Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Cynet All-in-One Cybersecurity Platform Reviews & Ratings
    372 Ratings
    Company Website
  • Cisco Duo Reviews & Ratings
    1,313 Ratings
    Company Website
  • Aikido Security Reviews & Ratings
    71 Ratings
    Company Website
  • Cisco Umbrella Reviews & Ratings
    1,154 Ratings
    Company Website
  • DriveLock Reviews & Ratings
    1 Rating
    Company Website
  • Heimdal Endpoint Detection and Response (EDR) Reviews & Ratings
    54 Ratings
    Company Website
  • PowerDMARC Reviews & Ratings
    148 Ratings
    Company Website
  • ESET PROTECT Advanced Reviews & Ratings
    1,051 Ratings
    Company Website
  • Carbon Black EDR Reviews & Ratings
    281 Ratings
    Company Website
  • ManageEngine ADAudit Plus Reviews & Ratings
    397 Ratings
    Company Website

What is Trend Micro Apex Central?

Centralized security management serves to unify the frequently fragmented IT and SOC teams, promoting a more integrated strategy for security and deployment efforts. Embracing this interconnected framework allows companies to improve their security posture and visibility, while also streamlining processes and reducing redundant tasks in security oversight, ultimately resulting in a more fortified defense and an improved experience for users. By leveraging visual timelines, this approach helps spot patterns of threat activity across all devices and organizational units, effectively addressing any possible vulnerabilities. Moreover, this system contributes to lower overall security management costs by alleviating the burden on IT staff and allowing them to focus on more critical tasks. With a single console at your disposal, there’s no need for constant transitions between different tools; you can set policies, monitor threats and data protection, and perform thorough investigations all from one unified interface. This holistic strategy not only offers a cohesive view of your security status through continuous monitoring and centralized insights but also fosters collaboration between teams. Additionally, the system is crafted for easy integration with existing SOC frameworks, thereby bolstering joint efforts to protect your organization from potential threats. As a result, organizations can not only enhance their security measures but also cultivate a more efficient workflow across departments.

What is BloxOne Threat Defense?

BloxOne Threat Defense bolsters brand security by enhancing your existing protections, ensuring your network is secure while providing vital coverage for critical digital domains such as SD-WAN, IoT, and the cloud. This cutting-edge solution supports security orchestration, automation, and response (SOAR), which significantly shortens the time needed to investigate and address cyber threats. Additionally, it streamlines the overall security architecture and reduces the costs associated with enterprise-level threat defense. By converting essential network services that drive business functions into important security assets, it utilizes services like DNS, DHCP, and IP address management (DDI), which are crucial for all IP-based communication. Infoblox positions these services as essential building blocks, allowing your complete security system to operate seamlessly and at scale, which enhances early detection and rapid response to potential threats. Furthermore, this integration equips your organization to swiftly adjust to the fast-evolving digital environment while ensuring a strong defense against cyber vulnerabilities, ultimately fortifying your overall cybersecurity posture. Embracing this advanced solution not only protects your assets but also instills confidence in your stakeholders.

Media

Media

Integrations Supported

Amazon Web Services (AWS)
Apache CloudStack
AriLinc
Checkmk
Chronicle SOAR
Docker
Google Cloud Platform
IBM Cloud
Infoblox DDI
Infoblox IPAM
Kubernetes
Microsoft 365
Microsoft Azure
Optiv Managed XDR
Rackspace OpenStack
SQL Server
Seconize DeRisk Center
Trend Micro ServerProtect
VMware Cloud

Integrations Supported

Amazon Web Services (AWS)
Apache CloudStack
AriLinc
Checkmk
Chronicle SOAR
Docker
Google Cloud Platform
IBM Cloud
Infoblox DDI
Infoblox IPAM
Kubernetes
Microsoft 365
Microsoft Azure
Optiv Managed XDR
Rackspace OpenStack
SQL Server
Seconize DeRisk Center
Trend Micro ServerProtect
VMware Cloud

API Availability

Has API

API Availability

Has API

Pricing Information

$37.75 per user
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Trend Micro

Date Founded

1989

Company Location

Japan

Company Website

www.trendmicro.com/en_us/business/technologies/control-manager.html

Company Facts

Organization Name

Infoblox

Date Founded

1999

Company Location

United States

Company Website

www.infoblox.com/products/bloxone-threat-defense/

Categories and Features

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Categories and Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

DDoS Protection

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Popular Alternatives

Trend Vision One Reviews & Ratings

Trend Vision One

Trend Micro

Popular Alternatives

BlueCat Edge Reviews & Ratings

BlueCat Edge

BlueCat