Blue Cube Security Ltd

Trend Micro Deep Security

Security that's built for DevOps to automatically defend your AWS , Azure, GCP & VMware workloads and simplify compliance. Pay per instance starting at $0.01/hour. Proactive protection of elastic workloads against threats, malware and vulnerabilities.

Features

  • Provides comprehensive security for data centre and cloud workloads
  • Protects enterprise applications and servers from the latest attacks
  • Delivers the best protection against ransomware and other threats
  • Security optimized for AWS, Microsoft Azure, VMware and GCP
  • Single-point visibility and control of your entire security infrastructure.
  • Security built to fit DevOps with robust API's and automation
  • Billed based on hourly usage, starting at just $0.01/hour
  • Simplify your life with Security as a Service

Benefits

  • Provides comprehensive security for data centre and cloud workloads.
  • Protects enterprise applications and servers from the latest attacks.
  • Security optimized for AWS, Microsoft Azure, GCP and on-premise servers.
  • Delivers the best protection against ransomware and other threats.
  • Single-point visibility and control of your entire security infrastructure.
  • Protects Windows, Linux & Container workloads against network threats
  • Speed PCI-DSS and regulatory compliance with multiple security controls

Pricing

£0.01 to £0.05 a virtual machine an hour

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at operations@bluecubesecurity.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

5 4 1 3 5 3 6 5 8 8 0 2 3 8 1

Contact

Blue Cube Security Ltd Operational Admin Support
Telephone: 0345 0943070
Email: operations@bluecubesecurity.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Virtual/Physical/Cloud based servers/AWS/Azure/GCP/Kubernetes/SAP
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
Your purchase also includes 24x7 standard support from Trend Micro. You can log a support ticket right from the Deep Security console. Customers can also purchase Premium support on request.
System requirements
https://help.deepsecurity.trendmicro.com/11_0/aws/Get-Started/Install/system-requirements.html

User support

Email or online ticketing support
Email or online ticketing
Support response times
Your purchase also includes 24x7 support from Trend Micro. You can log a support ticket right from the Deep Security console. Your purchase also includes 24x7 support from Trend Micro. You can log a support ticket right from the Deep Security console. aws.marketplace@trendmicro.com Premium support program (PSP) is at extra cost with additional service levels and capabilities
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Your purchase also includes 24x7 support from Trend Micro. You can log a support ticket right from the Deep Security console. aws.marketplace@trendmicro.com Premium Support Program(Additional purchase required) provides you with a named Customer Service Manager who will be your on-going contact to assist you with Find out more here : https://www.trendmicro.com/en_gb/business/products/support-services.html
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide documentation and guides, including knowledgebase articles to guide you through the steps required to install Deep Security solution. Customers can leverage professional services partners for additional assistance and onboarding, which is an additional cost.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Data collected by Trend Micro is subject to the conditions stated in the Trend Micro Privacy Policy. More details here - https://success.trendmicro.com/solution/1119904
End-of-contract process
To cancel your Deep Security via marketplace, you have to:
1. Deactivate and uninstall your Deep Security Agents.
2. Cancel your AWS Marketplace subscription if Deep Security as a Service currently bills to your AWS account.
3. Cancel your Deep Security as a Service account.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Yes
Compatible operating systems
  • Linux or Unix
  • Windows
Designed for use on mobile devices
No
Service interface
Yes
Description of service interface
Deep Security console has a service interface as part of the software installation.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
Trend Micro is committed to excellence in serving all customers including people with disabilities. More information can be found here : https://www.trendmicro.com/en_us/about/legal/accessibility-policy.html
API
Yes
What users can and can't do using the API
Get protected, stay secured, and keep informed with Trend Micro Deep Security's new RESTful API. Access system data and manage security configurations to automate your security workflows and integrate Deep Security into your CI/CD pipeline. Find out more here : https://automation.deepsecurity.trendmicro.com
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • PDF
API sandbox or test environment
No
Customisation available
No

Scaling

Independence of resources
Trend Micro manage their capacity for update services, but primary resource control for the software rests with the buyer and their cloud provider, not the supplier

Analytics

Service usage metrics
Yes
Metrics types
If you are subscribed to Deep Security software Pay as you Go through the AWS Marketplace, you can check your current costs and usage from the AWS Billing and Cost Management console. For directions on viewing or downloading your bills, see the AWS documentation on Viewing Your Monthly Charges.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Splunk, Trend , Sophos, Qualys, Netscout, Imperva, CyberArk, Fortinet, AWS

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least every 6 months
Penetration testing approach
In-house
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Data collected by Trend Micro is subject to the conditions stated in the Trend Micro Privacy Policy. More details here - https://success.trendmicro.com/solution/1119904
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
The availability for Deep Security Software is down to the platform and how this is configured. We cannot offer an SLA for this third party environment.
Approach to resilience
When the AMI is installed on AWS Deep Security has recommended reference architectures to ensure resiliency. Please refer to our quick start guide for reference architecture and deployment advice to ensure optimum resiliency : https://docs.aws.amazon.com/quickstart/latest/deep-security/overview.html
Outage reporting
AWS and DeepSecurity have capabilities which send out alerts directly via API

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
Trend Micro primarily handles data that is collected through the protection policy and security events. Each tenant's information is separated using a dedicated database schema. Access and storage of this information is strictly controlled and is used for diagnostic and support purposes only. Client contact details, such as their email address, are retained encrypted at rest for client management purposes
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users receive audit information on a regular basis
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Independently accredited
ISO/IEC 27001 accreditation date
December 2018
What the ISO/IEC 27001 doesn’t cover
N/a
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
Yes
Who accredited the PCI DSS certification
Coalfire
PCI DSS accreditation date
October 2006
What the PCI DSS doesn’t cover
N/A - Coalfire,has certified Deep Security as a Service according to version 3.2 of the PCI Data Security Standard. AWS is also PCI certified. The Attestation of Compliance is available on request.
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Deep Security as a Service is certified as a PCI DSS level 1 service provider. Coalfire, a Qualified PCI Auditor, has certified Deep Security as a Service according to version 3.2 of the PCI Data Security Standard. AWS is also PCI certified. The Attestation of Compliance is available on request. Deep Security as a Service has been added to the Trend Micro ISO 27001 certification, as of December 2018.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Supplier defined controls, available on request from Trend Micro
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Supplier defined controls, available on request from Trend Micro
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Supplier defined controls, available on request from Trend Micro
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Supplier defined controls, available on request from Trend Micro

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Pricing

Price
£0.01 to £0.05 a virtual machine an hour
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Evaluation licences for specific projects can be issued.

Deep Security software is available to explore via the AWS marketplace,

Please make a formal request via our website:

http://www.bluecubesecurity.com/contact-usgcloud/
Link to free trial
http://www.bluecubesecurity.com/contact-usgcloud/

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at operations@bluecubesecurity.com. Tell them what format you need. It will help if you say what assistive technology you use.