Skip to content

Trend Micro Endpoint Application Control

Pinterest
More Options

Prevent Unwanted and Unknown Applications from Executing

User browsing computer

Reduce your attack exposure by preventing unwanted and unknown applications from executing on your endpoints. Defend against malware and targeted attacks with flexible, dynamic policies and whitelisting and blacklisting capabilities, combined with an extensive, application catalog.


Don't let malicious applications take over your endpoints

Protect your endpoints against the army of new malicious software applications being rolled out daily. Endpoint Application Control helps you safeguard your data and machines against unauthorized access and user error. Plus, it’s integrated with Trend Micro User Protection solutions, which strengthens your defenses with multiple layers of interconnected protection. For even greater insight into threats, user-based visibility and policy management is available in the local console or via the Trend Micro Control Manager central management.

  • Protects against users or machines executing malicious software
  • Utilizes an extensive categorized application catalog (analyzed and correlated threat data from billions of files in the Trend Micro Smart Protection Network)
  • Employs dynamic policies to allow users to install valid applications based on many reputation-based variables such as prevalence, regional usage, and maturity
  • Ensures that patches/updates associated with whitelisted applications can be installed, as well as allowing your update programs that install new patches/updates, with trusted sources of change
  • Features roll-your-own application whitelisting and blacklisting for in-house and unlisted applications


TREND MICRO A LEADER IN ENDPOINT PROTECTION

Download Magic Quadrant

ENHANCE YOUR ENDPOINT SECURITY

Watch free webinar

ENDPOINT PROTECTION: A BUYER'S GUIDE

Get it now

 

Trend Micro named a champion in endpoint security

Get the Vendor Landscape Report by Info-Tech

 

Realize higher ROI on security spending

Get study

Systems Requirements

Minimum Recommended Server Requirements
Server Operating Systems:

  • Microsoft Windows Server 2008 and 2008 R2 (Standard or Enterprise Edition) (x86/x64)
  • Microsoft Windows Server 2012 and 2012 R2 (x86/x64)
  • (Optional) IIS v7.0 or higher with these modules: CGI, ISAPI, ISAPI Extensions

 

Server Platform:

  • Processor: 1.7 GHz Intel Core 2 Duo (2 CPU cores) or better
  • Memory: 6 GB RAM recommended
  • Disk Space: 45 GB of free disk space

 

Minimum Recommended Agent Requirements
Agent Operating System:

  • Windows (x86/x64) XP Editions
  • Windows (x86/x64) Vista Editions
  • Windows (x86/x64) 7 Editions
  • Windows (x86/x64) 8, 8.1 Editions
  • Windows (x86/x64) 10 Editions
  • Microsoft Windows (x86/x64) Server 2003, 2003 R2
  • Microsoft Windows (x86/x64) Server 2008, 2008 R2
  • Microsoft Windows Server 2012, 2012 R2
  • Windows Embedded Enterprise, POSReady 2009, POSReady 7, XPe, Standard 2009, Standard 7

 

Agent Platform:

  • Processor: 300 MHz Intel Pentium or equivalent
  • Memory: 512 MB RAM
  • Disk Space: 350 MB

 



Connect with us on