Key Features and Benefits
|
Feature
|
Benefits
|
|
Ransomware Protection
|
Enhanced scan features can identify and block ransomware programs that
target documents that run on endpoints by identifying common behaviors and blocking
processes commonly associated with ransomware programs.
|
|
Connected Threat Defense
|
Configure Trend Micro Apex One to subscribe to the Suspicious Object lists from the Trend Micro Apex Central server. Using the Trend Micro Apex Central console, you can
create customized actions for objects detected by the Suspicious Object lists to provide
custom defense against threats identified by endpoints protected by Trend Micro products
specific to your environment.
You can configure Security Agents to
submit file objects that may contain previously unidentified threats to a Virtual
Analyzer
for further analysis. After assessing the objects, Virtual Analyzer adds any objects
found
to contain unknown threats to the Virtual Analyzer Suspicious Objects lists and distributes
the lists to other Security Agents throughout the network.
|
|
Plug-in Manager and Plug-in Solutions
|
Administrators can install two kinds of plug-in solutions:
|
|
Centralized Management
|
A web-based
management console gives administrators transparent access to all endpoints and servers
on
the network. The web console coordinates automatic deployment of security policies,
pattern
files, and software updates on every endpoint and server. And with Outbreak Prevention
Services, it shuts down infection vectors and rapidly deploys attack-specific security
policies to prevent or contain outbreaks before pattern files are available. Trend Micro Apex One also performs real-time
monitoring, provides event notification, and delivers comprehensive reporting.
Administrators can perform remote administration, set customized policies for individual
desktops or groups, and lock endpoint security settings.
|
|
Antivirus / Security Risk Protection
|
Trend Micro Apex One protects computers from security risks by scanning files and then
performing a specific action for each security risk detected. An overwhelming number
of
security risks detected over a short period of time signals an outbreak. To contain
outbreaks, Trend Micro Apex One enforces
outbreak prevention policies and isolates infected computers until they are completely
risk-free.
Trend Micro Apex One uses smart scan to make the scanning process more efficient. This
technology works by off-loading a large number of signatures previously stored on
the local
endpoint to Smart Protection Sources. Using this approach, the system and network
impact of
the ever-increasing volume of signature updates to endpoint systems is significantly
reduced.
For information about smart scan and how to
deploy it to agents, see Scan Method Types.
|
|
Damage Cleanup Services
|
Damage Cleanup Services™
cleans computers of file-based and network
viruses, and virus and worm remnants (Trojans, registry entries, viral files) through
a
fully-automated process. To address the threats and nuisances posed by Trojans, Damage Cleanup Services does the following:
Because Damage Cleanup Services runs automatically in the
background, it is not necessary to configure it. Users are not even aware when it
runs.
However, Trend Micro Apex One may sometimes
notify the user to restart their endpoint to complete the process of removing a Trojan.
|
|
Web Reputation
|
Web Reputation
technology proactively protects agent endpoints within or outside the corporate network
from
malicious and potentially dangerous websites. Web Reputation breaks the infection
chain and
prevents the downloading of malicious code.
Verify the credibility of websites and pages by integrating Trend Micro Apex One with the Smart Protection
Server or the Trend Micro Smart Protection Network.
|
|
Apex One Firewall
|
The Apex One Firewall protects endpoints and servers on the network
using stateful inspections and high performance network virus scans.
Create rules to filter connections by application, IP address, port
number, or protocol, and then apply the rules to different groups of users.
|
|
Data Loss Prevention
|
Data Loss Prevention safeguards an organization's digital assets
against accidental or deliberate leakage. Data Loss Prevention allows administrators
to:
|
|
Device Control
|
|
|
Behavior Monitoring
|
Behavior Monitoring constantly monitors endpoints for unusual
modifications to the operating system or on installed software.
|
