Endpoint Security with Apex One

Endpoint security redefined 

Automated, insightful, all-in-one protection

Automated

Trend Micro™ Apex One™ protection offers advanced automated threat detection and response against an ever-growing variety of threats, including fileless and ransomware. Our cross-generational blend of modern techniques provides highly tuned endpoint protection that maximizes performance and effectiveness.  

Insightful

Get actionable insights, expanded investigative capabilities, and centralized visibility across the network by using an advanced EDR toolset, strong SIEM integration, and an open API set. Perform threat investigation through integrated EDR or by boosting your security teams with the MDR service option.

All-in-one

In an evolving technological landscape, you need security that goes beyond traditional AV. Apex One™ offers threat detection, response, and investigation within a single agent. Eliminate multiple vendors and consoles and gain deployment flexibility through both SaaS and on-premises deployment options.

Minimum recommended agent requirements

Agent Operating Systems

  • Windows 7 (6.1)
  • Windows 8/8.1 (6.2/6.3)
  • Windows 10 (10.0)
  • Windows Server 2008 R2 (6.1)
  • Windows Server 2012 (6.2)
  • Windows Server 2012 R2 (6.3)
  • Windows Server 2016 R2 (10)
  • Windows Server 2019
 

Agent Platform
Processor:
300 MHz Intel Pentium or equivalent

  • 1.0 GHz minimum (2.0 GHz recommended) Intel Pentium or equivalent 
  • 1.4 GHz minimum (2.0 GHz recommended) Intel Pentium or equivalent 
     

Memory: 256 MB minimum (512 MB recommended) with at least 100 MB exclusively for Apex One™ 

  • 512 MB minimum (2.0 GB recommended) with at least 100 MB exclusively for Apex One™ 
  • 1.0 GB minimum (1.5 GB recommended) with at least 100 MB exclusively for Apex One™ 
  • 1.0 GB minimum (2.0 GB recommended) with at least 100 MB exclusively for Apex One™ 
  • 1.5 GB minimum (2.0 GB recommended) with at least 100 MB exclusively for Apex One™ 
     

Disk Space: 650 MB minimum

Advanced detection techniques

Apex One™ leverages a blend of cross-generational threat techniques to provide the broadest protection against all types of threats, giving you:

Pre-execution and run-time machine learning

Pre-execution and run-time machine learning

More accurate detection of advanced malware, such as fileless, cryptomining, and ransomware

More accurate detection of advanced malware, such as fileless, cryptomining, and ransomware

Noise-cancelling techniques – like census and whitelisting – throughout every layer of detection to dramatically reduce false positives

Noise-cancelling techniques – like census and whitelisting – throughout every layer of detection to dramatically reduce false positives

Effective protection against scripts, injection, ransomware, memory, and browser attacks through innovative behavior analysis

Effective protection against scripts, injection, ransomware, memory, and browser attacks through innovative behavior analysis 

Ultimate protection against vulnerabilities

More than just a scan, Apex One™ Vulnerability Protection uses a host-based intrusion prevention system (HIPS) to virtually patch known and unknown vulnerabilities before a patch is available or deployable:  

Eliminating risk exposure by shielding vulnerabilities through innovative virtual patching capabilities and world-class research

Extending protection to critical platforms and physical or virtual devices

Reducing recovery and emergency patching downtime

Identifying vulnerabilities based on CVE, MS-ID, and severity 

Detecting more vulnerabilities than any other vendor by leveraging our industry-leading vulnerability research 

Integrated detection and response

Integrated detection and response

Leverage techniques that allow you to discover and respond to threats before they compromise data. EDR is available for endpoints, networks, and servers and gives you the ability to:

Hunt for Indicators of Attack (IOA) and define the attacker’s intent in real time
 

Sweep user timelines (telemetry) for Indicators of Compromise (IOCs) to determine the impact of targeted attacks  

Employ an interactive root cause analysis diagram to drill down on a detection and respond by isolating, terminating, or updating endpoint protection 

Effective security for your sensitive data Protect your sensitive data, on or off network, for maximum visibility and control. Integrated DLP, Endpoint Encryption and Device Control:

  • Covers the broadest range of devices, applications, and file types
  • Assists with most regulatory compliance, including GDPR
  • Protects data with full-disk, folder, file, and removable media encryption
  • Sets granular policies for device control and data management
  • Manages Microsoft® BitLocker, and Apple FileVault® encryption keys
     

Enhanced application control against malicious software Prevent unknown and unwanted applications from executing on your corporate endpoints using Apex One™ Application Control, allowing you to:

  • Block malicious software from running using customizable lockdown, whitelisting, and blacklisting policies
  • Create dynamic policies by leveraging Trend Micro’s application categorization and reputation intelligence to reduce management overhead
  • Correlate data from millions of application events to identify threats and maintain an up-to-date database of validated applications

Centralized visibility and control

Enable consistent security management, visibility, and reporting across multiple layers of interconnected security through a centralized console.

Extend control and visibility across on-premises, cloud, and hybrid models  

Improve protection, reduce complexity, and eliminate redundancy  

Provide access to actionable threat intelligence from the Trend Micro™ Smart Protection Network™  

Centralized visibility and control

How it works

A range of layered detection capabilities, alongside investigation and response, defends the endpoint through every stage

Industry recognized

Gartner

Named a leader in Gartner’s Magic Quadrant for Endpoint Protection Platforms since 2002

Trend Micro named a Leader in the 2017 Gartner Magic Quadrant for Endpoint Platforms

See why

Trend Micro maintains its position as a market leader.
The Forrester Wave™: Endpoint Security Suites, Q2 2018.

Third-party testing gave us top scores in performance, protection, and usability.

“Recommended” in 2018 NSS Labs Advanced Endpoint Protection Report

Get started with Apex One endpoint security

All Apex One capabilities are available in our Smart Protection Suites

Deploy on premises, in the cloud, or a mix of both

Learn more about which suite is right for you.

Smart Protection Complete Suite

This connected security suite includes complete endpoint protection and centralized management with added security capabilities for cloud applications, web, email, and collaboration. Delivers the best security across multiple layers, including advanced detection capabilities, to keep up with the latest threats.

Smart Protection for Endpoints Suite

This high-performance security suite includes all layers of endpoint defense to protect your users and corporate information, giving you centralized management across all devices and applications.

Complete user protectionApex One™ is part of our User Protection solution, which is powered by XGen™ security, a blend of cross-generational threat defense techniques that protects your endpoint, email, web, and SaaS applications.

For added functionality, Apex OneTM offers optional add-ons:
Endpoint Sensor assesses the nature and extent of advanced threats with endpoint detection and response (EDR)
Managed Detection and Response (MDR), 24/7 alert monitoring and threat hunting services
Cloud Sandbox analyzes multistage downloads, URLs, C&C, and more in a “safe live” mode