Notifications
Notifications
CDW Logo

Trend Micro Deep Security Agent Full Agent Bundle - license ( 1 year )

Mfg # DXNN0004 CDW # 2287069 | UNSPSC 43233205
Software Details
  • License ( 1 year )
  • volume
  • Linux
  • AIX
  • Solaris
  • 1 server
  • 1-10 licenses
  • Win
  • HP-UX
  • English
View Tech Specs

Know your gear

Trend Micro Deep Security Agent Full Agent Bundle includes Firewall, Deep Packet Inspection, Integrity Monitoring + Log Inspection.

The Deep Security Agent is a server-based software component of the Deep Security solution. The agent enables IDS/IPS, web application protection, application control, firewall, integrity monitoring and log inspection. It defends the server or virtual machine by monitoring incoming and outgoing traffic for protocol deviations, content that signals an attack, or policy violations.

The Deep Security Firewall software module is enterprise-grade, bi-directional, and stateful. It can be used to allow communications over ports and protocols necessary for correct server operation and block all other ports and protocols reducing the risk against unauthorized access to the server.

The high-performance deep packet inspection engine examines all incoming and outgoing traffic, including SSL traffic, for protocol deviations, content that signals an attack, or policy violations. It can operate in detection or prevention mode to protect operating systems and enterprise application vulnerabilities. It protects web applications from application-layer attacks including SQL injection and cross-site scripting. Detailed events provide valuable information, including who attacked, when they attacked and what they attempted to exploit. Administrators can be automatically notified via alerts when an incident has occurred. Deep packet inspection is used for intrusion detection and prevention, web application protection, and application control.

The Deep Security Integrity Monitoring module monitors critical operating system files and critical application files (files, directories, registry keys and values, etc.), to detect suspicious behavior.

The Deep Security Log Inspection module provides the ability to collect and analyze operating system and application logs for security events. Log Inspection rules optimize the identification of important security events buried in multiple log entries. These events are forwarded to a Security Information and Event Management (SIEM) system or centralized logging server for correlation, reporting and archiving.

Enhance your purchase

This item was discontinued on December 12, 2016