05.08.2013 Views

Control Manager Installation Guide - Trend Micro? Online Help

Control Manager Installation Guide - Trend Micro? Online Help

Control Manager Installation Guide - Trend Micro? Online Help

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

COMPONENT DESCRIPTION<br />

Introducing <strong>Trend</strong> <strong>Micro</strong> <strong>Control</strong> <strong>Manager</strong><br />

Widget Framework Allows an administrator to create a customized dashboard<br />

to monitor the <strong>Control</strong> <strong>Manager</strong> network.<br />

<strong>Trend</strong> <strong>Micro</strong> Smart Protection Network<br />

The <strong>Trend</strong> <strong>Micro</strong> Smart Protection Network is a next-generation cloud-client<br />

content security infrastructure designed to protect customers from security risks and<br />

web threats. It powers both on-premise and <strong>Trend</strong> <strong>Micro</strong> hosted solutions to protect<br />

users whether they are on the network, at home, or on the go. Smart Protection<br />

Network uses lighter-weight clients to access its unique in-the-cloud correlation of<br />

email, web, and file reputation technologies, as well as threat databases. Customers’<br />

protection is automatically updated and strengthened as more products, services and<br />

users access the network, creating a real-time neighborhood watch protection service for<br />

its users.<br />

Email Reputation<br />

<strong>Trend</strong> <strong>Micro</strong>’s email reputation technology validates IP addresses by checking them<br />

against a reputation database of known spam sources and by using a dynamic service<br />

that can assess email sender reputation in real time. Reputation ratings are refined<br />

through continuous analysis of the IP addresses’ “behavior,” scope of activity and prior<br />

history. Email reputation blocks malicious email messages in the cloud based on the<br />

sender’s IP address, preventing threats from reaching the network or the user’s PC.<br />

File Reputation Services<br />

File Reputation Services checks the reputation of each file against an extensive in-thecloud<br />

database. Since the malware information is stored in the cloud, it is available<br />

instantly to all users. High performance content delivery networks and local caching<br />

servers ensure minimum latency during the checking process. The cloud-client<br />

architecture offers more immediate protection and eliminates the burden of pattern<br />

deployment besides significantly reducing the overall client footprint.<br />

1-11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!