Antivirus / Security Risk Protection
|
Apex One protects computers from security risks by scanning files and then
performing a specific action for each security risk detected. An overwhelming number
of
security risks detected over a short period of time signals an outbreak. To contain
outbreaks, Apex One enforces
outbreak prevention policies and isolates infected computers until they are completely
risk-free.
Apex One uses smart scan to make the scanning process more efficient. This
technology works by off-loading a large number of signatures previously stored on
the local
endpoint to Smart Protection Sources. Using this approach, the system and network
impact of
the ever-increasing volume of signature updates to endpoint systems is significantly
reduced.
|
Application Control
|
Application Control provides users with advanced application
blocking and lockdown capabilities. You can run application inventories and then create
policy rules that only allow specific applications to execute on your endpoints. You
can
also create application lists based on application category, type, or version.
|
Behavior Monitoring
|
Behavior Monitoring constantly monitors endpoints for unusual
modifications to the operating system or on installed software.
|
Damage Cleanup Services
|
Damage Cleanup Services™
cleans computers of file-based and network
viruses, and virus and worm remnants (Trojans, registry entries, viral files) through
a
fully-automated process. To address the threats and nuisances posed by Trojans, Damage Cleanup Services does the following:
-
Detects and removes live Trojans
-
Kills processes that Trojans create
-
Repairs system files that Trojans modify
-
Deletes files and applications that Trojans drop
|
Data Loss Prevention
|
Data Loss Prevention safeguards an organization's digital assets
against accidental or deliberate leakage. Data Loss Prevention allows administrators
to:
-
Identify the digital assets to protect
-
Create policies that limit or prevent the transmission of digital
assets through common transmission channels, such as email messages and external
devices
-
Enforce compliance to established privacy standards
|
Device Control
|
Device Control
regulates access to external storage devices and network resources connected to endpoints.
Device Control helps prevent data loss and leakage and, combined with file scanning,
helps
guard against security risks.
|
Endpoint Sensor
|
Endpoint Sensor allows you to monitor, record, and perform historical
security investigations on your Trend Micro-protected endpoints. Use the Apex Central console and perform
preliminary investigations to locate at-risk endpoints before executing an in-depth
Root
Cause Analysis to identify the attack vectors.
|
Apex One Firewall
|
The Apex One Firewall protects endpoints and servers on the network
using stateful inspections and high performance network virus scans.
|
Plug-in Manager and Plug-in Solutions
|
Plug-in Manager facilitates the
installation, deployment, and management of plug-in solutions.
Administrators can install two kinds of plug-in solutions:
-
Plug-in programs
-
Native Apex One features
|
Predictive Machine Learning
|
The Predictive Machine Learning engine can protect your network from new,
previously unidentified, or unknown threats through advanced file feature analysis
and
heuristic process monitoring. Predictive Machine Learning can ascertain the probability
that
a threat exists in a file and the probable threat type, protecting you from zero-day
attacks.
If a functional Internet connection is unavailable, Predictive Machine
Learning automatically switches to the local model to provide constant unknown threat
protection against portable executable file threats.
|
Vulnerability Protection Integration
|
Integration with Vulnerability Protection protects Apex One users by
automating the application of virtual patches before official patches become available.
Trend Micro provides protected endpoints with recommended Intrusion Prevention rules
based
on your network performance and security priorities.
|
Web Reputation
|
Web Reputation
technology proactively protects agent endpoints within or outside the corporate network
from
malicious and potentially dangerous websites. Web Reputation breaks the infection
chain and
prevents the downloading of malicious code.
|