Get more out of detection and response
Advanced
detection
Leverage a full portfolio of advanced detection techniques against an ever-growing variety of threats. By integrating endpoint protection and EDR in a single agent, Trend offers a comprehensive detection and response solution with automation and remediation capabilities.
Extended investigation capabilities
Take advantage of the option to extend detection and response across endpoints and email to produce more insightful investigations. With email – the #1 attack source – covered, analysts can trace a root cause analysis back to email to identify all impacted parties, contain the threat, and stop the spread.
Single view.
Single console.
Receive alerts, view detections, and perform investigations on email and endpoints – all within our Apex Central console. No more moving from one console to another.
Memory |
|
Operating Systems |
|
Microsoft Internet Information Services (IIS) 7 with all of the following role services: |
|
Database |
|
Web Browsers |
|
Hardware RAM: |
|
Available Disk Space: |
|
Software |
|
Root cause analysis and impact assessment
Get complete visibility into the attack vector, spread, and extent of the impact of advanced threats across endpoint, servers, and email. Incident response staff can quickly perform impact assessments, determine the root cause of the detection, and take proactive measures to remediate and update security.
Layering in global threat intelligence, the Trend Micro Smart Protection Network™ provides clarity and assistance to threat investigators. And with access to the Trend Micro Threat Connect service, you have a comprehensive database of threat information.
Sweeping and hunting
Perform multiple IOC searches (or sweeping) with multiple parameters, like specific communications and malware, registry and account activity, and running processes.
Investigators can also search using industry standard OpenIOC or YARA rules and perform threat hunting based on indicators of attack (IOAs). This allows investigators to develop attack discovery rules or work with the IOAs provided by Trend Micro to hunt for threats.
Automated and integrated response
Automatically isolate, quarantine, block executions, roll back settings (and files, in the case of ransomware), with the option for investigators to also manually respond while performing an investigation. Endpoints can be isolated, processes can be terminated, and security intelligence can be automatically updated on a per-user or enterprise-wide basis.
Extend your detection and response capabilities
Managed XDR service
We offer 24/7 alert monitoring, alert prioritization, investigation, and threat hunting as a managed service. Trend Micro Managed XDR includes standard or advanced service packages across email, endpoints, servers, cloud workloads, and network.
XDR: multilayered detection and response
A solution for extending detection and response across email, endpoint, server, cloud workloads, and networks.
Get started with EDR