trend micro interscan web security suite ™ 2.5
DESCRIPTION
Trend Micro InterScan Web Security Suite ™ 2.5. 戴 燊 Samson Tai 趨勢科技 台灣區技術行銷部 技術顧問. Fighting Spyware in The Enterprise Requires A Multi-Layered Solution. At the Web Gateway - PowerPoint PPT PresentationTRANSCRIPT
1
Trend MicroTrend MicroInterScan Web Security Suite™ InterScan Web Security Suite™
2.52.5
戴 燊 Samson Tai趨勢科技 台灣區技術行銷部
技術顧問
2
Fighting Spyware in The EnterpriseFighting Spyware in The EnterpriseRequires A Multi-Layered SolutionRequires A Multi-Layered Solution
• At the Web Gateway– Detect and block spyware and other potentially unwanted software at the
gateway – inbound and outbound blocking features– Contractors, visitors may bring infected machines into your network
• At the Desktop– Scan, detect, block, clean spyware and other potentially unwanted
programs– Protection for mobile users– Additional Security Controls and Policy Enforcement
• Cleaning Options– Trend on the Desktop via OfficeScan– Trend at the Gateway via Damage Cleanup Service (DCS) collaboration
• Management Infrastructure– Integrated Policy Management– Global and local spyware event logging and reporting– Timely pattern update and threat management service core competencies
3
IWSS – the essential web gateway IWSS – the essential web gateway solutionsolution
– Best of breed gateway solution for HTTP and FTP traffic
– Built with intent – high performing, large enterprise solution
– More flexible, configurable options than competitive solutions
– Anti-phishing, anti-spyware, anti-virus included in the security platform
– URL Filtering and new Malicious Mobile Code protection module options
Antivirus
URL FilteringAnti-Phishing
Anti-spyware
MMC protection
4
What’s inside 2.5?What’s inside 2.5?
• New Security Applications– Anti-spyware collaboration with Damage Cleanup
Service– Malicious Mobile Code protection
• Enhanced threat scanning methods/options– Configurable deferred scan – Safer MIME-type skipping– Spyware granularity
– Trusted URLs receptacle
• Configurability – OpenLDAP, SunOne– Per-user/group virus scan policy– Distributed block list ACL
• Installation, Manageability and Networking– SNMP– WCCP – Remote install– EHLO support for admin notification– Transparent proxy– Reverse proxy
5
Integrated Web Security ArchitectureIntegrated Web Security Architecture
IWSSURLMMC
Upcoming FeaturesSpyware Categorization
Executive ReportingMobile Malicious Code
ICAP/WCCPDCS Collaboration
Anti-Phishing Updates
Policy Management
TMCM
DCS
CachingRouters
Enterprise Protection Strategy (EPS)
6
Integrated Web Security ArchitectureIntegrated Web Security Architecture
ScanEngine
HTTP
FTP
File Block
data
result
data
result
quarantine
deleted
netw
ork
nicHTTP AV
FTP AV
VSAPI
URL Block
logs
URL Quota
LogEngine
URL Policy
ScanEngine
7
IWSSIWSS 主畫面主畫面
8
The HTTP > Configuration > User ID screenThe HTTP > Configuration > User ID screen
9
The HTTP > Configuration > LDAP screenThe HTTP > Configuration > LDAP screen
10
The HTTP > Scanning > Target screenThe HTTP > Scanning > Target screen
11
The HTTP > Scanning > Action screenThe HTTP > Scanning > Action screen
12
The HTTP > Scanning > Notification screenThe HTTP > Scanning > Notification screen
13
Configuring HTTP URL BlockingConfiguring HTTP URL Blocking
14
The HTTP > URL Blocking > The HTTP > URL Blocking > Via Pattern File (PhishTrap) screenVia Pattern File (PhishTrap) screen
15
The HTTP > URL Blocking > The HTTP > URL Blocking > Via Pattern File (PhishTrap) screenVia Pattern File (PhishTrap) screen
16
The HTTP > URL Filtering Policies > The HTTP > URL Filtering Policies > Schedule screenSchedule screen
17
The HTTP > URL Filtering Policies >The HTTP > URL Filtering Policies > URL Categories screen URL Categories screen
18
Existing user policies
The HTTP > URL Filtering Policies >The HTTP > URL Filtering Policies > Policy List screen Policy List screen
19
IP-only
Hostname
LDAP Users
The screens for adding a user-based URL The screens for adding a user-based URL filtering policyfiltering policy
20
The HTTP > URL Filtering Policies >The HTTP > URL Filtering Policies > Policy List screen Policy List screen
21
Existing user quota policies
The HTTP > Access Quota Policies >The HTTP > Access Quota Policies >Policy List screenPolicy List screen
22
IP-only
Hostname
LDAP Users
The screens for adding an Access Quota PolicyThe screens for adding an Access Quota Policy
23
The HTTP > Access Quota Policy screenThe HTTP > Access Quota Policy screen