Ds Control Manager New
Ds Control Manager New
Ds Control Manager New
Trend Micro
control manager
Centralized Policy Management and Visibility for Data and Threat Protection
In todays sophisticated threat landscape, advanced attacks leverage multiple threat vectors,
crossing user endpoints, applications, web, and email. You need to manage multiple layers
of security to ensure the best possible security posture for your organization. And with the
transition to cloud-based IT delivery models, you need to manage security across on-premises,
cloud, and hybrid deployment environments.
Consistent security management will help you bridge the IT silos that often separate layers
of protection and deployment models. This type of centralized approach improves visibility
and protection, reduces complexity, and eliminates redundant and repetitive tasks in security
administrationall of which make your organization more secure, and your life easier.
Trend Micro Control Manager centralized management solution provides a single, integrated
interface to manage, monitor, and report across multiple layers of security, as well as across all
deployment models. Customizable data displays provide the visibility and situational awareness
that equip you to rapidly assess status, identify threats, and respond to incidents. User-based
visibility enables you to see what is happening across all endpoints owned by your users, enabling
you to review policy status and make changes across everything the user touches.
And if you do experience a threat outbreak, youll have complete visibility across your environment
to track how threats have spread. With a better understanding of security events, youre more likely
to prevent them from reoccurring. Direct links to the Trend Micro Threat Connect database deliver
actionable threat intelligence, which allows you to explore the complex relationships between
malware instances, creators, and deployment methods.
Deep Security
Custom Defense
OfficeScan
Worry-Free Business Security
Endpoint Encryption
Endpoint Application Control
Security for MAC
Vulnerability Protection
Data Loss Prevention
Mobile Security
InterScan Messaging Security
ScanMail
Hosted Email Security
PortalProtect
InterScan Web Security
key advantages
Simple, Enterprise-wide Visibility
and Continuous Monitoring
User-based Visibility
Visibility of multiple security layers, whether
deployed on-premise or in the cloud, means
you dont have to hop from console to console
to ensure that protection is properly defined
across the enterprise.
systems requirements
Server hardware Requirements
At least 2.3 GHz Intel Core i5 or compatible CPU; AMD 64 processor; Intel 64 processor
4 GB RAM ( 8 GB recommended)
20 GB Minimum 40 GB Recommended
Software Requirements
Operating system
Key Benefits
Simplifies administration with central
console for security and data policies
Web Console
to critical data
saving time and reducing IT workload
Database Software
Virtualization Support
Control Manager provides support for virtual platforms that are supported by the installed
operating system
2015 by Trend Micro Incorporated. All rights reserved. Trend Micro, the
Trend Micro t-ball logo, Trend Micro Control Manager, OfficeScan, ScanMail,
InterScan, Worryy-Free, and Smart Protection Network are trademarks
or registered trademarks of Trend Micro Incorporated. All other company
and/or product names may be trademarks or registered trademarks of
their owners. Information contained in this document is subject to change
without notice. [DS05_TMCM_150612US]