05.08.2013 Views

Trend Micro InterScan Gateway Security Appliance M-Series ...

Trend Micro InterScan Gateway Security Appliance M-Series ...

Trend Micro InterScan Gateway Security Appliance M-Series ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Trend</strong> <strong>Micro</strong> <strong>InterScan</strong> <strong>Gateway</strong> <strong>Security</strong> <strong>Appliance</strong> M-<strong>Series</strong> Administrator’s Guide<br />

Antivirus<br />

The antivirus security in <strong>InterScan</strong> <strong>Gateway</strong> <strong>Security</strong> <strong>Appliance</strong> guards every<br />

network entry point—from the Internet gateway and network perimeter to email and<br />

file servers, desktops, and mobile devices.<br />

• Delivers proven virus protection. Uses patterns, heuristics, and other innovative<br />

technologies to block viruses, worms, and Trojans.<br />

• Stops file-based viruses, malware, worms, and botnets. Runs inline network<br />

scans to detect and block worms and botnets.<br />

• Contains outbreaks. Isolates infected network segments—before threats can<br />

spread.<br />

• Blocks malicious mobile code. Screens Web pages for malware hidden in<br />

applets, ActiveX controls, JavaScript, and VBscript.<br />

• Automates damage cleanup. Removes malware and spyware from memory of<br />

clients and servers including guest devices.<br />

• Detects zero-day threats in real time. IntelliTrap heuristic detection and Outbreak<br />

Prevention Services increase defenses against emerging threats.<br />

Anti-Spyware<br />

The anti-spyware feature in <strong>InterScan</strong> <strong>Gateway</strong> <strong>Security</strong> <strong>Appliance</strong> blocks incoming<br />

spyware and stops spyware from sending out user data that it has collected.<br />

Innovative technology also prevents users from browsing Web sites that install<br />

tracking software. If such a site has already installed spyware, end users can<br />

automatically clean the infected system by clicking a URL.<br />

• Stops spyware at multiple layers. Delivers end-to-end spyware protection— from<br />

the Web gateway to client/server networks.<br />

• Automates cleanup. Removes spyware, unwanted grayware, and remnants from<br />

both the server and desktop active memory.<br />

• Prevents “drive by” downloads (downloads of malware through exploitation of a<br />

Web browser, e-mail client or operating system bug, without any user<br />

intervention whatsoever). Screens Web pages for malicious mobile code and<br />

blocks “drive by” spyware installations.<br />

• Blocks URLs known for spyware. Prevents users from browsing Web sites<br />

known to harbor malicious spyware.<br />

1-6

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!