Call a Specialist Today! 800-886-5369

Trend Micro Control Manager
Centralized Policy Management for Data and Threat Protection

 

Trend Micro for Enterprise & Midsize Business
Trend Micro Control Manager
Contact us for pricing!

Overview:


Centralized Policy management for Data and Threat Protection

As enterprises deploy security solutions across multiple layers of their IT infrastructure to protect against a wide range of threats, centrally managing security and data protection policies across the enterprise is becoming increasingly difficult. To address the resulting complexity, operational inefficiency, and loss of visibility, organizations require consistent security management that bridges IT silos that often separate threat and data loss prevention. A centralized approach will improve protection, reduce complexity, and eliminate redundant and repetitive tasks in security administration.

Trend Micro Control Manager™ 6 provides central threat and DLP policy management across layers of the IT infrastructure. Customizable data displays provide the visibility and situational awareness that equip organizations to rapidly assess status, identify threats, and respond to incidents. Now you can streamline administration and achieve more consistent policy enforcement with single-click deployment of data protection policies across endpoint, messaging, and gateway solutions.

Protection Points

Security

Manages security policies for Trend Micro Enterprise Security solutions

Data Protection

Manages data policies for Trend Micro solutions with integrated DLP modules:

  • OfficeScan™
  • ScanMail™ for Microsoft™ Exchange and IBM™ Lotus™ Domino
  • InterScan™ Messaging Security
  • InterScan™ Web Security

Features & Benefits:


Central policy management for endpoint threat and data protection

manage threat and data protection policies across distributed environments with a single solution.

  • Streamlines security administration and saves time for IT security team with centralized approach for threat and data protection
  • Automates policy application with customizable “targets” that deploy granular policies based on flexible attributes
  • Provides more consistent policy enforcement across distributed environments and multiple officeScan servers

Data-centric protection across the enterprise

Configure policies from a central console for multiple layers of endpoint, messaging, and gateway security.

  • Enables cross-product data protection for greater visibility across the network
  • Delivers consistent policy enforcement with a single central console that configures and manages data protection policies across the infrastructure
  • Easily integrates data protection into existing infrastructure without increasing management footprint, security agents, or client impact
  • Saves time and resources while demonstrating due diligence in data privacy compliance

Enterprise-wide visibility

Rapidly understand your security posture, identify threats, and respond to incidents with up-to-the-minute situational awareness across the IT infrastructure.

  • Provides cross-product views of security events across the infrastructure using configurable data displays
  • Improves incident response with increased abilities to identify and respond to threats as they occur
  • Centralizes the identification of botnet and targeted attack Command and Control (C&C) communications across endpoint, web, data center, and email security products

Web-based central Security management console

  • Delivers integrated, centrally managed security and data protection for a unified defense
  • Streamlines management with customizable role-based administration, automated updates, and license management
  • Automatically provisions new endpoints with the appropriate security and data protection policies
  • Provides enterprise-wide visibility into managed products—including down to the level of individual clients

Customizable Dashboard

  • Provides cross-product views with user-configurable data displays
  • Allows flexible configuration of additional dashboard views using pre-defined widgets
  • Provides actionable intelligence, facilitating deeper investigation into security events
  • Toggles data presentation between graphic or tabular views

Smart Protection network threat Statistics

  • Displays statistics and tracks the latest trends for Trend micro’s cloud-based threat intelligence
  • Includes metrics for both the global threat environment and the local deployment

Customizable Reporting, Ad Hoc Query, and Configurable Alerts

  • Allows easy access to critical security information
  • Enables quick start with pre-defined reporting templates
  • Facilitates compliance with internal IT audit requirements
  • Simplifies data interpretation with intuitive charts and graphs

Key Benefits

  • Simplifies administration with central console for security and data policies
  • Improves data protection by managing integrated DLP across the IT infrastructure
  • Reduces risk with consolidated updates and security alerts
  • Increases visibility with easy access to critical data
  • Lowers security management costs by saving time and reducing IT workload

System Requirements:


System Requirements
Server Hardware Requirements
  • At least 1.86GHS Intel™ Core™2 Duo or compatible CPU; AMD 64 processor; Intel 64 processor
  • 2GB RAM (4GB recommended)
  • 20G disk space recommended as reserve for growing logs and database demands
Software Requirements
Operating system
  • Windows Server 2003 Standard/enterprise edition SP1/SP2
  • Windows Server 2003 Standard/enterprise edition (r2) SP1/SP2 (WoW 64-bit)
  • Windows Server 2008 Standard/enterprise edition SP1/SP2
  • Windows Server 2008 Web edition SP1/SP2, Standard edition with/without SP1 (r2) (WoW 64-bit)
Web Console
  • Microsoft IIS 6.0 (for 2003 platform)
  • IIS 7.0 (for 2008 platform)
  • ISS 7.5 (for 2008 R2 platform)
Database Software
  • Microsoft SQL Server 2005 express SP2/SP3
  • Microsoft SQL Server 2005 Standard/enterprise (including 64-bit) SP2/SP3
  • Microsoft SQL Server 2008 Express; Microsoft SQL Server 2008 (R2) Standard/Enterprise (including 64-bit)
Virtualization Support
VMware: ESX/ESXi Server 3.5, 4.0, 4.1, 5.0; Server 1.0.3, 2; Workstation/Workstation ACE Edition 7.0, 7.1; vCenter™ 4, 4.1, 5; View™ 4.5, 5
Citrix: XenServer 5.5, 5.6, 6.0
Microsoft: Virtual Server 2005 R2 with SP1; Windows Server 2008 (R2) 64-bit Hyper-V; Hyper-V Server 2008 R2 64-bit

Control Manager is available standalone, or as part of these security suites:

  • Enterprise Security Suite
  • Enterprise Security for Endpoints and Mail Servers
  • Enterprise Security for Endpoints
  • Enterprise Security for Communication and Collaboration