Trend Micro Endpoint Application Control

Are you from this Company?
TREND MICRO INCORPORATED
Tokyo, Japan
1988
$1BN to $5BN
Enterprise
70 Likes
84 Buyers Negotiating

Summary

Trend Micro is one of the global leaders in security software and provides high-end security solutions for IT and internet security. Trend Micro Endpoint Application Control caters to a diverse set of endpoint devices such as mobile, desktop, laptop, servers, and other portable devices. In addition, the company also offers security solutions for endpoint security, web gateways, data centers, and cloud. The company develops security solutions for home users, SMEs, and large enterprises across all the major regions, including APAC, Latin America, North America, and EMEA. Trend Micro Endpoint Application Control provides its security solutions to diverse verticals including healthcare, IT & telecom, government, manufacturing, retail, BFSI, and oil & gas, among others. trend micro, INC.: company snapshot Note: The company has not declared financial details for FY 2015, so the financial detail of FY 2014 is been considered.

Discussions

Strengths
  • +6
    Application Detection and Usage Control
  • +11
    Application Reputation Scoring
  • +7
    Policy Management
  • +8
    Desktop/Laptop
  • +9
    Mobile/Tablet
  • +11
    Point of Sale (PoS) Systems
  • +10
    Servers
  • +8
    Delivery - Directly
  • +5
    Remote Support
  • +5
    Whitelisting
  • +7
    Hosted / On-Cloud
  • +6
    On-Premise
  • +6
    Blacklisting
  • +5
    Compliance Management
  • +9
    Threat Detection
  • +8
    Visibility and Reporting
  • +5
    Customer redressal mechanism
  • +13
    Dedicated Account Manager (DAM)
  • +9
    Delivery - Through Partners / Third-Party Vendors
  • +8
    End-users/Work stations
Cautions
  • -14
    Windows 10
  • -12
    Windows 7
  • -14
    Advanced Persistent Threat (APT) Protection
  • -13
    Removable Devices
  • -12
    Virtual Machines
  • -14
    On-Site Support
  • -10
    Advanced Memory Protection
  • -12
    Product variants/licences
  • -12
    Proof of Concept
  • -5
    Backup and Recovery
  • -7
    Greylisting
  • -6
    Identity Management
  • -13
    Application Development Team
  • -12
    Information Security Specialists
  • -13
    Compliance & Risk Management
  • -12
    Consulting Services
  • -8
    Education & Training
  • -11
    Vulnerability Assessment
  • -9
    Linux OS
  • -8
    Mac OS
I agree to 360Quadrants Terms of use and privacy policy
Success
info
Error
Company Size :
  Enterprise
  SME
  Startup