Skip to content

Trend Micro™ Control Manager™

More Options

Centralized, User-centric Management for Threat Detection and Data Protection

Centralized visibility and connected threat defense

  • Simplify administration
  • Gain a holistic view of your security posture with continuous monitoring and central visibility
  • Manage consistent data and threat policies across all security layers
  • Improve security and compliance with intelligence-sharing among security layers

Centralize threat and data protection policy management with a single management console that manages, monitors, and reports across multiple layers of security, as well as across on-premises, cloud, and hybrid deployment models.

Consistent security management will help you bridge the IT silos that often separate layers of protection and deployment models. This type of centralized approach improves visibility and protection, reduces complexity, and eliminates redundant and repetitive tasks in security administration—all of which make your organization more secure and your life easier.

Enterprise-wide visibility and continuous monitoring

Continuously monitor and rapidly understand your security posture, identify threats, and respond to incidents

  • Delivers up-to-the-minute situational awareness across all security layers whether deployed on-premises or in the cloud
  • Security dashboards allow instant triage and the ability to prioritize critical threat types, users, or endpoints
  • Lets you drill down to the specific information you need with an intuitive, customizable interface for visibility across all security layers and users
  • Gives you the information you need to ensure compliance and facilitate internal IT audit requirement
  • Improves your ability to identify and respond to threats as they occur

Connected threat defense for better protection

Integrate security management and analysis across multiple layers of protection critical to defending against advanced threats that exploit multiple threat vectors.

  • Enables connected threat defense sharing information among the security layers enabling faster time to protection and reducing the spread of malware
  • Comprehensive threat response and investigation enable you to look back in time to identify where a threat has spread and the full context and extent of an attack

Simplified security management

No more console hopping—configure policies from a central console for multiple layers of security

  • Consistent policy enforcement with a single console to configure and manage threat and data protection across multiple security layers: complete user protection, cloud and data center security, and custom defense from targeted attacks
  • Easily manages security across all device types
  • Deploys and reviews policy status for any endpoints owned by a given user

Server Hardware Requirements

  • At least 2.3 GHz Intel™ Core™ i5 or compatible CPU; AMD™ 64 processor; Intel 64 processor
  • 4 GB RAM (8 GB recommended)

  • 20 GB minimum (40 GB recommended)


Software Requirements

Operating System
  • Microsoft™ Windows™ Server 2008 Standard/Enterprise Edition R1/R2
  • Windows Server 2008 Web Edition R1/R2, Standard Edition with/without SP1 (R2) (WoW 64-bit)
  • Windows Server 2012 Standard Edition (64-bit)
  • Windows Server 2012 (R2) Enterprise Edition (64-bit) with/without SP1
Web Console
  • Microsoft™ IIS 6.0 (for 2003 platform)
  • IIS 7.0 (for 2008 platform)

  • ISS 7.5 (for 2008 R2 platform)
Database Software
  • Microsoft™ SQL Server 2005 Express SP4

  • SQL Server 2005 Standard/Enterprise (including 64-bit) SP4
  • SQL Server 2008 Express • Microsoft SQL Server2008 (R2)
  • SQL Server 2008 Standard/Enterprise (including 64-bit)
  • SQL Server 2012
  • SQL Server 2014
  • SQL Server 2014 Express
Virtualization Support
  • Control Manager provides support for virtual platforms that are supported by the installed operating system.

Connect with us on