Tokyo, Japan
$1BN to $5BN
84 Buyers are Negotiating "Group Buyer Deal" for TREND MICRO INCORPORATED
Are you from this company?


Trend Micro aims to grow in the application control market by enhancing its market offering to acquire new customers as well as stay competitive in the ever-growing security market. In order to increase its market share Trend Micro implemented the strategy of acquisitions and partnerships. For instance, they acquired HP Tipping Point in 2015, to broaden their NGIPS portfolio. They integrated Trend Micro Cloud App Security with AppDirect for Office 365 in the AppDirect cloud service commerce ecosystem of applications. The company has also launched new product advancements periodically based on the changing demand of the customers. In 2015, Trend Micro announced the availability of Trend Micro Mobile Security for Android and iOS devices. The company also extended its support services for medium and large enterprises in North American region. Moreover, the customized service and support portfolio of Trend Micro is helping the company in serving its customers in a better way. In 2014, the company launched enhancements to its Trend Micro Complete User Protection with the addition of new features enhancing security for endpoints. Such advancements help Trend Micro Endpoint Application Control stay in pace with the market demand and gain a competitive advantage over its competitors. Request TREND MICRO INCORPORATED Pricing to get more information.


Trend Micro is one of the global leaders in security software and provides high-end security solutions for IT and internet security. Trend Micro Endpoint Application Control caters to a diverse set of endpoint devices such as mobile, desktop, laptop, servers, and other portable devices. In addition, the company also offers security solutions for endpoint security, web gateways, data centers, and cloud. The company develops security solutions for home users, SMEs, and large enterprises across all the major regions, including APAC, Latin America, North America, and EMEA. Trend Micro Endpoint Application Control provides its security solutions to diverse verticals including healthcare, IT & telecom, government, manufacturing, retail, BFSI, and oil & gas, among others. trend micro, INC.: company snapshot Note: The company has not declared financial details for FY 2015, so the financial detail of FY 2014 is been considered.

360 Quadrants

Strengths and Weaknesses
  • +6 Application Detection and Usage Control
  • +11 Application Reputation Scoring
  • +7 Policy Management
  • +8 Desktop/Laptop
  • +9 Mobile/Tablet
  • +11 Point of Sale (PoS) Systems
  • +10 Servers
  • +8 Delivery - Directly
  • +5 Remote Support
  • +5 Whitelisting
  • +7 Hosted / On-Cloud
  • +6 On-Premise
  • +6 Blacklisting
  • +5 Compliance Management
  • +9 Threat Detection
  • +8 Visibility and Reporting
  • +5 Customer redressal mechanism
  • +13 Dedicated Account Manager (DAM)
  • +9 Delivery - Through Partners / Third-Party Vendors
  • +8 End-users/Work stations
  • -14 Windows 10
  • -12 Windows 7
  • -14 Advanced Persistent Threat (APT) Protection
  • -13 Removable Devices
  • -12 Virtual Machines
  • -14 On-Site Support
  • -10 Advanced Memory Protection
  • -12 Product variants/licences
  • -12 Proof of Concept
  • -5 Backup and Recovery
  • -7 Greylisting
  • -6 Identity Management
  • -13 Application Development Team
  • -12 Information Security Specialists
  • -13 Compliance & Risk Management
  • -12 Consulting Services
  • -8 Education & Training
  • -11 Vulnerability Assessment
  • -9 Linux OS
  • -8 Mac OS
There is no interaction
Invite one or more vendors for a discussion.

Top Features

  1. Product Features and Functionality / Application Control features
  2. Product Features and Functionality / Type of access points
  3. Support and Services / Levels of support
  4. Scalability / System configuration required
  5. Application Control techniques / Whitelisting
  6. Support and Services / Customer redressal mechanism
  7. Scalability / End-users/Work stations
  8. Application Control techniques / Blacklisting
  9. Services Offered / Support & Maintenance
  10. Breadth and Depth of Product Offering / Products/Solutions offered