Trend Micro OfficeScan Endpoint Protection with XGen endpoint security infuses high fidelity machine learning into a blend of threat protection techniques to eliminate security gaps across any user activity and any endpoint. It constantly learns, adapts, and automatically shares threat intelligence across your environment. This blend of threat protection is delivered via an architecture that uses endpoint resources more effectively and ultimately out-performs the competition on CPU and network utilization. Secure file servers, PCs, Macs, laptops, Point of Sale, ATMs, and virtualized desktops. Protect against data loss and theft. Get real-time updates with local sandbox integration. Maximum XGen security. Infuses high-fidelity machine learning with other detection techniques for the broadest protection against ransomware and advanced attacks. Progressively filters out threats using the most efficient technique for maximum detection without false positives.
Trend Micro is the first to infuse ‘high fidelity’ machine learning into its approach — uniquely analyzing files not only before execution but also during runtime for more accurate detection, with noise cancellation like census and whitelist checking at each layer to reduce false positives. Instantly shares information on suspicious network activity and files with other security layers to stop subsequent attacks. Advanced ransomware protection, monitors for suspicious file encryption activities at the endpoint, terminates malicious activities and even recovers lost files if necessary. Reduce user impact and management costs. Lightweight and optimized security uses the right detection technique at the right time to ensure minimal impact on devices and networks. Comprehensive central view of endpoint status lets you quickly get visibility to security risks. Automatic sharing of threat intelligence across security layers enables organization wide protection of emerging threats.
Trend Micro Vulnerability Protection
Stops zero day threats immediately with a network level Host Based Intrusion Prevention System (HIPS) that enables virtual patching. Eliminates risk exposure by shielding vulnerabilities with virtual patching. Reduces down-time for recovery and emergency patching. Allows patching on your own terms and timelines. Identifies security vulnerabilities with reporting based on CVE, MS-ID, severity. This centralized security management console ensures consistent security management and complete visibility and reporting across multiple layers of interconnected security. It also extends visibility and control across on premises, cloud, and hybrid deployment models. Centralized management combines with user based visibility to improve protection, reduce complexity, and eliminate redundant and repetitive tasks in security administration. Deploy Trend Micro Mobile Security to extend protection to smart phones and tablets. Integrates OfficeScan and Trend Micro Mobile Security through Trend Micro Control Manager, enabling unified management and policy deployment across all endpoint security.
Trend Micro Endpoint Encryption
Trend Micro OfficeScan Endpoint Protection ensures data privacy by encrypting data stored on your endpoints — including PCs, Apple Macs, DVDs, and USB drives, which can easily be lost or stolen. Protects data at rest with full disk encryption software. Automates data management with self encrypting hard drives. Encrypts data in specific files, shared folders, removable media. Sets granular policies for device control and data management. Manages Microsoft Bitlocker and Apple FileVault. Provides context aware endpoint investigation and forensic capabilities, recording and reporting detailed system level activities to allow threat analysts to rapidly assess the nature and extent of an attack. Enhances your defenses against malware and targeted attacks by preventing unwanted and unknown applications from executing on your corporate endpoints. Dynamic policies reduce management impact and allow flexibility for active user environments. Locks down systems to only the applications your organizations wants used approves.