본문으로 바로 가기
배경

Trendmicro

Cloud One

Easiest and most powerful all-in-one cloud
security platform for hybrid, multi-cloud environments(SaaS)
Trend Micro Cloud One is a cloud-based security platform optimized for enterprise cloud environments that delivers industry-leading security for your cloud environment. Provides six essential cloud-native security features for your customers' secure cloud migration. An all-in-one cloud security platform that delivers integrated security management from cloud infrastructure to DevOps pipelines, container security, serverless security, and enterprise-wide cloud environments with a single security platform.
Cloud One™ Features
  • Automated Security

    Code-level security allows DevOps teams to implement

    security in their built pipeline,

    and automation helps protect their cloud

    environment and meet compliance
    requirements quickly.

  • Multi-platform

    Protect your applications as well as secure

    hybrid cloud, multi-cloud, and multi-service

    environments with extensive platform

    support selected by your customers.

  • All-in-One

    A platform that provides all the tools and

    in-depth security features you need to

    meet and manage your cloud security needs.

Provides Cloud-native Security
클라우드 워크로드 Worklosd Security
Workload Security
Integrated Runtime Environment Security for Cloud Workloads (physical, virtual, cloud and docker host)
컨테이너 보안 Container Security
Container Security
Container security for
K8S and CaaS(Container
as a service) environments
애플리케이션 보안 Application Security
Application Security
Cloud-native application security for serverless environments
스토리지 파일 보안 File Storage Security
File Storage Security
File security for
cloud storage services
적합성 Conformity
Conformity
CSPM(Cloud security and compliance posture mana gement) Cloud security and compliance health management
오픈소스 취약점 대응 Open Source Security
Open Source Security
Responding to open source vulnerabilities used in cloud applications
네트워크 보안 Network Security
Network Security
Cloud Network Security
(NGIPS) for Cloud
Networks(VPC)

Deep Security

Runtime security for
Cloud Workload (physical, virtual, cloud, and container)
Secure cloud workloads across a variety of public cloud environments, including AWS, Azure, GCP, KT Cloud, Naver Cloud, and NHN Toast.
Cloud One Workload Security provides integrated security for a variety of workload environments, including physical, virtual, cloud,
and docker hosts, in enterprise multi- and hybrid cloud environments.
Deep Security 구조
All-in-One Security
백신 (Anti-Malware)

Anti-Malware
Protect against malicious code attacks
방화벽 (Firewall)

Firewall
5-tuple-based access control
취약점 방어 (IPS/IDS)

IPS/IDS
Detect and block vulnerabilities or zero-day attacks
무결성 모니터링 (Integrity Monitoring)

Integrity Monitoring
Detect unusual changes in directories, files, registry, etc
로그 감사 (Log Inspection)

Log Inspection
Efficient discovery of critical security events in logs
애플리케이션 제어 (Application Control)

Application Control
Block unauthorized applications
  • Global Threat Intelligence-Based Defense of New/Variable Ransomware
  • Real-time virus scanning capabilities
  • Virtual patch capabilities for vulnerability protection
  • Separate security policy enforcement and integrated security management capabilities per host server
  • Block illegal applications
  • Block internal side movement and block C&C traffic
Cloud One Workload Security
  • Docker+Container Host Runtime Full Stack Protection
  • Provides runtime protection for container environments
  • Docker+Container Host, Container Platform (Docker®),
    Orchestrator (Kub ernetes®),
    Detect and block attacks on containers themselves and containerized applications
  • With the API included in Cloud One Workload Security, security
    teams can protect and control containers with automated processes
DevOps
  • Enables automated workload security in the pipeline
  • Easily protect your applications by integrating DevOps, management,
    monitoring, and Cloud One Workload Security at the API level for
    configuring workloads in your multi-, hybrid cloud environment
all_in_one_security
Deep Security Features
  • Host-Based Integrated Security
  • Docker + Container Environment Security
  • Private Cloud, Data Center-Optimized Security Solutions
  • Multi-hybrid cloud security integration
  • Provides host-based security for cloud environments
  • Hybrid cloud security integration (cloud, virtualization, physical) management
  • Most platform support (Linux, Windows, Unix)
  • Meet key security compliance (PCI-DDS, HIPPA, H국제CC 최고등급, EAL2+ITECH)
  • CC certification, GS certification
  • Nara Market (Procurement) Registration
  • The nation's largest data center customer's choice of security solution
  • International CC Highest Rating, EAL2+
Supported OS | Linux
  • 지원 오에스 로고
  • 지원 오에스 로고
  • 지원 오에스 로고
  • 지원 오에스 로고
  • 지원 오에스 로고
  • 지원 오에스 로고
  • 지원 오에스 로고
  • 지원 오에스 로고
Supported Platforms
  • 지원 플랫폼 종류
  • 지원 플랫폼 종류
  • 지원 플랫폼 종류
  • 지원 플랫폼 종류
  • 지원 플랫폼 종류
  • 지원 플랫폼 종류
  • 지원 플랫폼 종류
  • 지원 플랫폼 종류
  • 지원 플랫폼 종류
  • 지원 플랫폼 종류
  • 지원 플랫폼 종류
  • 지원 플랫폼 종류
  • 지원 플랫폼 종류
  • 지원 플랫폼 종류
  • 지원 플랫폼 종류
  • 지원 플랫폼 종류
  • 지원 플랫폼 종류
  • 지원 플랫폼 종류
  • 지원 플랫폼 종류
  • 지원 플랫폼 종류

TippingPoint

Global NGIDPS top-tier solution with
NGIDPS single equipment up to 40Gbps performance
Next Generation Intrusion Detection & Prevention System 차세대 침입 탐지 및 방지 시스템
Zero Day Initiative
  • Global leading vulnerability discovery reports Zero Day vulnerabilities from ZDI (Zero Day Initiative) enable trend micro customers to be protected first from zero day vulnerabilities
  • Provides signatures based on Vulnerability-generic
  • Quickly provide filter rules based on defense of unknown/known security vulnerabilities to preemptive responses
Zero Day Initiative
Global Vulnerability Research
omdia research
2019 NSS Labs NG IPS Test
nss
Vendor Security
Effectiveness
Valie
(TCO per Protected Mbps)
Overall Rating
Trend Micro TippingPoint 8200TX
Appliance v5.1.0.49751 + Deep Discovery
Analyzer v6.1.0.114 + OfficeScan v12.0.5024
96.2% Above
Average
$40 Above
Average
Recommended
Trend Micro TippingPoint 8200TX
Appliance v5.1.0.4965 & Tren Micro
Smart Protection fo Endpoints v12.0.5024
92.1% Above
Average
$28 Above
Average
Recommended
< NSS Lab’s 2019 Recommendations : An Analysis of Breach Prevention Systems >
  • zero_day

    TippingPoint Customer defends
    against zero-day vulnerabilities on average 81 days earlier

  • garther

    Top Global IDPS Share in 2020

Deep Discover

Deep Discovery Inspector -
Network APT Detection
  • Products designed to detect targeted and zero-day attacks in the network's behavior, respond early, and proactively defend against serious damage
  • In addition to detecting illegal files and communications, attacks that exploit management tools at various stages of attack, from the early stages of the attack to internal proliferation and external communication
Deep Discovery Analyzer -
Network APT Analysis
  • Add sandbox analytics with Trend Micro's web, email, endpoint and server protection products
  • Increase security with Trend Micro products without significant changes in production as a response to targeted, zero-day, and thin, variable ransomware attacks
  • Automatically create and share signatures available for other Trend Micro products in addition to analytics
  • Manual analysis is used to analyze the threat suspicion information collected directly by the customer
Custom Sandbox
Establishing an environment using the operating system or software used in the customer's real environment, including Korean. Analyze from near-real-world images
Linkage with
Trend Micro Solution
Analyze suspicious files found on each product in conjunction with each of Trend Micro's solution
Collaboration with
third-party solutions
Support ICAP linkage, receive files or URLs such as web proxy products that implement ICAP client functions, analyze them in the user sandbox, and feedback on the results
Analyze manually
Send the URL of the file you want to analyze on the management screen to the sandbox for analysis
Mac file analysis
Sandbox analysis is also possible for file formats used in Macs such as macho and class
Deep Discovery Email Inspector -
E-Mail APT
  • A product specific to mail security that also blocks targeted mail attacks or ransomware mail attacks
  • Troubleshooting issues with state-of-the-art detection technology and support for files with passwords in addition to sandboxes
  • E-mail-controlled MTA mode, as well as detection mode for flexible deployment without affecting existing system configurations
Technology to respond to threats
  • Password compressed files also automatically retrieve and analyze passwords in the body of mail
  • Advanced Threat Scan Engine (ATSE) detects unpatterned malicious file or document vulnerability attack code
  • Analyze URLs in the mail body and compare them to malicious URL databases that Trend Micro updates daily through web reputation
  • User sandboxes reproduce the customer's real world and detect unique attacks targeting the customer
Flexible Operability
  • Immediately block malicious emails, isolate attachments, and insert warning messages into the body
  • Seamless management/operation, such as searching for details by drop-down from search list and previewing attachments
Installation for deployment
  • Can be installed in MTA mode (inline) to block malicious emails, BCC mode of detection monitoring entity, and TAP mode
  • Gateway options allow you to provide gateway functionality, such as anti-spam protection, in addition to traditional DDEI functionality
Deep Discovery Network Analytics -
Network APT Correlation analysis
Provides a correlation analysis that adds operational efficiency to Network APT solutions to provide hidden attack detection and correlation analysis.
Features
Detection events in the Deep Discovery Inspector, network metadata interworking
Provides correlation maps and detection event/transaction information
Visualize association information and correlation between individual threat events

Apex One

Next Generation Endpoint Security
30+ Trend Micro Global Threat Intelligence-based machine learning technology and EPP capabilities such as new/variable malware
(ransomware), application control, and vulnerability protection, all-in-one single-agent integrated endpoint security solution
  • 런타임 머신러닝Runtime Machine Learning
  • 가상패치Virtual Patches
  • 애플리케이션 제어Application Control
  • 변종 랜섬웨어 차단Blocking Vaiant Ransomware
  • IOA 동적 기반 분석Device Control
  • 장치 제어Device Control
  • C&C 차단C&C Cut-off
  • 에이전트 격리/파일 격리Agent Isolation
    File Isolation
  • 파일평판 웹평판File Reputation Web Reputation
Additional Services
  • EDREDR
  • 클라우드 샌드박스Cloud
    Sandbox
  • 애플리케이션 제어Application Control
Protection Target
  • Physical Computing Endpoint
  • Virtual Machine Endpoint
  • Window PC & Server Mail
  • Mac Computer
  • POS, ATM Endpoint
Threat Detection Function
  • Machine Running(File DNA fingerprint analysis, Runtime Machine Learning)
  • Behavior Monitoring (fileless, script, injection, ransomware, browser threats)
  • File Reputation
  • Web Reputation
  • Census Check
  • Intrusion prevention (host firewall, exploit prevention)
  • Vulnerability Defense (Virtual Patch)
  • C&C Cut-off
  • DLP, Device Control
  • Sandbox&A.P.T Detection interlocking
  • EDR(Endpoint Detextion and Response)
APEX One™ Configuration
Apex One Server
(Window Server _ IPS)
APEX One™ 구성
VDI plug-ins optimized for VDI environments
  • AV-Storm protection technology in VDI environments eliminates the need for separate VDI-only virtual appliances
  • Provide dedicated VDI plug-ins for VMWARE, CITRIX, and Microsoft HyperV to ensure and protect VDI environment performance
before after
APEX One EDR - Endpoint Detection and Response
Endpoint detection and response (EDR) integrated into the Apex One™ agent enables advanced detection and
analysis to explore the source of threats, track new threats, and provide optimal response
Advantages
  • Automated EDR process
  • Threat Analysis Insights and Pool Visibility
  • All-in-one Solution
Protection Target
  • MicrosoftⓇ WindowsⓇ
  • MacOS*
Key Features
  • IDC Sweeping
  • IOA Hunting
  • RCA Analysis
  • Influential Detection Analysis
  • Quick Response
  • API Interworking Support
RCA(Root Cause Analysis) Provision
RCA(Root Cause Analysis) 제공
APEX One EDR Workflow
APEX One EDR 워크플로우