Product Avatar Image

Trend Micro

Show rating breakdown
851 reviews
  • 36 profiles
  • 40 categories
Average star rating
4.3
#1 in 2 categories
Grid® leader
Serving customers since
1988
Profile Type
Category

All Profiles

Profile Filters
Profile Type
Category
Product Avatar Image
You’re seeing this ad based on the product’s relevance to this page. Sponsored content does not receive preferential treatment in any of G2’s ratings.

The Data Krypter

0 reviews

Product Description

Keep your data secure well into the future when quantum computers become mainstream. -encrypts files, folders and blocks of text -when encrypting a file/folder, you can: - -give the file/folder a random name - -securely erase the original -makes your data useless to an attacker in case you are ever a victim of ransomware. But you need to prepare ahead of time by encrypting your sensitive files. Then the attacker cannot: - -use your data or - -threaten to make your files public -you can receive encrypted files from someone else and only one of you needs to have a paid version (or a non-expired trial version) of the Data Krypter. i.e. an accountant or lawyer pays for the software and all their clients can send encrypted files with a trial version (even if it has expired). -even if someone has access to your computer they can&#39;t decrypt your files because your: - -master password is encrypted - -private keys are encrypted - -secret keys are encrypted (stored only to help recover keys). -symmetric encryption (the same secret key to encrypt and decrypt) using PERNG -asymmetric encryption (public/private keys) using NTRU-2x2 -no back door<br>

Profile Name

Star Rating

591
232
54
6
5

Trend Micro Reviews

Review Filters
Profile Name
Star Rating
591
232
54
6
5
PB
Paulino B.
10/09/2023
Validated Reviewer
Review source: G2 invite
Incentivized Review

Protection from external Risks

Trend Micro Hybrid Cloud Security is an user friendly solution. The deployment process and activation are easily manageable. Trend Micro Hybrid Cloud Security is an option, in the market.
CO
Cephas O.
10/09/2023
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review

Best in class and a true business worry free solution

The increased visibilty that Trend Vision One offers moreso for IoT devices that can be a serious blindspot and further more the ease of use that it offers. The ease of intergration with my existinf SaaS offerings during the implementation made it such a breeze. I have used the solution for over half a decade and no regrets to date.
PP
Prasad P.
10/04/2023
Validated Reviewer
Review source: G2 invite
Incentivized Review

Good Comprehensive Cloud Security Solution

Easy to use & simple UI/UX - we are using this at the organizational level. Once there was malware was detected in my system which restricted internet access remotely which helped us stop the virus from spreading to the other directories.

About

Contact

HQ Location:
Tokyo

Social

@trendmicro

What is Trend Micro?

Trend Micro, a global leader in security software and solutions, strives to make the world safe for exchanging digital information. For the past 25 years, its employees have been inspired to protect individuals, families, businesses and governments as they look to harness the potential of emerging technologies and new ways of sharing information. In today’s organizations, information has become the most strategic asset, embodying competitive advantage and powering operational excellence. With the explosion of mobile, social and cloud technologies, protecting this information has become more challenging than ever. Organizations need a smart protection strategy. Trend Micro enables the smart protection of information, with innovative security solutions that are simple to deploy and manage, and fits an evolving ecosystem. Trend Micro solutions provide layered content security for mobile devices, endpoints, gateways, servers and the cloud. Leveraging these solutions, organizations can protect their end users, their evolving data center and cloud resources, and their information threatened by sophisticated targeted attacks.

Details

Year Founded
1988
Ownership
OTCMKTS:TMICY