Trend Micro Deep Security

Security that's built for DevOps to automatically defend your AWS workloads and simplify compliance. Pay per instance starting at $0.01/hour. Proactive protection of elastic workloads against threats, malware and vulnerabilities.

Explore
Product Description

Overview

Security built to fit DevOps with robust API's and automated protection. Lock down servers with Application Control, protect Docker containers, and increase malware protection with behavioral analysis, and predictive machine learning. Get proactive protection for EC2 workloads with Trend Micro Deep Security. Secure hybrid environments with the Deep Security AMI and pay hourly per workload protected. Buy and deploy a Deep Security AMI and protect your physical, virtual or cloud resources with an agent or our industry leading virtual appliance, and pay for it all on your AWS bill.

Defend against threats, malware and vulnerabilities with a single product. With protection, starting at just $0.01 / hour, you can: Defend your network against attack with host-based intrusion detection and prevention; Stop patching live systems by shielding from vulnerability exploits; Protect Windows and Linux workloads from malware; Streamline the last mile of compliance with File and System Integrity Monitoring; and, get alerts about potential security events in system logs.

BYOL and SaaS versions of Deep Security are also available.

Security tips & tricks and technical resources available at <www.trendmicro.com/aws > or email us at aws.marketplace@trendmicro.com  with any questions.

Highlights

  • Secure Docker containers with DevOps friendly API security processes including automation security and lock down servers with application control built for the cloud.

  • Accelerate compliance and streamline audit evidence gathering with a single security tool that delivers IPS, Application Control, Anti-malware, Predictive Machine Learning, Integrity Monitoring, Log Inspection, and Content Filtering.

  • Prevent network threats and proactively protect against zero-day exploits with Intrusion Detection and Prevention (IDS/IPS).

Tell Us About Your Needs