Skip to content

InterScan Web Security

Deeper visibility for maximum control

Faced with today's advanced Internet threats and the growing use of cloud-based consumer applications in the workplace, application visibility is essential to understanding network risks. InterScan Web Security is a software virtual appliance that combines application control with advanced anti-malware scanning, real-time web reputation, and flexible URL filtering to provide superior Internet threat protection.

Interscan Web Security

Delivers unparalleled visibility and control

  • Allows deeper and more complete visibility
  • Centralizes management for maximized control
  • Monitors web use as it happens
  • Enables on-the-spot remediation
  • Reduces sprawl and energy costs

Superior threat protection and control over cloud-based applications

InterScan Web Security is a software virtual appliance that dynamically protects against the ever-growing flood of web threats at the Internet gateway—exclusively designed to secure you against traditional and emerging web threats at the Internet gateway.

Application control combines with industry leading anti-malware scanning, real-time web reputation, URL filtering and enhanced anti-botnet detection to protect systems and keep users productive. When deployed with the optional Advanced Reporting and Management Module, you gain real-time visibility into all your Internet activities.

  • An optional Data Loss Prevention module with easy-to-use and customizable templates helps you stay in compliance by securing outbound data
  • Centralizes management of distributed web gateways across the WAN with optional ARM module
  • Enables granular policy creation to control all web activities and user time spent on the internet

Award-winning gateway antivirus and antispyware

  • Scans inbound and outbound traffic for malware
  • Prevents malware from entering your network, relieving the burden on endpoint security
  • Stops virus and spyware downloads, botnets, phone home attempts, and malware tunneling
  • Closes the HTTPS security loophole by decrypting and inspecting encrypted content
  • Allows enterprises to selectively decrypt HTTPS traffic to balance content security with user privacy needs

Web reputation with correlated threat data

  • Trend Micro™ Smart Protection Network™ web reputation technology blocks access to web sites with malicious activity to protect against new threats and suspicious activity in real time

Powerful URL and active code filtering

  • Leverages real-time URL categorization and reputation to identify inappropriate or malicious sites
  • Offers six different policy actions for web access control, including: monitor, allow, warn, block, block with password override, enforce time quota
  • Supports object-level blocking within dynamic web pages, such as Web 2.0 mashups
  • Stops drive-by downloads and blocks access to spyware and phishing-related websites

Delivers unparalleled visibility and control

InterScan Web Security offers unmatched protection at the Internet gateway and provides the visibility and control required for IT administrators to keep their networks safe and their users productive.

  • Monitors and reports on more than 800 Internet protocols and applications, including instant messaging, peer-to-peer, social networking applications, and streaming media
  • Allows users to access cloud-based applications, while enforcing acceptable user policies to mitigate risks and conserve resources
  • Enables granular policy creation to control all web activities and user time spent on the internet

Simplifies installation and optimizes resources

  • Deploys as a virtual appliance or software appliance, supporting datacenter consolidation and standardization
  • Increases utilization rates of existing servers, reducing appliance sprawl and energy costs
  • Improves security levels with quick deployment of new capacity as needed
  • Speeds recovery from unplanned outages with native failover and redundancy functions
  • Simplifies OS and security updates, version control, and testing

Flexible deployment and integration

  • Offers multiple network deployment options for scalability, performance, and reliability, including transparent bridge, ICAP, WCCP, forward or reverse proxy
  • Ensures scalability, performance, and reliability without the cost of adding external load balancers
  • Supports LDAP, Active Directory™, Syslog, and SNMP for tighter network integration and lower TCO

Advanced Reporting and Management Module

Advanced Reporting and Management provides customers with unprecedented visibility into how the Internet is impacting their organization. Advanced Reporting and Management applies state-of-the-art database technology and user interface especially designed to help reduce the organization’s exposure to non-business Internet use and to increase their security posture against the latest web threats. Administrators and management have the ability to quickly and easily understand what is happening across their network in real time, to drill down into specific areas of interest, and to set network policies in InterScan Web Security.

Key Benefits

  • Accelerates problem resolution by monitoring Internet use and threat activity in real time
  • Simplifies operations by centralizing logging, reporting and management for multi-unit support
  • Extends visibility with over 50 standard reports and custom report capability
  • Reduces costs with real-time troubleshooting and forensics capabilities
  • Standardizes security policies with policy, and configuration replication and synchronization

Advanced Reporting and Management centralizes the logging, reporting, configuration management and policy synchronization across multiple InterScan Web Security servers. Through a single console, administrators can effectively monitor, manage, and secure their organization’s Internet usage. And because the solution installs as a software virtual appliance, IT can consolidate hardware resources, optimize utilization, and reduce the cost of deployment and operation.

Data Loss Prevention Module

Data Loss Prevention Module for InterScan Web Security is an optional component with easy-to-use and customizable templates to help you stay in compliance by securing outbound data. With integrated Data Loss Prevention, you can:

  • Scan outbound traffic for content that includes sensitive corporate data
  • Create and modify policies using predefined templates to better meet regulatory privacy requirements in various countries by filtering personally identifiable information
  • Provide reports on which DLP policies have been violated by certain users
  • Provide auditing functions for administrators to measure the effectiveness of the DLP policies


Choose security that fits

InterScan Web Security can be deployed as a virtual appliance or software appliance.

Virtual Appliance

Virtualized deployments via Hypervisor technologies

  • Microsoft® Hyper-V Virtual Appliance
  • VMware Ready Virtual Appliance: Rigorously tested and validated by VMware, the only messaging gateway solution to achieve VMware Ready validation. Supports VMware ESX or ESXi v3.5 and vSphere.

    VMware Ready

Software Appliance

Bare metal installation with tuned, security-hardened OS

Certified by Trend Micro
Through extensive testing and validation, Trend Micro certifies platforms for compatibility with Trend Micro software virtual appliance solutions.
See certified server platforms (PDF/engl.)


 InterScan Web SecurityAdvanced Reporting and Management (ARM)
Server Platform Compatibility Virtual Appliances:
VMware ESX/ESXi v3.5 and higher; Microsoft Hyper-V Windows 2008 SP1 or Windows 2008 R2

Software Appliances:
for the latest Certified by Trend Micro platforms, please go to See certified server platforms (PDF/engl.)
Virtual Appliances:
VMware ESX/ESXi v3.5 and higher; Microsoft Hyper-V Windows 2008 SP1 or Windows 2008 R2

Software Appliances:
for the latest Certified by Trend Micro platforms, please go to www.trendmicro.com/go/certified
CPU Minimum:
Single 2.0 GHz Intel™ Core2Duo™ 64-bit processor supporting Intel VT™ or equivalent

Recommended:
  • For up to 4000 users: Dual 2.8 GHz Intel Core2Duo 64-bit processor or equivalent
  • For up to 9500 users: Dual 3.16 GHz Intel QuadCore™ 64-bit processor or equivalent
Minimum:
Single 2.0 GHz Intel™ Core2Duo™ 64-bit processor supporting Intel VT™ or equivalent

Recommended:
  • For up to 2500 events per second: Dual 2.8 GHz Intel Core2Duo 64-bit processor or equivalent.
  • For over 2500 events per second: Dual 3.16 GHz Intel QuadCore 64-bit processor or equivalent.
Memory Minimum:
2GB RAM

Recommended:
  • For up to 4000 users: 6GB RAM
  • For up to 9500 users: 24GB RAM
  • For up to 15,000 users: 32GB RAM
Minimum:
2GB RAM

Recommended:
  • 4G RAM - Up to a maximum of 1000 events per second
  • 8G RAM - Up to a maximum of 2500 events per second
  • 12G RAM - Up to a maximum of 4000 events per second
  • 16G RAM - Up to a maximum of 6000 events per second
Disk Space Minimum:
12GB of disk space

Recommended:
At least 300GB of disk space for 90 days of logs; depends on number of users and log verbosity

(automatically partitions the detected disk space as required)
Minimum:
8GB of disk space

Recommended:
At least 300GB of disk space or more depending on number of log events and length of retention time

(automatically partitions the detected disk space as required)

 

Administrator Web Browser Requirements

  • Windows XP SP3: Internet Explorer (IE) 8.0 and Firefox 5.0
  • Windows Vista: IE 9.0
  • Windows 7: IE 8.0, IE 9.0, Google Chrome 18.0 and Firefox 5.0
  • Red Hat Enterprise Linux 5: Firefox 5.0

 

Hardware Specifications

The minimum requirements specified provide enough resources to properly evaluate the product under light traffic loads. The recommended requirements specified provide general production sizing guidance. For more detailed sizing information for production environments, search for “sizing guide” in the IWSVA Sizing Guide.


Social Media

Connect with us on