Product Avatar Image

Trend Micro

Show rating breakdown
851 reviews
  • 36 profiles
  • 40 categories
Average star rating
4.3
#1 in 2 categories
Grid® leader
Serving customers since
1988
Profile Type
Category

All Profiles

Profile Filters
Profile Type
Category
Product Avatar Image
IM Security for Microsoft Skype for Business

13 reviews

Trend Micro IM Security provides threat and data protection for Microsoft Skype for Business servers. Top-rated malware and URL filtering block phishing messages and malicious file transfers. Built-in Data Loss Prevention (DLP) controls the sharing of sensitive data. Minimize risk exposure with messaging content filters that warn users of unprofessional behavior. This real-time security solution also helps avoid conflicts of interest with communication controls to enforce blocks or ethical walls.

Product Avatar Image
Worry-Free Advanced

13 reviews

Trend Micro, a global leader in security software and solutions, strives to make the world safe for exchanging digital information.

Product Avatar Image
Scanmail

12 reviews

ScanMail Suite for IBM Domino stops highly targeted email attacks, such as spear phishing, by using document exploit detection, enhanced web reputation, and sandboxing as part of a custom APT defense. ScanMail also blocks traditional threats with reputation technology and correlated global threat intelligence from Trend Micro Smart Protection Network cloud-based security.

Product Avatar Image
Deep Discovery Inspector

10 reviews

Deep Discovery Analyzer Extend the value of your security investments with custom sandboxing

Product Avatar Image
Cleaner One Pro

10 reviews

Cleaner One Pro is an all-in-one disk cleaning and optimization utility.Available on both Mac and Windows Platform.With the minimalist and easy-to-use interface, you can visualize, manage and free up your storage space in just one click. Cleaner One Pro also provides some advanced features including start up manager, application manager. Keep your computer clean and automatically tune it up for the best performance.

Product Avatar Image
Managed XDR (MDR)

4 reviews

Managed XDR Augment threat detection with expertly managed detection and response (MDR) for email, endpoints, servers, cloud workloads, and networks

Product Avatar Image
You’re seeing this ad based on the product’s relevance to this page. Sponsored content does not receive preferential treatment in any of G2’s ratings.

The Data Krypter

0 reviews

Product Description

Keep your data secure well into the future when quantum computers become mainstream. -encrypts files, folders and blocks of text -when encrypting a file/folder, you can: - -give the file/folder a random name - -securely erase the original -makes your data useless to an attacker in case you are ever a victim of ransomware. But you need to prepare ahead of time by encrypting your sensitive files. Then the attacker cannot: - -use your data or - -threaten to make your files public -you can receive encrypted files from someone else and only one of you needs to have a paid version (or a non-expired trial version) of the Data Krypter. i.e. an accountant or lawyer pays for the software and all their clients can send encrypted files with a trial version (even if it has expired). -even if someone has access to your computer they can&#39;t decrypt your files because your: - -master password is encrypted - -private keys are encrypted - -secret keys are encrypted (stored only to help recover keys). -symmetric encryption (the same secret key to encrypt and decrypt) using PERNG -asymmetric encryption (public/private keys) using NTRU-2x2 -no back door<br>

Profile Name

Star Rating

591
232
54
6
5

Trend Micro Reviews

Review Filters
Profile Name
Star Rating
591
232
54
6
5
AM
Azizullah M.
12/19/2023
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review

TrendMicro Vision One XDR with intelligence

TrendMicro Vision One XDR uses holistic approach to detect and respond. it collects and correlates deep activities across the layers like – email, endpoint, server, cloud workloads, and network. The platform automates the analysis and detects threats faster. As a result, security analysts enjoy data at tips and able to conduct through investigations.
Richa T.
RT
Richa T.
Project Manager (Associate) at Enveu
12/19/2023
Validated Reviewer
Review source: G2 invite
Incentivized Review

Cloud edge Review

The best thing about it is it's real time monitoring,it has best threat protection and also they provide time to time update that best
JD
Jonathan D.
12/19/2023
Validated Reviewer
Verified Current User
Review source: Organic Review from User Profile
Incentivized Review
Translated Using AI

Use in a park of 180 machines

Apex One allows centralized management of client machine security, it allows us to supervise the 180 machines in our network, the trendmicro agent autoupdate saves time. The console is comprehensive and easy to use. We have been using it daily for 4 years now without particular difficulties.

About

Contact

HQ Location:
Tokyo

Social

@trendmicro

What is Trend Micro?

Trend Micro, a global leader in security software and solutions, strives to make the world safe for exchanging digital information. For the past 25 years, its employees have been inspired to protect individuals, families, businesses and governments as they look to harness the potential of emerging technologies and new ways of sharing information. In today’s organizations, information has become the most strategic asset, embodying competitive advantage and powering operational excellence. With the explosion of mobile, social and cloud technologies, protecting this information has become more challenging than ever. Organizations need a smart protection strategy. Trend Micro enables the smart protection of information, with innovative security solutions that are simple to deploy and manage, and fits an evolving ecosystem. Trend Micro solutions provide layered content security for mobile devices, endpoints, gateways, servers and the cloud. Leveraging these solutions, organizations can protect their end users, their evolving data center and cloud resources, and their information threatened by sophisticated targeted attacks.

Details

Year Founded
1988
Ownership
OTCMKTS:TMICY