The web has rapidly become a top threat vector for business. In addition to blocking malicious code, inappropriate websites, and targeted attacks, security managers are also being asked to secure the expanding use of Web 2.0 and cloud-based applications, while reducing overhead and bandwidth costs.
Brand | Trend Micro |
Product Type | Endpoint Security |
Version | INTERSCAN™ WEB SECURITY VIRTUAL APPLIANCE |
Distribution Media | Medialess |
Language Supported | English International |
System Requirements | Recommended Hardware • Single 3.3 GHz Intel Quad Core processor supporting Intel Hyper • Thread Technology or equivalent - 8 GB RAM • 300 GB disk space or more for log intensive environments IWSVA automatically partitions the detected disk space as per recommended Linux practices Administrator Web Console Requirements • Microsoft Internet Explorer 9 or 10 • Mozilla Firefox 39 or later • Google Chrome 44 or later Server Platform Compatibility • Virtual Appliances Supports VMware ESX and ESXi v4.0, v4.1, v5.0, v5.1, v5.5 Supports Hyper-V 2.0, 3.0 NOTE: If you use a virtual platform for IWSVA, reserve adequate resources for IWSVA. Otherwise, needed resources may be used by other instances on the same physical machine, and IWSVA may not function as designed Directory Servers for End-User Authentication To confgure policies based on Lightweight Directory Access Protocol (LDAP) users and groups, the product integrates with the following LDAP directory services: • Microsoft Active Directory (AD) 2003, 2008, and 2012 • Linux OpenLDAP Directory 2.2.16 or 2.3.39 • Sun Java System Directory Server 5.2 (formerly Sun ONE Directory Server) • Novell eDirectory 8.8 |
Feature 01 | Superior Protection InterScan Web Security stops threats at the gateway before they ever get to your endpoints. It delivers comprehensive real-time protection against the full scope of web threats, using anti-malware, the strongest advanced threat Protection, URL fltering, and web reputation. Interscan Web Security leverages the real-time protection of the Trend Micro™ Smart Protection Network™, ensuring you are protected against new and emerging threats, like ransomware. |
Feature 02 | Award-Winning Gateway Antivirus and Antispyware • Scans inbound and outbound traffc for malware • Prevents malware from entering your network • Stops virus and spyware downloads, botnets, malware callback attempts, and tunneling • Closes the HTTPS security loophole by decrypting and inspecting encrypted content |
Feature 03 | Advanced Threat Detection In addition to zero-day exploit scanning and detection of advanced persistent threats and botnets, the optional Trend Micro™ Deep Discovery™ Analyzer applies additional threat intelligence by using sandbox execution analysis to inspect suspicious fles offline. • Detonates fles in customer-defned sandbox environment(s) and monitors for risky behavior • Uses adaptive security updates to block new C&C servers found during analysis • Identifes attacks using continually updated detection intelligence and correlation rules from Smart Protection Network intelligence and dedicated threat research |
Feature 04 | Web Reputation with Correlated Threat Data Trend Micro™ Smart Protection Network™ web reputation technology blocks access to websites with malicious activity. • Protects against new threats and suspicious activity in real time • Identifes and blocks botnet and targeted attack C&C communications using global threat intelligence |
Feature 05 | Powerful and Flexible URL and Active Code Filtering • Leverages real-time URL categorization and reputation to identity inappropriate or malicious sites • Offers six different policy actions for web access control, including: monitor, allow, warn, block, block with password override, enforce time quota • Supports object-level blocking within dynamic web pages such as Web 2.0 mashups • Stops drive-by downloads and blocks access to spyware and phishing websites |
Feature 06 | Application Visibility and Control • Monitors more than 1,000 internet protocols and applications, including instant messaging, peer-to-peer, social networking applications, and streaming media • Allows users to access cloud-based applications, while enforcing your policies to mitigate risks and conserve resources • Enables policy creation to control all web activities and user online time |
Feature 07 | Ransomware Protection InterScan Web Security Virtual Appliance is part of Trend Micro’s multi-layered approach to block ransomware at the gateway level before reaching your users. It provides: • Scanning for zero-day exploits and browser exploits • Botnet and C&C callback detection to block ransomware botnet and C&C sites • Integration with Deep Discovery Analyzer for sandbox analysis (optional) • Real-time web reputation to determine if a URL is a known delivery vehicle for ransomware |
Feature 08 | Real-Time Reporting and Centralized Management Centralizes logging, reporting, confguration management, and policy synchronization across multiple InterScan Web Security servers regardless of their geographic location. Through a single console, administrators can more effectively monitor, manage, and secure their organization’s internet usage. • Monitors internet activity as it happens for unprecedented visibility • Changes reporting to a proactive decision-making tool, enabling on-the-spot remediation • Centralizes the confguration and reporting of multiple instances of the software virtual appliance • Supports creation of custom reports |
Feature 09 | Data Loss Prevention Add-on Module Extend your existing security to support compliance and prevent data loss. Single-click deployment of DLP capabilities built into InterScan Web Security Virtual Appliance give you visibility and control of data in motion. • Tracks and documents sensitive data flowing through network egress points • Identifes risky business processes and improves corporate data usage policies • Detects and reacts to improper data use based on keywords, regular expressions, and fle attributes • Reduces administration through central management with Trend Micro Control Manager along with other endpoint and email DLP modules |
Feature 10 | Reduced Complexity and Costs Deployed as a virtual or software appliance, InterScan Web Security Virtual Appliance lets you achieve data center consolidation and standardization. With centralized management of multiple gateways and native failover and redundancy. the solution makes ongoing management simpler — saving you time and resources. |
Feature 11 | Protection Points • Internet Gateway Threat and Data Protection • Cloud-based applications • Web 2.0 applications • Advanced Persistent Threats • Ransomware • Zero-day exploit • Malware • Data loss • Viruses and worms • Bots and command and control (C&C) callback • Spyware and keyloggers • Malicious mobile code • Rootkits • Phishing attacks • Content threats |
The web has rapidly become a top threat vector for business. In addition to blocking malicious code, inappropriate websites, and targeted attacks, security managers are also being asked to secure the expanding use of Web 2.0 and cloud-based applications, while reducing overhead and bandwidth costs.