TREND MICRO Endpoint Security Reviews, Features & Details

TREND MICRO INCORPORATED
Online
Tokyo, Japan
1988
$1BN to $5BN
92
Likes
84 Buyers are Negotiating "Group Buyer Deal" for TREND MICRO INCORPORATED
Are you from this company?

TREND MICRO INCORPORATED USP

Trend Micro's Apex One solution provides threat detection, response, and investigation all consolidated in a single agent. It enables users to eliminate multiple vendors and helps them acjieve deployment flexibility via both SaaS and on-premises deployment options. The solution also secures users with simplified security that provides businesses with an enhanced visibility and a faster response to attacks.  Request TREND MICRO INCORPORATED Pricing to get more information.

Summary

Trend Micro provides high-end security solutions for IT and Internet security. The company also offers security solutions for endpoint security, gateways, removable media, data centers, web, and cloud. The company offers Apex One, that helps organizations with advanced automated threat detection and response systems to secure against an ever-growing variety of threats. It also provides important insights, enhanced investigative capabilities, and better visibility by leveraging an advanced EDR toolset.

Top Usecases

  1. Incident Response
  2. Threat Hunting

360 Quadrants

Strengths and Weaknesses
  • +8 Android
  • +6 Installed
  • +7 iOS
  • +5 Web-Based
  • +12 Renewals & Registration
  • +10 Technical Support
  • +11 Virus & Threat Help
  • +8 Business
  • +9 Enterprise
  • +10 $ per Month/Yearly
  • +9 Automated Malware Removal
  • +12 Block targeted attacks
  • +10 Synchronized Security Heartbeat
  • +6 Control File Integrity
  • +14 Encryption of Data
  • +7 Monitor the Data access
  • +5 Prevent Data Loss
  • +13 Segregation of Network
  • +5 Active Adversary Mitigations
  • +14 Malicious Traffic Detection (MTD)
  • -6 Anti-Malware File Scanning
  • -13 Application Control
  • -5 Deep Learning malware detection
  • -12 Exploit Prevention
  • -9 Potentially Unwanted Application (PUA) Blocking
  • -8 Pre-execution Behavior Analysis (HIPS)
  • -11 Prevent data breaches
  • -13 Cloud
  • -14 Hybrid
  • -12 On-Premises
  • -13 Education & Certification
  • -5 Free Clean-up Tools
  • -14 Free Downloads
  • -11 $ per license
  • -11 Root Cause Analysis
  • -7 Disk and Boot Record Protection (WipeGuard)
  • -8 Man-in-the-Browser Protection (Safe Browsing)
  • -14 Client Firewal
  • -7 Live Protection
  • -12 Peripheral Control (e.g. USB)
Discussions
nodiscussion
There is no interaction
Invite one or more vendors for a discussion.


Top Features

  1. Product Features and Functionality / Prevention
  2. Product Features and Functionality / Data Security
  3. Product Features and Functionality / Detection
  4. Product Features and Functionality / Respond
  5. Product Features and Functionality / Licensing
  6. Services / Technical Support
  7. Prevention / Web Security
  8. Services / Renewals & Registration
  9. Services / Virus & Threat Help
  10. Product Features and Functionality / Costs & Units