trend micro interscan web security suite ™ 2.5

23
1 Trend Micro Trend Micro InterScan Web Security InterScan Web Security Suite™ 2.5 Suite™ 2.5 戴 Samson Tai 戴戴戴戴 戴戴戴戴戴戴戴戴 戴戴戴戴

Upload: esben

Post on 08-Jan-2016

35 views

Category:

Documents


0 download

DESCRIPTION

Trend Micro InterScan Web Security Suite ™ 2.5. 戴 燊 Samson Tai 趨勢科技 台灣區技術行銷部 技術顧問. Fighting Spyware in The Enterprise Requires A Multi-Layered Solution. At the Web Gateway - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Trend Micro InterScan Web Security Suite ™  2.5

1

Trend MicroTrend MicroInterScan Web Security Suite™ InterScan Web Security Suite™

2.52.5

戴 燊 Samson Tai趨勢科技 台灣區技術行銷部

技術顧問

Page 2: Trend Micro InterScan Web Security Suite ™  2.5

2

Fighting Spyware in The EnterpriseFighting Spyware in The EnterpriseRequires A Multi-Layered SolutionRequires A Multi-Layered Solution

• At the Web Gateway– Detect and block spyware and other potentially unwanted software at the

gateway – inbound and outbound blocking features– Contractors, visitors may bring infected machines into your network

• At the Desktop– Scan, detect, block, clean spyware and other potentially unwanted

programs– Protection for mobile users– Additional Security Controls and Policy Enforcement

• Cleaning Options– Trend on the Desktop via OfficeScan– Trend at the Gateway via Damage Cleanup Service (DCS) collaboration

• Management Infrastructure– Integrated Policy Management– Global and local spyware event logging and reporting– Timely pattern update and threat management service core competencies

Page 3: Trend Micro InterScan Web Security Suite ™  2.5

3

IWSS – the essential web gateway IWSS – the essential web gateway solutionsolution

– Best of breed gateway solution for HTTP and FTP traffic

– Built with intent – high performing, large enterprise solution

– More flexible, configurable options than competitive solutions

– Anti-phishing, anti-spyware, anti-virus included in the security platform

– URL Filtering and new Malicious Mobile Code protection module options

Antivirus

URL FilteringAnti-Phishing

Anti-spyware

MMC protection

Page 4: Trend Micro InterScan Web Security Suite ™  2.5

4

What’s inside 2.5?What’s inside 2.5?

• New Security Applications– Anti-spyware collaboration with Damage Cleanup

Service– Malicious Mobile Code protection

• Enhanced threat scanning methods/options– Configurable deferred scan – Safer MIME-type skipping– Spyware granularity

– Trusted URLs receptacle

• Configurability – OpenLDAP, SunOne– Per-user/group virus scan policy– Distributed block list ACL

• Installation, Manageability and Networking– SNMP– WCCP – Remote install– EHLO support for admin notification– Transparent proxy– Reverse proxy

Page 5: Trend Micro InterScan Web Security Suite ™  2.5

5

Integrated Web Security ArchitectureIntegrated Web Security Architecture

IWSSURLMMC

Upcoming FeaturesSpyware Categorization

Executive ReportingMobile Malicious Code

ICAP/WCCPDCS Collaboration

Anti-Phishing Updates

Policy Management

TMCM

DCS

CachingRouters

Enterprise Protection Strategy (EPS)

Page 6: Trend Micro InterScan Web Security Suite ™  2.5

6

Integrated Web Security ArchitectureIntegrated Web Security Architecture

ScanEngine

HTTP

FTP

File Block

data

result

data

result

quarantine

deleted

netw

ork

nicHTTP AV

FTP AV

VSAPI

URL Block

logs

URL Quota

LogEngine

URL Policy

ScanEngine

Page 7: Trend Micro InterScan Web Security Suite ™  2.5

7

IWSSIWSS 主畫面主畫面

Page 8: Trend Micro InterScan Web Security Suite ™  2.5

8

The HTTP > Configuration > User ID screenThe HTTP > Configuration > User ID screen

Page 9: Trend Micro InterScan Web Security Suite ™  2.5

9

The HTTP > Configuration > LDAP screenThe HTTP > Configuration > LDAP screen

Page 10: Trend Micro InterScan Web Security Suite ™  2.5

10

The HTTP > Scanning > Target screenThe HTTP > Scanning > Target screen

Page 11: Trend Micro InterScan Web Security Suite ™  2.5

11

The HTTP > Scanning > Action screenThe HTTP > Scanning > Action screen

Page 12: Trend Micro InterScan Web Security Suite ™  2.5

12

The HTTP > Scanning > Notification screenThe HTTP > Scanning > Notification screen

Page 13: Trend Micro InterScan Web Security Suite ™  2.5

13

Configuring HTTP URL BlockingConfiguring HTTP URL Blocking

Page 14: Trend Micro InterScan Web Security Suite ™  2.5

14

The HTTP > URL Blocking > The HTTP > URL Blocking > Via Pattern File (PhishTrap) screenVia Pattern File (PhishTrap) screen

Page 15: Trend Micro InterScan Web Security Suite ™  2.5

15

The HTTP > URL Blocking > The HTTP > URL Blocking > Via Pattern File (PhishTrap) screenVia Pattern File (PhishTrap) screen

Page 16: Trend Micro InterScan Web Security Suite ™  2.5

16

The HTTP > URL Filtering Policies > The HTTP > URL Filtering Policies > Schedule screenSchedule screen

Page 17: Trend Micro InterScan Web Security Suite ™  2.5

17

The HTTP > URL Filtering Policies >The HTTP > URL Filtering Policies > URL Categories screen URL Categories screen

Page 18: Trend Micro InterScan Web Security Suite ™  2.5

18

Existing user policies

The HTTP > URL Filtering Policies >The HTTP > URL Filtering Policies > Policy List screen Policy List screen

Page 19: Trend Micro InterScan Web Security Suite ™  2.5

19

IP-only

Hostname

LDAP Users

The screens for adding a user-based URL The screens for adding a user-based URL filtering policyfiltering policy

Page 20: Trend Micro InterScan Web Security Suite ™  2.5

20

The HTTP > URL Filtering Policies >The HTTP > URL Filtering Policies > Policy List screen Policy List screen

Page 21: Trend Micro InterScan Web Security Suite ™  2.5

21

Existing user quota policies

The HTTP > Access Quota Policies >The HTTP > Access Quota Policies >Policy List screenPolicy List screen

Page 22: Trend Micro InterScan Web Security Suite ™  2.5

22

IP-only

Hostname

LDAP Users

The screens for adding an Access Quota PolicyThe screens for adding an Access Quota Policy

Page 23: Trend Micro InterScan Web Security Suite ™  2.5

23

The HTTP > Access Quota Policy screenThe HTTP > Access Quota Policy screen