Today’s enterprise endpoints face more sophisticated attacks than ever with the likes of ransomware and fileless malware, especially when they are outside the corporate network and no longer protected by multiple layers of security. In addition, Point-of-Sale (POS) devices or End of Support (EOS) operating systems are difficult or impossible to update and patch. To keep your business fully protected from breach or targeted attacks, all types of endpoints require a blended approach to protection that secures data and applications from hacking attempts, web threats, and the increasing threat of vulnerabilities being exploited remotely.
Trend Micro™ Vulnerability Protection provides earlier, stronger endpoint protection by supplementing desktop anti-malware and threat security with proactive virtual patching. A high-performance engine monitors traffic for new specific vulnerabilities using hostbased intrusion prevention system (IPS) filters as well as zero-day attack monitoring. So you can detect network protocol deviations, or suspicious content that signals an attack, or security policy violations. Vulnerability Protection prevents these vulnerabilities from being exploited with easy and fast-to-deploy filters that provide full protection before patches can be deployed or are available. When used in conjunction with additional Trend Micro endpoint products, Vulnerability Protection provides the industry’s broadest range of protection for endpoints, whether they are on the network, travelling, or remote.
Defends Against Advanced Threats
Removes Bad Data from Business-Critical Traffic
Provides Earlier Protection
Deploys and Manages with Your Existing Infrastructure
Vulnerability Protection stops zero-day threats immediately on your physical and virtual desktops and laptops—on and off the network. Using host-level intrusion prevention system (IPS) filters, behavioral, statistical, heuristic and protocol enforcement technologies, Vulnerability Protection shields against vulnerabilities before a patch is available or deployable. This allows you to protect your critical platforms from both known and unknown threats including legacy operating systems such as Windows XP and new systems like Windows 10. To support a layered approach to security, Vulnerability Protection integrates with Trend Micro User Protection solutions to deliver multiple layers of interconnected threat and data protection.
Trend Micro Vulnerability Protection is very scalable with options for multiple servers to ensure endpoint deployment for even the largest of organizations. Vulnerability Protection integrates with other Trend Micro threat protection solutions to enhance the overall threat and malware protection of your endpoints.
Two components are required:
|Vulnerability Protection Manager (server) system requirements|
|Memory||4 GB (8 GB recommended|
|Disk Space||1.5 GB (5 GB recommended)|
Note: Cookies must be enabled on all browsers
|Vulnerability Protection Agent system requirements|
|Disk Space||500 MB|