- Products
- User Protection
- Smart Protection Suites
- Apex One Endpoint Security
- Vulnerability Protection
Advanced vulnerability shielding for endpoints
Today’s enterprise endpoints face more sophisticated attacks than ever with the likes of ransomware and fileless malware, especially when they are outside the corporate network and no longer protected by multiple layers of security. In addition, Point-of-Sale (POS) devices or End of Support (EOS) operating systems are difficult or impossible to update and patch. To keep your business fully protected from breach or targeted attacks, all types of endpoints require a blended approach to protection that secures data and applications from hacking attempts, web threats, and the increasing threat of vulnerabilities being exploited remotely.
Trend Micro™ Vulnerability Protection provides earlier, stronger endpoint protection by supplementing desktop anti-malware and threat security with proactive virtual patching. A high-performance engine monitors traffic for new specific vulnerabilities using hostbased intrusion prevention system (IPS) filters as well as zero-day attack monitoring. So you can detect network protocol deviations, or suspicious content that signals an attack, or security policy violations. Vulnerability Protection prevents these vulnerabilities from being exploited with easy and fast-to-deploy filters that provide full protection before patches can be deployed or are available. When used in conjunction with additional Trend Micro endpoint products, Vulnerability Protection provides the industry’s broadest range of protection for endpoints, whether they are on the network, travelling, or remote.
Software
Protection Points
Threat Protection
Key Benefits
Defends Against Advanced Threats
Removes Bad Data from Business-Critical Traffic
Provides Earlier Protection
Deploys and Manages with Your Existing Infrastructure
Vulnerability Protection stops zero-day threats immediately on your physical and virtual desktops and laptops—on and off the network. Using host-level intrusion prevention system (IPS) filters, behavioral, statistical, heuristic and protocol enforcement technologies, Vulnerability Protection shields against vulnerabilities before a patch is available or deployable. This allows you to protect your critical platforms from both known and unknown threats including legacy operating systems such as Windows XP and new systems like Windows 10. To support a layered approach to security, Vulnerability Protection integrates with Trend Micro User Protection solutions to deliver multiple layers of interconnected threat and data protection.
Trend Micro Vulnerability Protection is very scalable with options for multiple servers to ensure endpoint deployment for even the largest of organizations. Vulnerability Protection integrates with other Trend Micro threat protection solutions to enhance the overall threat and malware protection of your endpoints.
Two components are required:
User Protection
Trend Micro Vulnerability Protection is a critical component of our Smart Protection Suites, that deliver data protection like data loss prevention (DLP) and device control but also gateway, mobile device and endpoint threat protection with our XGen™ optimized capabilities like file reputation, machine learning, behavioural analysis, exploit protection, application control, intrusion prevention (vulnerability protection). Additional Trend Micro solutions extend your protection from advanced attacks with endpoint investigation and detection. Plus, Deep Discovery network sandboxing delivers rapid response (real-time signature updates) to endpoints when a new threat is detected locally, enabling faster time-to-protection and reducing the spread of malware. All of this modern threat security technology is made simple for your organization with central visibility, management, and reporting
Vulnerability Protection Manager (server) system requirements | |
Memory | 4 GB (8 GB recommended |
Disk Space | 1.5 GB (5 GB recommended) |
Operating System |
|
Web Browser |
Note: Cookies must be enabled on all browsers |
Vulnerability Protection Agent system requirements | |
Memory | 128 MB |
Disk Space | 500 MB |
Operating System |
|