0731- 4074407, 4037273

Cyber Security

Advance Business Security Solution Powered By Trend Micro and Cisco.

Like most small businesses, you probably have limited resources for your IT security. So protecting your livelihood against ever-evolving IT threats can be a significant challenge. We can help you overcome the hurdles and protect your staff and important data anywhere, anytime, on any device by installing our advance business security solution which is powered by TREND MICRO and  CISCO Meraki.

TREND MICRO and CISCO Meraki both are world’s number one and trusted companies worldwide.

Our advance business security solution provides you highly secure, high-performance, reliable connectivity to the Internet, other offices, and to employees working remotely. This proven  advance business security provide the performance and security you need to help keep your employees, and your business, productive.

Key Benefits of Advance Business Security Solution as follows:

  • Shields against ransomware
  • Specially designed for small businesses
  • Server maintenance free hosted by Trend MicroTM
  • Blocks malicious email attachments in real time
  • Stops threats before they reach your business
  • Blocks access to inappropriate websites
  • Supports Microsoft Office 365 using Trend Micro Hosted Email Security
  • Protects mobile devices
  • Intuitive, browser-based device manager and setup wizards
  • Cloud-based centralized management
  • Stateful firewall
  • Auto VPN™ self-configuring site-to-site VPN
  • Active Directory integration
  • Identity-based policies
  • Client VPN (IPsec)
  • Layer 7 application visibility and traffic shaping Application prioritization
  • Content filtering
  • Intrusion prevention (IPS)
  • Antivirus and antiphishing filtering
  • Monitoring and Management

What It Does:

Our advance business security solution allows you to use your PCs, Macs, and mobile devices without fear of interruption or data loss. It is security software that doesn’t require any IT expertise and won’t affect your network’s performance or slow down your devices.

Advantages as follows:

  • Lets you concentrate on your business, not your IT security
  • Installs easily and is simple to use, designed for small business – no IT expertise required
  • Stops threats in the cloud – before they can reach your network and devices
  • Filters URLs – blocks access to inappropriate websites
  • Shields against ransomware
  • Prevents business data from being shared – via email messages and USB drives
  • Safeguards against phishing as well as social engineering attacks
  • Provides you with easy mobile device security management
  • Stops spam before it reaches mail servers by leveraging Hosted Email Security
  • Protection point: – PCs, Macs, Mobile devices, Laptops, Mail and file servers, Point of sale devices, USB drivers.

Ransomware Protection:

Our advance business security solution provides advanced malware and ransomware protection; your endpoints are protected on or off the corporate network against viruses, malware, Trojans, worms, spyware, ransomware, and new variants as they emerge.

  • Reduces the burden of pattern file management and lowers performance impact
  • Detects and blocks ransomware encryption activities
  • Identifies and blocks botnet and targeted attack C&C communications
  • Secures users and endpoint systems from accessing malicious web content, without relying on updates, to assure zero-day protection

Defending against ransomware on the endpoint with:

  • Behavior monitoring – Monitors for the rapid encryption of multiple files (filtering out good encryption processes) and kills the malicious encryption process before the ransomware can spread. This advanced capability restores any files encrypted before the offending process was killed.
  • Web reputation – Blocks ransomware threats via the cloud using data from the Trend Micro Smart Protection Network and by blocking the ransomware (C&C) activity.
  • Browser exploit prevention – Uses multiple heuristic analysis techniques to detect and block exploit code on web pages (e.g., exploits in Java and Flash) that try to download ransomware as you attempt to access web pages with your browser.

Hosted Email Security blocks ransomware before it ever gets to your users: – By blocking ransomware at the email gateway, you prevent it from ever reaching your users. In just a short, 30-day snapshot (April ~ May 2016); Trend Micro Hosted Email Security blocked more than 1.4 million emails with ransomware.

  Hosted Email Security:

  • Detects and blocks ransomware with malware scanning, anti-spam and file (including executables and macro) scanning
  • Gives you advanced threat protection with sandbox malware analysis (optional), social engineering protection and zero-day and document exploit detection
  • Uses web reputation to protect against web links in malicious emails

Highly Secure, Reliable Connectivity for the Small Business Network:

  • Network and Security Services
    • Stateful firewall, 1:1 NAT, DHCP, DMZ, static routing
    • Identity-based policies
    • Auto VPN™ self-configuring site-to-site VPN
    • Client VPN (IPsec)
    • User and device quarantine
    • VLAN support and DHCP services
  • Advanced Security Services
    • Content filtering (Webroot BrightCloud CIPA-compliant URL database)
    • Web search filtering (including Google and Bing SafeSearch)
    • YouTube for Schools
    • Intrusion prevention (SourceFire Snort based)
    • Antivirus and antiphishing filtering (Kaspersky SafeStream II engine)
    • Requires Advanced Security License
  • WAN Performance Management
    • WAN link aggregation
    • Application level (Layer 7) traffic analysis and shaping
    • Automatic Layer 3 failover (including VPN connections)
    • WAN uplink selection based on traffic type
  • Monitoring and Management
    • Web based management and configuration
    • Throughput, connectivity monitoring and alerts
    • Network asset discovery and user identification
    • Built-in network-wide reporting, monitoring and alerts
    • Centralized policy management
    • Real-time diagnostic and troubleshooting over the web
    • Automatic firmware upgrades and security patches
    • Searchable network-wide event logs
  • Interfaces
    • WAN: 1 × 1 GbE
    • LAN: 4 × 1 GbE (1 optionally available for WAN connectivity)
    • USB: 1 × USB 2.0 for 3G/4G failover (supported devices)
  • Performance
    • Stateful firewall throughput: 250 Mbps
    • VPN throughput: 100 Mbps
    • Recommended for small branches (up to 50 users)

Why it’s better: – It is developed specifically for small business professionals, easy enough for a non-IT people to use.

  • Protects email, web, file sharing, and more
  • Filters URLs by blocking access to inappropriate websites, increasing employee productivity
  • Prevents data loss via email messages and USB drives
  • Blocks spam and safeguards against phishing as well as social engineering attacks
  • Protects Windows, Mac, and mobile devices
  • Installs easily and is simple to use
  • Provides centralized visibility and control
  • Provides protection with limited impact on performance
  • Features cloud-based protection through Trend Micro Smart Protection Network and proactively stops threats before they can reach the business, limiting the impact on your systems.
System Requirement
Operating Systems Clients Windows XP, Vista, Windows 7, Windows 8, Windows 8.1 x86/x64 Mac Clients: Mac OS X Snow Leopard™, Leopard™, Tiger™
Windows Servers 2003, 2003 R2, 2008, 2008 R2, 2012, Small Business Server 2003, 2003 R2, 2008 & 2011, Storage Server 2003, 2003 R2, 2008 & 2012, 2012 R2 x64, Home Server 2011, Server 2008 2008 R2, Essential Business Server 2008, Server 2012 Essentials
Mac Servers OS X™ Mountain Lion 10.8 or later, Mac OS™ X Lion 10.7 or later, Mac OS X Snow Leopard™ 10.6 or later, Mac OS X Leopard™ 10.5.7 or later, Mac OS X Tiger™ 10.4.11 or later, Mac OS X Mavericks 10.9
Mobile Security (Advanced version only) iOS 3.0-6.1 (4.3-7.0), Android 2.2-4.2, Windows 7.0-8.0, BlackBerry 7.0-10.1
Email Servers (Advanced version only) Exchange Server 2003 SP2, 2007 SP1, 2010 SP 1, 2 and 3, 2013
Processor Clients Intel Pentium x86 or compatible; x64: AMD64, Intel EM64T (clock speed varies depending on OS)Security Server: Conventional scan mode: Intel™ Pentium™ 4 or higher; Smart Scan mode: Intel Core 2 Duo™ or higher recommended
Mac Clients PowerPC™ or Intel™ core
Security Server Conventional scan mode: Intel™ Pentium™ 4 or higher
Smart Scan mode:
Multiple processors or multi-core processor
Email Server 1GHz Intel Pentium x86 or compatible; 1GHz x64 (AMD64, Intel EM64T)
RAM Clients 256MB; 512MB recommended
Security Server Smart Scan mode: 1GB; 2GB recommended
Conventional mode (x86): 512MB; 1GB recommended
x64 (Smart and Conventional): 1GB; 2GB recommended
Windows EBS 2008 or SBS 2008 (Smart and Conventional): 4GB, 8GB recommended
Email Server 1GB
Disk Space
(8.5GB total)
Clients 450MB
Security Server 5GB (not including Agents)
Email Server: 1.5GB


Compare Solution
Functions Advance Business Security Solution
@Just rupees 12/user/day
Other Firewall Solution
@ rupees 82/user/day
Centralized Management
Web Management Console Hosted by Trend Micro.
Can be accessed anywhere via Internet
Management server location Hosted by Trend Micro.
server maintenance free
Updates and patches pushed to users Automatic No
Policy pushed to users Via Internet. Can be pushed anywhere. Via internet. Can be pushed only intranet
PCs, laptops, Windows servers
Mac clients (iMacs and MacBooks)
and servers
Mobile devices (Android and iOS) each
seat comes with anti-virus and mobile
protection for two devices
NEW and UNIQUE – Mobile device security
Antivirus and Web Security
Defends against viruses, spyware
and other malware
Yes Yes, but internet performance decreses
UNIQUE – Advanced URL filtering blocks
inappropriate websites
Yes Yes
Web threat protection stops viruses
and threats  before they reach your business
Yes Yes, but internet performance decreses
ENHANCED – Ransomware protection Yes No
Data Protection
Device control – limits access of USB drives
and other attached devices to prevent
data loss and block threats
Yes No
Messaging Security and Antispam
Stops spam and email-based viruses
before they reach mail servers
Yes Yes
Advanced targeted attack and
spear-phishing protection
Yes Yes
Technical Support
Business hours support Yes Yes,but required proprietary license