Trend Micro User Protection, an XGen™ security solution, protects your users against today’s ever-changing threats like fileless malware, targeted attacks, and ransomware variants, including WannaCry.
Brand | Trend Micro |
Product Type | Endpoint Security |
Version | INTERSCAN™ MESSAGING SECURITY |
Distribution Media | Medialess |
Language Supported | English International |
OS Compatibility | A standard CentOS™ Linux™ operating system is contained within InterScan Messaging Security Virtual Appliance (IMSVA) Software Deployment Microsoft™ Windows™, Linux™ • 2G RAM of memory • 80 GB hard disk space - 500MB of disk space for installation and additional disk space needed for mail storage and database • Microsoft Internet Explorer 6 SP1, 7, 8 or Firefox 3 or above • LDAP Server Microsoft Active Directory 2000 or 2003, IBM Lotus Domino 6.0 or above, or Sun One LDAP Microsoft® Windows™ • Windows Server 2012, 2012 R2 • Windows Server 2008 SP2, 2008 R2 SP1 • Windows Server 2003 SP2, 2003 R2 SP2 • Intel Dual Pentium 3GHz or higher • Microsoft SQL Server 2008 or above, SQL Express 2008 or above Linux • Red Hat™ Enterprise Linux 3, 4, 5 or 6 • Intel Dual Pentium IV 3 GHz • 2GB swap space • PostgreSQL version 8.1.3 or above • MTA Postfx 2.1 or above; Sendmail; Qmail |
System Requirements | Hardware Requirements for Bare Metal Server Recommended System Requirements • 8-core Intel™ Xeon™ processor or equivalent • 8 GB RAM • 250 GB hard disk space or more. IMSVA automatically partitions the detected disk space based on recommended Linux practices • Monitor that supports 800 x 600 resolution with 256 colors or higher Minimum System Requirements • Dual-core Intel Xeon processor or equivalent • 4 GB RAM • At least 120 GB hard disk space. IMSVA automatically partitions the detected disk space based on recommended Linux practices • Monitor that supports 800 x 600 resolution with 256 colors or higher System Requirements for Virtual Machines Recommended Virtual Machine Requirements and System Settings • 8-core Intel Xeon processor or equivalent • 8 GB RAM • 250 GB of disk space or more. IMSVA automatically partitions the detected disk space based on recommended Linux practices Minimum Virtual Machine Requirements and System Settings • Dual-core Intel Xeon processor or equivalent • 4 GB RAM • 120 GB disk space. IMSVA automatically partitions the detected disk space based on recommended Linux practices Platform support • VMware ESXi 5.0 Update 3 • VMware ESXi 5.5 Update 2 • VMware ESXi 6.0 • Microsoft™ Windows™ Server 2008 R2 Service Pack 1 with Hyper-V™ • Windows Sever 2012 with Hyper-V • Windows Sever 2012 R2 with Hyper-V • Microsoft Hyper-V Server 2008 R2 Service Pack 1 • Microsoft Hyper-V Server 2012 R2 |
Feature 01 | Inbound in-the-cloud email fltering • Lowers impact at the email gateway by fltering email in the cloud • Reduces data center footprint and lowers IT staff time • Allows you to deploy new capacity quickly where needed • Includes Service Level Agreement that ensures email traffc uptime |
Feature 02 | Real-time protection from evolving threats • Queries web reputation database in real time to block emails containing malicious links • Checks email reputation to block mail from spam sources and rogue “fast flux” service networks • Improves accuracy and responsiveness with in-the-cloud threat correlation • Detects spear phishing emails with Trend Micro Social Engineering Attack Protection • Includes protection for Business Email Compromise (BEC), a popular new phishing technique mainly using executive spoofng • Identifes bulk marketing messages to allow separate dispositions for these emails • Detects and blocks botnet and targeted attack C&C communications • Provides time-of-click protection against malicious URLs in email messages—rewrites and analyzes URLs at the time of click and blocks them if they are malicious |
Feature 03 | Single management console for customization and control • Streamlines management of cloud pre-flter, scanning of on-premises content, and DLP and encryption • Supports customizable policies and granular, rule-based fltering • Identifes bulk marketing messages to allow customers to manage with separate policies • Integrates quarantines, logs, and reports for easy management, message tracking and visibility |
Feature 04 | Blocks ransomware before it ever gets to your users • Detects and blocks ransomware with malware scanning, anti-spam, and fle (including executables and macro) scanning • Gives you advanced threat protection with sandbox malware analysis (optional), social engineering protection, and zero-day and document exploit detection • Uses web reputation to protect against web links in emails that are malicious |
Feature 05 | Connected Threat Defense Using the Control Manager™ console, you can specify customized actions for malicious objects detected by other Trend Micro endpoints, gateways, and network breach detection technology. This allows you to provide a custom defense against targeted threats specifc to your environment. |
Feature 06 | Add-on Data Privacy and Encryption Module(additional license required; available for virtual appliance or software appliance deployments) • Triggers automatic encryption, quarantine, or notifcation-based fltering policies • Speeds set up of DLP content fltering rules with customizable compliance templates • Reduces your reliance on user-driven encryption with an automated policy-driven gateway solution • Eliminates the complexity of key management with identity-based encryption • Enables compliance personnel to centrally manage DLP policies, and violations across other Trend Micro products from endpoint to gateway with Trend Micro Control Manager |
Feature 07 | Protects organizations from APTs and other targeted attacks • Minimizes targeted attacks with ScanMail™ multiple protections • Performs execution analysis on your unique environment, and provides custom threat intelligence via Trend Micro™ Deep Discovery™ Analyzer integration (optional) • Detects spear phishing emails with Trend Micro Social Engineering Attack Protection • Includes protection for Business Email Compromise (BEC), a popular new phishing technique mainly using executive spoofng • Provides time-of-click protection against malicious URLs in email messages—rewrites and analyzes URLs at the time of click and blocks them if they are malicious |
Feature 08 | Blocks more malware, phishing, and spam with reputation technology • Drops up to 85 percent of all incoming email using email sender reputation to free network resources • Stops more spam with fewer false positives than other security solutions according to independent tests • Tags graymail messages such as bulk marketing newsletters for optional sorting • Checks for malicious links within the email to block phishing attacks via enhanced web reputation |
Feature 09 | Simplifes Data Protection and Encryption • Makes securing outbound email to anyone easier through identity-based email encryption • Eliminates pre-enrollment and certifcate management of PKI encryption via dynamic key generation • Simplifes regulatory compliance and data loss prevention with over 200 customizable DLP templates • Reduces time management and speeds compliance audits using detailed reporting |
Trend Micro User Protection, an XGen™ security solution, protects your users against today’s ever-changing threats like fileless malware, targeted attacks, and ransomware variants, including WannaCry.