Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Trend Micro Deep Security as service

An Overview of Trend Micro Deep Security Solution Components

Deep Security provides a single platform for server security to protect physical, virtual, and cloud servers
as well as hypervisors and virtual desktops. Tightly integrated modules easily expand to offer in-depth
defenses, including anti-malware, web reputation, intrusion prevention, firewall, integrity monitoring,
and log inspection.

Deep Security as service:


Trend Micro Cloud One - Workload Security provides advanced server security for physical, virtual, and
cloud servers. It protects enterprise applications and data from breaches and business disruptions
without requiring emergency patching. This comprehensive, centrally managed platform helps you
simplify security operations while enabling regulatory compliance and accelerating the ROI of
virtualization and cloud projects

Deep Security Agents (DSA):


The Deep Security Agent is a high-performance, small footprint, software component installed on a
computer to provide protection. This component is the policy enforcement point for all protection
functionality on your workloads using an agent. The nature of that protection depends on the rules and
security settings that each Deep Security Agent receives from the Deep Security Manager. Additionally,
the Deep Security Agent sends regular heartbeat and pushes security event logs and various other data
points to the Deep Security Manager.

Deployment Scenario
Deep Security can be deployed with agents in the computers

 In the agent-based deployment model, a Deep Security Agent is installed on every computer (or
VM), but all agents need to access internet
Logical View of Trend Micro Deep Security as service
The following diagram provides a high-level view of a typical Deep Security as service deployment

Deployment Considerations
For Deep Security Manager (cloud)

 The centralized web-based management console that administrators use to configure security policy
and deploy protection to the enforcement components, the Deep Security Agent.

Web browser

 Firefox 24 or higher

 Internet Explorer 9.x, 10.x, 11.x

 Chrome 33 or higher

 Safari 6 or higher (Cookies-enabled)

Supported platform
 Microsoft Windows

 Red Hat Enterprise Linux

 CentOS Linux

 Oracle Linux

 SUSE Linux

 Ubuntu Linux

 Debian Linux

 CloudLinux

 Amazon Linux

 Solaris

 AIX

Deep Security Agent requirements


Network Connectivity Validation
The following table describes the required connectivity between the different components in a Deep
Security environment.

Ports
Port From Towards Listening Node(S)
80, 443 (TCP) Client Servers Internet *.trendmicro.com/*

You might also like