Endpoint Security with Apex One

Layered endpoint security for maximum protection


Receive advanced, automated threat detection and response against an ever-growing variety of threats, including fileless and ransomware. Our cross-generational blend of advanced techniques provides endpoint protection that maximizes performance and effectiveness.


Get actionable insights, expanded investigative capabilities, and centralized visibility with a unified EDR toolset, strong SIEM integration, and an open API set. Perform correlated, extended threat investigations that go beyond the endpoint and augment your security teams with a managed detection and response service.


In an evolving technological and threat landscape, you need security that goes beyond traditional antivirus. Trend Micro Apex One™ offers threat detection, investigation, and response within a single agent. Consolidate capabilities and consoles and gain deployment flexibility through both SaaS and on-premises deployment options.

Minimum recommended agent requirements

Agent Operating Systems

  • Windows 7 (6.1) 
  • Windows 8.1 (6.2/6.3) 
  • Windows 10 (10.0) 
  • Windows 11 
  • Windows Server 2008 R2 (6.1) 
  • Windows Server 2012 (6.2) 
  • Windows Server 2012 R2 (6.3) 
  • Windows Server 2016 (10) 
  • Windows Server 2019 
  • Windows Server 2022 
  • macOS® High Sierra 10.13 
  • macOS® Mojave 10.14 
  • macOS® Catalina 10.15 
  • macOS® Big Sur 11.0 
  • macOS® Monterey 12.0

Agent Platform
300 MHz Intel Pentium or equivalent (Windows 7, 8.1, 10 family) and Intel® Core™ processor for Mac

  • 1.0 GHz minimum (2.0 GHz recommended) Intel Pentium or equivalent (Windows Embedded POSReady7)
  • 1.4 GHz minimum (2.0 GHz recommended) Intel Pentium or equivalent (Windows 2008 R2, Windows 2016 family, Windows 2019 family)


  • 512 MB minimum (2.0 GB recommended) with at least 100 MB exclusively for Apex One (Windows 2008 R2, 2012 family)
  • 1.0 GB minimum (2.0 GB recommended) with at least 100 MB exclusively for Apex One (Windows 7 (x86), 8.1 (x86), Windows Embedded POSReady 7, 10 (x64) family)
  • 2.0 GB minimum (4.0 GB recommended) with at least 100 MB exclusively for Apex One (Windows 7 (x64), 8.1 (x64), 10 (x64) family)
  • 512 MB minimum for Apex One on Mac

Disk Space: 1.5GB minimum (3GB recommended for all products) for Windows, 300 MB minimum for Mac

Trend Micro Apex One endpoint protectionRecognized in Gartner Peer Insights Customers’ Choice as well as a Leader in Gartner Magic Quadrant for EPPs

Gartner peer insights customers' choice 2021

Advanced detection techniques

Apex One leverages a blend of cross-generational threat techniques to provide the broadest protection against all types of threats

Trend Micro Machine Learning Icon

Pre-execution and runtime machine learning

Cyber Attack Crosshairs Icon

More accurate detection of advanced malware, such as fileless, living off the land, and ransomware threats

Icon for a data sheet

Noise-cancelling techniques – like census and safelisting – throughout every layer of detection to dramatically reduce false positives

Behavioral Analysis Icon

Effective protection against scripts, injection, ransomware, memory, and browser attacks through innovative behavior analysis 

Ultimate protection against vulnerabilities

More than just a scan, Apex One Vulnerability Protection uses a host-based intrusion prevention system (HIPS) to virtually patch known and unknown vulnerabilities before a patch is available or deployable, enabling you to:  

White Checkmark Icon

Eliminate risk exposure

White Checkmark Icon

Extend protection to critical platforms and physical or virtual devices

White Checkmark Icon

Reduce recovery and emergency patching downtime

White Checkmark Icon

Identify vulnerabilities based on CVE, MS-ID, and severity

White Checkmark Icon

Detect more vulnerabilities than any other vendor by leveraging our industry-leading vulnerability research

Integrated detection and response

Apex Cyber Security Platform

Leveraging Apex One with Trend Micro Vision One™, you gain market-leading XDR capabilities. Enhance detection, investigation, and response capabilities across multiple security layers for comprehensive visibility of threats impacting the entire organization.

Learn how you can improve endpoint security with industry-leading XDR. Experience Trend Micro Vision One within a virtual pre-configured lab.

  • Receive prioritized, actionable alerts. Uncover the scope of impact and initiate a direct response with root cause analysis. Gain enhanced correlated detection, investigation, and response across email, network, cloud, and workloads.
  • Proactively pinpoint threat tactics and validate suspicious activity via multiple methods. Continuously search for newly discovered IoCs via Trend Micro’s automated intelligence or custom intelligence sweeping.
  • Integrate via API with SIEM platforms and SOAR tools
  • Augment your teams with 24/7/365 managed detection and response (MDR) service

Effective security for your sensitive data Protect your sensitive data, on or off network, for maximum visibility and control. Endpoint encryption,* integrated DLP, and device control:

  • Covers the broadest range of devices, applications, and file types
  • Assists with most regulatory compliance, including GDPR
  • Protects data with full-disk, folder, file, and removable media encryption
  • Sets granular policies for device control and data management
  • Manage Microsoft BitLocker and Apple FileVault encryption keys


*Endpoint encryption is available as a separate agent.

Enhanced application control against malicious software Prevent unknown and unwanted applications from executing on your corporate endpoints. Trend Micro Apex One™ Application Control allows you to:

  • Block malicious software from running using customizable lockdown, safelisting, and blocklisting policies
  • Create dynamic policies by leveraging Trend Micro’s application categorization and reputation intelligence to reduce management overhead
  • Correlate data from millions of application events to identify threats and maintain an up-to-date database of validated applications

TrendConnect lets users stay current with real-time product alerts and threat information With the TrendConnect app customers will be able to:

  • Instantly see deployment status to avoid running out-of-date versions of Trend Micro Apex One
  • Align deployments with Trend Micro Apex One best practices to ensure your endpoints are optimally protected
  • Stay one step ahead with real-time advisories of new vulnerabilities/threats and notifications of new essential and critical patches


How it works

A range of layered detection capabilities, alongside investigation and response, defends the endpoint through every stage

Industry recognized

SBV Services logo

“Since deploying Trend Micro, we’ve recorded millions of attacks, stopped 117,000 threats in one day, and had zero infections in 18 months. Trend Micro is always working, even while I’m sleeping.” more

Ian Keller
Chief Security Officer, SBV Services

Get started with Apex One

Extend Apex One

Add-ons for extra functionality

Endpoint detection and response (EDR): Enable extended detection and response (XDR) capabilities with Trend Micro Vision One. Expand the value of XDR with correlated detections and integrated investigations and response across multiple Trend Micro solutions.

Managed detection and response (MDR): Trend Micro™ Managed XDR provides expert threat detection, investigation, and hunting services for endpoint as well as email, servers, cloud workloads, and/or network.

Cloud Sandbox: The sandbox-as-a-service offering analyzes multistage downloads, URLs, C&C, and more in a “safe live” mode.