DALLAS--(BUSINESS WIRE)--Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in security software, announced the Defense Information Systems Agency (DISA) has approved the configuration guideline for Trend Micro Deep Security 9.x for immediate use on Department of Defense (DoD) networks. This approval is based on the fulfillment of technical requirements for the Security Technical Implementation Guides (STIGs).
“DISA’s approval allows federal agencies to utilize and configure our solutions in the most effective way, further protecting them from the increasing number of cyberattacks targeting physical, virtual and cloud network environments,” said Ed Cabrera, vice president, cybersecurity strategy, Trend Micro and former chief information security officer for the U.S. Secret Service. “With Deep Security, government IT teams have access to best-of-breed protection through centralized management and simple administration – helping to reduce the cost and complexity of keeping their data safe.”
The STIG approval process encompasses proof points – policy requirements for security programs and best practices for Information Assurance (IA)-enabled applications. All DoD IT assets must meet STIG compliance before being permitted to operate on networks. DISA confirmed that Trend Micro Deep Security met all technical NIST SP 800-53 criteria. This approval further demonstrates the company’s ability to provide government customers with solutions consistent with DoD cybersecurity policies, standards, architectures, security controls and validation procedures.
Parties within the DoD and Federal Government’s computing environments can obtain the applicable STIG from the Information Assurance Support Environment (IASE) website at http://iase.disa.mil.
For more detailed information on the configuration guideline for Trend Micro Deep Security, please click here or read this blog post.
About Trend Micro
Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Built on 27 years of experience, our solutions for consumers, businesses and governments provide layered data security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative security technology that is simple to deploy and manage, and fits an evolving ecosystem. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™ infrastructure, and are supported by over 1,200 threat experts around the globe. For more information, visit TrendMicro.com.
Trend Micro Incorporated
Thomas Moore, 972-499-6648