To protect against today’s fast-evolving threats, you require comprehensive endpoint security technology with real-world protection against the latest advanced and unknown threats. Trend Micro™ OfficeScan™ provides modern threat protection for anti-malware, packer variants, device control, command and control (C&C) traffic, browser exploits, behavior monitoring, web threats, census-based control, and more.
Advanced malware protection
Your endpoints are protected on or off the corporate network against viruses, Trojans, worms, spyware, ransomware, and new variants as they emerge.
Optimized security for virtual desktop infrastructure (VDI)
You can isolate control of desktop environments, streamline management, and consolidate and extend the life of existing hardware.
Centralized visibility and control
Centralized management gives you heightened visibility and greater control.
Customizable endpoint protection
With OfficeScan’s flexible architecture, you can add security services as needed and apply updates quickly and easily.
Protects your sensitive data with integrated DLP for maximum visibility and control.
Provides a layer of protection for Mac clients on your network by preventing them from accessing malicious sites and distributing malware—even if the malware is not targeted at Mac OS X.
Lets you consolidate your endpoint security into one solution for both physical and virtual desktops.
Stops zero-day threats immediately with a network-level Host Intrusion Prevention System (HIPS) that enables virtual patching.
Deploy Trend Micro Mobile Security to extend protection to smart phones and tablets.
Ensures data privacy by encrypting data stored on your endpoints—including PCs, Macs, DVDs, and USB drives, which can easily be lost or stolen.
Enhances your defenses against malware and targeted attacks by preventing unwanted and unknown applications from executing on your corporate endpoints.
Provides context-aware endpoint security monitoring that records and reports detailed system-level activities to allow threat analysts to rapidly assess the nature and extent of an attack.
This centralized security management console ensures consistent security management and complete visibility and reporting across multiple layers of interconnected security. It also extends visibility and control across on-premises, cloud, and hybrid deployment models. Centralized management combines with user-based visibility to improve protection, reduce complexity, and eliminate redundant and repetitive tasks in security administration.
Server Operating Systems:
Agent Operating System:
Detailed requirements are available online at docs.trendmicro.com