Skip to content

InterScan Web Security Virtual Appliance

Deeper visibility for maximum control

Trend Micro™ InterScan™ Web Security Virtual Appliance is a secure web gateway that combines application control with zero-day exploit detection, advanced anti-malware scanning, real-time web reputation, and flexible URL filtering to provide superior Internet threat protection.

InterScan Web Security is also available as a cloud-based service offering that extends security to your users beyond your corporate network. Another option is a hybrid model of both the virtual appliance on-premise and SaaS models to accommodate the different parts of your business.

Fits your current IT strategy but can seamlessly evolve

  • Stops threats before they affect your network or users
  • Manages staff Internet activity
  • Centralizes control
  • Enables on-the-spot remediation
  • Reduces appliance sprawl and energy costs
  • Provides flexibility with three deployment options

Stops threats before they can affect your network and end-users

InterScan Web Security defends against the evolving web threat landscape. It also provides application visibility and control to help you manage how your employees use the web and cloud-based applications.

The key capabilities of InterScan Web Security include:

Anti-malware

  • Safeguards against everything from traditional malware to zero-day attacks and advanced malware

Targeted attack protection

  • Protects against targeted cyber attacks in which an attacker tries to steal specific information from an organization

Web reputation

  • With one of the largest domain-reputation databases in the world, Trend Micro tracks the credibility of web domains and controls access to malicious sites

URL filtering and application control

  • Provides complete control over the types of content users can access

Management and reporting

  • Features intuitive management of all users across all locations in real time, from a single console
  • Monitors web use as it happens, enabling on-the-spot remediation
  • Offers standard and fully customizable reporting, so you can focus on the information that is pertinent to your business

Comprehensive protection against the full scope of web threats

  • Anti-malware
  • Advanced threat protection
  • URL filtering
  • Real-time web reputation

Strongest advanced threat protection

  • Zero-day exploit detection
  • Command and control callback detection
  • Optional Deep Discovery integration for on-premise sandbox analysis and adaptive blacklist blocking

Real-time protection powered by the Trend Micro™ Smart Protection Network™ infrastructure

The Smart Protection Network is a cloud data-mining infrastructure that rapidly and accurately identifies new threats, delivering global threat intelligence to all Trend Micro products and services.

Easy-to-use, fully integrated data loss prevention

  • Template-based and easy to implement
  • Fully integrated requiring no extra server or management console

Protection for every user–any device, anywhere

  • PCs and mobile devices on the corporate network, branch office, or remote
    Enforces acceptable web use policies on any device so users can take advantage of their devices, the web and cloud-based applications of their choice without sacrificing security
  • Granular application control for a broad range of application categories, including:
    • Instant messaging
    • Peer-to-peer
    • Social networking apps
    • Streaming media

Transparent, clientless authentication, and high performance that doesn’t affect the user experience

  • Processing takes place at the gateway without any impact on the performance of your users’ devices
  • SaaS offering
    • High-performance, high-availability cloud with a global footprint and points of presence close to wherever your users may be, for guaranteed uptime, and near-zero latency, that doesn’t slow down the web experience
  • Comprehensive visibility because you can’t manage what you can’t measure—InterScan Web Security allows you to view all web activity historically and as it happens with standard and custom report creation

Interactive and customizable dashboard that gives you a snapshot of the web use and security information that is most useful to you

  • Full range of customizable, real-time widgets give you an easy-to-understand picture
  • Drill down from the dashboard to further investigate incidents of interest

Flexible deployment models including on-premise, SaaS, and hybrid model

  • Manage across all components of the solution with an intuitive management console
  • Easily create policies across devices, locations, and applications

Choose the procurement and IT management model that best meets your needs

  • On-premise capital purchase where you fully own deployment and ongoing maintenance of the solution as part of your virtual infrastructure
  • SaaS subscription-based model with elastic capacity, where Trend manages the infrastructure, freeing your resources to focus on adding value to your business

A hybrid model of the virtual appliance on-premise and SaaS models accommodates the varying needs of different parts of your business.

You can easily switch between deployment models as your requirements change, ensuring InterScan Web Security will meet your evolving needs.



Targeted attacks need a Custom defense

As a key part of the Trend Micro Custom Defense Solution, InterScan Web Security protects against targeted attacks using enhanced web reputation, a new detection engine, and a new threat analysis appliance that uses exploit detection and sandboxing.

The integration of these components creates a custom defense, so that you can detect, analyze, adapt, and respond to highly targeted attacks.

Enhanced web reputation

  • Web reputation is powered by the big data analytics and predictive technology of Smart Protection Network™ global threat intelligence
  • Enhanced technology scans and blocks URLs leading to malicious sites

Deep Discovery Advisor, a component of the Trend Micro Custom Defense Solution

  • Provides automatic in-depth simulation and analysis of potentially malicious attachments including executables and common office documents in a secure sandbox environment
  • Allows customers to create and analyze multiple fully custom target images that precisely match their host environments
  • Analyzes logs of Trend Micro products and third-party solutions combined with Trend Micro threat intelligence to provide in-depth insights for risk-based incident assessment, containment and remediation
  • Issues custom security updates for adaptive protection and remediation by other Trend Micro products and other third-party security layers

Choose security that fits

InterScan Web Security provides three flexible deployment models, so it will fit your current IT strategy and seamlessly evolve to take on tomorrow’s threats.

  • InterScan Web Security Virtual Appliance – Deployed on-premise, it is fully managed by you and since it is a virtual appliance it supports data center consolidation and standardization
    See the datasheet (PDF)
  • InterScan Web Security as a Service – A cloud-based software-as-service (SaaS) offering that extends security to users beyond your corporate network, including mobile, branch-office and home-based workers - all without the need to backhaul web traffic, saving you considerable networking expense. 


Since it’s a SaaS solution, it is fully managed by Trend Micro in the cloud eliminating the need to purchase, manage, or maintain software or hardware  
See the datasheet (PDF)

InterScan Web Security as a Service Hybrid - Customers can deploy the solution in a hybrid of the virtual appliance on-premise and SaaS models

A single, cloud-based management console lets you easily create a single set of policies for all components of the solution and reports on all users and components of the solution across on-premise and SaaS deployments


  InterScan Web Security
Server platform compatibility Virtual appliances:
VMware ESX/ESXi v3.5 and higher; Microsoft Hyper-V Windows 2008 SP1 or Windows 2008 R2; Windows Server 2012 Hyper-V

Software appliances:
for the latest Certified by Trend Micro platforms, please go here
CPU Minimum:
Single 2.0 GHz Intel™ Core2Duo™ 64-bit processor supporting Intel VT™ or equivalent

Recommended:
  • For up to 4000 users: Dual 2.8 GHz Intel Core2Duo 64-bit processor or equivalent
  • For up to 9500 users: Dual 3.16 GHz Intel QuadCore™ 64-bit processor or equivalent
Memory Minimum:
4GB RAM

Recommended:
  • For up to 4000 users: 6GB RAM
  • For up to 9500 users: 24GB RAM
  • For up to 15,000 users: 32GB RAM
Disk space Minimum:
20GB of disk space

Recommended:
At least 300GB of disk space for 90 days of logs; depends on number of users and log verbosity

(automatically partitions the detected disk space as required)

 

Administrator web browser requirements

  • Windows XP SP3: Internet Explorer (IE) 8.0 and Firefox 15.0 or higher
  • Windows 7 SP1: IE 8.0, IE 10.0, Google Chrome 22.0 or higher and Firefox 15.0 or higher
  • Red Hat Enterprise Linux 6: Firefox 15.0 or higher

 

Hardware specifications

The minimum requirements specified provide enough resources to properly evaluate the product under light traffic loads. The recommended requirements specified provide general production sizing guidance. For more detailed sizing information for production environments, search for “sizing guide” in the IWSVA Sizing Guide (PDF).


Social Media

Connect with us on