Control Manager Installation Guide - Trend Micro? Online Help
Control Manager Installation Guide - Trend Micro? Online Help
Control Manager Installation Guide - Trend Micro? Online Help
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
COMPONENT DESCRIPTION<br />
Introducing <strong>Trend</strong> <strong>Micro</strong> <strong>Control</strong> <strong>Manager</strong><br />
Widget Framework Allows an administrator to create a customized dashboard<br />
to monitor the <strong>Control</strong> <strong>Manager</strong> network.<br />
<strong>Trend</strong> <strong>Micro</strong> Smart Protection Network<br />
The <strong>Trend</strong> <strong>Micro</strong> Smart Protection Network is a next-generation cloud-client<br />
content security infrastructure designed to protect customers from security risks and<br />
web threats. It powers both on-premise and <strong>Trend</strong> <strong>Micro</strong> hosted solutions to protect<br />
users whether they are on the network, at home, or on the go. Smart Protection<br />
Network uses lighter-weight clients to access its unique in-the-cloud correlation of<br />
email, web, and file reputation technologies, as well as threat databases. Customers’<br />
protection is automatically updated and strengthened as more products, services and<br />
users access the network, creating a real-time neighborhood watch protection service for<br />
its users.<br />
Email Reputation<br />
<strong>Trend</strong> <strong>Micro</strong>’s email reputation technology validates IP addresses by checking them<br />
against a reputation database of known spam sources and by using a dynamic service<br />
that can assess email sender reputation in real time. Reputation ratings are refined<br />
through continuous analysis of the IP addresses’ “behavior,” scope of activity and prior<br />
history. Email reputation blocks malicious email messages in the cloud based on the<br />
sender’s IP address, preventing threats from reaching the network or the user’s PC.<br />
File Reputation Services<br />
File Reputation Services checks the reputation of each file against an extensive in-thecloud<br />
database. Since the malware information is stored in the cloud, it is available<br />
instantly to all users. High performance content delivery networks and local caching<br />
servers ensure minimum latency during the checking process. The cloud-client<br />
architecture offers more immediate protection and eliminates the burden of pattern<br />
deployment besides significantly reducing the overall client footprint.<br />
1-11