Trend Micro Deep Security as service
An Overview of Trend Micro Deep Security Solution Components
Deep Security provides a single platform for server security to protect physical, virtual, and cloud servers
as well as hypervisors and virtual desktops. Tightly integrated modules easily expand to offer in-depth
defenses, including anti-malware, web reputation, intrusion prevention, firewall, integrity monitoring,
and log inspection.
Deep Security as service:
Trend Micro Cloud One - Workload Security provides advanced server security for physical, virtual, and
cloud servers. It protects enterprise applications and data from breaches and business disruptions
without requiring emergency patching. This comprehensive, centrally managed platform helps you
simplify security operations while enabling regulatory compliance and accelerating the ROI of
virtualization and cloud projects
Deep Security Agents (DSA):
The Deep Security Agent is a high-performance, small footprint, software component installed on a
computer to provide protection. This component is the policy enforcement point for all protection
functionality on your workloads using an agent. The nature of that protection depends on the rules and
security settings that each Deep Security Agent receives from the Deep Security Manager. Additionally,
the Deep Security Agent sends regular heartbeat and pushes security event logs and various other data
points to the Deep Security Manager.
Deployment Scenario
Deep Security can be deployed with agents in the computers
In the agent-based deployment model, a Deep Security Agent is installed on every computer (or
VM), but all agents need to access internet
Logical View of Trend Micro Deep Security as service
The following diagram provides a high-level view of a typical Deep Security as service deployment
Deployment Considerations
For Deep Security Manager (cloud)
The centralized web-based management console that administrators use to configure security policy
and deploy protection to the enforcement components, the Deep Security Agent.
Web browser
Firefox 24 or higher
Internet Explorer 9.x, 10.x, 11.x
Chrome 33 or higher
Safari 6 or higher (Cookies-enabled)
Supported platform
Microsoft Windows
Red Hat Enterprise Linux
CentOS Linux
Oracle Linux
SUSE Linux
Ubuntu Linux
Debian Linux
CloudLinux
Amazon Linux
Solaris
AIX
Deep Security Agent requirements
Network Connectivity Validation
The following table describes the required connectivity between the different components in a Deep
Security environment.
Ports
Port From Towards Listening Node(S)
80, 443 (TCP) Client Servers Internet *.trendmicro.com/*