Product Avatar Image

Trend Micro

Show rating breakdown
851 reviews
  • 36 profiles
  • 40 categories
Average star rating
4.3
#1 in 2 categories
Grid® leader
Serving customers since
1988
Profile Type
Category

All Profiles

Profile Filters
Profile Type
Category
Product Avatar Image
IM Security for Microsoft Skype for Business

13 reviews

Trend Micro IM Security provides threat and data protection for Microsoft Skype for Business servers. Top-rated malware and URL filtering block phishing messages and malicious file transfers. Built-in Data Loss Prevention (DLP) controls the sharing of sensitive data. Minimize risk exposure with messaging content filters that warn users of unprofessional behavior. This real-time security solution also helps avoid conflicts of interest with communication controls to enforce blocks or ethical walls.

Product Avatar Image
Worry-Free Advanced

13 reviews

Trend Micro, a global leader in security software and solutions, strives to make the world safe for exchanging digital information.

Product Avatar Image
Scanmail

12 reviews

ScanMail Suite for IBM Domino stops highly targeted email attacks, such as spear phishing, by using document exploit detection, enhanced web reputation, and sandboxing as part of a custom APT defense. ScanMail also blocks traditional threats with reputation technology and correlated global threat intelligence from Trend Micro Smart Protection Network cloud-based security.

Product Avatar Image
Deep Discovery Inspector

10 reviews

Deep Discovery Analyzer Extend the value of your security investments with custom sandboxing

Product Avatar Image
Cleaner One Pro

10 reviews

Cleaner One Pro is an all-in-one disk cleaning and optimization utility.Available on both Mac and Windows Platform.With the minimalist and easy-to-use interface, you can visualize, manage and free up your storage space in just one click. Cleaner One Pro also provides some advanced features including start up manager, application manager. Keep your computer clean and automatically tune it up for the best performance.

Product Avatar Image
Managed XDR (MDR)

4 reviews

Managed XDR Augment threat detection with expertly managed detection and response (MDR) for email, endpoints, servers, cloud workloads, and networks

Product Avatar Image
You’re seeing this ad based on the product’s relevance to this page. Sponsored content does not receive preferential treatment in any of G2’s ratings.

The Data Krypter

0 reviews

Product Description

Keep your data secure well into the future when quantum computers become mainstream. -encrypts files, folders and blocks of text -when encrypting a file/folder, you can: - -give the file/folder a random name - -securely erase the original -makes your data useless to an attacker in case you are ever a victim of ransomware. But you need to prepare ahead of time by encrypting your sensitive files. Then the attacker cannot: - -use your data or - -threaten to make your files public -you can receive encrypted files from someone else and only one of you needs to have a paid version (or a non-expired trial version) of the Data Krypter. i.e. an accountant or lawyer pays for the software and all their clients can send encrypted files with a trial version (even if it has expired). -even if someone has access to your computer they can&#39;t decrypt your files because your: - -master password is encrypted - -private keys are encrypted - -secret keys are encrypted (stored only to help recover keys). -symmetric encryption (the same secret key to encrypt and decrypt) using PERNG -asymmetric encryption (public/private keys) using NTRU-2x2 -no back door<br>

Profile Name

Star Rating

591
232
54
6
5

Trend Micro Reviews

Review Filters
Profile Name
Star Rating
591
232
54
6
5
Sudhanshu G.
SG
Sudhanshu G.
Sr. SEO Executive @ Policybazaar || Ex- Cars24
09/27/2023
Validated Reviewer
Review source: G2 invite
Incentivized Review

Best Internet Security Antivirus for PC & Laptop

I like this software because of it mininmizes the risk of spyware-related slowdowns, & crashes. Its vesy easy to use with a strong customer support team.
Sumit S.
SS
Sumit S.
Senior Executive - Digital Marketing (SEO) at PolicyBazaar | Ex - HealthKart| Ex- Paisabazaar
09/27/2023
Validated Reviewer
Review source: G2 invite
Incentivized Review

Best Cloud Security & Endpoint Cybersecurity Software

Trend Micro is a best antivirus software for enterprises. it help us to protect from unwanted cyber threat and viruses. Our team is implemented it very quickly with the support of customer team.
JV
Jaydeepsinh V.
09/26/2023
Validated Reviewer
Verified Current User
Review source: G2 invite
Incentivized Review

TrendMicro Hybrid Cloud Security one stop solutions for Cloud Security

TM-Cloud Hybrid Security supports all the Operating System platform. Either you are using Server hosted in On-premises or VmWare, Hyper-V or on Cloud. Your Server will be protected as it supports all these plarforms. Deployment process is efficent and easy to enforce. Security Agent is light weight at the same time Protection modules offeres efficeint protection along with compliance need fullfillment.

About

Contact

HQ Location:
Tokyo

Social

@trendmicro

What is Trend Micro?

Trend Micro, a global leader in security software and solutions, strives to make the world safe for exchanging digital information. For the past 25 years, its employees have been inspired to protect individuals, families, businesses and governments as they look to harness the potential of emerging technologies and new ways of sharing information. In today’s organizations, information has become the most strategic asset, embodying competitive advantage and powering operational excellence. With the explosion of mobile, social and cloud technologies, protecting this information has become more challenging than ever. Organizations need a smart protection strategy. Trend Micro enables the smart protection of information, with innovative security solutions that are simple to deploy and manage, and fits an evolving ecosystem. Trend Micro solutions provide layered content security for mobile devices, endpoints, gateways, servers and the cloud. Leveraging these solutions, organizations can protect their end users, their evolving data center and cloud resources, and their information threatened by sophisticated targeted attacks.

Details

Year Founded
1988
Ownership
OTCMKTS:TMICY