Key Features and Benefits Parent topic

Apex One provides the following features and benefits.

Key Features and Benefits

Feature
Benefits
Antivirus / Security Risk Protection
Apex One protects computers from security risks by scanning files and then performing a specific action for each security risk detected. An overwhelming number of security risks detected over a short period of time signals an outbreak. To contain outbreaks, Apex One enforces outbreak prevention policies and isolates infected computers until they are completely risk-free.
Apex One uses smart scan to make the scanning process more efficient. This technology works by off-loading a large number of signatures previously stored on the local endpoint to Smart Protection Sources. Using this approach, the system and network impact of the ever-increasing volume of signature updates to endpoint systems is significantly reduced.
Application Control
Application Control provides users with advanced application blocking and lockdown capabilities. You can run application inventories and then create policy rules that only allow specific applications to execute on your endpoints. You can also create application lists based on application category, type, or version.
Behavior Monitoring
Behavior Monitoring constantly monitors endpoints for unusual modifications to the operating system or on installed software.
Damage Cleanup Services
Damage Cleanup Services™ cleans computers of file-based and network viruses, and virus and worm remnants (Trojans, registry entries, viral files) through a fully-automated process. To address the threats and nuisances posed by Trojans, Damage Cleanup Services does the following:
  • Detects and removes live Trojans
  • Kills processes that Trojans create
  • Repairs system files that Trojans modify
  • Deletes files and applications that Trojans drop
Data Loss Prevention
Data Loss Prevention safeguards an organization's digital assets against accidental or deliberate leakage. Data Loss Prevention allows administrators to:
  • Identify the digital assets to protect
  • Create policies that limit or prevent the transmission of digital assets through common transmission channels, such as email messages and external devices
  • Enforce compliance to established privacy standards
Device Control
Device Control regulates access to external storage devices and network resources connected to endpoints. Device Control helps prevent data loss and leakage and, combined with file scanning, helps guard against security risks.
Endpoint Sensor
Endpoint Sensor allows you to monitor, record, and perform historical security investigations on your Trend Micro-protected endpoints. Use the Apex Central console and perform preliminary investigations to locate at-risk endpoints before executing an in-depth Root Cause Analysis to identify the attack vectors.
Apex One Firewall
The Apex One Firewall protects endpoints and servers on the network using stateful inspections and high performance network virus scans.
Plug-in Manager and Plug-in Solutions
Plug-in Manager facilitates the installation, deployment, and management of plug-in solutions.
Administrators can install two kinds of plug-in solutions:
  • Plug-in programs
  • Native Apex One features
Predictive Machine Learning
The Predictive Machine Learning engine can protect your network from new, previously unidentified, or unknown threats through advanced file feature analysis and heuristic process monitoring. Predictive Machine Learning can ascertain the probability that a threat exists in a file and the probable threat type, protecting you from zero-day attacks.
If a functional Internet connection is unavailable, Predictive Machine Learning automatically switches to the local model to provide constant unknown threat protection against portable executable file threats.
Vulnerability Protection Integration
Integration with Vulnerability Protection protects Apex One users by automating the application of virtual patches before official patches become available. Trend Micro provides protected endpoints with recommended Intrusion Prevention rules based on your network performance and security priorities.
Web Reputation
Web Reputation technology proactively protects agent endpoints within or outside the corporate network from malicious and potentially dangerous websites. Web Reputation breaks the infection chain and prevents the downloading of malicious code.