•  small image
  •  small image
  •  small image
big image

Trend Micro InterScan Messaging Security (User Protection)

This product has 30 review(s) Add Review
Availability: Call For Order
Part no #

Shield your users from the gateway to the endpoint with maximum XGen™ security

CALL FOR PRICE

Trend Micro User Protection, an XGen™ security solution, protects your users against today’s ever-changing threats like fileless malware, targeted attacks, and ransomware variants, including WannaCry.

Brand Trend Micro
Product Type Endpoint Security
Version INTERSCAN™ MESSAGING SECURITY
Distribution Media Medialess
Language Supported English International
OS Compatibility A standard CentOS™ Linux™ operating system is contained within InterScan Messaging Security Virtual Appliance (IMSVA) Software Deployment Microsoft™ Windows™, Linux™ • 2G RAM of memory • 80 GB hard disk space - 500MB of disk space for installation and additional disk space needed for mail storage and database • Microsoft Internet Explorer 6 SP1, 7, 8 or Firefox 3 or above • LDAP Server Microsoft Active Directory 2000 or 2003, IBM Lotus Domino 6.0 or above, or Sun One LDAP Microsoft® Windows™ • Windows Server 2012, 2012 R2 • Windows Server 2008 SP2, 2008 R2 SP1 • Windows Server 2003 SP2, 2003 R2 SP2 • Intel Dual Pentium 3GHz or higher • Microsoft SQL Server 2008 or above, SQL Express 2008 or above Linux • Red Hat™ Enterprise Linux 3, 4, 5 or 6 • Intel Dual Pentium IV 3 GHz • 2GB swap space • PostgreSQL version 8.1.3 or above • MTA Postfx 2.1 or above; Sendmail; Qmail
System Requirements Hardware Requirements for Bare Metal Server Recommended System Requirements • 8-core Intel™ Xeon™ processor or equivalent • 8 GB RAM • 250 GB hard disk space or more. IMSVA automatically partitions the detected disk space based on recommended Linux practices • Monitor that supports 800 x 600 resolution with 256 colors or higher Minimum System Requirements • Dual-core Intel Xeon processor or equivalent • 4 GB RAM • At least 120 GB hard disk space. IMSVA automatically partitions the detected disk space based on recommended Linux practices • Monitor that supports 800 x 600 resolution with 256 colors or higher System Requirements for Virtual Machines Recommended Virtual Machine Requirements and System Settings • 8-core Intel Xeon processor or equivalent • 8 GB RAM • 250 GB of disk space or more. IMSVA automatically partitions the detected disk space based on recommended Linux practices Minimum Virtual Machine Requirements and System Settings • Dual-core Intel Xeon processor or equivalent • 4 GB RAM • 120 GB disk space. IMSVA automatically partitions the detected disk space based on recommended Linux practices Platform support • VMware ESXi 5.0 Update 3 • VMware ESXi 5.5 Update 2 • VMware ESXi 6.0 • Microsoft™ Windows™ Server 2008 R2 Service Pack 1 with Hyper-V™ • Windows Sever 2012 with Hyper-V • Windows Sever 2012 R2 with Hyper-V • Microsoft Hyper-V Server 2008 R2 Service Pack 1 • Microsoft Hyper-V Server 2012 R2
Feature 01 Inbound in-the-cloud email fltering • Lowers impact at the email gateway by fltering email in the cloud • Reduces data center footprint and lowers IT staff time • Allows you to deploy new capacity quickly where needed • Includes Service Level Agreement that ensures email traffc uptime
Feature 02 Real-time protection from evolving threats • Queries web reputation database in real time to block emails containing malicious links • Checks email reputation to block mail from spam sources and rogue “fast flux” service networks • Improves accuracy and responsiveness with in-the-cloud threat correlation • Detects spear phishing emails with Trend Micro Social Engineering Attack Protection • Includes protection for Business Email Compromise (BEC), a popular new phishing technique mainly using executive spoofng • Identifes bulk marketing messages to allow separate dispositions for these emails • Detects and blocks botnet and targeted attack C&C communications • Provides time-of-click protection against malicious URLs in email messages—rewrites and analyzes URLs at the time of click and blocks them if they are malicious
Feature 03 Single management console for customization and control • Streamlines management of cloud pre-flter, scanning of on-premises content, and DLP and encryption • Supports customizable policies and granular, rule-based fltering • Identifes bulk marketing messages to allow customers to manage with separate policies • Integrates quarantines, logs, and reports for easy management, message tracking and visibility
Feature 04 Blocks ransomware before it ever gets to your users • Detects and blocks ransomware with malware scanning, anti-spam, and fle (including executables and macro) scanning • Gives you advanced threat protection with sandbox malware analysis (optional), social engineering protection, and zero-day and document exploit detection • Uses web reputation to protect against web links in emails that are malicious
Feature 05 Connected Threat Defense Using the Control Manager™ console, you can specify customized actions for malicious objects detected by other Trend Micro endpoints, gateways, and network breach detection technology. This allows you to provide a custom defense against targeted threats specifc to your environment.
Feature 06 Add-on Data Privacy and Encryption Module(additional license required; available for virtual appliance or software appliance deployments) • Triggers automatic encryption, quarantine, or notifcation-based fltering policies • Speeds set up of DLP content fltering rules with customizable compliance templates • Reduces your reliance on user-driven encryption with an automated policy-driven gateway solution • Eliminates the complexity of key management with identity-based encryption • Enables compliance personnel to centrally manage DLP policies, and violations across other Trend Micro products from endpoint to gateway with Trend Micro Control Manager
Feature 07 Protects organizations from APTs and other targeted attacks • Minimizes targeted attacks with ScanMail™ multiple protections • Performs execution analysis on your unique environment, and provides custom threat intelligence via Trend Micro™ Deep Discovery™ Analyzer integration (optional) • Detects spear phishing emails with Trend Micro Social Engineering Attack Protection • Includes protection for Business Email Compromise (BEC), a popular new phishing technique mainly using executive spoofng • Provides time-of-click protection against malicious URLs in email messages—rewrites and analyzes URLs at the time of click and blocks them if they are malicious
Feature 08 Blocks more malware, phishing, and spam with reputation technology • Drops up to 85 percent of all incoming email using email sender reputation to free network resources • Stops more spam with fewer false positives than other security solutions according to independent tests • Tags graymail messages such as bulk marketing newsletters for optional sorting • Checks for malicious links within the email to block phishing attacks via enhanced web reputation
Feature 09 Simplifes Data Protection and Encryption • Makes securing outbound email to anyone easier through identity-based email encryption • Eliminates pre-enrollment and certifcate management of PKI encryption via dynamic key generation • Simplifes regulatory compliance and data loss prevention with over 200 customizable DLP templates • Reduces time management and speeds compliance audits using detailed reporting
Review is not available now!
To download flyer, brochure or specification of Trend Micro InterScan Messaging Security (User Protection) , click the on the buttons. (All documents are pdf format)

Trend Micro User Protection, an XGen™ security solution, protects your users against today’s ever-changing threats like fileless malware, targeted attacks, and ransomware variants, including WannaCry.

Categories