Deep Security Datasheet
Deep Security Datasheet
Trend Micro™
DEEP SECURITY™
Complete security for container, cloud, and virtualized data center environments
Virtualization has already transformed the data center and now organizations are Key Business Issues
moving their workloads to the cloud and container architectures. There are many Automated protection
advantages of hybrid cloud computing, however it also comes with new risks and Automate security using a rich set of
threats. Your organization must ensure you meet compliance requirements and have RESTful APIs and cloud templates to
security across all of your workloads, whether physical, virtual, cloud, or containerized. remove manual security processes and
reduce operational costs.
Trend Micro™ Deep Security™ provides comprehensive security in a single solution that
is purpose-built for virtual, cloud, and container environments. Deep Security allows for Unified security
consistent security, regardless of the workload. It also provides a rich set of application Deploy and consolidate security across
programming interfaces (APIs), so security can be automated and won’t impact your your physical, virtual, multi-cloud, and
containerized environments with a
teams.
single agent and platform.
BE POWERFUL BUILD SECURE Security for the CI/CD pipeline
Protect against vulnerabilities, malware, and Smart security controls that ensure you meet API-first, developer-friendly tools to
unauthorized change with the broadest range security and compliance requirements from help you ensure that security controls
of security capabilities the first build are baked into DevOps processes.
GET STREAMLINED SHIP FAST Accelerate compliance
Consistent protection and visibility, optimized Security that is connected through automation Demonstrate compliance with a number
for every part of your hybrid cloud and integration in your continuous integration/ of regulatory requirements including
continuous deployment (CI/CD) pipeline GDPR, PCI DSS, HIPAA, NIST, FedRAMP,
GO AUTOMATED
and more.
Connected security that can be integrated into RUN ANYWHERE
Dev and Ops processes to ensure adoption Security that is optimized for the place that
best suits your application
Deep Security delivers advanced runtime protection for containers. Layered security defends against attacks on the host, the
container platform (Docker®), the orchestrator (Kubernetes®), the containers themselves, and even the containerized applications.
Designed with a rich set of APIs, Deep Security allows IT Security to protect containers with automated processes for critical security
controls. DevOps can leverage security as code by baking security into the CI/CD pipeline, reducing the friction that comes with
applying security in rapidly changing and evolving infrastructures. With Trend Micro™ Deep Security™ Smart Check’s build pipeline
image scanning, Deep Security provides full protection across the container life cycle.
Deep Security works seamlessly to secure dynamic workloads in the cloud, with automated discovery of workloads across cloud
providers including AWS, Microsoft® Azure®, Google Cloud™, and more. Deep Security’s single management console enables unified
visibility over all of your workloads and automated protection across a multi-cloud environment with consistent, context-aware policies.
RESTful APIs allow for integrated security with your existing toolset for automated security deployment, policy management, health
checks, compliance reporting, and more.
Deep Security brings advanced protection to physical and virtual servers, enabling easy deployment and management
of security across multiple environments through automatic policy management and in the case of VMware®,
hypervisor-integrated agentless security. Deep Security protects virtual desktops and servers against
zero-day malware, including ransomware, cryptocurrency mining attacks, and network-based attacks
while minimizing operational impact from resource inefficiencies and emergency patching.
•• Shield known and unknown vulnerabilities in web, enterprise •• Ensure security at multiple layers of your container environments,
including protection for the host, the container platform (Docker) and
applications, and operating systems through an IPS.
orchestrator (Kubernetes), the containers themselves, as well as the
•• Advanced threat detection and remediation of suspicious objects containerized applications.
through sandbox analysis.
••Secure your container host with the same advanced host-based
•• Send alerts and trigger proactive prevention upon the detection of controls applied across your physical, virtual machine (VM), and
suspicious or malicious activity. cloud workloads
•• Secure end of support systems with virtual patches delivered via an ••Monitor for changes and attacks on Docker and Kubernetes
IPS, ensuring legacy systems stay protected from existing and future objects with integrity monitoring and log inspection capabilities
threats.
••Protect runtime containers through container vulnerability
•• Track website credibility and protect users from infected sites with shielding (via IPS), real-time malware protection, and east-west
web reputation threat intelligence from Trend Micro’s global domain- container traffic inspection
reputation database.
•• Enforce security early in the pipeline using Deep Security Smart
•• Identify and block botnet and targeted attack command and control Check’s advanced build-time and registry scanning, complementing
(C&C) communications. Deep Security’s runtime capabilities for protection across the
container life cycle.
•• Secure against the latest threats using threat intelligence from the
Trend Micro™ Smart Protection Network™, powered by Trend Micro’s •• Leverage Trend Micro’s tight integration with leading cloud vendors
market-leading threat research. such as AWS, Azure, and Google Cloud for unified visibility and
protection across your multi-cloud environment.
•• Support incident response with server endpoint detection and •• Extend the benefits of microsegmentation in the software-defined
response (EDR) capabilities, including monitoring for indicators data center and leverage Deep Security’s integration with VMware to
of attack and blocking of suspicious applications and processes. automatically detect and apply context-based policies.
Network security tools detect and stop network attacks and shield vulnerable applications and servers
•• Host-Based Intrusion Prevention: •• Firewall:
Detects and blocks network-based exploits of known vulnerabilities Host-based firewall protects endpoints on the network using
in popular applications and operating systems using IPS rules. stateful inspection.
Transparently enforces security policies on VMware vSphere® VMs. For VMware NSX®
environments, this provides agentless anti-malware, web reputation, IPS, integrity monitoring, and
firewall protection. A combined mode can be used where the virtual appliance is used for agentless
Trend Micro ZDI disclosed
anti-malware and integrity monitoring and an agent for IPS, application control, firewall, web 1,449 vulnerabilities in 2018.
reputation, and log inspection. This powers unmatched
timelines for virtual patches.
Global Threat Intelligence
Deep Security integrates with the Smart Protection Network to deliver real-time protection
from emerging threats by continuously evaluating and correlating global threat and reputation
intelligence for websites, email sources, and files.
•• Deep Security is also available as a software or a virtual appliance to run in your data center or Deep Security is part of the Trend Micro
cloud. System requirements are available at the following URL: Hybrid Cloud Security solution,
https://help.deepsecurity.trendmicro.com/11_3/on-premise/Get-Started/Install/system- powered by XGen.
requirements.html
Key Benefits
• Fast: Start securing workloads in minutes •
Saves time: We manage and update the
product so you can focus on your business
•
Cost-effective: Usage-based pricing
starting at $0.01/hour •
Proven: Protects thousands of customers
and millions of servers globally
•
Simple: Multiple security controls in a
single product •
Flexible: Purchase and procure through
AWS Marketplace to protect multi-cloud
environments
Copyright © 2019 by Trend Micro Incorporated. All rights reserved. Trend Micro,
and the Trend Micro t-ball logo, Deep Security, Trend Micro Deep Security
Antivirus for VDI, Trend Micro Deep Security Virtual Patch, Trend Micro Control
Manager are trademarks or registered trademarks of Trend Micro Incorporated.
All other company and/or product names may be trademarks or registered
trademarks of their owners. Information contained in this document is subject to
change without notice. [DS16_Deep_Security_Datasheet_190409US]