Apex Central - Centralised Visibility and Investigation

Lower the burden on IT and improve your security posture

Key Features

Centralised visibility and investigation

Monitor and rapidly understand your security posture, identify threats, and respond to incidents across your enterprise.

  • Ensure consistent data and threat protection policies across endpoints, servers, networks, web, and email, whether on premises or as a service.
  • View security operations dashboards that integrate with Active Directory to provide user-based and timeline-based views of security incidents, so you can easily understand the full context and timeline of a threat.
  • Access prioritised threats and perform detailed investigations of alerts directly from a single unified console.
Windows® Mac® AndroidTM iOS new Power Up

Prioritised dashboards and customisable reporting

With so much information coming at your IT and security operations centre (SOC) teams, it is difficult to determine what needs action first – Trend Micro Apex Central™ makes it easy.

  • Real-time, drill-down dashboards leverage innovative heat maps for an intuitive understanding of your endpoint compliance and threats – quickly identify and respond to the most critical incidents first.
  • Simple, standard, and custom reporting options give you the information you need to ensure compliance and facilitate internal IT audit requirements.
Windows® Mac® AndroidTM iOS new Power Up

Connected threat defence

Threat protection provides you with a continuous cycle of protection, detection, and response, so your security posture continuously adapts with the sharing of real-time threat intelligence amongst the various layers of security.

  • Deliver faster time to protection by sharing real-time threat intelligence with all security layers.
  • Identify where a threat has spread, including the full context and extent of an attack.
  • Access to the Trend Micro™ Threat Connect™ database for the delivery of actionable threat intelligence.
Windows® Mac® AndroidTM iOS new Power Up

Server Hardware Requirements

  • Processor: Minimum 2.3 GHz Intel™ Core™ i5 or compatible CPU; AMD™ 64 processor; Intel 64 processor
  • Memory: 8 GB RAM minimum
  • Available Disk Space: 80 GB minimum (SAS disk type)
Software Requirements

Operating system

  • Microsoft™ Windows™ Server 2008 Standard/Enterprise Edition with SP2
  • Windows Server 2008 (R2), Standard/Enterprise/Datacentre Edition with SP1
  • Windows Server 2012 Standard/Datacentre Edition (64-bit)
  • Windows Server 2012 (R2) Standard/Datacentre Edition (64-bit)
  • Windows Server 2016 Standard/Datacentre Edition (64-bit)

Web Console

  • Processor: 300 Mhz Intel™ Pentium™ processor or equivalent
  • RAM: 128 MB minimum
  • Available disk space: 30 MB minimum
  • Browers: Microsoft Internet Explorer™ 11, Microsoft Edge™, Google Chrome (Note: When using Internet Explorer or Edge, please turn off “Compatibility View”)
  • Other: Monitor that supports 1366 x 768 resolution at 256 colours or higher | Adobe™ Flash™ 8 or later

Database Software

  • SQL Server 2008 Express with SP4
  • SQL Server 2008 (R2) Standard/Enterprise with SP3
  • SQL Server 2008 Standard/Enterprise with SP4
  • SQL Server 2012 Express with SP3
  • SQL Server 2012 Standard/Enterprise with SP3
  • SQL Server 2014 Express with SP2
  • SQL Server 2014 Standard/Enterprise with SP2
  • SQL Server 2016 Express with/without SP1
  • SQL Server 2016 Standard/Enterprise with/without SP1
Virtualisation Support
Control Manager provides support for virtual platforms that are supported by the installed operating system

Improve visibility and protection

Centralised security management helps you bridge the IT and SOC silos that often separate layers of protection and deployment models. This type of connected, centralised approach improves visibility and protection, reduces complexity, and eliminates redundant and repetitive tasks in security administration–all of which make your organisation more secure and your life easier.

Visual timelines allow you to see patterns of threat activities for users across all their devices and within organisational groups, eliminating security gaps.

Lower the burden on IT

Lower security management costs by saving time and reducing IT workload.


Faster time to protection

The automatic sharing of threat intelligence reduces the need for IT intervention and adapts your security posture more quickly.


Get started with Apex Central

Trusted expertise

Gartner Logo

Named a Leader in Gartner’s Magic Quadrant for Endpoint Protection Platforms since 2002

What customers say


"We needed more than a point solution. Trend Micro’s broad security model and the fact that they’ve been a leader in this space for a long time was very important to us." ...more

Tim Masey
Director of Cybersecurity

Read Carhartt

success story