Control Manager - Centralized Visibility and Control

Lower the burden on IT and improve your security posture

Key Features

Centralized visibility and control

Monitor and rapidly understand your security posture, identify threats, and respond to incidents across your enterprise.

  • Ensure consistent data and threat protection policies across user protection, hybrid cloud security and network defense, whether on-premises or in the cloud.
  • Graphical, timeline-based views of security incidents, and standard and customizable reporting to understand the full context and timeline of a threat.
windows mac android ios

Prioritized dashboards and customizable reporting

With so much information coming at your administrators, it is difficult to figure out what needs action first – Control Manager makes it easy.

  • Real-time, drill-down dashboards allow you to identify and respond to the most critical incidents first.
  • Simple, standard, and custom reporting gives you the information you need to ensure compliance and facilitate internal IT audit requirements.
windows mac android ios

Connected threat defense

Threat protection is a continuous cycle of protect, detect and respond, where your security posture continuously adapts with the sharing of real-time threat intelligence amongst the various layers of security.

  • Delivers faster time to protection by sharing real-time threat intelligence with all security layers.
  • Identify where a threat has spread and the full context and extent of an attack.
  • Access to the Trend Micro Threat Connect database delivers actionable threat intelligence.
windows mac android ios

Server Hardware Requirements

  • At least 2.3 GHz Intel™ Core™ i5 or compatible CPU; AMD™ 64 processor; Intel 64 processor
  • 4 GB RAM ( 8 GB recommended)
  • 20 GB Minimum 40 GB Recommended
Software Requirements

Operating system

  • Microsoft™ Windows™ Server 2008 Standard/Enterprise Edition R1/R2
  • Windows Server 2008 Web Edition R1/R2, Standard Edition with/without SP1 (R2) (WoW 64-bit)
  • Windows Server 2012 Standard Edition (64-bit)
  • Windows Server 2012 (R2) Enterprise Edition (64-bit) with/without SP1

Web Console

  • Microsoft™ IIS 6.0 (for 2003 platform)
  • IIS 7.0 (for 2008 platform)
  • ISS 7.5 (for 2008 R2 platform)

Database Software

  • Microsoft™ SQL Server 2005 Express SP4
  • SQL Server 2005 Standard/Enterprise (including 64-bit) SP4
  • SQL Server 2008 Express
  • SQL Server 2008 (R2)
  • SQL Server 2008 Standard/Enterprise (including 64-bit)
  • SQL Server 2012
  • SQL Server 2014
  • SQL Server 2014 Express
Virtualization Support
Control Manager provides support for virtual platforms that are supported by the installed
operating system

Improve visibility and protection

Centralized security management will help you bridge the IT silos that often separate layers of protection and deployment models. This type of centralized approach improves visibility and protection, reduces complexity, and eliminates redundant and repetitive tasks in security administration—all of which make your organization more secure and your life easier.

Lower the burden on IT

Lower security management costs by saving time and reducing IT workload.

 

Eliminate security gaps

Reduce risk by ensuring consistent security policies.

 

Faster time to protection

The automatic sharing of threat intelligence, reduces the need for IT intervention, and adapts your security posture more quickly.

 

What customers say