Views:
The Connected Threat Defense strategy integrates many TrendAI™ products. The following diagrams illustrate how the major products interact.
topology-ctd-primer2.png
Endpoint Protection Example Topology
topology-ctd-primer-.png
Messaging and Network Security Example Topology
TrendAI™ Apex Central further monitors other registered TrendAI™ products through log analysis and comparison of detected files with the synchronized suspicious object lists.
For TrendAI™ Apex Central registration and suspicious object list synchronization information for each major product, refer to the following: