Know more about the new features and supported platforms of Deep Security 8.0.
Deep Security 8.0 offers the following:
The new features of Deep Security 8.0 are:
vSphere 5.0 and vShield 5.0 Support
Deep Security Virtual Appliance (DSVA) version 8 is designed to work with VMware VSphere 5
Deep Security Manager on Linux
64-bit RedHat Linux Enterprise Edition versions 5 and 6 are now officially supported in Deep Security.
Agentless Integrity Monitoring
The Integrity Monitoring module is used to monitor a system for changes to specified areas (certain files, registry values, etc.). This alerts you if there are unauthorized software installed or there are unexpected changes to already installed software.
The Integrity Monitoring module is now supported by the DSVA as well as by the DSA on physical or virtual computers.
Anti-Malware on DSA for Windows
Anti-malware for Windows provides both real-time and on-demand protection against file-based threats, including threats commonly referred to as malware, viruses, Trojans, and spyware.
Deep Security Relay and iAU Support
The Deep Security Relay is a server that relays Deep Security updates from the Trend Micro global update server to the Deep Security system. Relays improve performance by distributing the task of delivering updates to the Manager, Appliances, and Agents of your Deep Security installation.
Web Reputation Service Protection
Web Reputation module allows web pages to be blocked based on their web reputation ratings. Web Reputation uses Trend Micro Smart Protection Network.
Smart Protection Network Support
The Trend Micro Smart Protection Network uses a global network of threat intelligence sensors to continually update email, web, and file reputation databases in the cloud, identifying and blocking threats in real time. Deep Security can access the Smart Protection Service directly or you can install local Smart Protection Servers. Smart Protection Servers are designed to localize operations to the corporate network to optimize efficiency.
Auto-tagging and Trusted Source
Auto-tagging allows administrators to automatically tag events from protected computers based on the similarity to selected known-good events. The source for known-good events can be a local Trusted Computer, or known good signatures from Trend Micro’s Certified Safe Software Service. Tags can be used to organize events in order to simplify the task of event monitoring and management.
Agent Self Protection
This will prevent local users from uninstalling the Agent, stopping the Agent service, modifying Agent-related Windows Registry entries, or modifying Agent related files.
Webservices API and reference document
The Deep Security Manager's functionality can be controlled via SOAP-invoked Web services.
Deep Security 8 supports IPv6 traffic. IPv6 support is limited to Deep Packet Inspection. The firewall functionality cannot be applied to IPv6 traffic in this version.
Windows users will now be able to receive notification about malware and spyware events, and the status of protection through an application that installs on the Windows system tray.
Direct and via-Manager syslog options
Relaying syslog messages from the agents to the DSM simplifies firewall administration.
Deep Security Manager
Microsoft Windows Server 2008 (32-bit and 64-bit),Windows Server 2008 R2 (64-bit),Windows 2003 Server SP2 (32-bit and 64-bit),RHEL 5 (64-bit).
Deep Security Agent
Windows 7 (32-bit and 64-bit),Windows 2008 R2 (64-bit), Windows 2008 (32-bit and 64-bit), Windows 2003 server SP2 (32-bit and 64-bit), Windows XP (32-bit and 64-bit).
Deep Security Notifier
Windows 7 (32-bit and 64-bit), Windows 2008 (32-bit and 64-bit), Windows 2008 R2 (64-bit), Windows Vista (32-bit and 64-bit), Windows 2003 SP2 (32-bit and 64-bit), Windows XP (32-Bit and 64-bit).
Deep Security Relay
Windows 7 (32-bit and 64-bit), Windows 2008 (32-bit and 64-bit), Windows 2008 R2 (64-bit), Windows Vista (32-bit and 64-bit), Windows 2003 SP2 (32-bit and 64-bit), Windows XP (32-Bit and 64-bit), Red Hat 5 (64-bit), Red Hat 6 (64-bit).