Apex One (Mac)
provides the following features and
benefits:
Key Features and Benefits
Feature
|
Benefits
|
Smart Scan
|
Apex One (Mac)
uses smart scan to make the scanning process more efficient. This
technology works by off-loading a large number of signatures
previously stored on the local endpoint to Smart Protection Sources.
Using this approach, the system and network impact of the
ever-increasing volume of signature updates to endpoint systems is
significantly reduced.
For information about smart scan and how to deploy it to
Security Agents
, see
Scan Method Types
.
|
Damage Cleanup Services
|
Damage Cleanup
Services™
cleans
computers of file-based and network viruses, and virus and worm
remnants (Trojans, viral files) through a fully-automated process.
To address the threats and nuisances posed by
Trojans, Damage Cleanup
Services does the following:
Because Damage Cleanup Services runs
automatically in the background, it is not necessary to configure
it. Users are not even aware when it runs. However,
Apex One (Mac)
may sometimes notify
users to restart their endpoints to complete the process of removing
a Trojan.
|
Security Risk Protection
|
Apex One (Mac)
protects endpoints from security risks by scanning files and then
performing a specific action on each security risk detected. An
overwhelming number of security risks detected over a short period
of time signals an outbreak.
Apex One (Mac)
notifies you of any outbreak so you can take immediate action, such
as cleaning infected endpoints and isolating them until they are
completely risk-free.
|
Web Reputation
|
Web Reputation technology proactively
protects endpoints within or outside the corporate network from
malicious and potentially dangerous websites. Web Reputation breaks
the infection chain and prevents downloading of malicious code.
Verify the credibility of websites
and pages by integrating Apex One with the Smart Protection Server
or the Trend Micro Smart Protection Network.
|
Centralized Management
|
A web-based management console gives
administrators transparent access to all
Security Agents
on the network. The web
console coordinates automatic deployment of security policies,
pattern files, and software updates on every
Security Agent
. Administrators can perform
remote administration and configure settings for individual agents
or agent groups.
|