资源预览内容
第1页 / 共4页
第2页 / 共4页
亲,该文档总共4页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述
Page 1 of 4 SOLUTION BRIEF OPTIMIZED SECURITY FOR THE MODERN DATA CENTER SOLUTION BRIEF Trend Micro OPTIMIZED SECURITY FOR THE MODERN DATA CENTER Proven, efficient security for dynamic virtualized environments Virtualization and cloud computing can help your organization achieve significant savings in data center hardware costs, operational expenditures, and energy demands while achieving improvements in quality of service and business agility. However, as data centers continue to transition from physical to virtual and now increasingly, cloud environments, traditional security can slow down provisioning, become difficult to manage, and cause performance lag. As you scale your virtual environment and adopt software- defined networking, evolving your approach to security can reduce time, effort, and impact on CPU, network, and storage. Trend Micros modern data center security is optimized to help you safely reap the full benefits of your virtualized environment. Our virtualization-aware security offers many advantages including performance preservation, increased VM densities, and accelerated ROI. Powered by the Deep Security platform, it offers a broad set of security capabilities with the features you need to benefit from the efficiencies of virtualized environments and help meet compliance. This integrated solution protects physical, virtual, cloud, and hybrid environments. Why Choose Trend Micro to protect your data center? Complete set of security capabilities to protect sensitive applications and data Optimized for virtualized environments to improve performance and VM densities while reducing administrative effort Support for major virtualization platforms and the first to bring agentless integration with the VMware hypervisor and support for NSX Single platform for physical, virtualized, and cloud instances to simplify security policy and infrastructure management First and only security architecture designed for service providers and enterprises with software-defined data centers, with support for multi-tenancy, auto-scaling, utility computing, and self-service Consistently ranked #1 in server security and chosen by thousands of customers to protect millions of instances Trend Micro is the #1 provider of server security for physical, virtual, and cloud environments1 combining the most complete set of security capabilities with automated management to dramatically reduce both risk and cost. 1 Server Security: Not What it Used to Be! IDC, December 2014 Page 2 of 4 SOLUTION BRIEF OPTIMIZED SECURITY FOR THE MODERN DATA CENTER Instances Instances A COMPLETE SET OF SECURITY CAPABILITIES To be effective, security in your data center must be able to dynamically follow your servers, protect your unpatched servers from vulnerabilities, conduct real-time monitoring, and provide automatic protection. Trend Micros security for modern data centers, powered by the Deep Security Platform, has a broad set of security capabilities to support all of the above. This integrated solution protects your applications and data from attacks, optimizes data center resources, manages security efficiently, and helps achieve cost-effective internal and regulatory compliance. PROTECTS YOUR MODERN DATA CENTER WITH COMPREHENSIVE SECURITY Provides timely protection from constant malware attacks on your systems and data with Anti-malware and Web Reputation. Powered by the Trend Micro Smart Protection Network, Deep Security deployments leverage the latest in global threat intelligence. Shields unpatched vulnerabilities from attack with Intrusion Detection and Prevention (IDS/IPS). Security policies update automatically to ensure the right protection is applied to the right cloud servers at the right time. Reduces exposure to attacks with a host firewall. Blocks attacks and limits communication to only the ports and protocols necessary with the ability to log and audit traffic for compliance reporting at the instance level. Meets compliance file and system monitoring requirements with Integrity Monitoring. Ensures unauthorized or out-of-policy changes are detected and reportedacross files, ports, registries, and more. Identifies important security events buried in multiple log entries with Log Inspection. Forwards suspicious events to an SIEM system or centralized logging server for correlation, reporting, and archiving. Scans web applications for vulnerabilities and helps protect against them. Expert testing and false positive removal allow you to focus on high severity vulnerabilities and help to quickly mitigate them. Automatically recognizes VMs at launch. Initiates security at start to dramatically reduce the risk of any instances going unprotected. Administrator CloudData Center Reports PHYSICALVIRTUALVIRTUAL DESKTOP Deep Security Agent Deep Security Manager Deep Security Agentless Virtual Appliance Alerts Deep Security Optimized Security for the Modern Data Center: Powered
收藏 下载该资源
网站客服QQ:2055934822
金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号