Menu
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons
  • Home
  • Radar Console
    • About the Radar
    • Go to Radar Console
    • Vulnerability Details
    • Overall Alerts
  • The Product Directory
    • About the Product Directory
  • CND Community
    • Contact Us
    • Blog
    • Packet Headers
    • Other Charts
    • Security Cartoons

Trend Micro Deep Security

Deep Security protects confidential data and critical applications to help prevent data breaches and ensure business continuity, while enabling compliance with important standards and regulations such as PCI, FISMA and HIPAA. Whether implemented as software, virtual appliance, or in a hybrid approach, this solution equips enterprises to identify suspicious activity and behavior, and take proactive or preventive measures to ensure the security of the datacenter. Key Benefits * Protects critical applications and confidential data to help ensure application availability and business continuity * Prevents data breaches that result from attacks targeting software vulnerabilities, including web-based attacks like SQL injection and cross-site scription (XSS) * Enables compliance with important standards and regulations such as PCI, FISMA and HIPAA * Uncovers malicious activity and critical security events buried in system and application logs * Provides detailed, auditable reports that document prevented attacks, include policy compliance status, and facilitate audits * Provides security for virtual and cloud environments by closing security gaps unique to those environments. * Lowers operational costs with timely protection against vulnerability exploits to expedite code prioritization and unscheduled patching * Eliminates the cost of deploying multiple software clients with a centrally managed, multi-purpose software agent or virtual appliance Protection Modules Customize Deep Security to meet your enterprise’s datacenter security strategy with the following modules: * Deep Packet Inspection. Enables Intrusion Detection and Prevention, Web Application Protection and Application Control. * Firewall. Decreases the attack surface of your physical and virtual servers. * Integrity Monitoring. Monitors files, systems and registry for changes. * Log Inspection. Provides visibility into important security events buried in log files.

Rating
0 vote
Favoured:
0

Listing Details

Vendor
TrendMicro
Website
Visit the Product Site
Pricing Model
Commercial
Modified
2022-04-06
Owner
michelemjordan
Created
2010-01-11
  • 1122.png
RecommendReport
  • Web Application FW +
  • Cloud Security Services
  • Static Code Analysis
  • Boundary Guards +
    • - DLP Network
    • - Anti Spam Gateways
    • - Data Diodes
    • - Enterprise Appliance FW
    • - Enterprise Software FW
    • - SOHO Appliance FW
    • - Guards Mail
    • - Guards XML
    • - Guards Web
    • - Guards Net Mgmt
    • - Guards File Transfer
    • - Guards Authentication
    • - DDoS Mitigation
    • - IPS Evasion
    • - IPS Network
    • - Network Taps
    • - Load Balancers
    • - FW Mgmt and Test
    • - Firewall Next Generation
  • Network Anomoly Detection +
  • Scanning Products +
  • Network Access Control
  • Server Security Products +
  • Endpoint Security +
  • Forensic Solutions +
  • Malware Protection +
  • Patch Management +
  • Reputational Intelligence
  • Insider Threat Solutions
  • Phishing Assessment
  • Virtualisation Security
  • SIEM
  • Vulnerability Alert Services
  • Security Training +
  • Security Conferences
  • Password Managers
  • TSCM Bug Sweeping +
  • Geeky Gadgets
  • Visio Stencils
  • Uncategorised

CND Services - Assessing Your Security

  • Risk Assessment
  • Cyber Profile Assessment
  • Cyber Essentials
  • Vulnerability Assessment
  • Web App Scanning
  • Penetration Testing
  • Red Teaming
  • Phishing Assessment
  • Security Compliance
  • Firewall Audit
  • Forensic Readiness
  • vCISO
  • Aviation vCRSM
  • Maritime vCySO

CND Services - Preventing an Attack

  • Superyacht Cyber
  • Secure Cloud Configuration
  • Security Architecture
  • IDS & IPS
  • Blockchain Security
  • Data Loss Prevention
  • System Security Hardening
  • Insider Threat Prevention
  • Cisco Advanced Security
  • Vulnerability Management

CND Services - Detecting an Attack

  • Splunk Services
  • SIEM
  • XDR
  • MDR
  • EDR
  • Building a SOC
  • SOC Maturity
  • Staffing a SOC
  • Cloud Security Monitoring
  • Insider Threat Detection
  • GPG13 Protective Monitoring
  • Cyber Threat Intelligence
  • Branded Radar Console

CND Services - Responding to Incidents

  • Breach Triage
  • Incident Response
  • Incident Support
  • Breach Impact
  • Root Cause Analysis
  • Breach Remediation
  • Risk Assessment
  • Forensic Readiness
  • IR Planning

CND Services - Managed Security

  • Managed SOC
  • Managed Cyber Education
  • Managed Phishing Assessments
  • vCISO
  • Vulnerability Assessments
  • Vulnerability Management
  • XDR
  • MDR
  • EDR
  • Managed SIEM

CND Services - Superyacht Services

  • Complete IMO Cyber
  • Superyacht Intelligence
  • Cyber Assessment
  • Cyber Plan & Policies
  • Cyber Monitoring
  • Cyber Officer CySO
  • Maritime Blog

CND Services - Recruitment

   

© Computer Network Defence Limited 2023

Privacy Notice
Terms & Conditions
Send us a Message