Endpoint Application Control: Trend Micro
Endpoint Application Control: Trend Micro
Trend Micro™
Organizations are becoming increasingly aware that traditional signature-based antivirus software
approaches do not provide adequate defense against modern threats and targeted attacks.
Protection Points
This is exacerbated by the hundreds of thousands of new malicious software applications
•• Endpoints
being rolled out daily, making it extremely difficult to protect against all potential threats.
•• Servers
Without proper protection, you risk losing private company data that resides on endpoints.
•• Embedded and Point of Sale
In addition, the machines can be used as a springboard for malicious threats to enter
(POS) devices
the network. This increases the need to safeguard data and machines against both
inadvertent end-user behavior or unauthorized infiltration and the resulting execution Threat Protection
of new unwanted or malicious applications. •• Vulnerability Exploits
•• Malicious Applications (executables,
Trend Micro Endpoint Application Control allows you to enhance your defenses against DLLs, device drivers, Windows® store
malware and targeted attacks by preventing unknown and unwanted applications from apps, and others)
executing on your corporate endpoints. With a combination of flexible, dynamic policies,
whitelisting and blacklisting capabilities, as well as an extensive application catalog, this
easy-to-manage solution significantly reduces your endpoint attack exposure. For even
greater insight into threats, user-based visibility and policy management are available in the
local administration console or in the centrally-managed Trend Micro™ Control Manager™.
key features
Enhanced protection defends against malware, •• Uses intelligent and dynamic policies that •• Ensures that patches/updates associated
targeted attacks, and zero-day threats still allow users to install valid applications with whitelisted applications can be installed,
based on reputation-based variables like the as well as allowing your update programs
•• Prevents potential damage from unwanted prevalence, regional usage, and maturity of to install new patches/updates, with trusted
or unknown applications (executables, DLLs, the application sources of change
Windows App store apps, device drivers,
control panels, and other Portable Executable •• Provides greater insight into threat outbreaks •• Features roll-your-own application
(PE) files) with user-based visibility, policy management, whitelisting and blacklisting for in-house
and log aggregation. Enables reporting and unlisted applications
•• Provides global and local real-time threat across multiple layers of Trend Micro security
intelligence based on good file reputation •• Delivers unparalleled breadth of applications
solutions through Control Manager
data correlated across a global network and good file data
•• Easily deployed using existing OfficeScan
•• Interconnects with additional layers of endpoint security or other third-party
security to better correlate threat data Compliance with internal IT policies helps
deployment tools
and stop more threats, more often reduce legal and financial liabilities
•• Categorizes the applications and provides
•• Leverages threat data analyzed and correlated regular updates to simplify administration •• Limits application usage to a specific list
from 347 million unique files and 4+ billion using Trend Micro’s Certified Safe of applications supported by data loss
good file records (Trend Micro™ Smart Software Service prevention (DLP) products for specific
Protection Network™) users or endpoints
•• Integrates with Trend Micro Complete User •• Collects and limits application usage for
In-depth whitelisting and blacklisting blocks
Protection to complement antivirus, host software licensing compliance
unknown and unwanted applications
intrusion prevention, data loss prevention,
•• Features system lockdown to harden
mobile security, and more •• Uses application name, path, regular
end-user systems by preventing new
expression, or certificate for basic
applications from being executed
application whitelisting and blacklisting
Simplified management speeds protection
•• Contains broad coverage of pre-categorized
•• Increases convenience of implementing applications that can be easily selected
granular control with a customizable from Trend Micro’s application catalog
dashboard and management console (with regular updates)