect them no matter what they are doing or how they are doing it. To further complicate matters, you’re moving to the cloud. But you’re not all there. And you don’t want to be locked into a single approach. At the same time, you want to ensure centralized visibility across all layers of security. Traditional security solutions just aren’t keeping up with your users. Unfortunately, threats ARE. You need more than constant vigilance to hit threats head on. You need a mesh of interconnected security that consolidates your view across all threat vectors. And you need a forward-thinking security vendor that can predict developments before they strike. It’s time to think seriously about complete user protection. SOLUTION BROCHURE

Upload: others

Post on 17-Jun-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: COMPLETE USER PROTECTION - Trend Micro...Get better protection against today’s evolving threats Trend Micro Complete User Protection protects all user activities, reducing the risk

COMPLETE USER PROTECTIONBetter, More Complete Protection for Your Users

Get smarter security that goes where your users goYour users are accessing corporate resources in the office, at home, on the road, or anywhere in between. And they are not always working on a corporate network, device, or application. So it’s increasingly challenging to protect them no matter what they are doing or how they are doing it. To further complicate matters, you’re moving to the cloud. But you’re not all there. And you don’t want to be locked into a single approach. At the same time, you want to ensure centralized visibility across all layers of security.

Traditional security solutions just aren’t keeping up with your users. Unfortunately, threats ARE. You need more than constant vigilance to hit threats head on. You need a mesh of interconnected security that consolidates your view across all threat vectors. And you need a forward-thinking security vendor that can predict developments before they strike. It’s time to think seriously about complete user protection.

SolUTIon BRoChURE

Page 2: COMPLETE USER PROTECTION - Trend Micro...Get better protection against today’s evolving threats Trend Micro Complete User Protection protects all user activities, reducing the risk

Complete User Protection. Strong. Flexible. Easy to manage.

Trend Micro Complete User Protection is an interconnected suite of security capabilities that protect your users no matter where they are going or what they are doing. This modern security delivers the best protection at multiple layers: endpoint, application, and network using the broadest range of anti-malware techniques available. Plus, you can evolve your protection along with your business using flexible on-premise, cloud and hybrid deployment models that fit your IT environment today and tomorrow. And most importantly, you can manage users across multiple threat vectors from a single management console giving you complete visibility of the security of your environment.

Customers & Partners

Employees

ENDPOINT PROTECTION

WEB, EMAIL, AND COLLABORATION SECURITY

Attackers

DEVICE POLICY WEB REPUTATION BROWSER EXPLOIT PROTECTION

BEHAVIOR MONITORING

SANDBOXING

VULNERABILITY PROTECTION

COMMAND & CONTROL BLOCK

THREAT RESPONSE

ENCRYPTION APPLICATION CONTROL

DATA LOSS PREVENTION ANTI-MALWARE

Vulnerability Exploits

Employee Data Leaks

Traditional Malware

Advanced Malware

Targeted Attacks

Trend Micro delivers better protection

Page 3: COMPLETE USER PROTECTION - Trend Micro...Get better protection against today’s evolving threats Trend Micro Complete User Protection protects all user activities, reducing the risk

Get better protection against today’s evolving threats Trend Micro Complete User Protection protects all user activities, reducing the risk of sensitive information loss. You’ll get advanced protection with endpoint security, email and collaboration security, web security, and mobile security. The result is a protective shield that is extremely difficult for cyber criminals to penetrate. Plus, you‘ll be able to better analyze suspicious attacker behavior with access to optional sandboxing capabilities across layers of protection, from endpoint and mobile to mail server and web gateway.

You can trust Trend Micro to deliver the best protection for all of your users:

• Broadest threat protection. You get a full range of integrated protection across gateways, endpoints, mobiles, servers, and applications. All across the network, you get multiple layers of anti-threat capabilities to prevent even the most sophisticated threats.

• Advanced threat protection. In addition to world-class security fueled by global threat intelligence, you’re protected by integrated threat sandboxing, Command & Control detection, application control, behavior monitoring, and host intrusion protection.

• Better protection of your information. Integrated data loss prevention protects your information through instant messaging to the endpoint and web and email gateways. Endpoint and email encryption ensures only authorized eyes see your information. And application and port control prevents users from sending information where it doesn’t belong.

• Comprehensive view of user security. Now you can manage all layers of security from a single management console for comprehensive analysis of data and threats across user protection.

• Real-time interconnected threat intelligence. Take your protection beyond the traditional signature approach to benefit from threat insights from Trend Micro’s threat defense experts and real-time updates from our global threat intelligence network.

Evolve dynamically with the flexibility of cloud, on-premise, or both Trend Micro Complete User Protection ensures maximum flexibility by providing multiple deployment models to best fit your IT strategy. So you no longer need to make a choice between on-premise or cloud. With Trend Micro, you have the flexibility to choose the deployment model that fits you best, including a mix of on-premise and cloud. And you can change the mix at any time without changing your licensing—simply mix and match cloud and on-premise as your business needs change. Then, at any time, you can refine the mix without additional costs. And management is much simpler too. Rather than manage discrete solutions for on-premise and cloud-based security, Trend Micro gives you the flexibility to manage cloud and on-premise deployments from a single management console.

Accomplish more in less time with simplified security management Trend Micro Complete User Protection gives you multiple layers of inter-connected security that are managed from a single management console. You get a single view of all threat information for comprehensive visibility of user security in a timely and efficient manger. Plus, you’ll be able to dive deeper with user-centric management that allows you to easily understand how threats are spreading for a particular user across multiple systems. So you get simplified threat investigation with visibility across the entire threat lifecycle. Not to mention fast and easy deployment and configuration with only one solution to install and manage for multiple layers of protection.

Protect users without impacting user experience Trend Micro Complete User Protection gives you stronger security that’s also lightweight so it won’t impact the user experience, and it supports all of the devices and applications that your users want to use. Global threat intelligence from Trend Micro™ Smart Protection Network™ rapidly and accurately identifies new threats across all layers of security with real time threat updates. Bottom line, you get complete user protection from an industry leader you can trust.

Page 4: COMPLETE USER PROTECTION - Trend Micro...Get better protection against today’s evolving threats Trend Micro Complete User Protection protects all user activities, reducing the risk

Simple, Flexibile Suites Protect You Now and into the Future Trend Micro Smart Protection Suites contain all the Complete User Protection components you need to protect your users and data in today’s dynamic threat environment. And we make it easy by giving you a single user-based license that delivers multiple layers of protection for all of your users’ devices. This streamlines installation and lets you easily deploy protection in the way that best fits your business: on-premise, in the cloud or as a hybrid solution. Things change? need to move something to the cloud or back on premise? no problem. We give you complete flexibility to change the mix of on-premise and cloud components at anytime, without having to buy new licenses.

Smart Protection Suites are available in two options:

Trend Micro Inc.10101 n. De Anza Blvd.Cupertino, CA, 95014, USA

Toll free: +1 800.228.5651Phone: +1 408.257.1500Fax: +1 408.257.2003

©2014 by Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, and Smart Protection Network are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their owners. Information contained in this document is subject to change without notice. [BR01_CompleteUserProtection_140414US]

Smart Protection for Endpoints

Smart Protection Complete

Central Management P P

on-premise, cloud or hybrid deployment P P

24x7 support P P

Integrated Data loss Protection P P

ENDPOINT

Anti-malware P P

Vulnerability Protection P P

Virtual Desktop Integration P P

Mac and Windows Security P P

Server Security P P

Application Control P P

Endpoint Encryption P P

Mobile Security and Management P P

MESSAGING AND COLLABORATION

Messaging Gateway P

Mail Server Security for Microsoft Exchange P

Mail Server Security for IBM Domino P

Instant Messaging Security for Microsoft lync P

Microsoft SharePoint Security P

WEB

Secure Web Gateway P