Connected Threat Defense Product Integration

The Connected Threat Defense strategy integrates many Trend Micro products. The following diagrams illustrate how the major products interact.

Figure 1. Endpoint Protection
Figure 2. Messaging and Network Security

Control Manager further monitors other registered Trend Micro products through log analysis and comparison of detected files with the synchronized Suspicious Objects lists.

For Control Manager registration and Suspicious Objects list synchronization information for each major product, refer to the following: