XDR For Users: Trend Micro
XDR For Users: Trend Micro
XDR For Users: Trend Micro
Trend Micro™
Organizations today face an onslaught of new and stealthy threats that are constantly Protection Points
evolving to bypass existing security measures. Having advanced detection and response • Microsoft® Windows®
capabilities, in addition to advanced protection, is essential to eliminate or minimize the • Mac
impact of threats that do make it through defenses. Endpoint detection and response
• Microsoft 365® (email, Microsoft®
(EDR) is a great tool to detect threats that have landed on an endpoint, investigate the OneDrive® for Business, Microsoft®
root cause, and mitigate the impact—but with its targeted focus on endpoints, EDR can’t SharePoint® Online, Microsoft®
see or influence important parts of the attack path. For example, while EDR can identify Teams®)
that a threat came into the organization via email, it can’t offer key details on the scope • Google G Suite™ (email, Google Drive™)
of compromised accounts and hence can’t remove or stop the spread of the threat.
Given that 96% of social engineering attacks start with email , combining email with
endpoint detection and response is a powerful capability.
XDR Data Lake (sensor activity data: telemetry, metadata, logs, netflow)
1
2020 Data Breach Investigations Report, Verizon
Built-in security analytics combined with global threat intelligence to detect more:
• X
DR analytics can automatically tie together a series of lower-confidence activities
into a higher-confidence event, surfacing fewer, prioritized alerts for action (i.e. a
suspected phishing email is followed by an endpoint accessing a rare web domain).
• Correlate threat and detection data from your environment with Trend Micro’s global
threat intelligence in the Trend Micro™ Smart Protection Network™ for richer, more
meaningful alerts.
• M
ore context with mapping to the MITRE ATT&CK framework means faster detection
and higher fidelity alerts. In the MITRE AP29 evaluation, Trend Micro had the highest
initial detection rate2.
• One place for investigations to quickly visualize the entire chain of events across
security layers or to drill down into an execution profile.
• In seconds, determine the impact of a phishing attack as Trend Micro Vision One
automatically sweeps mailboxes to find other affected users.
• One location to respond using containment actions for both email and endpoint.
Trend Micro Vision One: One place for attack discovery, investigation, and response
2
MITRE ATT&CK Evaluations: Trend Micro #1 in Initial Overall Detection, Trend Micro
• With Managed XDR, customers can get the advantages of Trend Micro Vision One;
leveraging the resources and knowledge of Trend Micro security experts who are
skilled in hunting and investigating advanced threats.
• Provides 24/7 alert monitoring, alert prioritization, investigation, and threat hunting
services to Trend Micro customers as a managed service.
• Depending on the Trend Micro products in the environment, the Managed XDR
service can collect data—from not only endpoints and email, but also network, server,
and cloud—to correlate and prioritize alerts and system information and determine a
full root cause analysis.
• Threat investigators take the burden of investigations and provide a full incident
report and remediation plan so your internal teams can more easily and quickly know
what has happened, along with the impact and the necessary remediation steps.
For details about what personal information we collect and why, please see our Privacy Notice on our website at:
https://www.trendmicro.com/privacy
©2021 by Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball
logo, Trend Micro Apex Central, InterScan, Trend Micro Apex One, ServerProtect, ScanMail,
and TrendLabs are trademarks or registered trademarks of Trend Micro Incorporated. All
other company and/or product names may be trademarks or registered trademarks of
their owners. Information contained in this document is subject to change without notice.
[DS03_XDR_for_Users_Datasheet_210113US] trendmicro.com