0% found this document useful (0 votes)
95 views3 pages

Ds Vision One Endpoint Security

Uploaded by

Nelson Kolarik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
95 views3 pages

Ds Vision One Endpoint Security

Uploaded by

Nelson Kolarik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Datasheet

Trend Vision One™ – Endpoint Security


Optimized prevention, detection, and response for endpoints, servers, Protection points
and cloud workloads • Physical endpoints
In the face of an ever-changing threat landscape, organizations must keep endpoints
• Microsoft Windows PCs and servers
secure—no matter where they are—to help stay ahead of adversaries. The right endpoint
detection and response (EDR) solution is one that is not only up to the task, but easy • Apple MacOS computers
to integrate, capable of reducing loads on your security teams with smarter alerts and • Point-of-sale (POS) and ATM
AI-bolstered data analysis. In a sense, less is more, enabling your teams to prioritize—and endpoints
mitigate—the most urgent threats across endpoints and environments.
• Server
Discover the capabilities of Endpoint Security • Cloud workload
Our Endpoint Security solution is purpose-built for endpoints, servers, and cloud • Virtual machines
workloads, integrating advanced threat protection, EDR/XDR, and threat intelligence.
Leveraging the unified, AI-powered architecture of our Trend Vision One™ platform,
it will help you streamline IT and security operations, reduce complexity, and achieve Threat detection capabilities
optimal security outcomes across your on-premises, cloud, multi-cloud, and • High-fidelity machine learning
hybrid environments. (pre-execution and runtime)
Connect your endpoint and workload security with other protection solutions
• Behavioral analysis (against scripts,
seamlessly, including those from Trend Micro and third parties. In addition, leverage
injection, ransomware, memory,
threat intel, security information and event management (SIEM), attack surface
management (ASM), and more. Endpoint Security supports your diverse hybrid and browser attacks)
IT environments, helps automate and orchestrate workflows, and delivers expert • In-memory analysis for
cybersecurity services, so you can stop adversaries faster and take control of your identification of fileless malware
cyber risk. • Variant protection
Integrated EDR • Census check
Through Trend Vision One, you get the XDR advantage with integrated EDR capabilities. • Web reputation
• Receive prioritized, actionable alerts and comprehensive incident views • Exploit prevention (host firewall,
• Investigate root cause and execution profiles across Linux and Windows system exploit protection)
attacks to uncover their scope and initiate direct response • Command and control
• Hunt for threats via multiple methods—from powerful queries to simple text (C&C) blocking
search— to proactively pinpoint tactics or techniques and validate suspicious • Data loss prevention (DLP)
activity in their environment
• Device and application control
• Continuously search for newly discovered indicators of compromise (IoCs) via
• Ransomware rollback
automated intelligence or custom intelligence sweeping
• Sandbox and breach
Comprehensive threat protection from layered prevention to detection detection integration
and response • Extended detection and
Get timely protection against an ever-growing variety of threats by leveraging response (XDR)
automated and advanced security controls, and the latest industry-leading
threat intelligence.

With a full range of layered prevention, detection, and response capabilities—such as


modern anti-malware and ransomware protection, device control, host-based intrusion
prevention, application control, machine learning/AI, and more—you can defend your
endpoints, virtual desktops, servers and cloud workloads in real time.

Page 1 of 3 Datasheet • Trend Vision One™ - Endpoint Security


Datasheet

Modern, cloud-native security for your hybrid cloud deployments Proven Leadership
• Workloads, by default, are vulnerable from the moment they are instantiated; gain
built-in workload discovery capabilities, integrating with AWS, Microsoft Azure,
Google Cloud Platform™ (GCP), VMware, and Microsoft Active Directory to provide Named a
Trend is a Leader in Gartner
LEADER Magic Quadrant for EPP since
protections from the moment they are created in 2024
Gartner Magic Quadrant
for
2002, 19 times in a row
• Eliminate the cost of deploying multiple point solutions and achieve consistent
Endpoint Protection
Platforms

security across physical, virtualized, cloud, container, and user endpoint environments
with a single management console
• Monitor for changes and attacks on Docker and Kubernetes platforms with integrity A Leader in The Forrester
monitoring and log inspection capabilities Wave™: Endpoint Security, Q4
2023 - with the highest score in
• Protect runtime containers through container vulnerability shielding via intrusion
the strategy category
prevention, real-time malware protection, and east-west container traffic inspection

Intrusion and vulnerability prevention for endpoints, servers, and their


MITRE Engenuity ATT&CK
applications (2023) #1 performer in the
The intrusion prevention module within Endpoint Security helps you protect your protection, category with 100%
environment from known and zero-day vulnerabilities. In addition, it safeguards against detection of all critical attack
structured query language (SQL) injection attacks, cross-site scripting attacks, and steps in the evaluation
other web application vulnerabilities. In addition, our vulnerability protection and
intrusion prevention includes virtual patches to shield your organization from known
vulnerabilities until a patch is available from the vendor. This is backed by the Trend Ranked #1 for Cloud Workload
Micro™ Zero-Day Initiative™ (ZDI), the world’s largest bug bounty program. Security Market Share for the
6th consecutive year (2023)

File integrity monitoring


The integrity monitoring module allows you to scan for unexpected changes to registry
values, registry keys, services, processes, installed software, ports, and files. Using a
baseline secure state as a reference, the integrity monitoring module helps you perform
scans on the above and logs an event (as well as an optional alert) if it detects any
unexpected changes.

Log inspection Protecting your Linux platform


The log inspection protection module enables you to identify important events that
Our platform provides support
might be buried in your operating system and application logs.
for extensive Linux builds and
This module allows you to:
hundreds of Linux kernels,
• Detect suspicious behavior Solaris™, AIX, and HP-UX.
• Collect events across heterogeneous environments containing different operating
systems and diverse applications
• View error and informational events, such as “disk full,” “service start,” and
Achieve cost-effective
“service shutdown”
compliance
• Create and maintain audit trails of administrator activity, including administrator Address major compliance
logins or logouts, account lockouts, and policy changes requirements for the GDPR,
HIPAA, NIST, and more, with
In addition, the log inspection feature within Endpoint Security enables the real- one integrated and cost-
time analysis of third-party log files. The log inspection rules and decoders provide a effective platform.
framework to help you parse, analyze, rank and correlate events across a wide variety
of systems.

Page 2 of 3 Datasheet • Trend Vision One™ - Endpoint Security


Datasheet

Trend Vision One – Endpoint Security offerings

Core Essentials Pro


User endpoints and basic User endpoints and basic Critical endpoints including
Primary endpoint type
servers servers servers and workloads
Windows, Linux, and Mac OS • • •
Anti-malware, behavioral analysis, machine learning,
• • •
web reputation

Device control • • •

DLP • •
Firewall • • •
App control • • •
Intrusion prevention – IPS (OS) • • •
Virtualization protection • • •
EDR-XDR • •
IPS (OS) •
Integrity monitoring/log Inspection •
Core Essentials Pro
Trend Vision One – Email and Collaboration Security

+ + +
Trend Vision One – Mobile Security

+ + +
Trend Vision One™ – Network Security + + +
Trend Vision One – Cloud Security

+ + +
Trend Micro Zero Trust Secure Access (ZTSA)

+ + +
Managed detection and response/Trend Service One™ + +
Trend Vision One™ – Attack Surface Risk Management
(ASRM) + +

+ indicates add-on option

Interested in learning more about how you can leverage


Explore Trend Vision One
our platform and solutions to secure your endpoints?
Learn more at TrendMicro.com

Copyright ©2024 Trend Micro Incorporated. All rights reserved. Trend


Micro, the Trend Micro logo, Trend Vision One, Zero Day Initiative, Trend
Service One, and the t-ball logo are trademarks or registered trademarks
of Trend Micro Incorporated. All other company and/or product names
may be trademarks or registered trademarks of their owners. Information
contained in this document is subject to change without notice. Trend
Micro, the Trend Micro logo, and the t-ball logo Reg. U.S. Pat. & Tm. Off.
[DS04_Endpoint_Security_Datasheet_241007US]

For details about what personal information we collect and why, please see our
Privacy Notice on our website at: trendmicro.com/privacy

Page 3 of 3 Datasheet • Trend Vision One™ - Endpoint Security

You might also like