This high-performance XGen™ endpoint security suite protects virtual and physical desktops against today’s evolving threat landscape using the broadest range of anti-malware techniques including high-fidelity machine learning and behavior analysis to stop ransomware and other attacks. Multiple layers of threat and data security protect your users and corporate information across all devices and applications.
Brand | Trend Micro |
Product Type | Endpoint Security |
Version | SMART PROTECTION FOR ENDPOINTS |
Distribution Media | Medialess |
Language Supported | English International |
System Requirements | As a Suite based Product, System requirement will be the merge of all the suits components system requirement. |
Feature 01 | Trend MicroSMART PROTECTION FOR ENDPOINTS is a complete security solution for Endpoints. It includes the below Modules 1-Anti Malware 2-OfficeScan 3-Data Loss Prevention(DLP) 4-Encryption |
Feature 02 | Advanced malware and ransomware protection: Protects endpoints, on or off the corporate network, against malware, Trojans, worms, spyware, ransomware, and adapts to protect against new unknown variants as they emerge. |
Feature 03 | Connected threat defense: OffceScan integrates with other security products locally on your network and also via Trend Micro’s global, cloud threat intelligence to deliver network sandbox rapid response updates to endpoints when a new threat is detected, enabling faster time-to-protection and reducing the spread of malware |
Feature 04 | Centralized visibility and control: When deployed with Trend Micro™ Control Manager™, multiple OffceScan servers can be managed through a single console to provide complete user visibility. |
Feature 05 | Mobile security integration: Integrate Trend Micro™ Mobile Security and OffceScan by using Control Manager to centralize security management and policy deployment across all endpoints;Mobile Security includes mobile device threat protection, mobile app management, mobile device management (MDM), and data protection |
Feature 06 | Data Loss Prevention (DLP) Module Protects your sensitive data for maximum visibility and control. • Secures private data on- or off-network, including encrypting fles before they leave your network • Protects against data leaks via cloud storage, USB drives or connected mobile devices, Bluetooth connections, and other media • Covers the broadest range of devices, applications, and fle types • Aids compliance with greater visibility and enforcement |
Feature 07 | Security for Mac Module Provides a layer of protection for Apple Mac clients on your network by preventing them from accessing malicious sites and distributing malware—even if the malware is not targeted at Mac OS X. • Reduces exposure to web-based threats, including fast-spreading Mac-targeting malware • Adheres to Mac OS X look and feel for positive user experience • Saves time and effort with centralized management across endpoints, including Macs |
Feature 08 | Virtual Desktop Infrastructure (VDI) Module Lets you consolidate your endpoint security into one solution for both physical and virtual desktops. • Recognizes whether an agent is on a physical or virtual endpoint and optimizes protection and performance for its specifc environment • Serializes scans and updates, and whitelists base images and previously scanned content to preserve the host resources |
Feature 09 | Endpoint Encryption Option Ensures data privacy by encrypting data stored on your endpoints—including PCs, Macs, DVDs, and USB drives, which can easily be lost or stolen. Trend Micro™ Endpoint Encryption provides the data security you need with fulldisk encryption, folder and fle encryption, and removable media encryption. • Protects data at rest with full-disk encryption software • Automates data management with selfencrypting hard drives • Encrypts data in specifc fles, shared folders, removable media • Sets granular policies for device control and data management • Manages Microsoft Bitlocker and Apple FileVault |
Feature 10 | Vulnerability Protection Option Stops zero-day threats immediately on your physical and virtual desktops and laptops— on and off the network. Using host-based intrusion prevention system (HIPS), Trend Micro™ Vulnerability Protection shields against known and unknown vulnerabilities before a patch is available or deployable. Extends protection to critical platforms, including legacy operating systems such as Windows XP. • Eliminates risk exposure by shielding vulnerabilities with virtual patching • Reduces down-time for recovery and emergency patching • Allows patching on your own terms and timelines • Identifes security vulnerabilities with reporting based on CVE, MS-ID, severity |
Feature 11 | Endpoint Application Control Option Enhances your defenses against malware andtargeted attacks by preventing unwanted and unknown applications from executing on your corporate endpoints. • Protects users or machines from executing malicious software • Dynamic policies reduce management impact and allow flexibility for active user environments • Locks down systems to only the applications that your organizations wants used • Uses correlated threat data from billions of fles to create and maintain an up-to-date database of validated, good applications |
Feature 12 | Endpoint Sensor Option Provides context-aware endpoint investigation and forensic capabilities, recording and reporting detailed system-level activities to allow threat analysts to rapidly assess the nature and extent of an attack. Deep Discovery’s custom detection, intelligence, and controls enable you to: • Detect and analyze your attackers • Immediately adapt protection against attack • Rapidly respond before sensitive data is lost |
This high-performance XGen™ endpoint security suite protects virtual and physical desktops against today’s evolving threat landscape using the broadest range of anti-malware techniques including high-fidelity machine learning and behavior analysis to stop ransomware and other attacks. Multiple layers of threat and data security protect your users and corporate information across all devices and applications.