“Deep Discovery provides proven ransomware and advanced threat protection that interoperates and integrates with your security infrastructure. So you have a comprehensive defense tailored to protect your organization against targeted attacks, advanced threats, and ransomware.
- Proven detection rates—using specialized engines, custom sandboxing, and seamless correlation across the entire attack lifecycle
- In-depth analysis—correlation of local and global threat intelligence
- Rapid response—ability to detect and block spear phishing attacks and to share IOC intelligence with both Trend Micro and third party security investments
Deep Discovery Inspector is a physical or virtual network appliance that monitors 360-degrees of your network to create complete visibility into all aspects of targeted attacks, advanced threats, and ransomware. Deep Discovery Inspector monitors all physical, virtual, north-south, and east-west traffic, all network ports, and more than 100 protocols. It delivers the most effective detection of targeted attacks, advanced threats and ransomware in a single appliance.
Through use of extensive detection techniques, monitoring of all network activity, custom sandbox analysis, and correlated threat intelligence, Deep Discovery Inspector can detect and analyze malware, command and control (C&C) communications, and evasive attacker activities that are invisible to standard security defenses.
Deep Discovery Inspector delivers tangible ROI through flexible options to deploy as a single hardware or a virtual appliance based on network throughput. Deep Discovery can enhance existing investments in NGFW/IPS, SIEM and gateways by sharing In-depth threat intelligence with your other Trend Micro and third party security products to create a real-time defense against targeted attacks, advanced threats, and ransomware.
Inspect all network content
Monitors all traffic across physical and virtual network segments, all network ports, and over 100 network protocols to identify ransomware, targeted attacks, and advanced threats anywhere on your network.
Extensive detection techniques
Utilizes file, web, IP, mobile application reputation, heuristic analysis, advanced threat scanning, custom sandbox analysis, and correlated threat intelligence to detect ransomware, zero-day exploits, advanced malware, and attacker behavior.
Custom sandbox analysis
Uses virtual images to precisely match your operating system configurations, drivers, installed applications, and language versions. This improves the detection rates of ransomware and advanced threats that are designed to evade standard virtual images. The custom sandbox environment includes safe live mode access to identify and analyze multi-stage downloads, URLs, C&C and more. Sandboxing capabilities are offered as part of an integrated appliance, or as a scalable standalone capability.”