Skip to content

Vulnerability Management Services

Automated Vulnerability and Risk Management Powered by Qualys

Automate the process of your vulnerability management and policy compliance across the enterprise, providing network discovery and mapping, asset prioritization, vulnerability assessment reporting, and remediation tracking according to business risk.

 Vulnerability Management Services

Policy compliance features allow security managers to audit, enforce and document compliance with internal security policies and external regulations. And it’s easy to implement. As an on demand Software-as-a-Service (SaaS)solution, there is no infrastructure to deploy or manage.

Register for a free 14-day vulnerability scan trial:

Key Features

Automating Vulnerability Management.

Automates auditing and vulnerability management across the enterprise, including network discovery and mapping, asset prioritization, and vulnerability assessment reporting.

Enforcing IT Policy Compliance

Automates the collection of OS configuration and application access controls from information assets within the enterprise.

Scanning Web Applications for Flaws

Provides automated crawling and testing for web applications and custom code to identify most vulnerabilities, including SQL Injection and Cross-Site Scripting.

Maintaining PCI DSS Compliance

Provides the easiest, most cost-effective and highly automated way to achieve Payment Card Industry Data Security Standard (PCI DSS) compliance. Also available as a standalone offering.
View datasheet (PDF)

Protection Points

  • Internet facing servers
  • Internal clients and servers
  • Networks

Threat Protection

  • Vulnerability and risk management
  • Regulatory compliance


Solution Benefits

Mitigates Risk:

Automates vulnerability identification and prioritizes remediation based on risk to business operations.

Streamlines Audits:

Offers customizable, agent-less auditing scans from a single interface with least impact to IT resources.

Saves Money:

Reduces capital expenditures, human resources, maintenance, and infrastructure with on-demand SaaS technology.

Provides Immediate Visibility:

Allows IT to rapidly identify, visualize, and organize network assets and risk profiles by Business Unit and Asset Group.

Centralizes Policy Definition:

Consolidates IT compliance and security processes into a single solution.

Secures Web Applications:

Identifies vulnerabilities of syntax and semantics in any number of web applications.

Simplifies Compliance:

Discovers IT assets and compares their configurations against standards to help organizations audit and define corrective actions.


Support Information

There are several options available to our customers who need assistance:

  1. Trend Micro offers extensive online help for Trend Micro Vulnerability Management Services accounts through the administrative graphical user interface (GUI).
  2. Search the Trend Micro Support Knowledge Base: http://esupport.trendmicro.com/enterprise/default.aspx?locale=en_GB
  3. Contact TMSS Support for free assistance for setup, configuration, and service usability. Please see the Support contact information for Europe, Middle East and Africa:

Support for Europe, Middle East and Africa

Support during business hours:

8:00am - 5:00pm GMT (9:00am - 6:00pm CET) Monday – Friday

Please be prepared to provide the following information:

  • Company name
  • Administrator account name
  • Contact information
  • A brief description of your issue

Customers/Resellers:

Please log a case online at http://esupport.trendmicro.com/SRFMain.aspx. Phone contact details are available on this page for urgent queries during business hours.


Media społecznościowe

Połącz się z nami