Skip to content

InterScan Web Security

Deeper Visibility for Maximum Control

Faced with today’s advanced Internet threats and the growing use of cloud-based consumer applications in the workplace, application visibility is essential to understanding network risks and managing a workforce without limits. InterScan Web Security is a software virtual appliance that combines application control with advanced anti-malware scanning, real-time web reputation, and flexible URL filtering to provide superior Internet threat protection.

InterScan Web Security

Delivers unparalleled visibility and control

  • Allows deeper more complete visibility
  • Centralises management for maximised control
  • Monitors web use as it happens
  • Enables on-the-spot remediation
  • Reduces sprawl and energy costs

open all

Superior Threat Protection and Control Over Cloud-based Applications

InterScan Web Security is a software virtual appliance that dynamically protects against the ever-growing flood of web threats at the Internet gateway—exclusively designed to secure you against traditional and emerging web threats at the Internet gateway.

Application control combines with industry leading anti-malware scanning, real-time web reputation, URL filtering and enhanced anti-botnet detection to protect systems and keep users productive. When deployed with the optional Advanced Reporting and Management Module, you gain real-time visibility into all your Internet activities.

  • An optional Data Loss Prevention module with easy-to-use and customizable templates helps you stay in compliance by securing outbound data
  • Centralizes management of distributed web gateways across the WAN with optional ARM module
  • Enables granular policy creation to control all web activities and user time spent on the internet

Award-winning Gateway Antivirus and Antispyware

  • Scans inbound and outbound traffic for malware
  • Prevents malware from entering your network, relieving the burden on endpoint security
  • Stops virus and spyware downloads, botnets, phone home attempts, and malware tunneling
  • Closes the HTTPS security loophole by decrypting and inspecting encrypted content
  • Allows enterprises to selectively decrypt HTTPS traffic to balance content security with user privacy needs

Web Reputation with Correlated Threat Data

  • Trend Micro™ Smart Protection Network™ web reputation technology blocks access to web sites with malicious activity to protect against new threats and suspicious activity in real time

Powerful URL and Active Code Filtering

  • Deploys as a virtual appliance or software appliance, supporting datacenter consolidation and standardisation.
  • Increases utilisation rates of existing servers, reducing sprawl and energy costs.
  • Improves security levels with quick deployment of new capacity as needed.
  • Speeds recovery from unplanned outages with native failover and redundancy functions.

open all

Delivers Unparalleled Visibility and Control

InterScan Web Security offers unmatched protection at the Internet gateway and provides the visibility and control required for IT administrators to keep their networks safe and their users productive.

  • Monitors and reports on more than 800 Internet protocols and applications, including instant messaging, peer-to-peer, social networking applications, and streaming media
  • Allows users to access cloud-based applications, while enforcing acceptable user policies to mitigate risks and conserve resources
  • Enables granular policy creation to control all web activities and user time spent on the internet

Simplifies Installation and Optimizes Resources

  • Deploys as a virtual appliance or software appliance, supporting datacenter consolidation and standardization
  • Increases utilization rates of existing servers, reducing appliance sprawl and energy costs
  • Improves security levels with quick deployment of new capacity as needed
  • Speeds recovery from unplanned outages with native failover and redundancy functions
  • Simplifies OS and security updates, version control, and testing

Flexible Deployment and Integration

  • Monitors Internet activity as it happens for unprecedented visibility.
  • Changes reporting to a proactive decision-making tool, enabling on-the-spot remediation.
  • Centralises the configuration and reporting of multiple instances of the software virtual appliance.

Advanced Reporting and Management

If you lose visibility into what’s happening on your network, you have no control over what happens on it.Whether it’s malware delivered from a legitimate site, accessing illegal or inappropriate content, or using the latest Web 2.0 app to stream video, you need to know who is going where and when. To combat the dramatic rise in web threats, your enterprise needs immediate access to critical information about the safety of your network and how the Internet is being used. You also need clear visibility into users’ Internet activity with real-time monitoring and detailed forensics in order to adequately protect against these threats.

Trend Micro™ Advanced Reporting and Management provides customers with unprecedented visibility into how the Internet is impacting their organisation. Advanced Reporting and Management applies state-of-the-art database technology and user interface design to help reduce the organisation’s exposure to non-business Internet use and increase their security posture against the latest web threats.Administrators and management have the ability to quickly and easily understand what is happening across their network in real time, drill down into specific areas of interest, and set policies in InterScan Web Security to enforce their network rules.

Key Benefits

  • Accelerates problem resolution by monitoring Internet use and threat activity in real time.
  • Simplifies operations by centralising logging, reporting and management for multi-unit support.
  • Extends visibility with over 50 standard reports and custom report capability.
  • Reduces costs with real-time troubleshooting and forensics capabilities.
  • Standardises security policies with policy and configuration replication and synchronisation.

Advanced Reporting and Management centralises the logging, reporting, configuration management and policy synchronisation across multiple InterScan Web Security servers. Through a single console, administrators can more effectively monitor, manage, and secure their organisations Internet usage.Because the solution installs as a software virtual appliance, IT can consolidate hardware resources,optimise utilisation, and reduce the cost of deployment and operation.



Choose Security That Fits

InterScan Web Security can be deployed as a virtual appliance or software appliance.

Virtual Appliance

Virtualized deployments via Hypervisor technologies

  • Microsoft® Hyper-V Virtual Appliance
  • VMware Ready Virtual Appliance: Rigorously tested and validated by VMware, the only messaging gateway solution to achieve VMware Ready validation. Supports VMware ESX or ESXi v3.5 and vSphere.

    VMware Ready

Software Appliance

Bare metal installation with tuned, security-hardened OS

Certified by Trend Micro
Through extensive testing and validation, Trend Micro certifies platforms for compatibility with Trend Micro software virtual appliance solutions.
See certified server platforms


 InterScan Web SecurityAdvanced Reporting and Management (ARM)
Server Platform Compatibility Virtual Appliances:
VMware ESX/ESXi v3.5 and higher; Microsoft Hyper-V Windows 2008 SP1 or Windows 2008 R2

Software Appliances:
for the latest Certified by Trend Micro platforms, please go to www.trendmicro.com/go/certified
Virtual Appliances:
VMware ESX/ESXi v3.5 and higher; Microsoft Hyper-V Windows 2008 SP1 or Windows 2008 R2

Software Appliances:
for the latest Certified by Trend Micro platforms, please go to www.trendmicro.com/go/certified
CPU Minimum:
Single 2.0 GHz Intel™ Core2Duo™ 64-bit processor supporting Intel VT™ or equivalent

Recommended:
  • For up to 4000 users: Dual 2.8 GHz Intel Core2Duo 64-bit processor or equivalent
  • For up to 9500 users: Dual 3.16 GHz Intel QuadCore™ 64-bit processor or equivalent
Minimum:
Single 2.0 GHz Intel™ Core2Duo™ 64-bit processor supporting Intel VT™ or equivalent

Recommended:
  • For up to 2500 events per second: Dual 2.8 GHz Intel Core2Duo 64-bit processor or equivalent.
  • For over 2500 events per second: Dual 3.16 GHz Intel QuadCore 64-bit processor or equivalent.
Memory Minimum:
2GB RAM

Recommended:
  • For up to 4000 users: 6GB RAM
  • For up to 9500 users: 24GB RAM
  • For up to 15,000 users: 32GB RAM
Minimum:
2GB RAM

Recommended:
  • 4G RAM - Up to a maximum of 1000 events per second
  • 8G RAM - Up to a maximum of 2500 events per second
  • 12G RAM - Up to a maximum of 4000 events per second
  • 16G RAM - Up to a maximum of 6000 events per second
Disk Space Minimum:
12GB of disk space

Recommended:
At least 300GB of disk space for 90 days of logs; depends on number of users and log verbosity

(automatically partitions the detected disk space as required)
Minimum:
8GB of disk space

Recommended:
At least 300GB of disk space or more depending on number of log events and length of retention time

(automatically partitions the detected disk space as required)

 

Administrator Web Browser Requirements

  • Windows XP SP3: Internet Explorer (IE) 8.0 and Firefox 5.0
  • Windows Vista: IE 9.0
  • Windows 7: IE 8.0, IE 9.0, Google Chrome 18.0 and Firefox 5.0
  • Red Hat Enterprise Linux 5: Firefox 5.0

 

Hardware Specifications

The minimum requirements specified provide enough resources to properly evaluate the product under light traffic loads. The recommended requirements specified provide general production sizing guidance. For more detailed sizing information for production environments, search for “sizing guide” in the IWSVA Sizing Guide.


Connect with us on