- User Protection
- Smart Protection Suites
- Endpoint Security
- OfficeScan - Endpoint Protection
Endpoint security from the trusted security leader
The threat landscape used to be black and white – you kept the bad stuff out and the good stuff in. Now it’s harder to tell the good from the bad, and traditional signature-based antivirus approaches alone are a weak defense against ransomware and unknown threats, which often slip through. Next-generation technologies help with some threats but not others, and adding multiple anti-malware tools on a single endpoint results in too many products that don’t work together. To complicate matters your users are increasingly accessing corporate resources from a variety of locations and devices, and even services in the cloud. You need endpoint security that is smart, optimized, and connected, from a proven vendor you can trust.
Trend Micro™ OfficeScan™ infuses high-fidelity machine learning into a blend of threat protection techniques to eliminate security gaps across any user activity and any endpoint. It constantly learns, adapts, and automatically shares threat intelligence across your environment. This blend of threat protection is delivered via an architecture that uses endpoint resources more effectively and ultimately out-performs the competition on CPU and network utilization.
OfficeScan is a critical component of our Smart Protection Suites, that deliver gateway and endpoint protection capabilities like application control, intrusion prevention (vulnerability protection), endpoint encryption, data loss prevention (DLP), and more in one compelling package. Additional Trend Micro solutions extend your protection from advanced attacks with endpoint investigation and response (EDR). Plus, Deep Discovery network sandboxing delivers rapid response (real-time signature updates) to endpoints when a new threat is detected locally, enabling faster time-to-protection and reducing the spread of malware. All of this modern threat security technology is made simple for your organization with central visibility, management, and reporting. See how our endpoint security stacks up.
Advanced malware and ransomware protection:
Protects endpoints, on or off the corporate network, against malware, Trojans, worms, spyware, ransomware, and adapts to protect against new unknown variants as they emerge.
Connected threat defense:
OfficeScan integrates with other security products locally on your network and also via Trend Micro’s global, cloud threat intelligence to deliver network sandbox rapid response updates to endpoints when a new threat is detected, enabling faster time-to-protection and reducing the spread of malware.
Centralized visibility and control:
When deployed with Trend Micro™ Control Manager™, multiple OfficeScan servers can be managed through a single console to provide complete user visibility.
Mobile security integration:
Integrate Trend Micro™ Mobile Security and OfficeScan by using Control Manager to centralize security management and policy deployment across all endpoints; Mobile Security includes mobile device threat protection, mobile app management, mobile device management (MDM), and data protection.
Available on- premises or as a service:
OfficeScan can be deployed on site in your network or is available as a service (SaaS).
Maximum XGen™ security
Infuses high-fidelity machine learning with other detection techniques for the broadest protection against ransomware and advanced attacks.
Key Business Issues
“My first objective was to get rid of the heavy overhead that the previous endpoint solution was putting on our systems,” said Jamieson.
“OfficeScan did that… My second objective was to introduce security that really worked. Since we replaced the previous solution, we can see that Trend Micro has stopped the infections.”
Network systems manager of
A&W Food Services of Canada
Reduce user impact and management costs.
Proven Security Partner
Trend Micro has a history of constant innovation to provide the most effective and efficient security technologies. We are always looking ahead to develop the technology needed to fight tomorrow’s ever changing threats.
Expand your existing Trend Micro endpoint security with optional security modules and broaden protection with complementary endpoint solutions:
Data Loss Prevention (DLP) Module
Protects your sensitive data for maximum visibility and control.
Security for Mac Module
Provides a layer of protection for Apple Mac clients on your network by preventing them from accessing malicious sites and distributing malware—even if the malware is not targeted at Mac OS X.
Virtual Desktop Infrastructure (VDI) Module
Lets you consolidate your endpoint security into one solution for both physical and virtual desktops.
Endpoint Encryption Option
Ensures data privacy by encrypting data stored on your endpoints—including PCs, Macs, DVDs, and USB drives, which can easily be lost or stolen. Trend Micro™ Endpoint Encryption provides the data security you need with fulldisk encryption, folder and file encryption, and removable media encryption.
Vulnerability Protection Option
Stops zero-day threats immediately on your physical and virtual desktops and laptops— on and off the network. Using host-based intrusion prevention system (HIPS), Trend Micro™ Vulnerability Protection shields against known and unknown vulnerabilities before a patch is available or deployable. Extends protection to critical platforms, including legacy operating systems such as Windows XP.
Endpoint Application Control Option
Enhances your defenses against malware and targeted attacks by preventing unwanted and unknown applications from executing on your corporate endpoints.
Endpoint Sensor Option
Provides context-aware endpoint investigation and response (EDR), recording and reporting detailed system-level activities to allow threat analysts to rapidly assess the nature and extent of an attack. Custom detection, intelligence, and controls enable you to:
Trend Micro™ Control Manager™ Module
This centralized security management console ensures consistent security management and complete visibility and reporting across multiple layers of interconnected security from Trend Micro. It also extends visibility and control across on-premises, cloud, and hybrid deployment models. Centralized management combines with user-based visibility to improve protection, reduce complexity, and eliminate redundant and repetitive tasks in security administration. Control Manager also provides access to actionable threat intelligence from the Trend MicroTM Smart Protection NetworkTM, which uses global threat intelligence to deliver real-time security from the cloud, blocking threats before they reach you.
“With a network like ours, spread across the entire country, being able to secure mobile and desktop devices under one platform simplifies the security for our network and improves our team’s productivity.”
DCI Donor Services
Minimum recommended server requirements
|Processor:||1.86 GHz Intel Core 2 Duo (2 CPU cores) or better|
|Disk Space:||6.5 GB minimum, 7 GB minimum (using remote install)|
|Processor:||2 GHz Intel Core 2 Duo (2 CPU cores) or better|
|Memory:||4 GB minimum|
|Disk Space:||50 GB minimum|
|Operation System:||Windows Server 2012 R2|
Minimum recommended agent requirements
Processor: 300 MHz Intel Pentium or equivalent (Windows XP, 2003, 7, 8, 8.1, 10 family)
Memory: 256 MB minimum (512 MB recommended) with at least 100 MB exclusively for OfficeScan (Windows XP, 2003, Windows Embedded POSready 2009 family)
Disk Space: 650 MB minimum