Audience

Organizations searching for a data breach and ransomware protection solution

About Trend Micro Deep Discovery

Deep Discovery Inspector is available as a physical or virtual network appliance. It’s designed to quickly detect advanced malware that typically bypasses traditional security defenses and exfiltrates sensitive data. Specialized detection engines and custom sandbox analysis detect and prevent breaches. Organizations are increasingly becoming victims of targeted ransomware when advanced malware bypasses traditional security, encrypts data, and demands payment to release the data. Deep Discovery Inspector uses known and unknown patterns and reputation analysis to detect the latest ransomware attacks.

Deep Discovery Analyzer is a turnkey appliance that uses virtual images of endpoint configurations to analyze and detect targeted attacks. By applying a blend of cross-generational detection techniques at the right place and time, it detects threats designed to evade standard security solutions.

Integrations

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Trend Micro
Founded: 1988
United States
www.trendmicro.com/en_us/business/products/network/advanced-threat-protection/inspector.html

Videos and Screen Captures

Product Details

Platforms Supported
Cloud
Training
Documentation
Videos
Support
Phone Support
Online

Trend Micro Deep Discovery Frequently Asked Questions

Q: What kinds of users and organization types does Trend Micro Deep Discovery work with?
Q: What languages does Trend Micro Deep Discovery support in their product?
Q: What kind of support options does Trend Micro Deep Discovery offer?
Q: What other applications or services does Trend Micro Deep Discovery integrate with?
Q: What type of training does Trend Micro Deep Discovery provide?

Trend Micro Deep Discovery Product Features

Network Security

Access Control
Firewalls
Internet Usage Monitoring
Intrusion Detection System
VPN
Vulnerability Scanning
Threat Response
Analytics / Reporting