• slide
  • slide
  • slide
  • slide
  • slide
  • slide
  • slide
  • slide

Overview

Network, Endpoint & Cloud Security for the Public Sector

For nearly 30 years, Trend Micro's unwavering vision has been to make the world safe for exchanging digital information. Security is our entire focus, and it shows. This single-minded passion has inspired our innovations that keep up with the bad guys despite a changing IT landscape, riskier user behavior, and constantly evolving threats.

The depth of our experience remains unmatched. From the endpoint to the network to the cloud, we've got you covered with a connected threat defense recognized by analysts, customers, and industry gurus of all kinds.

Products

  • Advanced Threat Detection by Deep Discovery
  • Advanced Threat Protection
  • Cloud App Security
  • Control Manager
  • Deep Discovery Analyzer
  • Deep Discovery Email Inspector
  • Deep Discovery Inspector
  • Deep Security for the Cloud
  • Deep Security for the Data Center
  • Digital Vaccine Labs
  • Email & Collaboration
  • Endpoint Application Control
  • Endpoint Encryption
  • Endpoint Security
  • Endpoint Sensor
  • Enterprise Support Services
  • Hosted Email Security
  • Hybrid Cloud Security Solution
  • Integrated Advanced Threat Prevention
  • Integrated Data Loss Prevention (iDLP)
  • InterScan Messaging Security
  • InterScan Web Security as a Service
  • InterScan Web Security Virtual Appliance
  • Network Defense Solution
  • Next Generation Intrusion Prevention System
  • OfficeScan
  • PortalProtect for Microsoft SharePoint
  • Premium Support
  • ScanMail Suite for IBM Domino
  • ScanMail Suite for Microsoft Exchange
  • Secure Web Gateway
  • Security Management System
  • Server Protection
  • ServerProtect for Linux
  • ServerProtect for Windows/Netware
  • Smart Protection Suite – Complete for Endpoints
  • Threat Protection System
  • TippingPoint Support
  • Education and Services
  • User Protection Solution
  • Vulnerability Protection
  • Worry-Free Services Advanced
  • Worry-Free Services
  • Worry-Free Advanced
  • Worry-Free Standard
  • Worry-Free Store

Count on Carahsoft

Trend Micro, a global leader in cyber security solutions, helps to make the world safe for exchanging digital information. Their innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud environments, networks, and endpoints.

  • Ransomware

    Mitigate ransomware risks with layered Security – Email, Web, Endpoint, Server and Network Protection

    Resources:

    • Secure Telework

      Secure & Protect all of your Devices at Home. Feel Confident and Protected While Working from Home with Trend Micro Security

      Resources:

    Contracts

    Federal

    GSA 2GIT

    47QTCA21A000R
    Mar 31, 2021- Mar 30, 2026

    GSA Multiple Award Schedule (MAS)

    GS-35F-0119Y
    Dec 20, 2011- Dec 19, 2026

    GSA Multiple Award Schedule Contract (MAS)

    47QSWA18D008F
    Aug 22, 2018- Aug 21, 2023

    NASA SEWP V

    NNG15SC03B/NNG15SC27B
    May 01, 2015- Apr 30, 2025

    State and Local

    CMAS

    3-12-70-2247E
    Aug 28, 2012- Dec 19, 2026

    City of Seattle Contract

    0000003265
    Jul 11, 2014- Dec 19, 2026

    Department of General Services Pennsylvania

    4400004253
    May 01, 2009- Dec 19, 2026

    OH STS 0119Y

    534354
    May 31, 2012- Dec 19, 2026

    Oklahoma DIR Contract # SW1056A

    SW1056A
    Feb 22, 2019- Feb 21, 2023
    *Additional Option Years Available

    State of Indiana Contract

    0000000000000000000021430
    Aug 01, 2017- Sep 30, 2022

    State of New Mexico Contract

    10-00000-21-00098
    Aug 01, 2017- Dec 31, 2022

    Texas DIR-TSO-4288

    DIR-TSO-4288
    Feb 22, 2019- Feb 21, 2023
    *Additional Option Years Available

    Education

    E&I Carahsoft Cloud Solutions & Services Distributor Contract

    EI00063~2021MA
    Apr 01, 2021- Mar 31, 2026

    Illinois Learning Technology Purchase Program (ILTPP)

    ILTPP-19CT011
    May 20, 2019- Mar 01, 2023

    Massachusetts Higher Education Consortium (MHEC)

    MC15-04
    Aug 10, 2019- Aug 31, 2024

    NJSBA

    E-8801-ACESCPS
    Oct 20, 2015- Sep 03, 2025

    The Quilt

    MSA - 05012019F
    Apr 01, 2016- May 02, 2025

    VASCUPP

    UVA1482501
    May 02, 2014- Dec 19, 2026

    CMMC Domains

    Trend Micro

    Deep Discovery

    Deep Discovery Inspector detection engines deliver expanded APT and targeted attack detection including custom virtual analyzer and new discovery and correlation rules designed to detect malicious content, communication, and behavior across every stage of an attack sequence.

    The Advanced Threat Scan Engine is an upgrade from the standard virus scan engine, which protects against viruses, malware, and exploits to vulnerabilities in software such as Java and Flash. Integrated with the Trend Micro Virus Scan Engine, the Advanced Threat Scan Engine employs signature-based, behaviorbased, and aggressive heuristic detection. Major features include the following:

  • Detection of zero-day threats
  • Detection of embedded exploit code
  • Detection rules for known vulnerabilities
  • Enhanced parsers for handling file deformities
  • Deep Discovery Inspector

    Deep Discovery Inspector can detect unauthorized operating system commands targeting the kernel application programming interface.

    Deep Discovery Inspector Virtual Analyzer

    The Deep Discovery Inspector Virtual Analyzer is a secure virtual environment used to manage and analyze suspicious network and file samples. Sandbox images allow observation of file and network behavior in a natural setting without any risk of compromising the network. Virtual Analyzer performs static analysis and behavior simulation to identify potentially malicious characteristics. During analysis, Virtual Analyzer rates the characteristics in context and then assigns a risk level to the sample based on the accumulated ratings.

    Deep Discovery Email Inspector

    Deep Discovery Email Inspector investigates email messages for suspicious file attachments, embedded links (URLs), and characteristics. If an email message exhibits malicious behavior, Deep Discovery Email Inspector can block the threat and notify security administrators about the malicious activity.

    After investigating email messages, Deep Discovery Email Inspector assesses the risk using multi-layered threat analysis. Deep Discovery Email Inspector calculates the risk level based on the highest risk assigned between the Deep Discovery Email Inspector email scanners and Virtual Analyzer.

    The Deep Discovery Email Inspector Virtual Analyzer sandbox environment opens files, including password-protected archives and document files, and URLs to test for malicious behavior. Virtual Analyzer is able to find exploit code, Command & Control (C&C) and botnet connections, and other suspicious behaviors or characteristics.

    Deep Security

    Deep Security Anti-Malware module protects Windows and Linux workloads against malicious software, such as malware, spyware, and Trojans. Powered by the Trend Micro Smart Protection Network, the Anti-Malware module helps to instantly identify and remove malware and blacklist domains known to be command and control servers. The Anti-Malware can be configured to provide:

  • The applicable real-time policies that apply during different periods of the day/week
  • The policy for full scheduled or manual scans
  • Exclusions of file types and directories
  • Real-time behavior (scanning reads and/or writes) and applicable actions
  • The Deep Security Intrusion Prevention Module is both a host based Intrusion Detections System (IDS) and an Intrusion Prevention System (IPS) which protects host computers from being exploited by attacks against known and zero-day vulnerability attacks as well as against SQL injections attacks, cross-site scripting attacks, and other web application vulnerabilities. Shields vulnerabilities until code fixes can be completed.

    It identifies malicious software accessing the network and increases visibility into, or control over, applications accessing the network. Intrusion Prevention prevents attacks by detecting malicious instructions in network traffic and dropping relevant packets.

    Tipping Point

    TippingPoint is a high-speed, security system that includes the Intrusion Prevention System (IPS), Local Security Manager (LSM), Digital Vaccine, the Security Management System Appliance, and the Core Controller. TippingPoint’s security system provides a single, integrated, adaptive security system that includes hardware and a management interface. The SMS Server is an enterprise-class management platform that provides centralized administration, configuration, monitoring and reporting for well over a hundred TippingPoint IPS devices. The SMS provides the following functionality:

  • Enterprise-wide device status and behavior monitoring — Stores logs and device status information, manages updates, and monitors filter, device, software, and network status.
  • IPS networking and configuration — Stores device information and configures devices according to the settings that are modified, imported, or distributed by clients. These settings affect the flow and detection of traffic according to device, segment, or segment group.
  • Filter customization — Stores filter customizations in profiles as maintained by the SMS client. These settings are distributed and imported to devices, which can be reviewed and modified by local clients. If a device is managed by the SMS Server, the local clients cannot modify settings.
  • Filter and software distribution — Monitors and maintains the distribution and import of filters, Digital Vaccine packages, and software for the TippingPoint Operating System and SMS client. The SMS client and Central Management Server can distribute these packages according to segment group settings.
  • TippingPoint Threat Suppression Engine

    TippingPoint Threat Suppression Engine (TSE) can prevent the execution of malicious commands. The TSE uses Digital Vaccine (DV) filters to police the network and to screen out malicious or unwanted traffic. In addition to the DV filters, the IPS also provides Traffic Management filters, which are custom filters that react to traffic based on source IP address, destination IP address, port, protocol, or other defined values. Traffic management filters are applied to traffic before DV filters. Depending on how the filters are configured, traffic might or might not require further inspection.

    Events

    Past Events, Webinars & Trainings

    News

    Latest News

    Trend Micro Incorporated, the leader in cloud security, now offers two new FedRAMP authorized cloud security services running on AWS GovCloud.
    READ MORE >

    Resources

    Datasheet

    trend-micro-logo.png
    Trend Micro Datasheet
    Trend Micro™ Deep Discovery™ is a family of advanced threat protection products that enables you to detect, analyze, and respond to today’s stealthy, targeted attacks. Deep Discovery blends specialized detection engines, custom sandboxing, and global threat intelligence from Trend Micro™ Smart Prote...

    Runtime security as a service and as a managed service for physical, virtual, cloud, and container workloads in a FedRamp authorized environment

    trend-micro-logo.png
    Trend Micro Datasheet
    View this datasheet to learn more about Trend Micro Cloud One – Conformity and how it can continue to keep your cloud service provider platform secure while following governance compliance in the SaaS platform. Cloud One Conformity helps to manage misconfigurations of cloud resources in a multi-clou...

    Trend Micro Connected Threat Defense is a layered approach to security that gives you a better way to quickly protect, detect, and respond to new threats that are targeting you, while improving your visibility and control across your organization at the same time.

    Resources

    trend-micro-logo.png
    Trend Micro Resources
    Worldwide Cloud Security (Software-Defined Compute Workload Security and Firewall Fabric) Market Shares, 2018: Protecting Workloads in Hybrid and Multicloud

    Solutions Brief

    trend-micro-logo.png
    Trend Micro Solutions Brief
    Advanced Threat Protection against targeted attacks

    Video

    At this year’s AFCEA West 2022 in San Diego, Trend Micro discussed the benefits of its cybersecurity solutions. This resource provides a recap of the most important highlights from the event.Trend Micro is one of the world's leading providers of cybersecurity solutions making digital exchanges safer...

    Webinar

    This webinar recording outlines, how Amazon Web Services (AWS), Trend Micro, and Four Points Technology help Federal Government Agencies move securely to the cloud. Download the recording to learn more!

    View this on-demand webinar to learn how to address NIST 800-53 and 800-171 controls, mitigate misconfiguration of your cloud infrastructure, and quickly stand up workloads while meeting ATO regulatory objectives.

    Whitepaper

    trend-micro-logo.png
    Trend Micro Whitepaper
    The rising number and sophistication of cyber attacks against public and private sector organizations calls for a more comprehensive approach to organizational cybersecurity to supplement traditional firewalls and passwords. Zero-trust architectures offer security benefits in federal space, but achi...