For Trend Micro Apex One™ Customers
Experience the value of Trend Micro™ XDR across endpoints and email
Get access to XDR capabilities for 10% of Apex One endpoints and Office 365® mailboxes
WHO is eligible?*
- Add XDR for 50 endpoints or 10% of their licensed endpoints (whichever is more) for the length of their contract.
- Add Trend Micro™ Cloud App Security (if not already a customer) and XDR for 50 Office 365® mailboxes or equal to 10% of your licensed Apex One endpoints (whichever is more).
WHAT will the complimentary XDR licenses for Apex One and Cloud App Security offer?*
Enhanced Detection: Identifies and notifies the user of detected threats across selected endpoints and mailboxes. Powerful detection rules correlate multiple, low confidence events, behaviors, and actions to better detect malicious activity.
Integrated Investigation: Able to run an investigation, look at the execution profile of an attack (including associated MITRE ATT&CK TTPs), and identify the scope of impact across the endpoints and mailboxes.
IoC Sweeping: Can automatically sweep for indicators of compromise (IOCs) to identify threats, as well as allow for ad hoc queries and custom searches across multiple parameters.
Section 1 - Column 2. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Section 1 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Section 1 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
For Trend Micro™ Deep Security™ software Customers
Experience the value of XDR across servers, endpoints, and email
Get access to XDR for servers, PLUS 50 endpoints and Office 365® mailboxes
WHO is eligible?**
- Access the XDR cloud platform to see detailed detections data for all of their Deep Security agents, for the remaining term of their Deep Security contract (for a maximum term of one year).
- Add XDR for 50 endpoints
- Can be enabled on top of third-party endpoint security; OR
- Can be enabled on top of Apex One (SaaS or on-premises) or Deep Security software for 50 Windows® endpoints and servers or equal to 10% of licensed Apex One endpoints, whichever is more.
- Add Cloud App Security (if not already a customer) and XDR for 50 Office 365® mailboxes or equal to 10% of your licensed Apex One endpoints (whichever is more).
WHAT will the complimentary XDR licenses for Deep Security, Cloud App Security, and Endpoint offer?**
Enhanced Detection: Identifies and notifies the user of detected threats across selected servers, endpoints, and mailboxes. Powerful detection rules correlate multiple, low confidence events, behaviors, and actions to better detect malicious activity.
Impact Analysis: Identify the scope of impact across servers, endpoints, and mailboxes.
IoC Sweeping: Can automatically sweep for IoCs across endpoints and emails to identify threats, as well as allow for ad hoc queries and custom searches across multiple parameters.
Section 2 - Column 2. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Section 2 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Section 2 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
We want you to experience Trend Micro XDR so you can have a taste of what it can offer and determine for yourself the value it can bring to your organization.
Given the current environment, we believe now, more than ever, is an opportune time to leverage XDR as part of your endpoint and email deployment to improve security effectiveness and efficiency.
Learn more about Trend Mico™ XDR—extended detection and response
Section 3 - Column 2. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Section 3 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Section 3 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
After applying the latest version/patch, simply log in to Apex One or Deep Security and follow the instructions provided via the in-product notification, which will take you through:
- Creating an XDR account in a few simple steps
- Selecting the targeted endpoints, mailboxes, and servers as applicable
- Touring of the XDR platform with an in-product tutorial
NOTE:
- Apex One on-premises customers must apply the Apex One patch 3 to enable XDR access.
- Deep Security customers must apply the Deep Security Manager 20 update 2 to enable XDR access.
Section 4 - Column 2. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Section 4 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Section 4 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
* Conditions
- Eligible to Europe customers whose Apex One License seat count is greater than 100.
- Endpoint XDR offer eligible to customers without Endpoint Sensor or XDR: Endpoint and Server (formerly XDR Add-on: Apex One as a Service).
- Email XDR offer eligible to customers without XDR Add-on: Cloud App Security license who are deploying the Endpoint XDR complimentary license.
- Cloud App Security provides quick and easy API integration to Office 365 and can be deployed alongside email gateway products. Cloud App Security requires no change to the company’s MX record.
- Licenses enable Windows® endpoint agents to send activity data to the XDR cloud data lake and provides access to the XDR SaaS platform.
- Includes 30-day data retention.
- Complimentary XDR licenses do not include initiating response options from the platform (e.g. isolating endpoints, retrieving files, etc.).
**Conditions
- Deep Security detections data for anti-malware, firewall, IDS/IPS, integrity monitoring, and etc, depends on the Deep Security license purchased and what has been configured in the product.
- Complimentary XDR with both Deep Security and Apex One expires with either the Deep Security or Apex One renewal, whichever expires latest with a maximum term of one year.
- Deep Security XDR offer eligible to customers utilizing the software version. Customers with Trend Micro Cloud One™ – Workload Security (previously known as Trend Micro™ Deep Security™ as a Service) are not eligible.
- Email XDR offer eligible to customers without XDR Add-on: Cloud App Security license.
- Cloud App Security provides quick and easy API integration to Office 365 and can be deployed alongside email gateway products.
- Deep Security XDR complimentary licenses enable XDR-enabled agents to forward detection logs to the XDR cloud data lake and provides access to the XDR SaaS platform.
- Complimentary licenses across the products do not include initiating response options from the platform (e.g. isolating endpoints, retrieving files, etc.).
Section 5 - Column 2. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Section 5 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Section 5 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.