Escolar Documentos
Profissional Documentos
Cultura Documentos
Trend Micro™
InterScan Web Security Suite
Content Filtering
Technology Report
Trend Micro™ IWSS
Vendor Details
Name: Trend
Address: Trend Micro Inc., 10101 N. De Anza Blvd, Cupertino,
CA - 95014, USA
Telephone: + 1 (800) 228 5651 or + 1 (408) 257 1500
Website: www.trend.com
Product: InterScan Web Security Suite 2.5 for Windows
Name: West Coast Labs, Unit 9 Oak Tree Court, Mulberry Drive
Cardiff Gate Business Park, Cardiff, CF23 8RS, UK
Telephone: +44 (0) 29 2054 8400
Contact Point
Contents
The Product 10
Test Report 11
Test Results 17
Internet purists, for instance, claim that traffic should be free to flow
and that any form of control or censorship goes against the funda-
mental principles that have made the internet such a force in the
world.
only question is, how much. In some sectors, there are hard-and-fast
rules to help. Schools, for instance, need to show a duty of care for
their students, and must prevent them receiving indecent messages
or accessing inappropriate websites.
The stakes for organizations are therefore high and rising, and they will
also differ according to company size, industry sector and prevailing
social attitudes. Fortunately, technology has advanced and provides
a wide range of tools to help companies manage their email and
web traffic to meet their specific needs. Equally important, the proper
deployment of these tools can demonstrate a genuine will to comply
with regulations and to protect users.
All companies can do is train their staff well, deploy the right tools
intelligently and make sure their defenses are kept up to date. This re-
port is intended to help you choose the best product for your needs.
The URL test suite is regularly updated to include web sites that fall
outside of a predefined Acceptable Usage Policy (see Appendix 1),
and also includes various innocuous sites as “controls”.
The list may also include not only some sites that may trigger false
positives such as teenage sex education sites, but also a small
proportion of “zero-day” URLs published on the day of testing that are
made up entirely of Adult or Pornographic content - these may vary
from test to test.
For monitoring purposes, the HTML code from each web page is
appended to a log. Test engineers will then analyze the logs to
ascertain if any pages have been passed through the solution and if
Pass Criteria
Two levels of Checkmark URL Filtering Certification can be achieved
through this Technology Report test program.
www.check-mark.com
Introduction
Configuration options
for IWSS are easily
accessible and include
enough information to
make the administrator
aware of the effect of
selecting or changing
each option. Should the
administrator require
further information
on any of the options,
a useful Help index is
readily available in the
upper right corner of the
interface.
IWSS also provides virus and spyware protection through the use of
Scan Policies. These policies allow the administrator to alter specific
options such as whether or not to encrypt quarantined items, as
well as standard options including the blocking of specific file types
and the scanning of compressed files. The administrator is also free
to designate the action to perform should a file be found to be virus
infected - such actions might include quarantine or remove.
The resulting reports are very detailed, with the data contained
displayed in both numerical format as well as graphically, through the
use of various charts. Once generated, these reports can be exported
to a CSV file for backup or audit purposes. The reports are laid out in a
printer friendly fashion, including a print option on the page itself.
Reports may be
configured via the
customization tab. This
allows the administrator
to adjust the data that is
contained within each
report, specifically the
number of records that are to be displayed. For example, by default
each report displays the ten most common URLs to be blocked, this
may be altered to display any number of records (with the knock
on effect of increased memory usage). It is from here that the
administrator may also define how many monthly, daily, and weekly
reports should be stored.
www.check-mark.com
url : http://us.trendmicro.com/us/products/enterprise/interscan-web-
security-suite/
Integrated security
Enables a coordinated defense against viruses, spyware, grayware,
phishing, malicious mobile code, and unwanted content
Easy to manage
Enables centralized policy-based management, supports external
directory services, and offers multiple scanning and configuration
options—for greater ease-of-use
High performance
Scans and delivers Web pages with minimal system latency—for an
optimal Web-user experience and improved employee productivity
url : http://us.trendmicro.com/us/products/enterprise/interscan-web-
security-suite/
url : http://us.trendmicro.com/us/products/enterprise/interscan-web-
security-suite/
The past 12 months of development for the IWSS solution has been
focused in two areas:
1. Application security – awareness and policy definition for traffic that
tunnels over port 80 masquerading as HTTP browser traffic. IM and
P2P traffic is a classic example. In addition, several enhancements to
the spyware engine and URL filtering categorization features have
been made to better serve the needs of large organizations.
2. Reducing latency – as the IWSS scanning engines are enhanced
to catch more malware, the latency introduced to the end-users’
browsing experience must be reduced. Breakthroughs in connection
management and streaming scanning technology have allowed
the IWSS product to continue to provide transparent web security for
enterprise users.
Anti-Spyware
• Blocks spyware and grayware at the gateway before it can infect
clients, harm the network, and burden system resources
• Gives granular control to block/allow subtypes of grayware,
including adware, dialers, joke programs, hacking and remote
access tools, password cracking applications, etc.
• Delivers spyware-specific activity logs and reports, including a threat
summary graph
Anti-Phishing
• Blocks transmission of outbound data to known phishing-related Web
sites in order to protect credit cards, bank accounts, user names,
passwords, etc.
• Complements the anti-phishing capabilities of traditional spam
filtering technology, which addresses inbound traffic only
General Principles
In general, staff are expected to apply basic good judgement and
common sense in their use of e-mail.
You should bear in mind that e-mails are not private to you. The
Company has the right to monitor and/or record e-mails or electronic
documents that you create, send or receive:
Internet
General Principles:
You should bear in mind that the websites visited by you may be
monitored and/or recorded:
•For security and network management reasons;
•To ensure compliance with this policy;
•Where necessary in order to carry out the business of the Company;
•To prevent or detect a crime.
EUROPE SALES
T +44 2920 548 400
GLOBAL HEADQUARTERS
West Coast Labs
Unit 9 Oak Tree Court
Mulberry Drive
Cardiff Gate Business Park
Cardiff
CF23 8RS, UK