Trend Micro Endpoint Application Control

Trend Micro is one of the global leaders in security software and provides high-end security solutions for IT and internet security. Trend Micro Endpoint Application Control caters to a diverse set of endpoint devices such as mobile, desktop, laptop, servers, and other portable devices. In addition, the company also offers security solutions for endpoint security, web gateways, data centers, and cloud. The company develops security solutions for home users, SMEs, and large enterprises across all the major regions, including APAC, Latin America, North America, and EMEA. Trend Micro Endpoint Application Control provides its security solutions to diverse verticals including healthcare, IT & telecom, government, manufacturing, retail, BFSI, and oil & gas, among others. trend micro, INC.: company snapshot Note: The company has not declared financial details for FY 2015, so the financial detail of FY 2014 is been considered.

USP : Trend Micro aims to grow in the application control market by enhancing its market offering to acquire new customers as well as stay competitive in the ever-growing security market. In order to increase its market share Trend Micro implemented the strategy of acquisitions and partnerships. For instance, they acquired HP Tipping Point in 2015, to broaden their NGIPS portfolio. They integrated Trend Micro Cloud App Security with AppDirect for Office 365 in the AppDirect cloud service commerce ecosystem of applications. The company has also launched new product advancements periodically based on the changing demand of the customers. In 2015, Trend Micro announced the availability of Trend Micro Mobile Security for Android and iOS devices. The company also extended its support services for medium and large enterprises in North American region. Moreover, the customized service and support portfolio of Trend Micro is helping the company in serving its customers in a better way. In 2014, the company launched enhancements to its Trend Micro Complete User Protection with the addition of new features enhancing security for endpoints. Such advancements help Trend Micro Endpoint Application Control stay in pace with the market demand and gain a competitive advantage over its competitors.

BUYERS
VENDORS
EXPERTS
3.7
ANALYSTS
 

TREND MICRO INCORPORATED detailed analysis

Product Maturity
Company Maturity
Most IMPORTANT
0.0
0.0
0.0
Support and Services
3.80
4.60
3.80
Scalability
4.35
5.00
4.65
Product Features and Functionality
3.50
4.40
4.40
Delivery
4.25
4.05
4.25
Breadth and Depth of Product Offering
2.70
3.70
2.95
LEAST IMPORTANT LESS IMPORTANT

PARTICIPATING QUADRANTS

TREND MICRO INCORPORATED has chosen it’s strengths in these 3 territories
  • Niche Quadrant

    All-Middle East and Africa

    9 Participants

  • Niche Quadrant

    All-Asia-Pacific

    10 Participants

  • Niche Quadrant

    All-Europe

    10 Participants

SECTORS
REGIONS
North America Middle East and Africa Latin America Europe Asia-Pacific
STRENGTHS
  • Product Maturity / Application Control features
    Application Detection and Usage Control
  • Product Maturity / Application Control features
    Application Reputation Scoring
  • Product Maturity / Application Control features
    Policy Management
  • Product Maturity / Type of access points
    Desktop/Laptop
  • Product Maturity / Type of access points
    Mobile/Tablet
  • Product Maturity / Type of access points
    Point of Sale (PoS) Systems
  • Product Maturity / Type of access points
    Servers
  • Product Maturity / Mode of delivery
    Delivery - Directly
  • Product Maturity / Support services
    Remote Support
  • Product Maturity / Application Control techniques
    Whitelisting
  • Product Maturity / Deployment model
    Hosted / On-Cloud
  • Product Maturity / Deployment model
    On-Premise
  • Product Maturity / Application Control techniques
    Blacklisting
  • Product Maturity / Application Control features
    Compliance Management
  • Product Maturity / Application Control features
    Threat Detection
  • Product Maturity / Application Control features
    Visibility and Reporting
  • Product Maturity / Support and Services
    Customer redressal mechanism
  • Product Maturity / Pre-sales support
    Dedicated Account Manager (DAM)
  • Product Maturity / Mode of delivery
    Delivery - Through Partners / Third-Party Vendors
  • Product Maturity / Scalability
    End-users/Work stations
WEAKNESSES
  • Product Maturity / Application Control features
    Advanced Persistent Threat (APT) Protection
  • Product Maturity / Type of access points
    Removable Devices
  • Product Maturity / Type of access points
    Virtual Machines
  • Product Maturity / Support services
    On-Site Support
  • Product Maturity / Application Control features
    Advanced Memory Protection
  • Product Maturity / Breadth and Depth of Product Offering
    Product variants/licences
  • Product Maturity / Pre-sales support
    Proof of Concept
  • Product Maturity / Add-on products
    Backup and Recovery
  • Product Maturity / Application Control techniques
    Greylisting
  • Product Maturity / Add-on products
    Identity Management
  • Product Maturity / End-users catered
    Application Development Team
  • Product Maturity / End-users catered
    Information Security Specialists
  • Product Maturity / Services Offered
    Compliance & Risk Management
  • Product Maturity / Services Offered
    Consulting Services
  • Product Maturity / Services Offered
    Education & Training
  • Product Maturity / Services Offered
    Vulnerability Assessment
  • Product Maturity / OS/Platforms supported
    Linux OS
  • Product Maturity / OS/Platforms supported
    Mac OS
  • Product Maturity / OS/Platforms supported
    Windows 10
  • Product Maturity / OS/Platforms supported
    Windows 7
See More

Have you EVER used TREND MICRO INCORPORATED Products?

Share your experience with potential buyers.

TOP FEATURES
  • Product Features and Functionality
    Application Control features
  • Product Features and Functionality
    Type of access points
  • Type of Support services
    Technical Support
  • Type of access points
    Servers
  • End-users catered
    IT Administrators
  • Application Control features
    Threat Detection
  • OS/Platforms supported
    Windows Server 2003
  • Type of Support services
    Security Support
  • Application Control features
    Visibility and Reporting
  • Pre-sales support
    Dedicated Account Manager (DAM)

CONNECT with this company

360 Connect helps you reach out to vendors and find the right people connect to it. Think of it as a concierge service for businesses to connect with other businesses, to buy, sell or invest in.

Questions & Answers

TOP REVIEWS

Get help

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.

TOP NEWS