Monitor and rapidly understand your security posture, identify threats, and respond to incidents across your enterprise.
Ensure consistent data and threat protection policies across user protection, hybrid cloud security and network defence, whether on-premises or in the cloud.
Graphical, timeline-based views of security incidents, and standard and customisable reporting to understand the full context and timeline of a threat.
Prioritised dashboards and customisable reporting
With so much information coming at your administrators, it is difficult to figure out what needs action first – Control Manager makes it easy.
Real-time, drill-down dashboards allow you to identify and respond to the most critical incidents first.
Simple, standard, and custom reporting gives you the information you need to ensure compliance and facilitate internal IT audit requirements.
Connected threat defence
Threat protection is a continuous cycle of protect, detect and respond, where your security posture continuously adapts with the sharing of real-time threat intelligence amongst the various layers of security.
Delivers faster time to protection by sharing real-time threat intelligence with all security layers.
Identify where a threat has spread and the full context and extent of an attack.
Access to the Trend Micro Threat Connect database delivers actionable threat intelligence.
Available Disk Space: 80 GB minimum (SAS disk type)
Microsoft™ Windows™ Server 2008 Standard/Enterprise Edition with SP2
Windows Server 2008 (R2), Standard/Enterprise/Datacenter Edition with SP1
Windows Server 2012 Standard/Datacenter Edition (64-bit)
Windows Server 2012 (R2) Standard/Datacenter Edition (64-bit)
Windows Server 2016 Standard/Datacenter Edition (64-bit)
Processor: 300 Mhz Intel™ Pentium™ processor or equivalent
RAM: 128 MB minimum
Available disk space: 30 MB minimum
Browers: Microsoft Internet Explorer™ 11, Microsoft Edge™, Google Chrome (Note: When using Internet Explorer or Edge, please turn off “Compatibility View”)
Other: Monitor that supports 1366 x 768 resolution at 256 colors or higher | Adobe™ Flash™ 8 or later
SQL Server 2008 Express with SP4
SQL Server 2008 (R2) Standard/Enterprise with SP3
SQL Server 2008 Standard/Enterprise with SP4
SQL Server 2012 Express with SP3
SQL Server 2012 Standard/Enterprise with SP3
SQL Server 2014 Express with SP2
SQL Server 2014 Standard/Enterprise with SP2
SQL Server 2016 Express with/without SP1
SQL Server 2016 Standard/Enterprise with/without SP1
Virtualisation Support Control Manager provides support for virtual platforms that are supported by the installed operating system
Improve visibility and protection
Centralised security management will help you bridge the IT silos that often separate layers of protection and deployment models. This type of centralised approach improves visibility and protection, reduces complexity, and eliminates redundant and repetitive tasks in security administration—all of which make your organisation more secure and your life easier.
Lower the burden on IT
Lower security management costs by saving time and reducing IT workload.
No more console hopping—configure policies from a central console for multiple layers of security.
Gain a holistic view of your security posture with continuous monitoring and centralised visibility.
Consistent policy enforcement with a single console to configure and manage threat and data protection across multiple security layers.
Easy integration with your security operations centre (SOC).
Eliminate security gaps
Reduce risk by ensuring consistent security policies.
Named a Leader in Gartner’s Magic Quadrant for Endpoint Protection Platforms since 2002. See why
What customers say
“It would sometimes take us a day to two to figure out where the attack was coming from, involving lots of resources to correlate that data. After switching to Trend Micro, we’ve been able to identify the attack and the sources almost instantaneously.”
Associate CIO, Vice President IT Operations at Rush University Medical Centre