Skip to content

Trend Micro Vulnerability Protection

Advanced Vulnerability Shielding for Endpoints

Vulnerability Protection

Keep your endpoints shielded until patches can be deployed, or indefinitely for out-of-support or un-patchable systems. We’ll help you prevent vulnerabilities from being exploited with easy- and fast-to-deploy filters. So you get full protection until you can deploy patches when it makes most sense for your business.


Cover exploits with virtual patching at the endpoint

Get earlier, stronger endpoint protection when you supplement client-level antivirus and anti-malware security with pro-active virtual patching. A high-performance, deep-packet inspection engine monitors incoming and outgoing traffic for network protocol deviations, suspicious content that signals an attack, or security policy violations. Plus, Vulnerability Protection is integrated with Trend Micro Complete User Protection solutions which strengthens your defenses with multiple layers of interconnected protection.

  • Eliminates risk exposure due to missing patches
  • Extends the life of legacy and end-of-support operating systems like Windows XP
  • Reduces downtime for recovery with incremental protection against zero-day attacks
  • Allows patching on your own terms and timelines
  • Lowers potential legal exposure by improving data security compliance
  • Enhances firewall protection for remote and mobile enterprise endpoints

Other Key Features

  1. Defend against advanced threats. Blocks known and unknown vulnerability exploits before patches are deployed on systems that hold sensitive data, critical to regulatory and corporate policy compliance.
  2. Remove bad data from business-critical traffic. Ensures delivery of business-critical communications with low false positives by filtering forbidden network traffic and ensuring allowed traffic.
  3. Get earlier protection. Provides protection before patches are deployed using attack blocking, vulnerability shielding, and malicious traffic detection.
  4. Deploy and manage within your existing infrastructure. Simply and easily deploys with existing endpoint security solutions and streamlines management with a simplified dashboard and management console.

Systems Requirements

Vulnerability Protection Manager (server)
Server Operating System

  • Microsoft Windows 2012 R2 (64-bit)
  • Microsoft Windows 2012 (64-bit)
  • Windows Server 2008 R2 (64-bit)
  • Windows Server 2008 (32-bit and 64-bit)
  • Windows 2003 Server SP2 (32-bit and 64-bit)
  • Windows 2003 Server R2 SP2 (32-bit and 64-bit)

 

Server Platform

  • Memory: 4 GB (8 GB recommended)
  • Disk Space: 1.5 GB (5 GB recommended)

 

Web Browser

  • Firefox 12+
  • Internet Explorer 9.x & 10.x
  • Chrome 20+

Note: Cookies must be enabled on all browsers



Vulnerability Protection Agent

Agent Operating System

  • Windows 8.1 (32-bit and 64-bit)
  • Windows Server 2012 R2 (64-bit)
  • Windows 8 (32-bit and 64-bit)
  • Windows Server 2012 (64-bit)
  • Windows 7 (32-bit and 64-bit)
  • Windows Server 2008 R2 (64-bit)
  • Windows Server 2008 (32-bit and 64-bit)
  • Windows Vista (32-bit and 64-bit)
  • Windows Server 2003 SP1 (32-bit and 64-bit) patched with "Windows Server 2003 Scalable Networking Pack"
  • Windows Server 2003 SP2 (32-bit and 64-bit)
  • Windows Server 2003 R2 SP2 (32-bit and 64-bit)
  • Windows XP (32 bit and 64 bit)

 

Agent Platform

  • Memory: 128 MB
  • Disk Space: 500 MB

Social Media

Connect with us on