Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
701 views4 pages

Data Sheet SMS

Uploaded by

juan zarate
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
701 views4 pages

Data Sheet SMS

Uploaded by

juan zarate
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

REMOVE BEFORE USING

Datasheet 1ST PAGE TEMPLATE 2 COLUMN WITH SIDE BAR

Trend Micro™ TippingPoint™ Security


Management System (SMS)
Centralized management with integrated security policy, response, and visibility

TippingPoint SMS provides you with a scalable, policy-based operational model. Use it
to enable straightforward management of your large-scale Trend Micro™ TippingPoint™ Key benefits
deployments.
• Enable global security device
TippingPoint SMS enables you to: configuration and monitoring
• Gain big-picture analysis with trending reports • Implement flexible network
• Leverage correlation and real-time graphs on traffic statistics security policy management
across TippingPoint devices
• Filter attacks
• Manage network hosts and services • Prioritize incident response
measures and gain visibility
• Analyze inventory and health status of TippingPoint devices
into correlated threat data
using Threat Insights
TippingPoint SMS dashboard
A significant component of TippingPoint SMS is the dashboard. It provides at-a-glance • Simplify and automate advanced
monitoring and launch capabilities for targeted management applications. and external actions with
Active Responder
It also presents an overview of current performance for all TippingPoint devices on
your network, including notifications of updates and potential issues that may need your • Centralize security feed
attention. Customize the TippingPoint SMS dashboard to suit your needs via a palette management for Trend Micro™
of drag-and-drop configurable gadgets categorized by health and task status, inspection Digital Vaccine™ and Trend Micro™
event, event rate, security, reputation, application, and user. Digital Vaccine™ Threat Intelligence
(DVTI) services
Figure 1: TippingPoint SMS dashboard
• Manage your URL reputation
feed and support enforcement
of user-provided malicious URL
entries with full API management

• Use Enterprise Vulnerability


Remediation (eVR) to map
vulnerabilities to DVTI
and remediate discovered
vulnerabilities with a virtual patch

• Detect and block network


traffic bi-directionally based
on geographic region or country

Page 1 of 1 Datasheet • Trend Micro™ TippingPoint™ Security Management System (SMS)


Datasheet

Threat visibility and prioritization


Leverage our Trend Vision One™ – Threat Insights aggregation portal to display Additional benefits
events from TippingPoint devices, vulnerability scanners, and sandboxing solutions • Submit potential threats identified
in one place. This helps you prioritize, automate, and consolidate your network threat by TippingPoint to a sandbox
information and equips multiple security groups with a common framework for for advanced threat analysis
discussion and resolution. By correlating and automating threat data from multiple and automated blocking
security tools, Threat Insights assists helps you prioritize incident response measures
• Centralize your certificate
for breaches or potential vulnerabilities.
repository for TippingPoint
SMS and managed TippingPoint
Threat Insights provides views and actionable data on:
devices with on-box SSL
Breached hosts inspection enabled
Information is correlated from TippingPoint and Trend Micro™ Deep Discovery™ Analyzer
• Integrate Microsoft Active
(sandbox) to help prioritize events for response. Isolate, seek out, and quarantine users
Directory (AD) for prioritized
on your network who appear to be infected or acting suspiciously.
network user context
Attacked vulnerable hosts and reporting

Integrate with third-party vulnerability scanners to prioritize Digital Vaccine filters based • Visualize all network traffic
on actual vulnerabilities in a unique environment. This enables your users to quickly when combined with the
enable filters that they might not have known about before. latest TippingPoint solutions

Suspicious objects • Leverage advanced reporting


and analysis of security events
Incident response is integrated between Trend Micro™ – Deep Discovery™ and TippingPoint
and network usage
SMS. Automatically submit identified potential threats (such as URLs) from TippingPoint
to the Deep Discovery sandbox to isolate and investigate risks. This also enables you • Integrate with security information
to convert unknown, potential threats into known threats. These suspicious objects and event management (SIEM),
can then be viewed in Threat Insights to ensure your users are protected. breach detection, and other
third-party security solutions
Trend Micro™ Zero Day Initiative™ (ZDI) filter hits
Undisclosed threats are vulnerabilities that are unknown to the public—outside of
Trend Micro and the impacted software vendor—that could potentially be zero-day
threats. The Trend™ Research team, in collaboration with ZDI, provides preemptive
protection from undisclosed and zero-day threats with proactive insights on
vulnerability information. In most cases, this preemptive protection is available
before a vulnerability is disclosed or exploited. Threat Insights displays filters that
trigger on the potentially most impactful threats, giving your security response teams
visibility into the high‑priority, undisclosed zero-day filters protecting vulnerabilities in
their environment. This helps you prioritize events that may require immediate action.

Figure 2: Threat Insights overview

Page 2 of 4 Datasheet • Trend Micro™ TippingPoint™ Security Management System (SMS)


Datasheet

Advanced threat analysis


TippingPoint solutions can automatically block known and undisclosed vulnerabilities
from the network. Through added forensic capabilities, they can automatically Leader in global vulnerability research
forward unknown or suspicious indicators of compromise (IoC) to Threat Insights. and discovery since 2007
Deep Discovery Analyzer can then confirm whether IoCs are malicious through
in-depth sandbox analysis and remediation—all without changing your policy
or network infrastructure.

Advanced policy definition Ranked #1 in Gartner® IDPS


Policy definitions can be based on physical segments, virtual local area network (VLAN), Market Share worldwide at
IP range, and direction. Security policies can be easily changed to fit the rhythm of your 23.5% share for 20201
operations and automatically adjusted as threats arise.

Figure 3: Policy tuning wizard


Digital Vaccine and DVTI distribution
The TippingPoint Threat Management Center (TMC) distributes filter updates through
weekly Digital Vaccine packages to protect systems against known and zero-day threats.
The TippingPoint SMS can be configured to automatically check for, download, and
distribute filter updates to TippingPoint devices.

Automated event actions


Included with the TippingPoint SMS is Active Responder, an automated response
system that allows users to specify an action in response to a security event. It can
direct a user to a self-remediation site, generate a trouble ticket or, for severe events,
move them to a secure VLAN or remove them from the network.

Enterprise vulnerability remediation (eVR)


With eVR, you can import vulnerability data from vulnerability assessment and
vulnerability management (VA/VM) vendors (including Qualys, Rapid7, and Tenable),
map common vulnerability exposures (CVEs) to DV filters, and take immediate action
based on the enhanced threat intelligence to increase your security coverage.

Geographic and location filtering


TippingPoint SMS can be configured to detect and block network traffic based
on a computer’s IP address and host name within a geographic region or country.
Establish an action set associated with geographic filters to minimize or eliminate
communications with potentially risky systems.

Microsoft Active Directory (AD) integration


TippingPoint SMS can provide visibility, enhanced context, and reporting on the traffic
of a particular user through AD integration. The username, domain, machine, and user
group are all tracked and available for forensics, reporting, and filtering results. For
example, you can see all attacks targeted to “machine X” or from “user Y.” Administrators
can also see the IP history of a particular AD user or the user history for a particular IP.

Comprehensive network traffic visualization


TippingPoint solutions can support the export of network flow data statistics for
visualization and analysis. With TippingPoint SMS, your statistics and flow data
summaries can be viewed and analyzed to optimize performance and help identify
compromised hosts as well as other suspicious and malicious network traffic.
1
Market Share: Enterprise Network Equipment by Market Segment, Worldwide, 4Q20 and 2020, Christian Canales,
Naresh Singh, Joe Skorupa, Gartner (March 2021)

Page 3 of 4 Datasheet • Trend Micro™ TippingPoint™ Security Management System (SMS)


Datasheet

Device configuration and monitoring


TippingPoint SMS management can scale up to hundreds of devices or drill down deep into the internal workings of TippingPoint
devices. In addition, a single client can operate across multiple TippingPoint SMS instances for even greater scalability. Your network
parameters—as well as your TippingPoint device and filter behaviors—can be viewed, assessed, and tuned from one interface.

Third-party integration
TippingPoint SMS integrates with several third-party security solutions using APIs to enhance a layered approach to security. These
APIs can be used to integrate with existing security tools to enhance response and control across your network. Gain visibility into
your network to make informed decisions and take immediate action on any potential threats to infrastructure or data. TippingPoint
SMS can integrate with leading SIEM, VA/VM, breach detection, and other complementary security solutions.

TippingPoint SMS technical specifications


Physical appliance specifications

Features TippingPoint SMS H5 appliance Tippingpoint SMS H5 XL appliance


Manufacturer Dell Dell
4.27 cm H x 48.22 cm W x 75.85 cm D 4.27 cm H x 48.22 cm W x 75.85 cm D
Dimensions
(1.68" H x 18.97" W x 29.85" D) (1.68" H x 18.97" W x 29.85" D
Form factor 1U rack mount 1U rack mount
Weight 18.2 kg (40.1 lbs) 18.2 kg (40.1 lbs)
64 GB RAM 128 GB RAM
Memory and storage
800 GB storage (2 x 800 GB SSD, RAID 1) 2.4 TB storage (6 x 800 GB disks, RAID 10)
Operating temperature 10°C – 35°C (50°F – 95°F) 10°C – 35°C (50°F – 95°F)
Power supply Dual 1100 W PSUs (1+1 redundant, hot-swappable) Dual 1100 W PSUs (1+1 redundant, hot-swappable)
Voltage 100 VAC ~ 240 VAC 100 VAC ~ 240 VAC
Frequency 50/60 Hz 50/60 Hz
Maximum power
476W 598W
consumption
Capacity 200 million historical events 600 million historical events
Provides additional processing and storage recommended
Additional processing
for deployments larger than 150 devices
Ethernet management
Dual 1GbE RJ45 / Dual 25GbE SFP28 Dual 1GbE RJ45 / Dual 25GbE SFP28
connectivity
Out-of-box remote Dell iDRAC9 Enterprise w/ GbE RJ45 Dell iDRAC9 Enterprise w/ GbE RJ45
management DB9 serial / DB15 VGA + USB keyboard DB9 serial / DB15 VGA + USB keyboard

TippingPoint SMS enterprise virtual appliance


Hypervisor support VMware ESX/ESXi v7.0 or 8.0 / KVM
Storage: 600 GB (recommended)
Resources Compute: 8 virtual CPUs
Memory: 32 GB (minimum)
Capacity 100 million historical events

Experience our Trend Vision One™ platform


Access free trial

Copyright ©2024 Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro logo, TippingPoint, Trend Vision One, Zero Day Initiative, Deep Discovery, Digital Vaccine, and
the t-ball logo are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their owners.
Information contained in this document is subject to change without notice. Trend Micro, the Trend Micro logo, and the t-ball logo Reg. U.S. Pat. & Tm. Off. [DS10_SMS_TippingPoint_240910US]

Trendmicro.com

For details about what personal information we collect and why, please see our Privacy Notice on our website at: trendmicro.com/privacy

Page 4 of 4 Datasheet • Trend Micro™ TippingPoint™ Security Management System (SMS)

You might also like