The Connected Threat Defense strategy integrates many Trend Micro products. The
following diagrams illustrate how the major products interact.


Apex
Central further
monitors other registered Trend Micro products through log analysis and comparison
of detected
files with the synchronized suspicious object lists.
For Apex
Central
registration and suspicious object list synchronization information for each major
product, refer
to the following: