1 / 23

Trend Micro InterScan Web Security Suite ™ 2.5

Trend Micro InterScan Web Security Suite ™ 2.5. 戴 燊 Samson Tai 趨勢科技 台灣區技術行銷部 技術顧問. Fighting Spyware in The Enterprise Requires A Multi-Layered Solution. At the Web Gateway

esben
Download Presentation

Trend Micro InterScan Web Security Suite ™ 2.5

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Trend MicroInterScan Web Security Suite™ 2.5 戴 燊 Samson Tai趨勢科技 台灣區技術行銷部 技術顧問

  2. Fighting Spyware in The EnterpriseRequires A Multi-Layered Solution • At the Web Gateway • Detect and block spyware and other potentially unwanted software at the gateway – inbound and outbound blocking features • Contractors, visitors may bring infected machines into your network • At the Desktop • Scan, detect, block, clean spyware and other potentially unwanted programs • Protection for mobile users • Additional Security Controls and Policy Enforcement • Cleaning Options • Trend on the Desktop via OfficeScan • Trend at the Gateway via Damage Cleanup Service (DCS) collaboration • Management Infrastructure • Integrated Policy Management • Global and local spyware event logging and reporting • Timely pattern update and threat management service core competencies

  3. Antivirus Anti-spyware Anti-Phishing URL Filtering MMC protection IWSS – the essential web gateway solution • Best of breed gateway solution for HTTP and FTP traffic • Built with intent – high performing, large enterprise solution • More flexible, configurable options than competitive solutions • Anti-phishing, anti-spyware, anti-virus included in the security platform • URL Filtering and new Malicious Mobile Code protection module options

  4. What’s inside 2.5? • New Security Applications • Anti-spyware collaboration with Damage Cleanup Service • Malicious Mobile Code protection • Enhanced threat scanning methods/options • Configurable deferred scan • Safer MIME-type skipping • Spyware granularity • Trusted URLs receptacle • Configurability • OpenLDAP, SunOne • Per-user/group virus scan policy • Distributed block list ACL • Installation, Manageability and Networking • SNMP • WCCP • Remote install • EHLO support for admin notification • Transparent proxy • Reverse proxy

  5. Integrated Web Security Architecture TMCM Enterprise Protection Strategy (EPS) Caching Routers IWSS URL MMC Policy Management Upcoming Features Spyware Categorization Executive Reporting Mobile Malicious Code ICAP/WCCP DCS Collaboration Anti-Phishing Updates DCS

  6. Integrated Web Security Architecture VSAPI URL Policy ScanEngine URL Quota data HTTP URL Block result network nic HTTP AV LogEngine data FTP AV FTP ScanEngine result File Block deleted quarantine logs

  7. IWSS主畫面

  8. The HTTP > Configuration > User ID screen

  9. The HTTP > Configuration > LDAP screen

  10. The HTTP > Scanning > Target screen

  11. The HTTP > Scanning > Action screen

  12. The HTTP > Scanning > Notification screen

  13. Configuring HTTP URL Blocking

  14. The HTTP > URL Blocking > Via Pattern File (PhishTrap) screen

  15. The HTTP > URL Blocking > Via Pattern File (PhishTrap) screen

  16. The HTTP > URL Filtering Policies > Schedule screen

  17. The HTTP > URL Filtering Policies > URL Categories screen

  18. The HTTP > URL Filtering Policies > Policy List screen Existing user policies

  19. IP-only LDAP Users Hostname The screens for adding a user-based URL filtering policy

  20. The HTTP > URL Filtering Policies > Policy List screen

  21. Existing user quota policies The HTTP > Access Quota Policies >Policy List screen

  22. IP-only LDAP Users Hostname The screens for adding an Access Quota Policy

  23. The HTTP > Access Quota Policy screen

More Related