You are on page 1of 3

datasheet

Trend Micro™

Enterprise Security for Endpoints


Protect your desktops, laptops, and file servers
Protecting enterprise endpoints is more complex than ever. Employees are using desktops Protection Points
and laptops, both PCs and Macs, in the office and remotely. In many cases, companies are • Windows PCs
also running file servers on a variety of operating systems. So how do you protect your • Macintosh computers
end users against threats, while setting them free to work without limits? The answer: an
• Microsoft servers
endpoint security suite that supports endpoint flexibility while maintaining security and
control, letting you unlock opportunity in your business. • Novell NetWare servers
• Linux file, web, and application servers
Trend Micro™ Enterprise Security for Endpoints secures your endpoints, both on
and off the network with award-winning anti-malware, host intrusion prevention (HIPs), Threat and Data Protection
and malicious website protection. This comprehensive endpoint security is powered • Viruses and trojans
by Trend Micro™ Smart Protection Network™ cloud-based security delivering global • Spyware and rootkits
threat intelligence and faster performance. It also offers the flexibility to customize your
• Web threats
endpoint protection with add-on options for desktop virtualization, data protection, and
mobile device security. Regardless of how you deploy this endpoint security for your • Hackers and intruders
business, unified management helps you lower management costs and deliver the • Compliance risks
industry’s best protection from today’s evolving threats.

Protect your endpoints on and off the network with security that unleashes the power
and performance of your desktops, laptops, and servers.

Endpoint/Client Protection Centralized Management


• OfficeScan™ Endpoint Security • Trend Micro Control Manager™
• Security for Mac plug-in Enterprise Data Protection (optional)
• Virtual Desktop Infrastructure
(VDI) plug-in • Trend Micro™ Integrated Data Loss
Prevention (DLP)
• Vulnerability Protection
• Trend Micro™ Mobile Security
File Server Protection • Trend Micro™ Endpoint Encryption
• OfficeScan Endpoint Security • Trend Micro™ Email Encryption Gateway
• ServerProtect™ for Microsoft®
Windows™/Novell™ NetWare®
• ServerProtect for Linux™

ADVANTAGES
Smart Simple Security That Fits
Lower your risks with proactive threat Get the most out of your IT staff and Streamline administration by enforcing
protection infrastructure. According to Osterman threat protection policies from a single
• Block malware to prevent network Research, cloud-client endpoint security console
downtime, lost productivity, and enables you to: • Centralize policy management across
compliance violations • Lower endpoint infection rates by 53 endpoint security and other Trend
• Provide immediate protection with percent Micro security products
Trend Micro Smart Protection Network • Slash IT security management costs • Coordinate threat and data protection
in-the-cloud threat intelligence for by 41 percent polices with optional Enterprise Data
web and file reputation • Extend PC lifecycle with endpoint Protection plus gateway messaging
• Secure your desktops, laptops, and performance rated up to 50 percent and mail server solutions
servers with a complete endpoint better by Indusface • Gain enterprise-wide visibility into
security suite • Minimize the drain on endpoint threat protection for effective
• Protect sensitive data everywhere resources by moving pattern files to security against targeted attacks and
it goes by adding Enterprise Data the cloud and off the endpoint data loss
Protection

Page 1 of 3 • datasheet • enterprise security FOR ENDPOINTS


TREND MICRO ENTERPRISE SECURITY FOR ENDPOINTS
Protect your workforce on a variety of devices on and off the network.

FILE SERVERS
• OfficeScan Endpoint Security KEY BENEFITS
CENTRALIZED • ServerProtect for Microsoft • Provides immediate protection for
MANAGEMENT Windows/ Novell Netware
endpoints, on or off the network
• Control Manager • ServerProtect for Linux
• Blocks malicious files and websites,
and automatically removes malware
• Reduces the impact on the
endpoints’ performance and
resources
• Allows you to add new security
capabilities with plug-in modules,
removing the need to redeploy a full
solution
• Reduces management complexity
GATEWAY and overall costs
CLIENTS
• InterScan Messaging Security • OfficeScan Endpoint Security • Defends against data loss and
• InterScan Web Security • Security for Mac plug-in reputation damage with optional
• Virtual Desktop DLP, encryption, and mobile security
Infrastructure (VDI) plug-in
MAIL SERVERS • Vulnerability Protection
• ScanMail Suite for Microsoft Exchange
• ScanMail Suite for Lotus Domino

KEY FEATURES

Endpoints and Clients


OfficeScan™ Endpoint Security
File Servers
OfficeScan Endpoint Security

Maximize your endpoint security and Secure your Windows servers as part With Trend Micro
performance with cloud-based, proactive of a comprehensive endpoint security Enterprise Security for
threat protection. An expandable framework by consolidating your Endpoints, we have a good
modular, plug-in architecture builds all endpoints under a unified infrastructure.
technologies into a single endpoint agent handle on our network
that is deployed and managed from a ServerProtect™ for Microsoft® and we have the efficiency
single console including: Windows/Novell NetWare® of single endpoint security
Get real-time protection for Microsoft solution...Trend Micro
Security for Mac Plug-in for OfficeScan Windows and Novell NetWare web servers
Achieve a consistent security deployment and file servers, preventing them from Enterprise Security is
and policy across all endpoints, spreading viruses, spyware, and other an important step we
regardless of form factor or operating web threats. take to minimize the
system with enterprise-class threat risk to our customers
protection for Apple Mac laptops and ServerProtect™ for Linux™
desktops. Flashback, MacDefender, and Simplify and automate security and our own reputation,
phishing attacks have shown the need for operations for Linux servers, detecting and also supports our
effective, adaptive protection for Macs. malware in real time with cleanup PCI compliance efforts
capabilities to remove malicious code and by building in a layer of
VDI Plug-in for OfficeScan repair system damage.
defense that protects


Optimize OfficeScan for agent-based
virtual desktop infrastructure (VDI) Centralized Management sensitive information.
deployments across a range of hypervisors.
Trend Micro Control Manager™ John Hur
Vulnerability Protection Centrally manage threat and data Director
Keep your endpoints shielded until protection policies across multiple layers IT Golf Town
patches can be deployed, or indefinitely of your IT infrastructure, streamline
for out-of-support or un-patchable security administration and policy
legacy systems. We’ll help you prevent enforcement across your enterprise.
vulnerabilities from being exploited with
a simple recommendation scan and easy,
fast-to-deploy filters.

Page 2 of 3 • datasheet • enterprise security FOR ENDPOINTS


TREND MICRO Enterprise Security Suite for endpoints
Trend Micro Enterprise Security for Endpoints creates a solid security foundation across the client layer with broad platform support
that provides security for heterogeneous environments and protection for your unique network configuration.

Add Enterprise Data Protection—for Complete End User Protection


Secure your data from gateway to mobile devices by adding Trend Micro™ Enterprise Data Protection, a full set of data security
products that integrate within Trend Micro™ Enterprise Security for Endpoints. By combining threat and data protection in a flexible,
centrally-managed solution, it lowers the cost of and effort to deploy and manage while closing critical security and compliance
gaps—for complete end user protection. Enterprise Data Protection is also available as part of our most comprehensive enterprise
security suite: Trend Micro™ Enterprise Security and Data Protection.

Enterprise Data Protection includes these products:


• Trend Micro™ Integrated Data Loss Prevention
• Trend Micro™ Mobile Security
• Trend Micro™ Endpoint Encryption
• Trend Micro™ Email Encryption Gateway

MINIMUM SYSTEM REQUIREMENTS

Multilayered Protection Platform Coverage Advantage CONSIDER OTHER SUITES


• Enterprise Security and Data
File Server
Protection
OfficeScan Software: Windows Secures Windows servers • Enterprise Security Suite
VDI support is available as an add-on
• Enterprise Security for Endpoints and
ServerProtect for Windows/ Software: Windows, Novell NetWare, Secures Windows and NetWare Mail Servers
Novell NetWare VMware ESX file servers
• Enterprise Security for Gateways
ServerProtect for Linux Software: Linux Secures Linux file servers • Enterprise Security for
Clients Communication and Collaboration
OfficeScan Software: Windows Protects Windows clients
VDI support is available as an add-on
EXPAND YOUR PROTECTION
Security for Mac • Included plug in for OfficeScan: Protects Macintosh clients
Apple Macintosh • Data Center and Cloud
Virtual Desktop Infrastructure • Included plug in supporting range of Agent-based security for VDI
• Network and Web
hypervisors deployments • Messaging and Collaboration
Vulnerability Protection • Software: Windows Provides proactive HIPS and • Risk Management
virtual patching • Support Services
Centralized Management • Endpoint and Mobile Devices
Control Manager Software: Windows Centrally manages security

For the latest Trend Micro Enterprise Security for Endpoints system requirements, please
refer to the Enterprise Security for Endpoints product page.

Securing Your Journey to the Cloud

©2014 by Trend Micro Incorporated. All rights reserved. Trend Micro, the
Trend Micro t-ball logo, OfficeScan, InterScan, ScanMail, ServerProtect,
Trend Micro Control Manager, Trend Micro Smart Protection Network,
and TrendLabs are trademarks or registered trademarks of Trend Micro
Incorporated. All other company and/or product names may be trademarks
or registered trademarks of their owners. Information contained in this
document is subject to change without notice.
[DS02_ESE_140730US] www.trendmicro.com

Page 3 of 3 • datasheet • enterprise security FOR ENDPOINTS

You might also like