Trend Micro Enterprise Security for Endpoints
August 01, 2012
$39.89 per user for 251 users, includes one year of standard support. Prices vary by number of users.
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Ability to add layers of protection through licensing; Data Protection module.
- Weaknesses: Deployment and configuring takes some work; multiple interfaces to manage.
- Verdict: Better-than-average endpoint protection; middle of the pack on pricing; on the harder side of ease of use.
Trend Micro Enterprise Security for Endpoints is a centrally managed security suite for desktops, laptops and mobile devices. We were provided a download for OfficeScan 10.6, Control Manager 6 and some plug-in licenses for intrusion defense firewall and integrated data leakage prevention (DLP). Trend Micro Control Manager 6 provides central threat and DLP policy management across layers of the IT infrastructure. Trend Micro OfficeScan protects enterprise networks from malware, network viruses, web-based threats, spyware and mixed threat attacks. An integrated solution, OfficeScan consists of a client program that resides at the endpoint and a server program that manages all clients. The client guards the endpoint and reports its security status to the server. The server, through the web-based management console, makes it easy to set coordinated security policies and deploy updates to every client.
The requirements for the OfficeScan Server are Windows 2003 SP2 or later. However, there are a few caveats. OfficeScan requires IIS or Apache web server and Control Manager used our MS SQL instance to install its database. We had some issues getting OfficeScan and Control Manager running on the same server. Trend Micro does not recommend installing Control Manager and Office-Scan 10.6 on the same box. Instead, it was highly recommended to install them on separate machines. After several attempts, we did get both packages to load. We launched the OfficeScan web portal. Once in, we downloaded and installed the two plug-ins mentioned above.
Enterprise Security Suite for Endpoints includes multiple, purpose-built components. OfficeScan provides real-time protection against the latest viruses and trojans and web-based threats. It uses cloud-based threat intelligence and integrated optional DLP. Intrusion Defense Firewall, a plug-in for OfficeScan, provides network-level, strong endpoint protection by supplementing highly effective OfficeScan client-level security with proactive virtual patching.
The Data Protection module provides Digital Asset Control and expands the range of devices monitored by Device Control. The Data Loss Prevention plug-in for OfficeScan includes predefined policy templates, multi-channel content filtering and granular device control. All of these solutions can be integrated through the OfficeScan Manager framework, which uses a plug-in architecture to permit easy integration of components to tailor the protection capabilities to the customer's business and security needs.
The user interface was intuitive and we had no problem adding modules, setting policies and reviewing results. Customers can find endpoints through a scan tool. Reporting was good and offered numerous standard accounts. There was a high-level dashboard summary of key client information and threats.
Standard support is included for one year in the purchase price and includes eight-hours-a-day/five-days-a-week support. Ongoing renewal is usually 40 percent of the first year's price. Support is available 24/7 for an additional fee of $8 to $12 per user, regardless of the product. Documentation was complete and we did need to use it to deploy and configure the software.
Sign up to our newsletters
SC Magazine Articles
- Study: Open Source Software use increasing in enterprises but without vulnerability monitoring
- RSA Conference 2015: Prepare for the IoT before it's too late, Sorebo warns
- 'Aaron's Law' returns to Congress
- RSA 2015: Tension continues to grow between govt, cryptographers
- Data at risk for 9,000 individuals following unauthorized access to SRI Inc. website
- Study: Conficker declared top threat of 2014, but N. America targeted mainly by AnglerEK
- RSA 2015: Straight talk about encryption, bulk surveillance and IoT
- RSA 2015: In the healthcare industry, security must innovate with business
- RSA 2015: Unintended use of aircraft systems next challenge for counterterrorism community
- RSA 2015: Bug hunting and responsible vulnerability disclosure