Overview
A blend of advanced threat protection techniques delivered through a single-agent architecture to eliminate security gaps across any user activity and any endpoint.
- Automated detection and response against a variety of threats, including fileless and
ransomware.
- Centralized visibility and control, with integration into endpoint detection and response (EDR)
and managed detection and response (MDR) for advanced investigation and visibility across
network.
- An all-in-one lightweight agent through software as a service (SaaS) and on-premises options.
Automated
Receive advanced, automated threat detection and response against an ever-growing variety of threats, including fileless and ransomware. Our cross-generational blend of advanced techniques provides endpoint protection that maximizes performance and effectiveness.
Integrated
Get actionable insights, expanded investigative capabilities, and centralized visibility with a unified EDR toolset, strong SIEM integration, and an open API set. Perform correlated, extended threat investigations that go beyond the endpoint and augment your security teams with a managed detection and response service.
Flexible
In an evolving technological and threat landscape, you need security that goes beyond traditional antivirus. Trend Micro Apex One offers threat detection, investigation, and response within a single agent. Consolidate capabilities and consoles and gain deployment flexibility through both SaaS and on-premises deployment options.
You Can Have It All
- Malware and ransomware protection: Defends endpoints against malware, ransomware, malicious scripts, and more. Advanced protection capabilities adapt to protect against unknown and stealthy new threats.
- Extensive detection and response capabilities in one console: XDR goes beyond EDR with cross-layer detection and threat hunting and investigation across email, endpoints, servers, cloud workloads, and networks.
- The industry’s most timely virtual patching: Vulnerability protection applies virtual patches for protection before a patch is available or deployable.
- Ransomware rollback: Detects ransomware with runtime machine learning and expert rules to block encryption processes in milliseconds. Rollback restores any files encrypted before the detection.
- Connected threat defense: Trend Micro Apex One integrates with other security products via our global cloud threat intelligence, delivering sandbox rapid response updates to endpoints.
- Flexible deployment: Trend Micro Apex One as a Service saves time, money, and is always up to date with the latest protection. On-premises and hybrid deployments are also fully supported.
Protection and Efficiency: The Right Technique At The Right Time
Advanced detection techniques
Apex One leverages a blend of cross-generational threat techniques to provide the broadest protection against all types of threats
Pre-execution and runtime machine learning
More accurate detection of advanced malware, such as fileless, living off the land, and ransomware threats
Noise-cancelling techniques – like census and safelisting – throughout every layer of detection to dramatically reduce false positives
Effective protection against scripts, injection, ransomware, memory, and browser attacks through innovative behavior analysis
Features
Ultimate protection against vulnerabilities
More than just a scan, Apex One Vulnerability Protection uses a host-based intrusion prevention system (HIPS) to virtually patch known and unknown vulnerabilities before a patch is available or deployable, enabling you to:
- Eliminate risk exposure
- Extend protection to critical platforms and physical or virtual devices
- Reduce recovery and emergency patching downtime
- Identify vulnerabilities based on CVE, MS-ID, and severity
- Detect more vulnerabilities than any other vendor by leveraging our industry-leading vulnerability research
Integrated detection and response
Leveraging Apex One with Trend Micro Vision One, you gain market-leading XDR capabilities. Enhance detection, investigation, and response capabilities across multiple security layers for comprehensive visibility of threats impacting the entire organization.
Learn how you can improve endpoint security with industry-leading XDR. Experience Trend Micro Vision One within a virtual pre-configured lab.
- Receive prioritized, actionable alerts. Uncover the scope of impact and initiate a direct response with root cause analysis. Gain enhanced correlated detection, investigation, and response across email, network, cloud, and workloads.
- Proactively pinpoint threat tactics and validate suspicious activity via multiple methods. Continuously search for newly discovered IoCs via Trend Micro’s automated intelligence or custom intelligence sweeping.
- Integrate via API with SIEM platforms and SOAR tools
- Augment your teams with 24/7/365 managed detection and response (MDR) service
Effective security for your sensitive data
Protect your sensitive data, on or off network, for maximum visibility and control. Endpoint encryption,* integrated DLP, and device control:
- Covers the broadest range of devices, applications, and file types
- Assists with most regulatory compliance, including GDPR
- Protects data with full-disk, folder, file, and removable media encryption
- Sets granular policies for device control and data management
- Manage Microsoft BitLocker and Apple FileVault encryption keys
*Endpoint encryption is available as a separate agent.
Enhanced application control against malicious software
Prevent unknown and unwanted applications from executing on your corporate endpoints. Trend Micro Apex One™ Application Control allows you to:
- Block malicious software from running using customizable lockdown, safelisting, and blocklisting policies
- Create dynamic policies by leveraging Trend Micro’s application categorization and reputation intelligence to reduce management overhead
- Correlate data from millions of application events to identify threats and maintain an up-to-date database of validated applications
TrendConnect lets users stay current with real-time product alerts and threat information
With the TrendConnect app customers will be able to:
- Instantly see deployment status to avoid running out-of-date versions of Trend Micro Apex One
- Align deployments with Trend Micro Apex One best practices to ensure your endpoints are optimally protected
- Stay one step ahead with real-time advisories of new vulnerabilities/threats and notifications of new essential and critical patches
Customization
Apex One is a critical component of Trend Micro Smart Protection Suites, allowing you to add
security and investigation capabilities to fit your organizations unique security needs.
Vulnerability Protection
- Backed by world-class vulnerability research from Trend Micro Research and our Zero Day Imitative (ZDI), which discovered 61% of the disclosed zero-day vulnerabilities in 2020.
- Eliminates risk exposure due to missing patches and allows patching on your own timeline.
- Delivers critical patches to legacy operating systems no longer being provided by the vendor.
- Reduces downtime for recovery with incremental protection against zero-day attacks.
Application Control
- Prevents damage from unwanted and unknown applications (executables, DLLs, and other PE files).
- Offers flexible, dynamic policies and safelisting/blocklisting capabilities to reduce attack exposure.
- Allows users to install applications based on reputation variables (prevalence, usage, and maturity).
- Provides global and local real-time threat intelligence based on good file reputation data.
Data Loss Prevention (DLP)
- Provides visibility and control of data and prevents data loss via USB, email, cloud storage, etc.
- Gives you protection for your data at rest and in motion, for less cost than traditional DLP solutions.
- Educates on corporate data usage policies through alerts, blocking or soft-blocking, and reporting.
- Reduces resource and performance impact through single endpoint security, device control, and content DLP.
Trend Micro Vision One
- Offers a threat defense platform featuring XDR and risk visibility.
- Simplifies and accelerates threat detection and response by connecting email, endpoints, servers, cloud workloads, and network.
- Provides automatic indicators of compromise (IoC) sweeping with included Trend Micro threat intelligence feed.
- Hunt, detect, and contain threats.
- Quickly see all aspects of an attack and respond from a single place.
- Optional Trend Micro Managed XDR service for threat hunting and investigation by Trend Micro threat experts.
Protect, Detect and Respond with XDR package:
- Trend Micro XDR for Users package adds to Trend Micro Apex One with XDR advanced email and cloud file sharing security for Microsoft 365 and Google Workspace. The solution delivers proven protection as well extended detection and response to address phishing—the number one attack method.
System Requirements
Agent Operating Systems
- Windows 7 (6.1)
- Windows 8.1 (6.2/6.3)
- Windows 10 (10.0)
- Windows 11
- Windows Server 2008 R2 (6.1)
- Windows Server 2012 (6.2)
- Windows Server 2012 R2 (6.3)
- Windows Server 2016 (10)
- Windows Server 2019
- Windows Server 2022
- macOS High Sierra 10.13
- macOS Mojave 10.14
- macOS Catalina 10.15
- macOS Big Sur 11.0
- macOS Monterey 12.0
Agent Platform
Processor: 300 MHz Intel Pentium or equivalent (Windows 7, 8.1, 10 family) and Intel Core processor for Mac
- 1.0 GHz minimum (2.0 GHz recommended) Intel Pentium or equivalent (Windows Embedded POSReady7)
- 1.4 GHz minimum (2.0 GHz recommended) Intel Pentium or equivalent (Windows 2008 R2, Windows 2016 family, Windows 2019 family)
Memory:
- 512 MB minimum (2.0 GB recommended) with at least 100 MB exclusively for Apex One (Windows 2008 R2, 2012 family)
- 1.0 GB minimum (2.0 GB recommended) with at least 100 MB exclusively for Apex One (Windows 7 (x86), 8.1 (x86), Windows Embedded POSReady 7, 10 (x64) family)
- 2.0 GB minimum (4.0 GB recommended) with at least 100 MB exclusively for Apex One (Windows 7 (x64), 8.1 (x64), 10 (x64) family)
- 512 MB minimum for Apex One on Mac
Disk Space: 1.5GB minimum (3GB recommended for all products) for Windows, 300 MB minimum for Mac