Trend Micro Deep Security as a Service - Cloudnexa

Report 10 Downloads 24 Views
datasheet

Trend Micro™

deep security as a service Advanced Security Built for the Cloud

Organizations are embracing the economic and operational benefits of cloud computing, turning to leading cloud providers including Amazon Web Services, Microsoft Azure, VMware vCloud and others. To ensure an end-to-end secure computing environment, cloud providers employ a shared security responsibility model with their customers. While the cloud provider delivers secure facilities and processes, it is up to organizations to protect their cloud workloads, including operating systems, applications, and data. Built on Trend Micro’s industry leading cloud and data center security solution, Trend Micro Deep Security as a Service is designed specifically to complement cloud provider security so that organizations can be fully protected and worry free. The Deep Security service provides a complete suite of security capabilities including firewall, intrusion detection and prevention, anti-malware, integrity monitoring, log inspection, and web reputation. Deep Security as a Service was developed specifically for securing cloud workloads. This highly optimized security offering is cloud based for quick setup and automates and simplifies security operations for cloud instances. Deep Security as a Service is elastic, dynamic and flexible–all characteristics necessary to enable organizations to fully exploit the benefits of cloud computing while remaining protected.

Key Benefits Deep Security as a Service

•• Security and compliance with a broad set of recommended security capabilities for the deployment of AWS instances

•• Fast deployment from the cloud reduces setup time and eliminates hardware

•• Minimal change to deployment with support for leading cloud deployment tools

•• Lowered risk with instances automatically recognized and secured upon their launch

•• Easy management from an integrated console with customizable policy rules and templates

•• Built on proven technology selected by thousands of customers to secure millions of servers

Maximize Operational Cost Reductions

Prevent Data Breaches and Business Disruptions

Achieve Cost-Effective Compliance

•• Avoids setup and hardware costs by hosting

•• Detects and removes malware in real time

•• Addresses major compliance requirements

on leading cloud provider platforms

•• Saves the effort to deploy and manage disparate products with a single suite of security capabilities

•• Reduces administrative workload with automatic recognition of new instances

•• Provides vulnerability protection to prioritize secure coding and cost-effective implementation of unscheduled patching

•• Reduces management costs by automating repetitive and resource intensive security tasks, reducing false positive security alerts, and enabling workflow of security incident response

Page 1 of 4 • datasheet • deep security as a service

with minimal performance impact

•• Blocks malware that attempts to evade detection by uninstalling or otherwise disrupting the security program

•• Reduces exposure to attack by ensuring cloud servers are only communicating with expected systems

•• Shields known and unknown vulnerabilities •• Detects and alerts suspicious or malicious activity to trigger proactive, preventive actions

•• Leverages the web reputation capabilities by controlling server communication at the domain level

for PCI DSS 2.0, as well as HIPAA, NIST, and SAS 70 with one integrated and cost-effective solution

•• Provides detailed, auditable reports that document prevented attacks and policy compliance status

•• Reduces the preparation time and effort required to support audits

•• Supports internal compliance initiatives to increase visibility of internal network activity

•• Leverages proven technology certified to Common Critera EAL4+

key features Anti-Malware

Intrusion Detection and Prevention

Bidirectional Stateful Firewall

•• Optimizes security operations to avoid

•• Protects against known and zero-day

•• Decreases the attack surface of each cloud

antivirus storms commonly seen in full system scans and pattern updates

attacks by shielding known vulnerabilities from unlimited exploits

•• Tamper-proofs security from sophisticated

•• Examines all incoming and outgoing traffic

attacks in virtual environments by isolating malware from anti-malware

for protocol deviations, policy violations, or content that signals an attack

•• Automatically shields newly discovered vulnerabilities from attack with auto-updating security policies

Integrity Monitoring •• Monitors and tracks both authorized and unauthorized changes made to an instance and detects and reports malicious and unexpected changes in real time

web applications and the data they process

•• Defends against SQL injection, cross-site scripting, and other web application vulnerabilities

•• Shields against vulnerabilities until code fixes can be completed

•• Includes out-of-the-box vulnerability protection for all major operating systems and over 100 applications, including database, web, email, and FTP servers

Web Reputation •• Integrates with Trend Micro™ Smart Protection Network™ for web reputation capabilities to reduce the risk of communicating with compromised domain servers

•• Provides increased visibility into, or control over applications accessing the network

Clear Control at Your Fingertips •• Enables policy-driven management and administration •• Customizable dashboard enables users to see the health of their security environment at a glance

•• Customizable policy templates allow users to enable and disable security controls on the fly based on rules they assigned

•• Provides users with immediate notification of events or activities that may require their immediate attention (Logging Alert)

Page 2 of 4 • datasheet • deep security as a service

•• Centrally manages server firewall policy, including templates for common server types

•• Prevents denial-of-service attacks and detects reconnaissance scans

•• Assists compliance (PCI DSS 6.6) to protect

•• Reduces administrative overhead with trusted event tagging that automatically replicates actions for similar events

server by creating a firewall perimeter to block attacks and limit communication to only the ports and protocols necessary

Log Inspection •• Collects and analyzes operating system and application logs for suspicious behavior, security events, and administrative events across your cloud instances

•• Assists compliance (PCI DSS 10.6) to optimize the identification of important security events buried in multiple log entries

•• Forwards events to SIEM system or centralized logging server for correlation, reporting, and archiving

Alerts

cloud Instances

deep security as a service

integrated Dashboard

Reports

Administrator

Deep Security Agent

Deep Security as a Service Helps You Resolve Key Business Issues

Elastic, Seamless and Stress-Free •• Designed to seamlessly integrate with cloud infrastructure security controls, making it fast and easy for users to get up and running in minutes

•• Works seamlessly with industry-leading cloud management tools such as Chef, Puppet, Rightscale and others

•• Enables cloud instances to be immediately secured regardless of the deployment method (Active Protection)

•• The AutoSync feature detects new instances and provides detailed information that can be used to automatically set security policy without administrative intervention

Built for Security in the Cloud Trend Micro Deep Security as a Service is optimized for leading cloud providers’ infrastructures, including support of the most common instance types:

Zero-Day Security Protection against zero-day malware while minimizing operational impact from resource inefficiencies and emergency patching Compliance Achieve and prove compliance to a number of regulatory requirements including PCI DSS 2.0, FIPAA, FISMA/NIST, NERC, SAS 70 and more Integrated Security Consolidate all security point products into one comprehensive platform that optimizes protection across all cloud instances

And compatibility with cloud management tools:

®

Page 3 of 4 • datasheet • deep security as a service

Virtual Patching Shield vulnerabilities before they can be exploited and eliminate the operational pains of emergency patching, frequent patch cycles, and costly system downtime

Supported Platforms

Key Certifications and Alliances

•• •• •• •• ••

•• Common Criteria EAL 4+

Microsoft Windows (32/64 bit) Amazon Linux AMI (32/64 bit) Ubuntu (64 bit) Red Hat® Enterprise 4, 5, 6 (32-bit/64-bit)1 SUSE® Enterprise 10, 11 (32-bit/64-bit)1

•• PCI Suitability Testing for HIPS (Nss Labs)

•• Visualization by VMware •• Microsoft Application Protection Program •• Microsoft Certified Partnership

Deep Security as a Service fits how enterprises use the cloud. Customers can deploy in the cloud with the investment model that is consistent with how they purchase cloud services–paying on-demand with a credit card within the application, or for reserved instance security, via the Trend Micro sales channel.

•• Oracle Partnership •• HP Business Partnership •• Certified Red Hat Ready Certification for CSPs

Flexible Pricing to Meet Cloud Needs Deep Security as a Service provides flexible pricing to reflect how you use the cloud. You can pay only for what you use with a simple per hour rate for securing your cloud instances. There is no minimum fee. Billing is monthly via credit card.

Trend Ready for Cloud Service Providers is a global testing program designed for Cloud Service Providers (CSPs) to prove interoperability with industry-leading cloud security solutions from Trend Micro.

You can also purchase as an annual-per-server subscription. For this and other purchasing options, please contact your Trend Micro sales representative or reseller, or contact us at 1-877-218-7363. Special Pricing for AWS Deep Security as a Service also introduces special pricing for Amazon Web Services that delivers unprecedented value and that reflects how you use AWS. Not only do you pay only for what you use without minimum fees, your costs are based on EC2 instance pricing. With Deep Security as a Service, you only pay for security you use at a rate of 20% of the EC2 price for the instances you are protecting. For example:

•• Securing a Small Instance costs 20% of the current AWS EC2 price (for example, $0.060 per hour) for a cost of $0.012 per hour.

•• Securing an Extra Large Instance costs 20% of the current AWS EC2 price (for example, $0.480 per hour) for a cost of $0.096 per hour. This AWS special pricing requires the use of the Deep Security AWS Connector to detect AWS instance types. Otherwise charges of $0.10 per hour will apply. Pricing is based on Linux, On-Demand Instance price in the US East (N. Virginia) data center. This assures you the lowest cost regardless of what O/S or Region you actually use. As EC2 Pricing changes, your costs will automatically be updated!

Securing Your Journey to the Cloud

©2014 by Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, and Smart Protection Network are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their owners. Information contained in this document is subject to change without notice. [DS02_DSaaS_140508US]

Page 4 of 4 • datasheet • deep security as a service