The Connected Threat Defense strategy integrates many Trend Micro products. The following diagrams illustrate how the major products interact.
Apex Central further monitors other registered Trend Micro products through log analysis and comparison of detected files with the synchronized suspicious object lists.
For Apex Central registration and suspicious object list synchronization information for each major product, refer to the following: