Skip to content

Deep Security comprehensive server security platform

Advanced protection for physical, virtual, and cloud servers

Delivers comprehensive, adaptive, highly efficient agentless and agent-based protection, including anti-malware, intrusion detection and prevention, firewall, web application protection, integrity monitoring, and log inspection.

Deep Security





  • Accelerate virtualization investments
  • Minimize security impact
  • Ensure cost-effective compliance
  • Move safely to the cloud


 

Deep Security provides advanced server security for physical, virtual, and cloud servers. It protects enterprise applications and data from breaches and business disruptions without requiring emergency patching. This comprehensive, centrally managed platform helps you simplify security operations while enabling regulatory compliance and accelerating the ROI of virtualization and cloud projects.

Server virtualization

Improve ROI with industry-leading server security that can help you triple VM consolidation rates

Get mature technology from the recognized leader in virtualization security. With integrated security designed for virtual servers, you can remain secure without sacrificing performance or management. Deep Security helps you secure your virtual environment for the increased efficiencies of cloud computing. Virtualization-aware security preserves performance, and increase VM densities.

Desktop virtualization

Maximize VDI security and performance with both agentless and agent-based deployment options

Get comprehensive protection for virtual desktops while preserving performance and consolidation ratios. Built specifically to handle the rigors of virtual desktop environments (PDF), Deep Security maximizes protection for a broad spectrum of virtual desktop scenarios. True agentless security for VMware VDI environments (PDF)—antimalware, intrusions prevention, web application protection, firewall, and more—ensures no extra footprint from a security agent to impact the virtual desktops and the underlying host.

And agent-based security protects non-VMware VDI and virtual desktops in local mode. These flexible VDI security options let you can maximize both the protection and ROI of your company’s unique VDI investment.

Virtual patching

Shield vulnerabilities before they can be exploited, saving the cost of emergency patching

Hundreds of software vulnerabilities are exposed each month, and timely patching is expensive, prone to error and often impossible. Trend Micro virtual patching solutions deliver immediate protection while eliminating the operational pains of emergency patching, frequent patch cycles, and costly system downtime. Deep Security virtual patching (PDF) keeps your servers and endpoints protected while preventing costly emergency patching and upgrades as well as reducing the risk (PDF) of breach disclosure costs. It even helps to extend the life of legacy systems and applications.

Cloud protection

Control and encrypt data in the cloud and validate server access

Whether you’re deploying a private, public, or hybrid cloud, Trend Micro provides you with cloud protection (PDF) that’s optimized for virtual and cloud environments.Deep Security integrates with SecureCloud for encryption and policy-based key management for cloud environments. So you get better protection, less administrative complexity, and increased performance.  Agentless and agent-based deployments provide flexible cloud implementation options (PDF) with cross-cloud management to secure your servers, application, and data. 

Compliance

Address major regulatory requirements for PCI DSS 2.0, HIPAA, NIST, SAS 70, and many others

The complexity and fluidity of desktop and server virtualization pose security, compliance, and performance risks that require specialized, virtualization-optimized protection and performance. Deep Security provides integrated security and compliance for business systems operating in physical, virtual, and cloud environments. Deep Security addresses 8 PCI DSS requirements and provides core security controls with a unique approach that economically solves the toughest compliance challenges. 


The following tightly integrated modules easily expand the platform to ensure server, application, and data security across physical, virtual, and cloud servers, as well as virtual desktops.

Anti-malware

Integrates with VMware environments for agentless protection, or provides an agent to defend physical servers and virtual desktops in local mode

Integrates new VMware vShield Endpoint APIs to provide agentless anti-malware protection for VMware virtual machines with zero in-guest footprint. Helps avoid security brown-outs commonly seen in full system scans and pattern updates. Also provides agent-based anti-malware to protect physical servers, Hyper-V and Xen-based virtual servers, public cloud servers as well as virtual desktops in local mode. Coordinates protection with both agentless and agent-based form factors to provide adaptive security to defend virtual servers as they move between the data center and public cloud.

Web reputation

Strengthens protection against web threats for servers and virtual desktops

Integrates with the Trend Micro™ Smart Protection Network™ web reputation capabilities to safeguard users and applications by blocking access to malicious urls. Provides same capability in virtual environments in agentless mode through the same virtual appliance that also delivers agentless security technologies for greater security without added footprint.

Integrity monitoring

Detects and reports malicious and unexpected changes to files and systems registry in real time. Now available in agentless form factor

Monitors critical operating system and application files, such as directories, registry keys, and values, to detect and report malicious and unexpected changes in real time. Adds greater security to virtual machines without additional footprint through an agentless configuration. Protects the hypervisor from exploits with innovative new hypervisor integrity monitoring technology. Reduces administrative overhead with trusted event tagging that automatically replicates actions for similar events across the entire data center.

Intrusion detection and prevention

Shields known vulnerabilities from unlimited exploits until they can be patched

Helps achieve timely protection against known and zero-day attacks. Uses vulnerability rules shield a known vulnerability—for example those disclosed monthly by Microsoft—from an unlimited number of exploits. Offers out-of-the-box vulnerability protection for over 100 applications, including database, web, email and FTP servers. Automatically delivers rules that shield newly discovered vulnerabilities within hours, and can be pushed out to thousands of servers in minutes, without a system reboot.

Defends against web application vulnerabilities

Enables compliance with PCI Requirement 6.6 for the protection of web applications and the data that they process. Defends against SQL injections attacks, cross-site scripting attacks, and other web application vulnerabilities. Shields vulnerabilities until code fixes can be completed.

Identifies malicious software accessing the network

Increases visibility into, or control over, applications accessing the network. Identifies malicious software accessing the network and reduces the vulnerability exposure of your servers.

Firewall

Decreases the attack surface of your physical and virtual servers

Centralizes management of server firewall policy using a bi-directional stateful firewall. Supports virtual machine zoning and prevents Denial of Service attacks. Provides broad coverage for all IP-based protocols and frame types as well as fine-grained filtering for ports and IP and MAC addresses.

Log inspection

Provides visibility into important security events buried in log files

Optimizes the identification of important security events buried in multiple log entries across the data center. Forwards suspicious events to a SIEM system or centralized logging server for correlation, reporting and archiving. Leverages and enhances open-source software available at OSSEC


Accelerates virtualization, VDI & cloud ROI

Provides a lighter, more manageable way to secure VMs to help you make the most out of your virtualization and cloud investments

  • Strengthens security without additional footprint through agentless integrity monitoring, intrusion prevention, firewall and anti-malware
  • Frees staff from continually configuring, updating, and patching agents
  • Protects virtual servers and virtual desktops as they move between data center and public cloud

Lower costs

Maximizes efficiency to reduce operational costs with lower overhead, fewer staff hours, and higher VM consolidation rates

  • Allows greater machine consolidation in virtual environments with agentless configuration for anti-malware and other security
  • Eliminates the cost of deploying multiple software clients with a centrally managed, multi-purpose agent or virtual appliance
  • Provides vulnerability protection to prioritize secure coding and cost-effective implementation of unscheduled patching
  • Reduces security management costs by automating repetitive and resource intensive security tasks

Prevents data breaches

Minimizes business disruptions with advanced protection that enables self-defending servers and virtual desktops

  • Detects and removes malware from virtual servers in real time
  • Shields known and unknown vulnerabilities in enterprise applications and operating systems
  • Leverages one of the world’s largest domain-reputation databases to protect systems from accessing compromised websites
  • Integrity monitoring of the hypervisor via Intel TPM/TXT technology to meet evolving compliance needs
  • NEW: Identifies and blocks botnet and targeted attack Command and Control (C&C) communications using global and local threat intelligence

Helps achieve compliance

Addresses major requirements for standards such as PCI DSS 2.0, HIPAA, NIST, SAS 70, and many others

  • Provides detailed, auditable reports that document prevented attacks and policy compliance status
  • Reduces the preparation time and effort required to support audits
  • Supports internal compliance initiatives to increase visibility

Architecture

Deep Security is a comprehensive agentless server security platform designed to protect dynamic data centers comprising physical, virtual, and cloud servers as well as virtual desktops. The solution consists of: the Deep Security Virtual Appliance, Deep Security Agent, and Deep Security Manager.

Deep Security Virtual Appliance

Transparently enforces security policies on VMware vSphere virtual machines

This virtual appliance provides agentless integrity monitoring, anti-malware, IDS/IPS, web application protection, application control, and firewall protection—coordinating with Deep Security Agent, if desired, for log inspection and defense in depth.

Deep Security Agent

Deploys protection on a server or virtual machine

This small software component is deployed on the server or virtual machine being protected to help enforce security policies. Enables anti-malware, IDS/IPS, web application protection, application control, firewall, integrity monitoring, and log inspection.

Deep Security Manager

Allows administrators to create security profiles and apply them to servers

This powerful management system has a centralized console for monitoring alerts and preventive actions taken in response to threats. The Manager can be configured to automate or distribute security updates to servers on demand. It also generates reports to gain visibility into activity and meet compliance requirements. Event Tagging functionality streamlines the management of high-volume events and enables workflow of incident response.

Deep Security as a Service

Cloud-based offering to deliver elastic security for Amazon Web Services

As organizations move to the cloud, they take on shared risk with their cloud partner. For those using Amazon Web Services, Trend Micro Deep Security as a Service provides the most complete set of recommended security capabilities, delivered in AWS with tight integration to make it fast and easy to realize the full benefits of the cloud. Learn more

Security center

Provides constant security updates to keep you ahead of the latest threats

This dedicated team of security experts rapidly develops and delivers security updates that address newly discovered vulnerabilities. The Security Center manages the customer portal used for accessing these security updates and information. Security updates can be delivered to Deep Security Manager automatically, or on-demand for deployment to thousands of servers within minutes.


Beth Israel Deaconess

Industry: Healthcare

Location: Boston, Massachusetts

# Employees: 350 primary care physicians, 1150 specialists

http://www.bidpo.org


CHALLENGE: Secure new SaaS electronic healthcare services for physician network

RESULTS: Increased security and reduced costs for virtualized cloud applications


CITY OF OULU

Industry: Municipal Government

Location: Oulu, Finland

# Employees: 10,000

www.ouluntietotekniikka.fi

CHALLENGE: Merge infrastructures of four surrounding cities, while reducing costs and complexity

RESULTS: Protection of virtual desktop infrastructure (VDI) that is easy to deploy, administer, and scale

Jussi Tarkkonen talks about merging multiple municipal security infrastructures. [05:13 min]



OHIOHEALTH

Industry: Healthcare

Location: Columbus, Ohio

# Employees: 12,000+

CHALLENGE: : Introduce virtual desktop infrastructure (VDI) without compromising protection of patient data

SOLUTION: Deploy Deep Security, extending agentless security to VDI endpoints

RESULTS: Protection automatically extended to virtual endpoints, plus improved performance


İÇDAŞ Çelik Enerji tersane ve Ulaşım Sanayi A.Ş.

Industry: Iron and Steel

Location: Istanbul, Turkey

# Employees: 10,000

http://www.icdas.com.tr

CHALLENGE: : Secure virtualized data center with a software solution that could use VMware vShield APIs and that would have minimal impact on server performance.

RESULTS: The investment paid off. After ICDAS examined total investment and maintenance costs, it found Deep Security to be 40% more economical.


DODD (Ohio Department of Developmental Disabilities)

Industry: State Government/Healthcare

Location: Columbus, Ohio

# Employees: 3,200

http://odmrdd.state.oh.us


CHALLENGE: Minimize user complaints by providing thin-client users with a desktop experience equivalent to traditional PCs.

RESULTS: Transparent security, with no user complaintsdue to slowing of applications


YAPI KREDI

Industry: Finance

Location: Levent-Istanbul Besiktas, Turkey

# Employees: 17,000

www.yapikredi.com.tr


CHALLENGE: Secure virtual environment, maintain compliance, and maximize consolidation

RESULTS: Excellent performance and consolidation with strict security controls for compliance


GODADDY.COM

Industry: Web site hosting

Location: Scottsdale, Arizona

# Employees: 3,000+

www.GoDaddy.com


CHALLENGE: Block continually changing threats that could compromise customer data

RESULTS: Improved protection, enhanced visibility, and minimized performance impact


AHOLD

Industry: Retail Food

Location: Greenville, South Carolina

# Employees: 100,000, 800 stores, 35,000 systems

www.ahold.com


CHALLENGE: Maximize point-of-sale protection without impacting critical sales transactions

RESULTS: Data security and integrity, cost savings, and PCI compliance



Platforms

Microsoft® Windows®

  • Windows 7, 8* (32 & 64 bit)
  • XP (32 & 64 bit)
  • XP embedded
  • Windows Vista (32 & 64 bit)
  • Windows Server 2003 (32 & 64 bit)
  • Windows Server 2008 R2 (64 bit)
  • Windows 2012* (64 bit)

*Support for Windows 8, 2012 available in 2013

Oracle Solaris™

  • Trend Micro Deep Security supports Oracle Exadata Database Machine, Oracle Exalogic Elastic Cloud and SPARC Super Cluster via the supported Solaris operating systems.
  • Oracle Solaris 9 and 10, (64-bit Sparc), Solaris 10 and 11, (64-bit x86)

Linux

  • Red Hat 4, 5, 6 (32-bit and 64-bit)
  • SuSE 10, 11
  • Ubuntu 10.04, 12.04** LTS (64-bit)
  • CentOS 5, 6 (32-bit and 64-bit)
  • Amazon Linux (see the latest Agent release notes for supported versions).
  • Oracle Linux 5**, 6** (32-bit and 64 bit, Redhat kernel only)

*Anti-Malware support for Linux for on-demand scan. RHEL 5, 6 (64 bit only), SLEX 10, 11 (64 bit only)
**Support for Ubuntu 12.04 LTS, Oracle Linux available in 2013

 

Unix*

  • AIX 5.3, 6.1 on IBM Power Systems
  • HP-UX 10, 11i v3 (11.31)

*Only Integrity Monitoring and Log Inspection modules are available on these UNIX-based platforms.

Virtualization

  • VMware®: VMware ESX/ESXi 3.x*, ESX/ESXi 4.0**, ESX/ESXi/VMware vShield Endpoint 4.1, ESXi 5.0/5.1/vCloud Networking and Security 5.1, View 4.5/5.0/5.1
  • Citrix®: XenServer*
  • Microsoft®: HyperV*

*Protection via Deep Security Agent only
**Agent-less protection on firewall and DPI only



Full list of system requirements:

Deep Security Manager system requirements

Memory 4GB
Disk space 1.5GB (5GB recommended)
Operating system
  • Windows: Microsoft Windows 2012 (64-bit), Windows Server 2008 (64-bit), Windows Server 2008 R2 (64-bit), Windows 2003 Server SP2 (64-bit)
  • Linux: Red Hat 5 (64-bit), Red Hat 6 (64-bit)
Database (recommended but optional)

Oracle 11g, Oracle 10g, Microsoft SQL Server 2012, Microsoft

SQL Server 2008, Microsoft SQL Server 2005. (20GB RAM recommended for pre-allocation)
Web browser

Firefox 12+ (cookies enabled), Internet Explorer 8+ (cookies enabled), Chrome 20+ (cookies

enabled), Safari 5+ (cookies enabled)

 

Deep Security Relay system requirements

Memory 512MB
Disk space 100MB (200MB recommended, primarily for logging) (1GB recommended with Anti-Malware protection enabled)
Operating system
  • Windows: Windows 7 (32-bit and 64-bit), Windows Server 2008 (32-bit and 64-bit), Windows Server 2008 R2
    (64-bit), Windows Vista (32-bit and 64-bit), Windows Server 2003 SP2 (32-bit and 64-bit), Windows Server
    2003 R2 (32-bit and 64-bit), Windows XP (32-bit and 64-bit)

  • Linux: Red Hat 5 (64-bit), Red Hat 6 (64-bit), CentOS 5 (64-bit), CentOS 6 (64-bit)

 

ESX/ESXi requirements for the Deep Security Virtual Appliance

In addition to the ESX/ESXi standard system requirements, the following specifications must be met:
CPU 64-bit, Intel-VT present and enabled in BIOS
Supported vSwitch standard vSwitch or 3rd party vSwitch – Cisco Nexus 1000v
Note: A virtualized ESX/ESXi environment (hypervisor running as a VM) is not supported.

 

Deep Security Virtual Appliance system requirements

Memory 1GB (Memory requirements can vary depending on the number of VMs being protected
Disk space 20GB
Operating system VMware vCenter 5.1, and ESXi 5.1
Additional VMware utilities VMware Tools, VMware vShield Manager 5.1, VMware vShield Endpoint Security 5.1 (ESXi5 patch ESXi500-201109001 or later for vShield Endpoint Driver).
VMware endpoint protection supported guest platforms Windows Vista (32-bit and 64-bit), Windows 7 (32-bit and 64-bit), Windows XP SP2 (32-bit and 64-bit), Windows Server 2003 SP2 (32-bit and 64-bit), Windows Server 2003 R2 (32-bit and 64-bit), Windows Server 2008 (32-bit and 64-bit), Windows Server 2008 R2 (64-bit). (For the latest list of supported guest platforms, see your VMware documentation.)

 

Deep Security Agent system requirements

Memory
  • with Anti-Malware: 512MB
  • without Anti-Malware: 128MB
Disk space 100MB (200MB recommended, primarily for logging) (1GB recommended with Anti-Malware protection enabled)
Operating system
  • Windows: Windows 7 (32-bit and 64-bit), Windows Server 2008 R2 (64-bit), Windows Server 2008 (32-bit and 64-bit), Windows Vista (32-bit and 64-bit), Windows Server 2003 Sp1 32-bit and 64-bit) with patch "Windows Server 2003 Scalable Networking Pack", Windows Server 2003 SP2 (32-bit and 64-bit), Windows Server 2003 R2 SP2 (32-bit and 64-bit), Windows XP (32-bit and 64-bit)

  • Solaris: Solaris 9 and 10, (64-bit Sparc), Solaris 10 and 11, (64-bit x86)

  • Linux: Red Hat 4 (32-bit and 64-bit), Red Hat 5 (32-bit and 64-bit), Red Hat 6 (32-bit and 64-bit), SuSE 10 (32-bit and 64-bit), SuSE 11 (32-bit and 64-bit), Ubuntu 10.04 LTS (64-bit), CentOS 5 (32-bit and 64-bit), CentOS 6 (32-bit and 64-bit), Amazon Linux (see the latest Agent release notes for supported versions). (Agent-based Anti-Malware not supported on Red Hat 5 (32-bit), Red Hat 6 (32-bit), CentOS 5 (32-bit), CentOS 6 (32-bit), SuSE 10 (32-bit), SuSE 11 (32-bit), and Amazon Linux (32-bit).)

AIX AIX 5.3, 6.1 (The AIX Agents do not support Anti-Malware or Web Reputation protection.)
HP-UX 11i v3 (11.31) (The HP-UX Agents only support Integrity Monitoring and Log Inspection.)
Note: Windows Agents running on Windows XP or Windows 2003 will not function in an IPv6 environment.

 

Deep Security Notifier system requirements

Windows: Windows 7 (32-bit and 64-bit), Windows Server 2008 R2 (64-bit), Windows Server 2008 (32-bit
and 64-bit), Windows Vista (32-bit and 64-bit), Windows Server 2003 Sp1 32-bit and 64-bit) with patch
"Windows Server 2003 Scalable Networking Pack", Windows Server 2003 SP2 (32-bit and 64-bit), Windows Server 2003 R2 SP2 (32-bit and 64-bit), Windows XP (32-bit and 64-bit)


Social Media

Connect with us on