Download presentation
Presentation is loading. Please wait.
Published bySilvester Justin Lynch Modified over 9 years ago
1
Pre-Release Information Aug 17, 2009 Trend Micro Web Gateway Security InterScan Web Security Virtual Appliance v5 Advanced Reporting and Management v1
2
Copyright 2009 - Trend Micro Inc. 2 What’s NEW! InterScan Web Security Virtual Appliance v5 (IWSVA) Advanced Reporting & Management v1 (ARM) And Better- Trend Micro Web Gateway Security Launch Dates: General Availability:Aug 31 Public Announcement:Aug 31
3
Copyright 2009 - Trend Micro Inc. 3 Problem Our web strategy Our solution What’s new/different Roadmap (analysts)
4
Copyright 2009 - Trend Micro Inc. 4 Problem Every 2 seconds a new malware threat is created 79% of websites hosting malicious code are legitimate – thus compromised by hackers 59% view their organization’s Web gateway security solutions as only somewhat effective, not very effective or not at all effective in protecting against web-borne threats 23% of the average user’s day at work is spent doing something on the Web 45% of the 100 most popular websites support user generated content – Web2.0 –60% infected with malware 42% are prepared to deal with the risks of Web2.0 in order to capitalize on its business benefits (i.e. allow access to social networking sites etc)
5
Copyright 2009 - Trend Micro Inc. 5 Why Trend Micro NOW! URL Filtering is NOT Enough Web Gateway solution choice is now about Security Trend Micro has the best security at the Web Gateway Trend Micro lowers TCO Trend Micro offers more Flexibility
6
Copyright 2009 - Trend Micro Inc. 6 TREND MICRO Web Gateway Security Faster ProtectionReal-time VisibilityConsolidated SecurityLower Total Cost Our Strategy – How We Achieve This
7
Copyright 2009 - Trend Micro Inc. 7 URL Filtering Web Reputation Anti- Malware Scanning Content & Threat Intelligence from the Smart Protection Network Feedback Loop updates Smart Protection Network regarding URLs with known Malware Remediation action triggered to coordinate endpoint Damage Cleanup Services Our Solution – Trend Micro Web Gateway Security Consolidated Security Exposure Layer Protection Infection Layer Protection In the Cloud On Premise HTTP, HTTPS, FTP Advanced Reporting and Centralized Management
8
Copyright 2009 - Trend Micro Inc. 8 Software Virtual Appliance Reduce Costs Increase IT Flexibility Improve Disaster Recovery & Business Continuity Provide operational flexibility Simplify management Optimize IT resources Consolidate and reduce costs Mitigate cost of proprietary hardware Standardize hardware configurations Provide more capacity at lower cost Virtual Appliance Software Appliance IWSVA and ARM Software Virtual Appliance
9
Copyright 2009 - Trend Micro Inc. 9 What’s New in IWSVA v5.0 HTTPS malware scanning –Choose to decrypt specific URL categories for content scanning –Option to white list categories and forego decryption and scanning URL Filtering Enhancements –Custom URL categories- when the existing >80 categories aren’t sufficient –URL and File Type White Lists – simplifies per policy exceptions –SafeSearch support for Google and Yahoo! –Object-level blocking per Page – addresses Web2.0 mashups –Monitor Mode Management Enhancements –User authentication in Transparent Bridge and WCCP Modes –Syslog support- supports SIEM integrations –New system event logging capabilities –New Standard reporting functionality
10
Copyright 2009 - Trend Micro Inc. 10 Advanced Reporting and Management State-of-the-art dynamic dashboard Over 50 pre-defined “Quick” Reports Detailed end-user activity Real-time network monitoring and drill down Real-time troubleshooting Custom reports with iReports Policy management and synchronization for multiple units High-performance off-box reporting solution for central logging, reporting, and policy management Unprecedented visibility into Internet activity as its happening
11
Copyright 2009 - Trend Micro Inc. 11 Dynamic Dashboard – Real-time Traffic Monitoring User customizable dashboard views through Settings One to six dashboard components per dashboard tab Activity Monitoring Filters target specific activities for real-time monitoring Multiple dashboard tabs for easy grouping of monitored activity
12
Copyright 2009 - Trend Micro Inc. 12 Dynamic Dashboard – Real-time User Activity Monitoring Identify user by directory name See what sites and what files are being downloaded See traffic from as recent as 60 seconds ago.
13
Copyright 2009 - Trend Micro Inc. 13 Proof Point Independent corpus of URLs Most effective across URL categories Best overall blocking effectiveness
14
Copyright 2009 - Trend Micro Inc. 14 NEW, Yet to be Published Consistently greater effectiveness!
15
Copyright 2009 - Trend Micro Inc. 15 Competitive Comparison Capability Trend Micro Websense McAfee/ Secure Computing IronPortBlue Coat URL Filtering real-time push update Secure Computing real-time push update Web Reputation category based category based Integrated AV Choose from among 2 OEM vendors Choose from among 5 OEM vendors Feedback Loop limited IM/P2P Control limited limited DLP limited email only
16
Copyright 2009 - Trend Micro Inc. 16 Feedback Loops Community Network What’s Different – Fast, Accurate Protection for the Web Gateway Internet Public-facing Web Servers Gateway Perimeter Customer Network Websense ThreatSeeker Network MFE/Secure Computing TrustedSource Cisco/IronPort SenderBase BlueCoat WebPulse Cloud Service IWSx +ARM URL Category Web Reputation OK Pattern File Updates Web Reputation Email Reputation File Reputation
17
Copyright 2009 - Trend Micro Inc. 17 Why Trend Micro – Our Value Better together security –Average anticipated cost savings from consolidation of vendors in the Web gateway security space is 18% Better protection also means lower costs –Security management costs reduced 40% with cloud-client architecture Lower total costs –3 year license cost of Trend Micro is 50% that of Websense Standardize hardware –Software appliance will be 47% less expensive than proprietary appliance solutions Virtualize security applications –Reduce IT management costs by more than 40%
18
Copyright 2009 - Trend Micro Inc. 18 Thank You!
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.