OfficeScan™ secures both physical and virtual endpoints with immediate protection against threats delivered through leading malware protection and cloud-based global threat intelligence. Optional modules allow instant deployment of data loss prevention, virtual desktop infrastructure and Mac protection. OfficeScan also works in conjunction with proactive security technologies like application control, vulnerability protection, mobile security, and endpoint encryption to further enhance your threat protection.
Unique modular architecture: OfficeScan, with its flexible architecture, makes it possible to add security services, as needed, and apply future updates quickly and easily.
Optimized for desktop virtualization security: Isolate control of desktop environments, streamline management, and consolidate and extend the life of existing hardware.
Superior malware protection: Protects endpoints on or off the corporate network against viruses, Trojans, worms, spyware, and new variants as they emerge.
Easy to manage: Centralizes management capabilities for heightened visibility and greater control.
Plugs into OfficeScan to protect your sensitive data with integrated data loss prevention for maximum visibility and control.
Plugs into OfficeScan to provide a layer of protection for Mac clients on your network by preventing them from accessing malicious sites and distributing malware—even if the malware is not targeted at a Mac operating system.
Plugs into OfficeScan to let you consolidate your endpoint security into one solution for both physical and virtual desktops.
Stop zero-day threats immediately with a network-level Host Intrusion Prevention System (HIPS) that enables virtual patching.
Deploy Trend Micro Mobile Security to extend endpoint protection to mobile devices and the data they carry.
Ensure data privacy by encrypting data stored on your endpoints—including PCs, Macs, DVDs, and USB drives, which can easily be lost or stolen.
Enhances your defenses against malware and targeted attacks by preventing unwanted and unknown applications from executing on your corporate endpoints.
This centralized security management console ensures consistent security management and complete visibility and reporting across multiple layers of interconnected security. It also extends visibility and control across on-premises, cloud and hybrid deployment models. Centralized management combines with user-based visibility to improve protection, reduce complexity, and eliminate redundant and repetitive tasks in security administration.
Trend Micro OfficeScan recently ranked #1 in anti-malware tests by AV-Test, an independent IT research lab that certifies endpoint security solutions. See below for some of the results and all the details on OfficeScan's performance, usability, and protection as compared to other major vendors. AV-Test's January/February 2014 Report
Indusface proves Trend Micro offers a smaller footprint and higher performance.
TEST RESULTS - PHYSICAL CLIENTS
The descriptions below highlight test cases and results from testing of physical clients.
TEST CASE - BASELINE AV INSTALLATION
Approach: Systems memory, HDD & CPU data are recorded after the installation of the endpoint target.
Result: It was observed that Trend Micro OfficeScan 10.6 utilizes the lowest endpoint resource after AV installation on the endpoint system. This observation proves that endpoint resources are available for more end-user activity with OfficeScan 10.6, consuming 4-11% less memory than competitors' products.
When compared to other solutions, OfficeScan gets the job done faster – up to 60% faster . Because OfficeScan leverages our cloud-based Smart Protection Network infrastructure, the bulk of signatures aren’t deployed to the endpoints, freeing up memory for your user’s applications.
Scanning is finished earlier, returning the resources to the user sooner and minimizing the impact security scans have on productivity.
Comparison test results consistently prove Trend Micro offers a smaller footprint and higher performance, and leads in overall protection against threats.
Server Operating Systems:
Agent Operating System:
Detailed requirements are available online at docs.trendmicro.com