Product Avatar Image

Trend Micro

Show rating breakdown
851 reviews
  • 36 profiles
  • 40 categories
Average star rating
4.3
#1 in 2 categories
Grid® leader
Serving customers since
1988
Profile Type
Category

All Profiles

Profile Filters
Profile Type
Category
Product Avatar Image
Trend Micro TippingPoint

26 reviews

Trend Micro TippingPoint integrates with the Deep Discovery Advanced Threat Protection Solution to detect and block targeted attacks and malware through preemptive threat prevention, threat insight and prioritization, and real-time enforcement and remediation.

Product Avatar Image
Trend Micro Web Security

21 reviews

Trend Micro Secure Web Gateway is designed to protect users and their information from web-based threats.

Product Avatar Image
Trend Micro ServerProtect

21 reviews

ServerProtect scans and detects malware in real time and incorporates cleanup capabilities to help remove malicious code and repair system damage. Administrators can use one management console to centrally enforce, administer, and update malware protection on every server throughout an organization. This robust solution enables enterprises to secure the entire server file system including compressed archives, distribute virus patterns to remove any viruses that get through, and help automate the damage cleanup process to resolve problems left by virus infections.

Product Avatar Image
Cloud Edge

17 reviews

Cloud Edge Unified threat management as a service for managed service providers

Product Avatar Image
Trend Micro Deep Discovery

17 reviews

Deep Discovery Inspector is available as a physical or virtual network appliance. It's designed to quickly detect advanced malware that typically bypasses traditional security defenses and exfiltrates sensitive data. Specialized detection engines and custom sandbox analysis detect and prevent breaches.

Product Avatar Image
Trend Vision One - XDR for Networks

17 reviews

Powered by XGen security, Trend Micro Network Defense goes beyond next-gen IPS to provide a blend of cross-generational techniques that apply the right technology at the right time to deliver integrated detection and prevention of known, unknown and undisclosed threats.

Product Avatar Image
You’re seeing this ad based on the product’s relevance to this page. Sponsored content does not receive preferential treatment in any of G2’s ratings.

The Data Krypter

0 reviews

Product Description

Keep your data secure well into the future when quantum computers become mainstream. -encrypts files, folders and blocks of text -when encrypting a file/folder, you can: - -give the file/folder a random name - -securely erase the original -makes your data useless to an attacker in case you are ever a victim of ransomware. But you need to prepare ahead of time by encrypting your sensitive files. Then the attacker cannot: - -use your data or - -threaten to make your files public -you can receive encrypted files from someone else and only one of you needs to have a paid version (or a non-expired trial version) of the Data Krypter. i.e. an accountant or lawyer pays for the software and all their clients can send encrypted files with a trial version (even if it has expired). -even if someone has access to your computer they can&#39;t decrypt your files because your: - -master password is encrypted - -private keys are encrypted - -secret keys are encrypted (stored only to help recover keys). -symmetric encryption (the same secret key to encrypt and decrypt) using PERNG -asymmetric encryption (public/private keys) using NTRU-2x2 -no back door<br>

Profile Name

Star Rating

591
232
54
6
5

Trend Micro Reviews

Review Filters
Profile Name
Star Rating
591
232
54
6
5
Sudhanshu G.
SG
Sudhanshu G.
Sr. SEO Executive @ Policybazaar || Ex- Cars24
09/27/2023
Validated Reviewer
Review source: G2 invite
Incentivized Review

Best Internet Security Antivirus for PC & Laptop

I like this software because of it mininmizes the risk of spyware-related slowdowns, & crashes. Its vesy easy to use with a strong customer support team.
Sumit S.
SS
Sumit S.
Senior Executive - Digital Marketing (SEO) at PolicyBazaar | Ex - HealthKart| Ex- Paisabazaar
09/27/2023
Validated Reviewer
Review source: G2 invite
Incentivized Review

Best Cloud Security & Endpoint Cybersecurity Software

Trend Micro is a best antivirus software for enterprises. it help us to protect from unwanted cyber threat and viruses. Our team is implemented it very quickly with the support of customer team.
JV
Jaydeepsinh V.
09/26/2023
Validated Reviewer
Verified Current User
Review source: G2 invite
Incentivized Review

TrendMicro Hybrid Cloud Security one stop solutions for Cloud Security

TM-Cloud Hybrid Security supports all the Operating System platform. Either you are using Server hosted in On-premises or VmWare, Hyper-V or on Cloud. Your Server will be protected as it supports all these plarforms. Deployment process is efficent and easy to enforce. Security Agent is light weight at the same time Protection modules offeres efficeint protection along with compliance need fullfillment.

About

Contact

HQ Location:
Tokyo

Social

@trendmicro

What is Trend Micro?

Trend Micro, a global leader in security software and solutions, strives to make the world safe for exchanging digital information. For the past 25 years, its employees have been inspired to protect individuals, families, businesses and governments as they look to harness the potential of emerging technologies and new ways of sharing information. In today’s organizations, information has become the most strategic asset, embodying competitive advantage and powering operational excellence. With the explosion of mobile, social and cloud technologies, protecting this information has become more challenging than ever. Organizations need a smart protection strategy. Trend Micro enables the smart protection of information, with innovative security solutions that are simple to deploy and manage, and fits an evolving ecosystem. Trend Micro solutions provide layered content security for mobile devices, endpoints, gateways, servers and the cloud. Leveraging these solutions, organizations can protect their end users, their evolving data center and cloud resources, and their information threatened by sophisticated targeted attacks.

Details

Year Founded
1988
Ownership
OTCMKTS:TMICY