SlideShare a Scribd company logo
Page 1 of 2 • DATASHEET • HOSTED EMAIL SECURITY
DATASHEET
Email is mission-critical, but spam and email-based malware are growing exponentially and it’s
difficult to keep up. With the rise of targeted spear-phishing, even your savviest employees can
mistakenly click on a malicious link and expose your enterprise to cybercrime. At the same time,
other critical IT projects are demanding your attention, but that doesn’t mean you can afford to
neglect email security maintenance and potential targeted attacks.
Trend Micro™ Hosted Email Security™ is a no-maintenance-required solution that delivers
continuously updated protection to stop spam, malware, spear phishing, ransomware, and advanced
targeted attacks before they reach your network. Email Encryption is included in the base offering.
Hosted Email Security customers are covered by a contractually-binding Service Level Agreement
(SLA). If we don’t deliver, you’re eligible for money back.1
Hosted Email Security protects Microsoft®
Exchange™
, Microsoft®
Office 365™
, Google Apps, and
other hosted and on-premises email solutions. It protects more than 50,000 companies around
the globe.
All emails from EMEA customers are routed to data centers in Germany. Emails from the rest of the
world are routed to data centers in the U.S.
Stops spam and targeted attacks
•• Helps you reclaim productivity and bandwidth
•• Rated #1 for stopping spam and phishing
attacks, achieving the highest catch rates in
independent competitive tests by Opus One
•• 99%+ spam blocking with no more than
.0003% false positives and zero email-
based viruses
•• Protects organizations from spear phishing,
ransomware, and advanced targeted attacks
•• Provides time-of-click protection against
malicious URLs in email messages —
rewrites and analyzes URLs at the time of
click and blocks them if they are malicious
Saves time
•• Helps free your time to implement critical
business initiatives
•• No maintenance required since Trend Micro
experts continuously implement all updates,
patches, and hot fixes 24x7
•• Spam quarantine managed by end users—
not IT staff
Gives you peace of mind
•• 100% service availability with no more
than one minute of mail delivery latency
•• Included policy-based encryption
automatically enforces compliance
requirements and protects confidential
information
•• The Trend Micro™ Smart Protection Network™
cloud-based global threat intelligence
rapidly identifies new threats and
continuously improves protection against
known threats
•• Included 24x7 technical support gives you
extra peace of mind
WHAT HOSTED EMAIL SECURITY CAN DO FOR YOU
BLOCKS RANSOMWARE BEFORE IT EVER GETS TO YOUR USERS
•• Detects and blocks ransomware with malware scanning, anti-spam and file (including executables
and macro) scanning
•• Gives you advanced threat protection with cloud sandbox malware analysis, social engineering
protection and zero-day and document exploit detection
•• Uses web reputation to protect against web links in emails that are malicious
”
”
We signed up for the free
30-day trial license of Trend
Micro Hosted Email Security
and our spam problem
disappeared overnight.
Rico Horsley, Partner
Metro Law
SERVICE LEVEL AGREEMENT PROVISIONS HOSTED EMAIL SECURITY
Availability 100% uptime
Virus protection Zero email-based viruses
Spam-blocking effectiveness 99% or better
False positives No more than .0003%
Support responsiveness Matches incident severity
Email delivery latency No more than a one minute latency
1
Money-back remedies are defined in the Trend Micro Hosted Email Security Service Level Agreement.
Protection Points
•• In the cloud
Threat Protection
•• Spam
•• Viruses
•• Spyware
•• Spear-phishing
•• Targeted attacks
•• Ransomware
Trend Micro™
HOSTED EMAIL SECURITY
Stop spam. Save time. Sleep easy.
Page 2 of 2 • DATASHEET • HOSTED EMAIL SECURITY
Protection from spear phishing -
See how easy it is to integrate Trend Micro
Hosted Email Security with Office 365
©2016 by Trend Micro Incorporated. All rights reserved. Trend Micro,
the Trend Micro t-ball logo, and OfficeScan are trademarks or registered
trademarks of Trend Micro Incorporated. All other company and/or product
names may be trademarks or registered trademarks of their owners.
Information contained in this document is subject to change without notice.
[DS08_TMHES_161219US]
Targeted Attack Protection
Hosted Email Security provides protection against targeted invasions using enhanced social
engineering attack protection, web reputation, and advanced threat detection engine. It also
employs cloud-based threat analysis to block highly targeted email attacks by using exploit detection
and sandboxing. Integration of these components enables you to defend against targeted attacks. This
comprehensive targeted attack protection is included in Hosted Email Security at no extra charge.
Social Engineering Attack Protection
Detects spear phishing emails by correlating email components, such as the header, body, and
network routing using our new Social Engineering Attack Protection technology.
Includes protection for Business Email Compromise (BEC), a popular phishing technique mainly
using executive spoofing.
Enhanced Web Reputation
Enhanced technology from the Smart Protection Network scans URLs embedded in emails and
blocks URLs leading to malicious sites.
Advanced Threat Scan Engine
Detects advanced malware in PDF, MS Office, and other documents using static and heuristic logic
to detect and examine abnormalities in addition to known and zero-day exploits.
Cloud Sandbox
Provides automatic in-depth simulation and analysis of potentially malicious attachments
including executables and common office documents in a secure sandbox environment
hosted by Trend Micro.
Hosted Email Security
Antispam/phishing Sandbox
Social Engineering
Attack Protection
Advanced Threat Scan
Cloud Sandbox
Hosted by Trend Micro
Suspicious
Threat Analysis
Threat IntelligenceRisk Rating
No maintenance, hardware, or software required
when using Trend Micro Hosted Email Security
Google Apps
or
Microsoft Office 365
On-premises
Cloud / Hosted
OR
Mail
Mail Server
Client
Client
Hosted Email Security
Internet

More Related Content

What's hot

Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Security
xsy
 
Cybersecurity
CybersecurityCybersecurity
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
Sandip Juthani
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
belsis
 
Borderware Security Platform
Borderware Security PlatformBorderware Security Platform
Borderware Security Platformcostigaj
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
E.S.G. JR. Consulting, Inc.
 
Are you the next target?
Are you the next target?Are you the next target?
Are you the next target?
Strategic Insurance Software
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
Sachin Darekar
 
Tonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
Tonex Cybersecurity Fundamentals, Cybersecurity Training and CertificationTonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
Tonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
Bryan Len
 
Cyber attack
Cyber attackCyber attack
Cyber attack
Manjushree Mashal
 
Review of Information Security Concepts
Review of Information Security ConceptsReview of Information Security Concepts
Review of Information Security Concepts
primeteacher32
 
Wapt course detail
Wapt course detailWapt course detail
Wapt course detail
hackersguru
 
E Commerce security
E Commerce securityE Commerce security
E Commerce security
Mayank Kashyap
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
SHIVAMSHARMA1271
 
The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017
R-Style Lab
 
Threat Modelling And Threat Response
Threat Modelling And Threat ResponseThreat Modelling And Threat Response
Threat Modelling And Threat Response
Vivek Jindaniya
 
Email Security Solutions | Seclore
Email Security Solutions | SecloreEmail Security Solutions | Seclore
Email Security Solutions | Seclore
Seclore
 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practises
WAJAHAT IQBAL
 
презентация1
презентация1презентация1
презентация1
sagidullaa01
 

What's hot (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Borderware Security Platform
Borderware Security PlatformBorderware Security Platform
Borderware Security Platform
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Are you the next target?
Are you the next target?Are you the next target?
Are you the next target?
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
 
Tonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
Tonex Cybersecurity Fundamentals, Cybersecurity Training and CertificationTonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
Tonex Cybersecurity Fundamentals, Cybersecurity Training and Certification
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Review of Information Security Concepts
Review of Information Security ConceptsReview of Information Security Concepts
Review of Information Security Concepts
 
Wapt course detail
Wapt course detailWapt course detail
Wapt course detail
 
E Commerce security
E Commerce securityE Commerce security
E Commerce security
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017
 
Threat Modelling And Threat Response
Threat Modelling And Threat ResponseThreat Modelling And Threat Response
Threat Modelling And Threat Response
 
Email Security Solutions | Seclore
Email Security Solutions | SecloreEmail Security Solutions | Seclore
Email Security Solutions | Seclore
 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practises
 
презентация1
презентация1презентация1
презентация1
 

Similar to Trend Micro - Hosted eMail Security

Comprehensive Protection and Visibility into Advanced Email Attacks
Comprehensive Protection and Visibility into Advanced Email Attacks Comprehensive Protection and Visibility into Advanced Email Attacks
Comprehensive Protection and Visibility into Advanced Email Attacks
Symantec
 
Information Security Management System in the Banking Sector
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking Sector
Samvel Gevorgyan
 
IT security threats and endpoint security
IT security threats and endpoint securityIT security threats and endpoint security
IT security threats and endpoint security
Acutec Limited
 
Webinar Mastering Microsoft Security von Baggenstos
Webinar Mastering Microsoft Security von BaggenstosWebinar Mastering Microsoft Security von Baggenstos
Webinar Mastering Microsoft Security von Baggenstos
JenniferMete1
 
brif enpoint.pptx
brif enpoint.pptxbrif enpoint.pptx
Email: still the favourite route of attack
Email: still the favourite route of attackEmail: still the favourite route of attack
Email: still the favourite route of attack
Claranet UK
 
UNIT-3.docx
UNIT-3.docxUNIT-3.docx
UNIT-3.docx
CSEA18Arun537
 
Keep your Email Secure
Keep your Email SecureKeep your Email Secure
Keep your Email Secure
Shawn Jordan
 
Top Companies Providing Cyber Security in Europe
Top Companies Providing Cyber Security in EuropeTop Companies Providing Cyber Security in Europe
Top Companies Providing Cyber Security in Europe
roxanaaleena
 
Cyber Security Services for Business.pdf
Cyber Security Services for Business.pdfCyber Security Services for Business.pdf
Cyber Security Services for Business.pdf
Vograce
 
Microsoft Security adoptionguide for the enterprise
Microsoft Security adoptionguide for the enterpriseMicrosoft Security adoptionguide for the enterprise
Microsoft Security adoptionguide for the enterprise
ssuserd58af7
 
Microsoft Forefront - Online Security For Exchange Whitepaper
Microsoft Forefront -  Online Security For Exchange WhitepaperMicrosoft Forefront -  Online Security For Exchange Whitepaper
Microsoft Forefront - Online Security For Exchange WhitepaperMicrosoft Private Cloud
 
Choosing the Right Network Security for Your Business - Minerva.pdf
Choosing the Right Network Security for Your Business  - Minerva.pdfChoosing the Right Network Security for Your Business  - Minerva.pdf
Choosing the Right Network Security for Your Business - Minerva.pdf
online Marketing
 
Balancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecurityBalancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With Security
Symantec
 
Email Security Market : Global Industry Trends and Forecast (2023-2032)
Email Security Market : Global Industry Trends and Forecast (2023-2032)Email Security Market : Global Industry Trends and Forecast (2023-2032)
Email Security Market : Global Industry Trends and Forecast (2023-2032)
PriyanshiSingh187645
 
Office 365 advanced threat protection
Office 365 advanced threat protectionOffice 365 advanced threat protection
Office 365 advanced threat protection
SoHo Dragon
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
SofiyaKhan49
 
A Complete Profile of Tech IT Cloud company
A Complete Profile of Tech IT Cloud companyA Complete Profile of Tech IT Cloud company
A Complete Profile of Tech IT Cloud company
Tech IT Cloud
 
Top 6 Email Security Controls.pptx
Top 6 Email Security Controls.pptxTop 6 Email Security Controls.pptx
Top 6 Email Security Controls.pptx
Enfology Services
 

Similar to Trend Micro - Hosted eMail Security (20)

Comprehensive Protection and Visibility into Advanced Email Attacks
Comprehensive Protection and Visibility into Advanced Email Attacks Comprehensive Protection and Visibility into Advanced Email Attacks
Comprehensive Protection and Visibility into Advanced Email Attacks
 
Information Security Management System in the Banking Sector
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking Sector
 
IT security threats and endpoint security
IT security threats and endpoint securityIT security threats and endpoint security
IT security threats and endpoint security
 
Webinar Mastering Microsoft Security von Baggenstos
Webinar Mastering Microsoft Security von BaggenstosWebinar Mastering Microsoft Security von Baggenstos
Webinar Mastering Microsoft Security von Baggenstos
 
brif enpoint.pptx
brif enpoint.pptxbrif enpoint.pptx
brif enpoint.pptx
 
Email: still the favourite route of attack
Email: still the favourite route of attackEmail: still the favourite route of attack
Email: still the favourite route of attack
 
UNIT-3.docx
UNIT-3.docxUNIT-3.docx
UNIT-3.docx
 
Keep your Email Secure
Keep your Email SecureKeep your Email Secure
Keep your Email Secure
 
Top Companies Providing Cyber Security in Europe
Top Companies Providing Cyber Security in EuropeTop Companies Providing Cyber Security in Europe
Top Companies Providing Cyber Security in Europe
 
Cyber Security Services for Business.pdf
Cyber Security Services for Business.pdfCyber Security Services for Business.pdf
Cyber Security Services for Business.pdf
 
Microsoft Security adoptionguide for the enterprise
Microsoft Security adoptionguide for the enterpriseMicrosoft Security adoptionguide for the enterprise
Microsoft Security adoptionguide for the enterprise
 
Microsoft Forefront - Online Security For Exchange Whitepaper
Microsoft Forefront -  Online Security For Exchange WhitepaperMicrosoft Forefront -  Online Security For Exchange Whitepaper
Microsoft Forefront - Online Security For Exchange Whitepaper
 
Choosing the Right Network Security for Your Business - Minerva.pdf
Choosing the Right Network Security for Your Business  - Minerva.pdfChoosing the Right Network Security for Your Business  - Minerva.pdf
Choosing the Right Network Security for Your Business - Minerva.pdf
 
Balancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecurityBalancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With Security
 
Email Security Market : Global Industry Trends and Forecast (2023-2032)
Email Security Market : Global Industry Trends and Forecast (2023-2032)Email Security Market : Global Industry Trends and Forecast (2023-2032)
Email Security Market : Global Industry Trends and Forecast (2023-2032)
 
Office 365 advanced threat protection
Office 365 advanced threat protectionOffice 365 advanced threat protection
Office 365 advanced threat protection
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
 
A Complete Profile of Tech IT Cloud company
A Complete Profile of Tech IT Cloud companyA Complete Profile of Tech IT Cloud company
A Complete Profile of Tech IT Cloud company
 
Email Security Overview
Email Security OverviewEmail Security Overview
Email Security Overview
 
Top 6 Email Security Controls.pptx
Top 6 Email Security Controls.pptxTop 6 Email Security Controls.pptx
Top 6 Email Security Controls.pptx
 

Recently uploaded

Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
KrzysztofKkol1
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
Peter Caitens
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
NaapbooksPrivateLimi
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 
Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024
Sharepoint Designs
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Globus
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
Cyanic lab
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
varshanayak241
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
Jelle | Nordend
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 

Recently uploaded (20)

Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024
 
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 

Trend Micro - Hosted eMail Security

  • 1. Page 1 of 2 • DATASHEET • HOSTED EMAIL SECURITY DATASHEET Email is mission-critical, but spam and email-based malware are growing exponentially and it’s difficult to keep up. With the rise of targeted spear-phishing, even your savviest employees can mistakenly click on a malicious link and expose your enterprise to cybercrime. At the same time, other critical IT projects are demanding your attention, but that doesn’t mean you can afford to neglect email security maintenance and potential targeted attacks. Trend Micro™ Hosted Email Security™ is a no-maintenance-required solution that delivers continuously updated protection to stop spam, malware, spear phishing, ransomware, and advanced targeted attacks before they reach your network. Email Encryption is included in the base offering. Hosted Email Security customers are covered by a contractually-binding Service Level Agreement (SLA). If we don’t deliver, you’re eligible for money back.1 Hosted Email Security protects Microsoft® Exchange™ , Microsoft® Office 365™ , Google Apps, and other hosted and on-premises email solutions. It protects more than 50,000 companies around the globe. All emails from EMEA customers are routed to data centers in Germany. Emails from the rest of the world are routed to data centers in the U.S. Stops spam and targeted attacks •• Helps you reclaim productivity and bandwidth •• Rated #1 for stopping spam and phishing attacks, achieving the highest catch rates in independent competitive tests by Opus One •• 99%+ spam blocking with no more than .0003% false positives and zero email- based viruses •• Protects organizations from spear phishing, ransomware, and advanced targeted attacks •• Provides time-of-click protection against malicious URLs in email messages — rewrites and analyzes URLs at the time of click and blocks them if they are malicious Saves time •• Helps free your time to implement critical business initiatives •• No maintenance required since Trend Micro experts continuously implement all updates, patches, and hot fixes 24x7 •• Spam quarantine managed by end users— not IT staff Gives you peace of mind •• 100% service availability with no more than one minute of mail delivery latency •• Included policy-based encryption automatically enforces compliance requirements and protects confidential information •• The Trend Micro™ Smart Protection Network™ cloud-based global threat intelligence rapidly identifies new threats and continuously improves protection against known threats •• Included 24x7 technical support gives you extra peace of mind WHAT HOSTED EMAIL SECURITY CAN DO FOR YOU BLOCKS RANSOMWARE BEFORE IT EVER GETS TO YOUR USERS •• Detects and blocks ransomware with malware scanning, anti-spam and file (including executables and macro) scanning •• Gives you advanced threat protection with cloud sandbox malware analysis, social engineering protection and zero-day and document exploit detection •• Uses web reputation to protect against web links in emails that are malicious ” ” We signed up for the free 30-day trial license of Trend Micro Hosted Email Security and our spam problem disappeared overnight. Rico Horsley, Partner Metro Law SERVICE LEVEL AGREEMENT PROVISIONS HOSTED EMAIL SECURITY Availability 100% uptime Virus protection Zero email-based viruses Spam-blocking effectiveness 99% or better False positives No more than .0003% Support responsiveness Matches incident severity Email delivery latency No more than a one minute latency 1 Money-back remedies are defined in the Trend Micro Hosted Email Security Service Level Agreement. Protection Points •• In the cloud Threat Protection •• Spam •• Viruses •• Spyware •• Spear-phishing •• Targeted attacks •• Ransomware Trend Micro™ HOSTED EMAIL SECURITY Stop spam. Save time. Sleep easy.
  • 2. Page 2 of 2 • DATASHEET • HOSTED EMAIL SECURITY Protection from spear phishing - See how easy it is to integrate Trend Micro Hosted Email Security with Office 365 ©2016 by Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, and OfficeScan are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their owners. Information contained in this document is subject to change without notice. [DS08_TMHES_161219US] Targeted Attack Protection Hosted Email Security provides protection against targeted invasions using enhanced social engineering attack protection, web reputation, and advanced threat detection engine. It also employs cloud-based threat analysis to block highly targeted email attacks by using exploit detection and sandboxing. Integration of these components enables you to defend against targeted attacks. This comprehensive targeted attack protection is included in Hosted Email Security at no extra charge. Social Engineering Attack Protection Detects spear phishing emails by correlating email components, such as the header, body, and network routing using our new Social Engineering Attack Protection technology. Includes protection for Business Email Compromise (BEC), a popular phishing technique mainly using executive spoofing. Enhanced Web Reputation Enhanced technology from the Smart Protection Network scans URLs embedded in emails and blocks URLs leading to malicious sites. Advanced Threat Scan Engine Detects advanced malware in PDF, MS Office, and other documents using static and heuristic logic to detect and examine abnormalities in addition to known and zero-day exploits. Cloud Sandbox Provides automatic in-depth simulation and analysis of potentially malicious attachments including executables and common office documents in a secure sandbox environment hosted by Trend Micro. Hosted Email Security Antispam/phishing Sandbox Social Engineering Attack Protection Advanced Threat Scan Cloud Sandbox Hosted by Trend Micro Suspicious Threat Analysis Threat IntelligenceRisk Rating No maintenance, hardware, or software required when using Trend Micro Hosted Email Security Google Apps or Microsoft Office 365 On-premises Cloud / Hosted OR Mail Mail Server Client Client Hosted Email Security Internet