Regulatory Compliance: A Better Way

2
Securing Your Web World Achieving and maintaining compliance with security and privacy regulations is costly, complex, ever changingand still not enough to fully protect your company’s sensitive data. Trend Micro Enterprise Security offers you a better way to stay both compliant and secure with solutions that address a broad range of controls, solve tough compliance challenges and deliver maximum protection at minimal cost. With Trend Micro Enterprise Security you can: Reduce the cost and complexity of regulatory compliance Solve the toughest compliance challenges Maximize the real security value of your investments ADDRESSING CORE COMPLIANCE CONTROLS Information security and privacy regulations are largely based on well-established security technology and best practices. Trend Micro offers robust, cost-effective solutions to these core controls, allowing you to secure once to build a strong foundation for compliance with the range of regulations that apply to your organization. Trend Micro Enterprise Security provides comprehensive protection that addresses a full range of compliance controls. Vulnerability Management Patch Management IT Policy Compliance Intrusion/Incident Response Sensitive Data Protection Firewall; IDS/IPS Antivirus/Anti-malware Anti-spam and phishing Logging & Reporting CONQUERING TOUGH COMPLIANCE CHALLENGES Ever-evolving technology and your organization’s unique business environment, IT initiatives, and everyday operating constraints add to the challenge of maintaining your security and compliance posture. Trend Micro Enterprise Security solutions allow you to confidently innovate and drive down costs by solving these compliance challenges: Risk visibility and control End-to-end vulnerability management Website protection Mitigating information risk Desktop and server virtualization Public cloud computing Large-scale distributed environments Hard-to-secure systems and devices Regulatory Compliance: A Better Way Trend Micro Enterprise Security Trend Micro Enterprise Security offers unique and cost-effective solutions to address the core controls and tough challenges of a broad range of regulations, laws and standards worldwide. Credit Card Security PCI DSS Healthcare Data Privacy US HIPAA & HITECH Financial Data Privacy US GLBA Privacy Laws EU Protection Directive UK Data Protection German Data Protection Swiss Data Protection Australia Privacy Act Canada PIPEDA Government IT Security US FISMA; NIST Canada MITS Financial Fraud Protection US SOX J-SOX; Euro-SOX IT Frameworks COBIT; COSO ITIL; ISO Other Regulations US NERC, FERC IASE 3402/SAS70 SysTrust M e s s a g i n g S e c u r i t y a n d S e r v i c e s S o l u t i o n s P r o t e c tio n D a t a C e n t r a l M a n a g e m e n t E n d p o in t S e c u r it y S e c u rit y W e b S e c u r i t y D a t a c e n t e r . y t i x e l p m o C m u m i n i M . n o i t c e t o r P m u m i x a M

Transcript of Regulatory Compliance: A Better Way

Page 1: Regulatory Compliance: A Better Way

Securing Your Web World

Achieving and maintaining compliance with security and privacy regulations is costly, complex, ever changing—and still not enough to fully protect your company’s sensitive data.

Trend Micro Enterprise Security offers you a better way to stay both compliant and secure with solutions that address a broad range of controls, solve tough compliance challenges and deliver maximum protection at minimal cost.

With Trend Micro Enterprise Security you can:

• Reduce the cost and complexity of regulatory compliance• Solve the toughest compliance challenges• Maximize the real security value of your investments

Addressing Core CompliAnCe Controls

Information security and privacy regulations are largely based on well-established security technology and best practices. Trend Micro offers robust, cost-effective solutions to these core controls, allowing you to secure once to build a strong foundation for compliance with the range of regulations that apply to your organization.

trend micro enterprise security provides comprehensive protection that addresses a full range of compliance controls.

• Vulnerability Management • Patch Management• IT Policy Compliance • Intrusion/Incident Response • Sensitive Data Protection • Firewall; IDS/IPS • Antivirus/Anti-malware• Anti-spam and phishing• Logging & Reporting

Conquering tough CompliAnCe ChAllenges

Ever-evolving technology and your organization’s unique business environment, IT initiatives, and everyday operating constraints add to the challenge of maintaining your security and compliance posture. Trend Micro Enterprise Security solutions allow you to confidently innovate and drive down costs by solving these compliance challenges:

• Risk visibility and control• End-to-end vulnerability management• Website protection• Mitigating information risk• Desktop and server virtualization• Public cloud computing• Large-scale distributed environments• Hard-to-secure systems and devices

Regulatory Compliance: A Better WayTrend Micro™ Enterprise Security

Trend Micro Enterprise Security offers unique and cost-effective solutions to address the core controls and tough challenges of a broad range of regulations, laws and standards worldwide.

Credit Card Security• PCI DSS

Healthcare Data Privacy• US HIPAA & HITECH

Financial Data Privacy• US GLBA

Privacy Laws• EU Protection Directive• UK Data Protection• German Data Protection• Swiss Data Protection• Australia Privacy Act• Canada PIPEDA

Government IT Security• US FISMA; NIST• Canada MITS

Financial Fraud Protection• US SOX• J-SOX; Euro-SOX

IT Frameworks• COBIT; COSO• ITIL; ISO

Other Regulations• US NERC, FERC• IASE 3402/SAS70• SysTrust

Messagin

g

Security

and Ser

vice

s

Solutio

ns

Protection

Data

C e n t r a l Ma

na

ge

me

nt

E

nd

point

Secu

rity

SecurityWeb

Secu

rity D

ata

cen

ter

.ytixelpmoC mumini

M .noitcetorP

mumixa

M

Page 2: Regulatory Compliance: A Better Way

regulatory Compliance: A Better Way

©2010 by Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, OfficeScan and Private Post are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their owners. Information contained in this document is subject to change without notice. [SB01_Compliance_100908US]

www.trendmicro.com

Conquering tough CompliAnCe ChAllenges (Cont.)

Risk Visibility and Control

Trend Micro vulnerability and threat management solutions give you total risk visibility and remediation control over active threats, software and systems vulnerabilities, web content, and IT policy compliance.

End-to-End Vulnerability Management

Trend Micro solutions streamline, automate and manage the entire vulnerability management process from automated discovery to virtual patching/shielding and permanent patch deployment.

Website Protection

Trend Micro Enterprise Security keeps your website and company reputation secure with website application scanning, PCI scanning, best-in-class server protection, and comprehensive vulnerability management.

Mitigating Information Risk

Trend Micro secures sensitive data with a full range of data loss prevention and encryption solutions that emphasize security, management simplicity, and employee ease-of-use.

Desktop and Server Virtualization

Only Trend Micro server and endpoint solutions provide advanced virtualization-aware software that secures virtualized desktops and servers with best-in-class protection, optimized performance and critical compliance controls.

Public Cloud Computing

Only Trend Micro provides the secure virtual server and cloud data encryption solutions that allow you to confidently incorporate the public cloud into your datacenter strategy.

Large-Scale Distributed Environments

Trend Micro Deep Security provides firewall, IPS, integrity monitoring, and other core controls directly to critical host systems that process regulated data—eliminating the cost and management complexity of perimeter security devices at each location.

Hard-to-Secure Systems and Devices

Trend Micro’s unique network-based Threat Management Services discovers any active infiltration, allowing you to achieve compliance and non-invasive protection for any endpoint or server, including legacy or proprietary devices.

CompliAnCe Without seCurity Compromise

For security-driven organizations that want to truly protect their sensitive data and comply with regulatory requirements, Trend Micro Enterprise Security solutions, powered by the Trend Micro Smart Protection Network™, help you achieve compliance while delivering the best in enterprise security. That’s compliance without compromise.

Additional information

• trend micro pCi solutions Whitepaper

• healthcare/hipAA solutions Whitepaper

• deep security pCi solution Brief

• Forrester total economic impactCase study

www.trendmicro.com/compliance

Customer testimonials

Switching to Trend Micro was the right move for our retail operation and has solved the problems created by our previous vendor.

Follett Corporation

We like to think of PCI as a baseline. We chose Trend Micro Deep Security because it helps us…do all we possibly can to safeguard credit card data.

Noodles Restaurants

We must go beyond simply meeting compliance requirements. Trend Micro Enterprise Security was extremely competitive and covered all our needs.

Mercy Memorial Hospital