{"id":2733,"date":"2022-01-13T13:38:23","date_gmt":"2022-01-13T18:38:23","guid":{"rendered":"https:\/\/www.678pc.com\/site1\/?page_id=2733"},"modified":"2022-01-18T14:03:58","modified_gmt":"2022-01-18T19:03:58","slug":"trend-micro-apex-one-endpoint-security","status":"publish","type":"page","link":"https:\/\/www.678pc.com\/site1\/it-consulting\/business-cloud-services\/trend-micro-apex-one-endpoint-security\/","title":{"rendered":"Trend Micro Apex One Endpoint Security"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; bg_type=&#8221;image&#8221; parallax_style=&#8221;vcpb-default&#8221; bg_image_new=&#8221;id^2738|url^https:\/\/www.678pc.com\/site1\/wp-content\/uploads\/2022\/01\/1-apex1.jpg|caption^null|alt^null|title^apex1|description^null&#8221; css=&#8221;.vc_custom_1642527266406{margin-top: -130px !important;padding-top: 300px !important;padding-bottom: 300px !important;}&#8221;][vc_column offset=&#8221;vc_hidden-xs&#8221;]<div id=\"ultimate-heading-284569f0bd2704169\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-284569f0bd2704169 uvc-8179  uvc-heading-default-font-sizes\" data-hspacer=\"no_spacer\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-heading-spacer no_spacer\" style=\"top\"><\/div><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-284569f0bd2704169 h1'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h1 style=\"--font-weight:theme;color:#ffffff;\">TREND MICRO - APEX ONE<\/h1><\/div><div class=\"uvc-sub-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-284569f0bd2704169 .uvc-sub-heading '  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"font-weight:normal;color:#dd3333;\"><\/p>\n<h2 style=\"color: white;\">Endpoint Security<\/h2>\n<p><\/div><\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221;][vc_column offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221;]<div id=\"ultimate-heading-313769f0bd27041e8\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-313769f0bd27041e8 uvc-7964  uvc-heading-default-font-sizes\" data-hspacer=\"no_spacer\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-heading-spacer no_spacer\" style=\"top\"><\/div><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-313769f0bd27041e8 h1'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h1 style=\"--font-weight:theme;color:#000000;\">TREND MICRO - APEX ONE<\/h1><\/div><div class=\"uvc-sub-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-313769f0bd27041e8 .uvc-sub-heading '  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"font-weight:normal;color:#000000;\"><\/p>\n<h2>Endpoint Security<\/h2>\n<p><\/div><\/div>[vc_separator][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1642527019845{padding-top: 30px !important;}&#8221;][vc_column]<div id=\"ultimate-heading-664069f0bd2704238\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-664069f0bd2704238 uvc-8911  uvc-heading-default-font-sizes\" data-hspacer=\"no_spacer\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-heading-spacer no_spacer\" style=\"top\"><\/div><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-664069f0bd2704238 h2'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h2 style=\"--font-weight:theme;\">Automated, insightful, all-in-one protection<\/h2><\/div><\/div>[\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1642465287951{padding-top: 30px !important;padding-bottom: 30px !important;}&#8221;][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/3&#8243;]<div id=\"ultimate-heading-772369f0bd2704280\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-772369f0bd2704280 uvc-326  uvc-heading-default-font-sizes\" data-hspacer=\"no_spacer\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-heading-spacer no_spacer\" style=\"top\"><\/div><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-772369f0bd2704280 h2'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h2 style=\"--font-weight:theme;\">Automated<\/h2><\/div><\/div>[vc_column_text]Trend Micro Apex One&#x2122; protection offers advanced automated threat detection and response against an ever-growing variety of threats, including fileless and ransomware. Our cross-generational blend of modern techniques provides highly tuned endpoint protection that maximizes performance and effectiveness.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;]<div id=\"ultimate-heading-279469f0bd27042c1\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-279469f0bd27042c1 uvc-6409  uvc-heading-default-font-sizes\" data-hspacer=\"no_spacer\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-heading-spacer no_spacer\" style=\"top\"><\/div><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-279469f0bd27042c1 h2'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h2 style=\"--font-weight:theme;\">Insightful<\/h2><\/div><\/div>[vc_column_text]Get actionable insights, expanded investigative capabilities, and centralized visibility by using an advanced EDR toolset, strong SIEM integration, and an open API set. You have the option to perform correlated, extended threat investigations that go beyond the endpoint and augment your security teams with a managed detection and response service.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;]<div id=\"ultimate-heading-236669f0bd2704300\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-236669f0bd2704300 uvc-5639  uvc-heading-default-font-sizes\" data-hspacer=\"no_spacer\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-heading-spacer no_spacer\" style=\"top\"><\/div><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-236669f0bd2704300 h2'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h2 style=\"--font-weight:theme;\">All-in-one<\/h2><\/div><\/div>[vc_column_text]In an evolving technological landscape, you need security that goes beyond traditional antivirus. Apex One offers threat detection, response, and investigation within a single agent. Eliminate multiple vendors and consoles and gain deployment flexibility through both SaaS and on-premises deployment options.[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1642465302109{padding-top: 30px !important;padding-bottom: 30px !important;}&#8221;][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column]<div id=\"ultimate-heading-109969f0bd2704346\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-109969f0bd2704346 uvc-598  uvc-heading-default-font-sizes\" data-hspacer=\"no_spacer\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-heading-spacer no_spacer\" style=\"top\"><\/div><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-109969f0bd2704346 h2'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h2 style=\"--font-weight:theme;\">Advanced detection techniques<\/h2><\/div><\/div>[vc_column_text css=&#8221;.vc_custom_1642529020743{padding-bottom: 30px !important;}&#8221;]<span class=\"body-subhead-title\">Apex One leverages a blend of cross-generational threat techniques to provide the broadest protection against all types of threats, giving you:<\/span>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;2743&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<div class=\"richText section\">\n<p style=\"text-align: center;\">Pre-execution and runtime machine learning<\/p>\n<\/div>\n<div class=\"productImageText vitl section\"><\/div>\n<div><\/div>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;2744&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<div class=\"responsiveColumnControl section\">\n<div id=\"responsive-column-e8969f7f-cded-4d5d-88c3-9b0282ed041e\" class=\"row medium-spacing global-margin-top-medium global-padding-top-none global-padding-bottom-none global-margin-bottom-x-small\">\n<div class=\"col-sm-6 col-xs-12 col-md-6 column\">\n<div class=\"responsiveColumnControl section\">\n<div id=\"responsive-column-2534bf90-f98c-4b50-88dd-24e65262075e\" class=\"row global-margin-top-none global-padding-top-none global-padding-bottom-none global-margin-bottom-none\">\n<div class=\"col-sm-9 col-xs-12 col-md-9 column\">\n<div class=\"richText section\">\n<div class=\"responsiveColumnControl section\">\n<div id=\"responsive-column-e8969f7f-cded-4d5d-88c3-9b0282ed041e\" class=\"row medium-spacing global-margin-top-medium global-padding-top-none global-padding-bottom-none global-margin-bottom-x-small\">\n<div class=\"col-sm-6 col-xs-12 col-md-6 column\">\n<div class=\"responsiveColumnControl section\">\n<div id=\"responsive-column-12492d56-7ca4-4636-8969-a4a86410c5c2\" class=\"row global-margin-top-none global-padding-top-none global-padding-bottom-none global-margin-bottom-none\">\n<div class=\"col-sm-9 col-xs-12 col-md-9 column\">\n<div class=\"richText section\">\n<p style=\"text-align: center;\">More accurate detection of advanced malware, such as fileless, living off the land, and ransomware threats<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"responsiveColumnControl section\">\n<div id=\"responsive-column-489d0a2e-1255-4b2d-987c-b01c625ac6cf\" class=\"row medium-spacing global-margin-top-x-small global-padding-top-none global-padding-bottom-none global-margin-bottom-medium\">\n<div class=\"col-sm-6 col-xs-12 col-md-6 column\">\n<div class=\"responsiveColumnControl section\">\n<div id=\"responsive-column-16ace753-aba1-44de-8ca8-dbf6558ae5a3\" class=\"row global-margin-top-none global-padding-top-none global-padding-bottom-none global-margin-bottom-none\">\n<div class=\"col-sm-3 col-xs-12 col-md-3 column\">\n<div class=\"productImageText vitl section\"><\/div>\n<\/div>\n<div class=\"col-sm-9 col-xs-12 col-md-9 column\">\n<div class=\"richText section\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"col-sm-6 col-xs-12 col-md-6 column\">\n<div class=\"responsiveColumnControl section\">\n<div id=\"responsive-column-0465e13d-7f89-4c0f-84ff-02c337b9240d\" class=\"row global-margin-top-none global-padding-top-none global-padding-bottom-none global-margin-bottom-none\">\n<div class=\"col-sm-9 col-xs-12 col-md-9 column\">\n<div class=\"richText section\">\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;2745&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<div style=\"text-align: center;\">Noise-cancelling techniques \u2013 like census and safelisting \u2013 throughout every layer of detection to dramatically reduce false positives<\/div>\n<div class=\"responsiveColumnControl section\">\n<div id=\"responsive-column-489d0a2e-1255-4b2d-987c-b01c625ac6cf\" class=\"row medium-spacing global-margin-top-x-small global-padding-top-none global-padding-bottom-none global-margin-bottom-medium\">\n<div class=\"col-sm-6 col-xs-12 col-md-6 column\">\n<div class=\"responsiveColumnControl section\">\n<div id=\"responsive-column-0465e13d-7f89-4c0f-84ff-02c337b9240d\" class=\"row global-margin-top-none global-padding-top-none global-padding-bottom-none global-margin-bottom-none\">\n<div class=\"col-sm-3 col-xs-12 col-md-3 column\">\n<div class=\"productImageText vitl section\"><\/div>\n<\/div>\n<div class=\"col-sm-9 col-xs-12 col-md-9 column\">\n<div class=\"richText section\">\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;2742&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<div class=\"richText section\" style=\"text-align: center;\">Effective protection against scripts, injection, ransomware, memory, and browser attacks through innovative behavior analysis<\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1642465322256{padding-top: 30px !important;padding-bottom: 30px !important;}&#8221;][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;]<div id=\"ultimate-heading-613069f0bd270438e\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-613069f0bd270438e uvc-5661  uvc-heading-default-font-sizes\" data-hspacer=\"no_spacer\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-heading-spacer no_spacer\" style=\"top\"><\/div><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-613069f0bd270438e h2'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h2 style=\"--font-weight:theme;\">Ultimate protection against vulnerabilities<\/h2><\/div><\/div>[vc_column_text]<\/p>\n<div class=\"richText section\">\n<p><span class=\"body-subhead-title\"><span class=\"rte-white-text\">More than just a scan, Apex One Vulnerability Protection uses a host-based intrusion prevention system (HIPS) to virtually patch known and unknown vulnerabilities before a patch is available or deployable: \u00a0<\/span><\/span><\/p>\n<\/div>\n<div class=\"responsiveColumnControl section\">\n<div id=\"responsive-column-92a0ce79-bcac-4d53-849e-47cbd25d6db5\" class=\"row global-margin-top-none global-padding-top-none global-padding-bottom-none global-margin-bottom-none\">\n<div class=\"col-sm-6 col-xs-12 col-md-6 column\">\n<div class=\"responsiveColumnControl section\">\n<div id=\"responsive-column-54aae39b-b521-4260-97f7-6c4da2f21f9b\" class=\"row medium-spacing global-margin-top-none global-padding-top-none global-padding-bottom-none global-margin-bottom-none\">\n<div class=\"col-sm-2 col-xs-2 col-md-2 column\">\n<div class=\"productImageText vitl section\">\n<div class=\"row prod-3a554626-a6b1-4127-a659-12213081265d mobile-vertical tablet-vertical desktop-vertical add-flex global-margin-top-none global-margin-bottom-none\">\n<div class=\"image-wrap vertical col-md-12 col-sm-12 col-xs-12 center-image center-align\"><img decoding=\"async\" src=\"https:\/\/marvel-b1-cdn.bc0a.com\/f00000000017219\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/business\/products\/user-protection\/sps\/endpoint-security-apex-one\/icn_white-checkmark.png\" alt=\"White Checkmark Icon\" \/><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"col-sm-8 col-xs-8 col-md-8 column\">\n<div class=\"richText section\">\n<ul>\n<li><span class=\"rte-white-text\">Eliminating risk exposure by shielding vulnerabilities through innovative virtual patching capabilities and world-class research<\/span><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"responsiveColumnControl section\">\n<div id=\"responsive-column-787ae8eb-0b38-44a0-9e2c-5498b94aa922\" class=\"row medium-spacing global-margin-top-none global-padding-top-none global-padding-bottom-none global-margin-bottom-none\">\n<div class=\"col-sm-8 col-xs-8 col-md-8 column\">\n<div class=\"richText section\">\n<ul>\n<li><span class=\"rte-white-text\">Extending protection to critical platforms and physical or virtual devices<\/span><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"responsiveColumnControl section\">\n<div id=\"responsive-column-a9dbbb1b-759a-46b7-b3ae-ccbd75d1da4f\" class=\"row medium-spacing global-margin-top-none global-padding-top-none global-padding-bottom-none global-margin-bottom-none\">\n<div class=\"col-sm-8 col-xs-8 col-md-8 column\">\n<div class=\"richText section\">\n<ul>\n<li><span class=\"rte-white-text\">Reducing recovery and emergency patching downtime<\/span><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"col-sm-6 col-xs-12 col-md-6 column\">\n<div class=\"responsiveColumnControl section\">\n<div id=\"responsive-column-5924d5fb-e163-4911-8417-097ece34a2e1\" class=\"row medium-spacing global-margin-top-none global-padding-top-none global-padding-bottom-none global-margin-bottom-none\">\n<div class=\"col-sm-8 col-xs-8 col-md-8 column\">\n<div class=\"richText section\">\n<ul>\n<li><span class=\"rte-white-text\">Identifying vulnerabilities based on CVE, MS-ID, and severity\u00a0<\/span><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"responsiveColumnControl section\">\n<div id=\"responsive-column-2b7bb4ca-16a0-41f6-8733-bb0ca2f3521e\" class=\"row medium-spacing global-margin-top-none global-padding-top-none global-padding-bottom-none global-margin-bottom-none\">\n<div class=\"col-sm-8 col-xs-8 col-md-8 column\">\n<div class=\"richText section\">\n<ul>\n<li><span class=\"rte-white-text\">Detecting more vulnerabilities than any other vendor by leveraging our industry-leading vulnerability research\u00a0<\/span><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;2735&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1642465345560{padding-top: 30px !important;padding-bottom: 30px !important;}&#8221;][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_hidden-xs&#8221;][vc_single_image image=&#8221;2741&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div id=\"ultimate-heading-705069f0bd27043d3\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-705069f0bd27043d3 uvc-2852  uvc-heading-default-font-sizes\" data-hspacer=\"no_spacer\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-heading-spacer no_spacer\" style=\"top\"><\/div><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-705069f0bd27043d3 h2'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h2 style=\"--font-weight:theme;\">Integrated detection and response<\/h2><\/div><\/div>[vc_column_text]Leverage advanced detection techniques to proactively detect and respond to threats before any damage can be done. With\u00a0Trend Micro Vision One&#x2122;, you gain full-featured XDR capabilities to deepen detection, investigation, and response capabilities, so you can extend them across multiple security layers for broad visibility and response to threats impacting the entire organization.<\/p>\n<p>Learn how you can improve your email and endpoint security with XDR. Experience\u00a0Trend Micro Vision One&#x2122;\u00a0for free within a virtual pre-configured lab.<\/p>\n<div class=\"col-sm-3 col-xs-12 col-md-3 column\">\n<div class=\"richText section\">\n<ul>\n<li>Hunt for indicators of attack (IoA) and define the attacker\u2019s intent in real time<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"col-sm-3 col-xs-12 col-md-3 column\">\n<div class=\"richText section\">\n<ul>\n<li>Sweep user timelines (telemetry) for indicators of compromise (IoCs) to determine the impact of targeted attacks<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"col-sm-3 col-xs-12 col-md-3 column\">\n<div class=\"richText section\">\n<ul>\n<li>Employ an interactive root cause analysis diagram to drill down on a detection, and respond by isolating or terminating processes and updating protection points<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"col-sm-3 col-xs-12 col-md-3 column\">\n<div class=\"richText section\">\n<ul>\n<li>Have the option to go beyond a single vector approach by correlating events across email, endpoints, servers, cloud workloads, and networks<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][\/vc_column][vc_column offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221;][vc_single_image image=&#8221;2741&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column][vc_column][vc_empty_space][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;2765&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<div class=\"col-sm-3 col-xs-12 col-md-3 column\">\n<div class=\"richText section\" style=\"text-align: left;\">\n<p style=\"text-align: center;\">Hunt for indicators of attack (IoA) and define the attacker\u2019s intent in real time<\/p>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;2766&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<div class=\"col-sm-3 col-xs-12 col-md-3 column\" style=\"text-align: left;\">\n<div class=\"richText section\" style=\"text-align: center;\">\n<p>Sweep user timelines (telemetry) for indicators of compromise (IoCs) to determine the impact of targeted attacks<\/p>\n<\/div>\n<\/div>\n<div class=\"col-sm-3 col-xs-12 col-md-3 column\" style=\"text-align: center;\">\n<div class=\"productImageText vitl section\">\n<div class=\"row prod-a95eeea9-d8eb-434b-892a-210dfb404fe7 mobile-vertical tablet-vertical desktop-vertical global-margin-top-small global-margin-bottom-small\"><\/div>\n<\/div>\n<\/div>\n<div class=\"col-sm-3 col-xs-12 col-md-3 column\" style=\"text-align: left;\">\n<div class=\"richText section\">\n<p style=\"text-align: center;\">\n<\/div>\n<\/div>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;2767&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<div class=\"col-sm-3 col-xs-12 col-md-3 column\" style=\"text-align: left;\">\n<div class=\"richText section\" style=\"text-align: center;\">\n<p>Employ an interactive root cause analysis diagram to drill down on a detection, and respond by isolating or terminating processes and updating protection points<\/p>\n<\/div>\n<\/div>\n<div class=\"col-sm-3 col-xs-12 col-md-3 column\" style=\"text-align: center;\">\n<div class=\"productImageText vitl section\" style=\"text-align: center;\">\n<div class=\"row prod-efbd1f27-bd51-4b65-b10f-71495c3e590b mobile-vertical tablet-vertical desktop-vertical global-margin-top-small global-margin-bottom-small\"><\/div>\n<\/div>\n<div class=\"richText section\">\n<p style=\"text-align: center;\">\n<\/div>\n<\/div>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;2768&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<div class=\"richText section\">\n<p style=\"text-align: center;\">Have the option to go beyond a single vector approach by correlating events across email, endpoints, servers, cloud workloads, and networks<\/p>\n<\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1642465362259{padding-top: 30px !important;padding-bottom: 30px !important;}&#8221;][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;]<div id=\"ultimate-heading-915069f0bd270441c\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-915069f0bd270441c uvc-4216  uvc-heading-default-font-sizes\" data-hspacer=\"no_spacer\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-heading-spacer no_spacer\" style=\"top\"><\/div><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-915069f0bd270441c h2'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h2 style=\"--font-weight:theme;\">Effective security for your sensitive data<\/h2><\/div><\/div>[vc_column_text]Protect your sensitive data, on or off network, for maximum visibility and control. Endpoint encryption,* integrated DLP, and device control:<\/p>\n<ul>\n<li class=\"rich-text-li\">Cover the broadest range of devices, applications, and file types<\/li>\n<li class=\"rich-text-li\">Assist with most regulatory compliance, including GDPR<\/li>\n<li class=\"rich-text-li\">Protect data with full-disk, folder, file, and removable media encryption<\/li>\n<li class=\"rich-text-li\">Set granular policies for device control and data management<\/li>\n<li class=\"rich-text-li\">Manage Microsoft<sup>\u00ae<\/sup>\u00a0BitLocker<sup>\u00ae<\/sup>, and Apple<sup>\u00ae<\/sup>\u00a0FileVault<sup>\u00ae<\/sup>\u00a0encryption keys<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;2746&#8243; img_size=&#8221;full&#8221; alignment=&#8221;right&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1642465379622{padding-top: 30px !important;padding-bottom: 30px !important;}&#8221;][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243; offset=&#8221;vc_hidden-xs&#8221;][vc_single_image image=&#8221;2747&#8243; img_size=&#8221;full&#8221;][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div id=\"ultimate-heading-622169f0bd2704466\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-622169f0bd2704466 uvc-8485  uvc-heading-default-font-sizes\" data-hspacer=\"no_spacer\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-heading-spacer no_spacer\" style=\"top\"><\/div><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-622169f0bd2704466 h2'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h2 style=\"--font-weight:theme;\">Enhanced application control against malicious software<\/h2><\/div><\/div>[vc_column_text]Prevent unknown and unwanted applications from executing on your corporate endpoints. Trend Micro Apex One&#x2122; Application Control allows you to:<\/p>\n<ul>\n<li class=\"rich-text-li\">Block malicious software from running using customizable lockdown, safelisting, and denylisting policies<\/li>\n<li class=\"rich-text-li\">Create dynamic policies by leveraging Trend Micro\u2019s application categorization and reputation intelligence to reduce management overhead<\/li>\n<li class=\"rich-text-li\">Correlate data from millions of application events to identify threats and maintain an up-to-date database of validated applications<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221;][vc_single_image image=&#8221;2747&#8243; img_size=&#8221;full&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1642465399501{padding-top: 30px !important;padding-bottom: 30px !important;}&#8221;][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;]<div id=\"ultimate-heading-407769f0bd27044af\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-407769f0bd27044af uvc-2559  uvc-heading-default-font-sizes\" data-hspacer=\"no_spacer\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-heading-spacer no_spacer\" style=\"top\"><\/div><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-407769f0bd27044af h2'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h2 style=\"--font-weight:theme;\">TrendConnect lets users stay current with real-time product alerts and threat information<\/h2><\/div><\/div>[vc_column_text]With the TrendConnect app customers will be able to:<\/p>\n<ul>\n<li class=\"rich-text-li\">Instantly see deployment status to avoid running out-of-date versions of Trend Micro Apex One<\/li>\n<li class=\"rich-text-li\">Align deployments with Trend Micro Apex One best practices to ensure your endpoints are optimally protected<\/li>\n<li class=\"rich-text-li\">Stay one step ahead with real-time advisories of new vulnerabilities\/threats and notifications of new essential and critical patches<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;2749&#8243; img_size=&#8221;full&#8221; alignment=&#8221;right&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1642465418130{padding-top: 30px !important;padding-bottom: 30px !important;}&#8221;][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column]<div id=\"ultimate-heading-562969f0bd27044e8\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-562969f0bd27044e8 uvc-6377  uvc-heading-default-font-sizes\" data-hspacer=\"no_spacer\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-heading-spacer no_spacer\" style=\"top\"><\/div><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-562969f0bd27044e8 h2'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h2 style=\"--font-weight:theme;\">Centralized visibility and control<\/h2><\/div><div class=\"uvc-sub-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-562969f0bd27044e8 .uvc-sub-heading '  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"font-weight:normal;\"><\/p>\n<div class=\"richText section\">\n<p><span class=\"body-subhead-title\">Enable consistent security management, visibility, and reporting across multiple layers of interconnected security through a centralized console.<\/span><\/p>\n<\/div>\n<div class=\"responsiveColumnControl section\">\n<div id=\"responsive-column-9229601b-c841-4570-aa38-7bc5a7db6b34\" class=\"row medium-spacing global-margin-top-none global-padding-top-none global-padding-bottom-none global-margin-bottom-none\">\n<div class=\"col-sm-4 col-xs-12 col-md-4 column\">\n<div class=\"responsiveColumnControl section\">\n<div id=\"responsive-column-ed28cf7b-11ab-48b4-b45f-4d4905f0d94d\" class=\"row medium-spacing global-margin-top-small global-padding-top-none global-padding-bottom-none global-margin-bottom-none\">\n<div class=\"col-sm-3 col-xs-12 col-md-3 column\">\n<div class=\"row prod-f6c3f6b9-3643-44c7-80ba-143f9c65301e mobile-vertical tablet-vertical desktop-vertical add-flex global-margin-top-none global-margin-bottom-none\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/div><\/div>[\/vc_column][vc_column offset=&#8221;vc_hidden-xs&#8221;][vc_single_image image=&#8221;2748&#8243; img_size=&#8221;full&#8221;][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;2762&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<div class=\"responsiveColumnControl section\">\n<div id=\"responsive-column-ed28cf7b-11ab-48b4-b45f-4d4905f0d94d\" class=\"row medium-spacing global-margin-top-small global-padding-top-none global-padding-bottom-none global-margin-bottom-none\">\n<div class=\"col-sm-3 col-xs-12 col-md-3 column\">\n<div class=\"productImageText vitl section\">\n<div class=\"row prod-f6c3f6b9-3643-44c7-80ba-143f9c65301e mobile-vertical tablet-vertical desktop-vertical add-flex global-margin-top-none global-margin-bottom-none\">\n<div class=\"image-wrap vertical col-md-12 col-sm-12 col-xs-12 center-image center-align\">Extend control and visibility across on-premises, cloud, and hybrid models<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"responsiveColumnControl section\">\n<div id=\"responsive-column-5ab2c5c6-561f-4967-93e4-3907319add7d\" class=\"row medium-spacing global-margin-top-none global-padding-top-none global-padding-bottom-none global-margin-bottom-none\">\n<div class=\"col-sm-3 col-xs-12 col-md-3 column\">\n<div class=\"productImageText vitl section\">\n<div class=\"row prod-8ef09f26-5fa5-41a7-8315-b9fdb51ae0a6 mobile-vertical tablet-vertical desktop-vertical add-flex global-margin-top-none global-margin-bottom-none\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"responsiveColumnControl section\">\n<div id=\"responsive-column-1857e6e5-74af-4c12-86c6-6814acfb4f2a\" class=\"row medium-spacing global-margin-top-none global-padding-top-none global-padding-bottom-none global-margin-bottom-none\">\n<div class=\"col-sm-9 col-xs-12 col-md-9 column\">\n<div class=\"richText section\">\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;2763&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<div class=\"responsiveColumnControl section\">\n<div id=\"responsive-column-ed28cf7b-11ab-48b4-b45f-4d4905f0d94d\" class=\"row medium-spacing global-margin-top-small global-padding-top-none global-padding-bottom-none global-margin-bottom-none\">\n<div class=\"col-sm-3 col-xs-12 col-md-3 column\">\n<div class=\"productImageText vitl section\">\n<div class=\"row prod-f6c3f6b9-3643-44c7-80ba-143f9c65301e mobile-vertical tablet-vertical desktop-vertical add-flex global-margin-top-none global-margin-bottom-none\">Improve protection, reduce complexity, and eliminate redundancy<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;2764&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][vc_column_text]<\/p>\n<div class=\"responsiveColumnControl section\">\n<div id=\"responsive-column-ed28cf7b-11ab-48b4-b45f-4d4905f0d94d\" class=\"row medium-spacing global-margin-top-small global-padding-top-none global-padding-bottom-none global-margin-bottom-none\">\n<div class=\"col-sm-3 col-xs-12 col-md-3 column\">\n<div class=\"productImageText vitl section\">\n<div class=\"row prod-f6c3f6b9-3643-44c7-80ba-143f9c65301e mobile-vertical tablet-vertical desktop-vertical add-flex global-margin-top-none global-margin-bottom-none\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"responsiveColumnControl section\">\n<div id=\"responsive-column-1857e6e5-74af-4c12-86c6-6814acfb4f2a\" class=\"row medium-spacing global-margin-top-none global-padding-top-none global-padding-bottom-none global-margin-bottom-none\">\n<div class=\"col-sm-3 col-xs-12 col-md-3 column\">\n<div class=\"productImageText vitl section\">\n<div class=\"row prod-7b0831a1-9692-46ac-a47d-8207833c6ac3 mobile-vertical tablet-vertical desktop-vertical add-flex global-margin-top-none global-margin-bottom-none\">\n<div class=\"image-wrap vertical col-md-12 col-sm-12 col-xs-12 center-image center-align\">Provide access to actionable threat intelligence from the Trend Micro&#x2122; Smart Protection Network&#x2122;<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][\/vc_column][vc_column offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221;][vc_single_image image=&#8221;2748&#8243; img_size=&#8221;full&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1642465440620{padding-top: 30px !important;padding-bottom: 30px !important;}&#8221;][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column]<div id=\"ultimate-heading-780269f0bd270451a\" class=\"uvc-heading ult-adjust-bottom-margin ultimate-heading-780269f0bd270451a uvc-4471  uvc-heading-default-font-sizes\" data-hspacer=\"no_spacer\"  data-halign=\"center\" style=\"text-align:center\"><div class=\"uvc-heading-spacer no_spacer\" style=\"top\"><\/div><div class=\"uvc-main-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-780269f0bd270451a h2'  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}' ><h2 style=\"--font-weight:theme;\">How it works<\/h2><\/div><div class=\"uvc-sub-heading ult-responsive\"  data-ultimate-target='.uvc-heading.ultimate-heading-780269f0bd270451a .uvc-sub-heading '  data-responsive-json-new='{\"font-size\":\"\",\"line-height\":\"\"}'  style=\"font-weight:normal;\"><span class=\"body-subhead-title\">A range of layered detection capabilities, alongside investigation and response, defends the endpoint through every stage<\/span><\/div><\/div>[vc_single_image image=&#8221;2750&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; bg_type=&#8221;image&#8221; parallax_style=&#8221;vcpb-default&#8221; bg_image_new=&#8221;id^2738|url^https:\/\/www.678pc.com\/site1\/wp-content\/uploads\/2022\/01\/1-apex1.jpg|caption^null|alt^null|title^apex1|description^null&#8221; css=&#8221;.vc_custom_1642527266406{margin-top: -130px !important;padding-top: 300px !important;padding-bottom: 300px !important;}&#8221;][vc_column offset=&#8221;vc_hidden-xs&#8221;][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221;][vc_column offset=&#8221;vc_hidden-lg vc_hidden-md vc_hidden-sm&#8221;][vc_separator][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1642527019845{padding-top: 30px !important;}&#8221;][vc_column][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1642465287951{padding-top: 30px !important;padding-bottom: 30px !important;}&#8221;][vc_column][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/3&#8243;][vc_column_text]Trend Micro Apex One&#x2122; protection offers advanced automated threat detection and response against an ever-growing variety of threats, including fileless and ransomware. Our cross-generational blend of modern techniques provides highly&hellip;<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":2107,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2733","page","type-page","status-publish","hentry","description-off"],"_links":{"self":[{"href":"https:\/\/www.678pc.com\/site1\/wp-json\/wp\/v2\/pages\/2733","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.678pc.com\/site1\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.678pc.com\/site1\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.678pc.com\/site1\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.678pc.com\/site1\/wp-json\/wp\/v2\/comments?post=2733"}],"version-history":[{"count":0,"href":"https:\/\/www.678pc.com\/site1\/wp-json\/wp\/v2\/pages\/2733\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.678pc.com\/site1\/wp-json\/wp\/v2\/pages\/2107"}],"wp:attachment":[{"href":"https:\/\/www.678pc.com\/site1\/wp-json\/wp\/v2\/media?parent=2733"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}