Views:
The following table outlines the key features and benefits provided by the Trend Micro Apex One.
Feature
Benefit
Ransomware Protection
Enhanced scan features can identify and block ransomware programs that target documents that run on endpoints by identifying common behaviors and blocking processes commonly associated with ransomware programs.
Connected Threat Defense
Configure Trend Micro Apex One to subscribe to the Suspicious Object lists from the Trend Micro Apex Central server. Using the Trend Micro Apex Central console, you can create customized actions for objects detected by the Suspicious Object lists to provide custom defense against threats identified by endpoints protected by Trend Micro products specific to your environment.
You can configure Security Agents to submit file objects that may contain previously unidentified threats to a Virtual Analyzer for further analysis. After assessing the objects, Virtual Analyzer adds any objects found to contain unknown threats to the Virtual Analyzer Suspicious Objects lists and distributes the lists to other Security Agents throughout the network.
Predictive Machine Learning
The Predictive Machine Learning engine can protect your network from new, previously unidentified, or unknown threats through advanced file feature analysis and heuristic process monitoring. Predictive Machine Learning can ascertain the probability that a threat exists in a file and the probable threat type, protecting you from zero-day attacks.
Antivirus / Security Risk Protection
Trend Micro Apex One protects computers from security risks by scanning files and then performing a specific action for each security risk detected. An overwhelming number of security risks detected over a short period of time signals an outbreak. To contain outbreaks, Trend Micro Apex One enforces outbreak prevention policies and isolates infected computers until they are completely risk-free.
Trend Micro Apex One uses smart scan to make the scanning process more efficient. This technology works by off-loading a large number of signatures previously stored on the local endpoint to Smart Protection Sources. Using this approach, the system and network impact of the ever-increasing volume of signature updates to endpoint systems is significantly reduced.
Damage Cleanup Services
Damage Cleanup Services™ cleans computers of file-based and network viruses, and virus and worm remnants (Trojans, registry entries, viral files) through a fully-automated process. To address the threats and nuisances posed by Trojans, Damage Cleanup Services does the following:
  • Detects and removes live Trojans
  • Kills processes that Trojans create
  • Repairs system files that Trojans modify
  • Deletes files and applications that Trojans drop
Because Damage Cleanup Services runs automatically in the background, it is not necessary to configure it. Users are not even aware when it runs. However, Trend Micro Apex One may sometimes notify the user to restart their endpoint to complete the process of removing a Trojan.
Web Reputation
Web Reputation technology proactively protects agent endpoints within or outside the corporate network from malicious and potentially dangerous websites. Web Reputation breaks the infection chain and prevents the downloading of malicious code.
Verify the credibility of websites and pages by integrating Trend Micro Apex One with the Trend Micro Smart Protection Network
Apex One Firewall
The Apex One Firewall protects endpoints and servers on the network using stateful inspections and high performance network virus scans.
Create rules to filter connections by application, IP address, port number, or protocol, and then apply the rules to different groups of users.
Data Loss Prevention
Data Loss Prevention safeguards an organization's digital assets against accidental or deliberate leakage. Data Loss Prevention allows administrators to:
  • Identify the digital assets to protect
  • Create policies that limit or prevent the transmission of digital assets through common transmission channels, such as email messages and external devices
  • Enforce compliance to established privacy standards
Device Control
Device Control regulates access to external storage devices and network resources connected to endpoints. Device Control helps prevent data loss and leakage and, combined with file scanning, helps guard against security risks.
Behavior Monitoring
Behavior Monitoring constantly monitors endpoints for unusual modifications to the operating system or on installed software.
Security solution agnostic
agents running in Coexist mode are compatible on any supported Windows endpoint, running any endpoint security software.
Software-as-a-Service solution
Because the Trend Micro Apex One server is hosted and managed in the cloud, you do not have the overhead associated with managing local hardware.
Comments (0)