Skip to content

Trend Micro Vulnerability Protection

Pinterest
More Options

Advanced Vulnerability Shielding for Endpoints

Keep your endpoints shielded until patches can be deployed, or indefinitely for out-of-support or un-patchable systems. We’ll help you prevent vulnerabilities from being exploited with easy- and fast-to-deploy filters. So you get full protection until you can deploy patches when it makes the most sense for your business.


Cover exploits with virtual patching at the endpoint

Get earlier, stronger endpoint protection when you supplement client-level antivirus and anti-malware security with pro-active virtual patching. A high-performance, engine monitors traffic for new specific vulnerabilities using host-based intrusion prevention filters as well as zero-day attack monitoring. So you can detect network protocol deviations, suspicious content that signals an attack, or security policy violations.

  • Eliminates risk exposure due to missing patches
  • Extends the life of legacy and end-of-support operating systems like Windows XP
  • Reduces downtime for recovery with incremental protection against zero-day attacks
  • Allows patching on your own terms and timelines
  • Lowers potential legal exposure by improving data security compliance
  • Enhances firewall protection for remote and mobile enterprise endpoints
     

Simple, flexible suites protect you now and into the future

Vulnerability Protection is part of the Trend Micro Smart Protection Suites. Learn how Vulnerability Protection contributes to these interconnected, multi-layered security suites to protect your users and their data regardless of device or location.




Other key features

  1. Defend against advanced threats. Blocks known and unknown vulnerability exploits before patches are deployed on systems that hold sensitive data, critical to regulatory and corporate policy compliance.
  2. Remove bad data from business-critical traffic. Ensures delivery of business-critical communications with low false positives by filtering forbidden network traffic and ensuring allowed traffic.
  3. Get earlier protection. Provides protection before patches are deployed by using attack blocking, vulnerability shielding, and malicious traffic detection.
  4. Deploy and manage within your existing infrastructure. Simply and easily deploys with existing endpoint security solutions and streamlines management with a simplified dashboard and management console.
 

Trend Micro named a leader in endpoint protection

Learn why Gartner placed us in the leaders’ quadrant

 

Trend Micro named a champion in endpoint security

Get the Vendor Landscape Report by Info-Tech

 

Realize higher ROI on security spending

Get study

 

Trend Micro rated a market leader in Ovum Decision Matrix

See how our solutions measure up

Systems Requirements

Vulnerability Protection Manager (server)
Server Operating System

  • Microsoft Windows 2012 R2 (64-bit)
  • Microsoft Windows 2012 (64-bit)
  • Windows Server 2008 R2 (64-bit)
  • Windows Server 2008 (32-bit and 64-bit)


Server Platform

  • Memory: 4 GB (8 GB recommended)
  • Disk Space: 1.5 GB (5 GB recommended)


Web Browser

  • Firefox 12+
  • Internet Explorer 9.x & 10.x
  • Chrome 20+

Note: Cookies must be enabled on all browsers

Vulnerability Protection Agent
Agent Operating System

  • Windows 10 (32-bit and 64-bit)
  • Windows 8.1 (32-bit and 64-bit)
  • Windows Server 2012 R2 (64-bit)
  • Windows 8 (32-bit and 64-bit)
  • Windows Server 2012 (64-bit)
  • Windows 7 (32-bit and 64-bit)
  • Windows Server 2008 R2 (64-bit)
  • Windows Server 2008 (32-bit and 64-bit)
  • Windows Vista (32-bit and 64-bit)
  • Windows Server 2003 SP1 (32-bit and 64-bit) patched with "Windows Server 2003 Scalable Networking Pack"
  • Windows Server 2003 SP2 (32-bit and 64-bit)
  • Windows Server 2003 R2 SP2 (32-bit and 64-bit)
  • Windows XP (32 bit and 64 bit)

Agent Platform

  • Memory: 128 MB
  • Disk Space: 500 MB

Connect with us on