Top Rated Trend Micro Cloud App Security Alternatives
44 Trend Micro Cloud App Security Reviews
Overall Review Sentiment for Trend Micro Cloud App Security
Log in to view review sentiment.
It provide Advanced threat prevention for Email Review collected by and hosted on G2.com.
Message tracking logs can not be get with in the standard license. Review collected by and hosted on G2.com.

This is very useful for protecting data and secure user data in our application before this we are using extra condition and validation for user data security but when we have use in our application then resolve all the issue and good protection for user data and secure all our data in our application . Review collected by and hosted on G2.com.
As per my observation when we are using this then sone limits are there and we can use in operating system and server level of our server is window . Review collected by and hosted on G2.com.
User Friendly.
helpful protection
tens free Review collected by and hosted on G2.com.
a little bit annoying.
need improvement. Review collected by and hosted on G2.com.

1) Be protected from any kind of risk coming from the email better than the native tool by Google workspace and o365.
2)Can be easily implemented and integrated to other tools.
3)The tech support by them is really good.
4)The best feature is email encryption this the sensitive data shared through mail remains ensured. Review collected by and hosted on G2.com.
1) For our few clients it's interface was bit complex.
2)Also Reporting analytics can be improved. Review collected by and hosted on G2.com.
Trend Micro opens our eyes to cloud variabilities and also suggests solutions for that.
It's suggested use to save our time. Trend Micro is having best customer support.
They provide other security solutions like endpoint security.
It is very easy to administer all users and configurations on a single dashboard. Review collected by and hosted on G2.com.
Sometimes I have found langs during the investigation.
The admin interface has scope for improvement.
Once you put the config on Trend Micro it use to take some time to sync over clouds.
I have not found many issues there. Review collected by and hosted on G2.com.

Protecting the applications over the cloud is one of the most significant challenges many organizations are facing; Trend Micro Cloud app security help us not only to protect the cloud applications but to protect the app data as well with very minimal effort. Review collected by and hosted on G2.com.
The overall solution is good; one thing which Trend Micro can improve is its Dashboard and reporting. The reports can be customizable and more meaningful so that we should know the exact area we need to focus on. Review collected by and hosted on G2.com.

The best thing about this product is how fast the performance is. It also offers great tools for free that other programs charge extra for. The price is also more reasonable than the competing software. Review collected by and hosted on G2.com.
I dislike the lack of the two features that are a must for me. There is no PC backup that I can utilize. I can get at least 50GB of backup services on other software. In addition, webcam protection is only offered for the Mac, which puts non-Apple users at risk. Review collected by and hosted on G2.com.

Provide Data leakage protection
Effective ransomware attacks
Email security for Business mail
External threats detection Review collected by and hosted on G2.com.
Slow service support takes more than a week
High price Review collected by and hosted on G2.com.
1. Maintains data security.
2. Maintains the Privacy and Control of the data in the cloud apps.
3. Detects advanced attacks and hidden threats.
4. Scans Mails and attachments thoroughly to prevent the malware.
5. Opens Risky files in a virtual cloud sandbox environment to avoid the risk of being malicious to the device. Review collected by and hosted on G2.com.
1. Their web support is not strong as phone support.
2. Remote endpoints don't have a strong and constant internet connection. Review collected by and hosted on G2.com.

The application prevents threats and ransomware attacks and provides a centralized dashboard for monitoring and managing the critical workloads of setting up and integrate with cloud applications. Review collected by and hosted on G2.com.
This application sometimes goes into a hung state during installation, making the server run slowly. Also, it's a bit tricky to pull out the Syslog reports. Even reaching out to support is delayed. Review collected by and hosted on G2.com.