TRUSTMARQUE TREND MICRO ONE PRODUCT SUITE
Cloud-delivered and powered by over 250 million global sensors, Trend Micro One continuously discovers your dynamic attack surface, assesses your risk, and helps you respond with the right security at the right time. Zero Trust strategy and executive risk dashboards enable you to be more confident in your security strategy.
Features
- Cloud Security - comprehensive security for cloud applications
- Network Security - Protection from known, unknown and undisclosed threats
- User Protection - Complete user protection security
- Email Security - Cross-generational blend of threat techniques
- Web Security - Forward-looking threat protection on web threats
- Workload Security - Secure your data center, cloud, and containers
- Central Security Visibility - Increase risk visibility, understand broader threats.
- Advanced Threat Detection - collect and correlates deep activity data
- Cross Platform Detection and Response - collect and correlates data
- Managed Cross Platform Detection and Response – Threat detection
Benefits
- Cloud Security - Automated, flexible, all in one cloud security
- Network Security - Prevent, detect, respond
- User Protection - Protect users and their information
- Email Security - Layered protection guards against persistent/ targeted attacks
- Web Security - Protect users at any location
- Workload Security - Automatically detect new workloads and protect them.
- Central Security Visibility - Increase risk visibility
- Advanced Threat Detection - Powerful security analytics
- Cross Platform Detection and Response - Collect and correlate
- Managed Cross Platform Detection and Response
Pricing
£10.65 a unit
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 6 8 3 9 1 7 5 0 9 8 9 7 0 9
Contact
Trustmarque Solutions Limited
Lorraine Spence
Telephone: 01904 924089
Email: tenders@trustmarque.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Trend Micro One
- Cloud deployment model
- Hybrid cloud
- Service constraints
- No constraints regarding maintenance arrangements or specific hardware configurations. All supported platforms can be found at docs.trendmicro.com
- System requirements
- Please visit trendmicro.com
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Trend Micro will make a commercially reasonable effort to ensure that its technical staff promptly answer
Customer’s calls, respond to Customer’s questions, and correct software/service deficiencies, according to the
severity definitions and target initial response times identified in the following link https://success.trendmicro.com/dcx/s/solution/000285802?language=en_US - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- Full testing such as short hand word identification
- Onsite support
- No
- Support levels
-
Standard 9-6.30pm 5 days a week support is complimentary to Trend Micro customers.
Premium Support is 24x7 and charged based upon which solution is being supported. Further information can be requested from Account Manager. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Chargeable onsite training is available. Complimentary online training is available. Best practice guides and user documentation is availabe at https://success.trendmicro.com/dcx/s/solution/1118282-compilation-of-best-practices-while-using-trend-micro-products-for-business?language=en_US and docs.trendmicro.com
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- All information regarding customer data collection can be found here https://success.trendmicro.com/dcx/s/data-collection-disclosure?language=en_US
- End-of-contract process
- Trend Micro will work proactively with the customer to ensure timely renewal is in place to avoid any issues to the customer's security services
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- Linux or Unix
- MacOS
- Windows
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AAA
- Description of service interface
- Online SaaS interface that allows management and configuration
- Accessibility standards
- WCAG 2.1 AAA
- Accessibility testing
- Full testing such as short hand word identification
- API
- Yes
- What users can and can't do using the API
- Details can be found here https://automation.deepsecurity.trendmicro.com/article/20_0/
- API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- Configuration and Mangagement based on users requirements
Scaling
- Independence of resources
- Automscaling is in place
Analytics
- Service usage metrics
- Yes
- Metrics types
-
1. CPU
2. Disk
4. Memory
5. Network - Reporting types
- Reports on request
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Trend Micro
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Via CSV or ODF through management interface
- Data export formats
-
- CSV
- ODF
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- Private network or public sector network
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Trend Micro Service Levels can be found here https://success.trendmicro.com/dcx/s/solution/000285802?language=en_US
- Approach to resilience
- This information is available upon request
- Outage reporting
- Email Alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- 2-factor authentication and Username or password
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users receive audit information on a regular basis
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users receive audit information on a regular basis
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- SGS
- ISO/IEC 27001 accreditation date
- 28/12/2021
- What the ISO/IEC 27001 doesn’t cover
- https://www.trendmicro.com/en_us/about/trust-center/compliance.html
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- Security Standards Council
- PCI DSS accreditation date
- June 2018
- What the PCI DSS doesn’t cover
- https://www.trendmicro.com/en_us/about/trust-center/compliance.html
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- ISO 27001, 27014 & 27034
- ISO 27017
- ISO 20000
- SOC 2 Type 2
- FIPS 140-2
- Common Criteria EAL2+
- FedRAMP
- ICSA Labs Certification
- NetSecOPEN
- HIPAA
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- https://www.trendmicro.com/en_us/about/trust-center/compliance.html
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- All information can be found here https://www.trendmicro.com/en_us/about/trust-center/security-practices.html
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- https://www.trendmicro.com/en_us/about/trust-center/company.html
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- All information can be found here https://www.trendmicro.com/en_us/about/trust-center/compliance.html
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- All information can be found here https://www.trendmicro.com/en_us/about/trust-center/compliance.html
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
- Other
- Other public sector networks
- More information on request
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Trustmarque's Environmental Policy and Carbon Reduction Plan include delivering and supporting actions on reducing our carbon footprint and our impact on climate change. We have set a target to achieve net zero by 2035. Our policies include 'Virtual First 'meetings, energy reduction plans, flexible working, green software solutions and associated services from innovative suppliers to promote digital environmental innovation, promoting sustainable procurement. Please contact Trustmarque to discuss the provision of Social Value. Any Social Value deliverable must be agreed with Trustmarque and be proportionate to the contract value and scope.
Pricing
- Price
- £10.65 a unit
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- 30 day free trials are available for many of our solutions and can be found here https://www.trendmicro.com/en_us/business/products/trials.html
- Link to free trial
- https://www.trendmicro.com/en_us/business/products/trials.html