Trend Micro Apex One Endpoint Sensor Add-on for Apex One On-premises - License - 1 user - academic, volume, public sector, non-contract government - 251-500 licenses - Win, Mac

Code: SKNA0021
Brand: Trend Micro
Warranty: Unknown
For illustrative purpose only
Stock Qty Est. Delivery Price
VAT
SYNCA 9999 3/26/2026 unknown 34.36

Marketing description

Advanced malware can manifest itself in your enterprise networks, bypassing traditional security technology. It can change and spread through an organization before executing and exploiting your intellectual property. Or it can sit dormant until an opportunity presents itself to steal or ransom data. Fortunately, Trend Micro Apex One security uses XGen threat and malware protection, using a blend of cross generational threat protection techniques, such as machine learning, behavioral analysis and vulnerability protection. Once a detection has been made though, questions remain. What was the root cause? How many endpoints did it spread to? Was it related to other detections picked up by the endpoint protection?
Trend Micro Apex One as a Service: Endpoint Sensor gives insight to detections by allowing threat investigators to explore detections and hunt for different threats using EDR investigation functionality.

Key selling points

  • Integrated workflow
  • Efficient endpoint recording
  • Server side IOC sweeping
  • Flexible searching
  • Root cause analysis
  • Vendor intelligence and assistance
  • Immediate response options
  • Advanced threat hunting
  • Open APIs
  • Sandbox integration

Product features

  • Integrated workflow
    Threat hunting and detection investigation are performed within the workflow and console of Trend Micro Apex One as a Service endpoint protection. No more moving from one console to another.
  • Efficient endpoint recording
    Endpoint Sensor records and stores information on system behaviors, communications and user behaviors. Metadata on this information is sent to the Apex One server to allow investigators to sweep for indicators of compromise (IOCs).
  • Server side IOC sweeping
    The Apex One as a Service server only stores essential metadata of end user recorded data (or telemetry). This allows investigators to perform multiple searches or sweeps of this data without having to query each endpoint individually. In addition, detailed root cause investigations can be made on each endpoint directly.
  • Flexible searching
    Investigators can search (or sweep) with multiple parameters. Searches can be made on parameters, such as specific communications, specific malware, registry activity, account activity, and running processes. Or investigators can search using industry standard OpenIOC or YARA rules.
  • Root cause analysis
    Investigators can drill down on an interactive process tree that illustrates the full chain of attack to analyze how the detection arrived, changed, and spread by viewing activities, objects, and processes. Immediate response can be taken to terminate processes, isolate users, update security, and to sweep further.
  • Vendor intelligence and assistance
    Layering in proactive global threat intelligence, the Trend Micro Smart Protection Network provides clarity and assistance to threat investigators. Endpoint Sensor recognizes known good objects and processes as well as known bad. Investigators can view a color-coded root cause analysis to identify risky or unknown processes and guide in the remediation. Investigators can also access Trend Micro Threat Connect service to research the database of threat information.
  • Immediate response options
    Apex One as a Service already provides advanced automation to remediate detections. It can automatically isolate, quarantine, block executions, roll back settings (and files, in the case of ransomware), with the option for investigators to also manually respond while performing an investigation. Endpoints can be isolated, processes can be terminated, and security intelligence can be automatically updated on a per-user or enterprise-wide basis.
  • Advanced threat hunting
    Investigators can perform threat hunting based on indicators of attack (IOAs). This allows investigators to develop attack discovery rules or work with the IOAs provided by Trend Micro to hunt for threats.
  • Open APIs
    Many customers want to be able to leverage their security operations tools. Apex One as a Service has multiple built-in documented APIs that allow the product to work with these tools.
  • Sandbox integration
    Security investigators can select objects and manually submit them to Trend Micro sandboxes. Suspicious objects can be sent to the Deep Discovery network security sandboxes on-premises.

Product Description
Trend Micro Apex One Endpoint Sensor Add-on for Apex One On-premises - license - 1 user
Product Type
License
Category
Security applications - intrusion and vulnerability detection, advanced threat detection, security - data loss prevention
License Qty
1 user
License Pricing
Academic, volume, public sector, non-contract government / 251-500 licenses
Platform
Windows, MacOS
Category
Security applications - intrusion and vulnerability detection, advanced threat detection, security - data loss prevention
Product Type
License
Platform
Windows, MacOS
License Qty
1 user
License Pricing
Academic, volume, public sector, non-contract government / 251-500 licenses