This article compares the features of the Apex One family, which includes:
- Apex One On-Premise
- Apex One as a Service
The following table provides a comparison of features for Co-Exist and Exclusive in the Apex family.
Feature | Module | SaaS | On-Premise | |||
---|---|---|---|---|---|---|
Co-Exist | Exclusive | Co-Exist | Exclusive | |||
Prevention | Web Reputation Service | Anti-Malware | ✔ | ✔ | ✔ | ✔ |
Anti-Malware | Anti-Malware | ✘ | ✔ | ✘ | ✔ | |
Pre-Execution Machine Learning | Anti-Malware | ✔ | ✔ | ✔ | ✔ | |
Behavior Monitoring | Anti-Malware | ✘ | ✔ | ✘ | ✔ | |
Attack Discovery (IOA) | Endpoint Sensor | ✔ | ✔ | ✔ | ✔ | |
Anti-Exploit | Anti-Malware | ✘ | ✔ | ✘ | ✔ | |
Runtime Machine Learning | Anti-Malware | ✘ | ✔ | ✘ | ✔ | |
Firewall | Anti-Malware | ✘ | ✔ | ✘ | ✔ | |
Device Control | Anti-Malware | ✘ | ✔ | ✘ | ✔ | |
Data Loss Prevention | Anti-Malware | ✘ | ✔ | ✘ | ✔ | |
Application Control | Application Control | ✔ | ✔ | ✔ | ✔ | |
Virtual Patch | Vulnerability Protection | ✔ | ✔ | ✔ | ✔ | |
Detection | VASO - IP, URL, DNS, File | Anti-Malware | ✔1 | ✔ | ✔1 | ✔ |
UDSO - IP, URL, DNS, File | Anti-Malware | ✔1 | ✔ | ✔1 | ✔ | |
UDSO - SHA1/256 | Application Control | ✔ | ✔ | ✔ | ✔ | |
Sample Submission | Anti-Malware | ✔2 | ✔ | ✔2 | ✔ | |
Attack Discovery (IOC) | Endpoint Sensor | ✔ | ✔ | ✔ | ✔ | |
Response | Kill Chain | Endpoint Sensor | ✔ | ✔ | ✔ | ✔ |
Network Isolation (Kill Chain) | Anti-Malware | ✔ | ✔ | ✔ | ✔ | |
Application Ban (Kill Chain) | Application Control | ✔ | ✔ | ✔ | ✔ | |
Process Termination (Kill Chain) | Endpoint Sensor | ✔ | ✔ | ✔ | ✔ | |
UDSO - IP, DNS, SHA1/256 (Kill Chain) | Endpoint Sensor | ✔ | ✔ | ✔ | ✔ | |
Sweeping (IOC, YARA, STIX) | Endpoint Sensor | ✔ | ✔ | ✔ | ✔ |
2 Only supports USB Autorun
The following table provides a comparison of the EDR events between specific Apex One features that have been disabled and Apex One.