Trend Micro logo - business

Business

search close
  • Platform
    • Trend Vision One Platformone-platform
      • Trend Vision One Platformone-platform
        • Trend Vision One™
          Platform

          Bridge threat protection and cyber risk management

          Learn moreone-platform
      • Trend Vision One Marketplace
        • Trend Vision One™
          Marketplace

          Browse Trend-approved partner solutions for our leading platform

          Learn more
      • Deployment Optionsproducts
        • Trend Vision One™
          Deployment Options

          Your environment, your choice – deploy Trend Vision One™ as SaaS or customer hosted

          See moreproducts
    • Cyber Risk Exposure Managementproducts
      • Trend Vision One™
        Cyber Risk Exposure Management (CREM)

        The leader in Exposure Management – turning cyber risk visibility into decisive, proactive security

        Learn moreproducts
    • Security Operationsproducts
      • Trend Vision One™
        Security Operations (SecOps)

        Stop adversaries with unrivaled visibility, powered by the intelligence of XDR, Agentic SIEM, and Agentic SOAR to leave attackers with nowhere left to hide

        Learn moreproducts
    • Cloud Securityproducts
      • Cloud Securityproducts
        • Trend Vision One™
          Cloud Security

          The most trusted cloud security platform for developers, security teams, and businesses

          Learn moreproducts
      • XDR for Cloudproducts
        • Trend Vision One™
          XDR for Cloud

          Extend visibility to the cloud and streamline SOC investigations

          Learn moreproducts
      • Workload Securityproducts
        • Trend Vision One™
          Workload Security

          Secure your data centre, cloud, and containers without compromising performance by leveraging a cloud security platform with CNAPP capabilities

          Learn moreproducts
      • Container Securityproducts
        • Trend Vision One™
          Container Security

          Simplify security for your cloud-native applications with advanced container image scanning, policy-based admission control, and container runtime protection

          Learn moreproducts
      • File Securityproducts
        • Trend Vision One™
          File Security

          Protect application workflow and cloud storage against advanced threats

          Learn moreproducts
      • Cloud Risk Managementproducts
        • Trend Vision One™
          Cloud Risk Management

          Unify multi-cloud visibility, eliminate hidden exposure, and secure your future

          Learn moreproducts
    • Endpoint Securityproducts
      • Endpoint Securityproducts
        • Trend Vision One™
          Endpoint Security

          Defend the endpoint through every stage of an attack

          Learn moreproducts
      • XDR for Endpointproducts
        • Trend Vision One™
          XDR for Endpoint

          Stop adversaries faster with a broader perspective and better context to hunt, detect, investigate, and respond to threats from a single platform

          Learn moreproducts
      • Workload Securityproducts
        • Trend Vision One™
          Workload Security

          Optimised prevention, detection, and response for endpoints, servers, and cloud workloads

          Learn moreproducts
    • Network Securityproducts
      • Network Securityproducts
        • Trend Vision One™
          Network Security

          Expand the power of XDR with network detection and response

          Learn moreproducts
      • XDR for Network (NDR)products
        • Trend Vision One™
          XDR for Network (NDR)

          Stop adversaries faster with a broader perspective and better context to hunt, detect, investigate, and respond to threats from a single platform

          Learn moreproducts
      • Network Intrusion Prevention (IPS)products
        • Network Intrusion Prevention (IPS)

          Protect against known, unknown, and undisclosed vulnerabilities in your network

          Learn moreproducts
      • Zero Trust Secure Access (ZTSA)products
        • Zero Trust Secure Access (ZTSA)products
          • Trend Vision One™
            Zero Trust Secure Access (ZTSA)

            Redefine trust and secure digital transformation with continuous risk assessments

            Learn moreproducts
        • AI Secure Accessproducts
          • AI Secure Access

            Ensure unified visibility and control for every GenAI service, user, and interaction

            Learn moreproducts
      • 5G Network Security
        • 5G Network Security
          Learn more
      • Industrial Network Securityproducts
        • Industrial Network Security
          Learn moreproducts
    • Email and Collaboration Securityproducts
      • Trend Vision One™
        Email and Collaboration Security

        Stay ahead of phishing, BEC, ransomware and scams with AI-powered email security, stopping threats with speed, ease and accuracy

        Learn moreproducts
    • Threat Intelligenceproducts
      • Trend Vision One™
        Threat Intelligence

        See threats coming from miles away

        Learn moreproducts
    • Identity Securityproducts
      • Trend Vision One™
        Identity Security

        End-to-end identity security from identity posture management to detection and response

        Learn moreproducts
    • Data Securityproducts
      • Trend Vision One™
        Data Security

        Pre-empt data leaks with centralised visibility, intelligent risk prioritisation, and rapid response capabilities

        Learn moreproducts
    • AI Security
      • AI Security
        • AI at Trend

          Discover AI solutions designed to protect your enterprise, support compliance, and enable responsible innovation

          Learn more
      • Proactive AI Security
        • Proactive AI Security

          Strengthen your defences with the industry's first proactive cybersecurity AI - no blind spots, no surprises

          Proactive AI Security
      • Trend Cybertron
        • Trend Cybertron

          The industry’s first proactive cybersecurity AI

          Trend Cybertron
      • Trend Companion
        • Trend Companion

          Harness unparalleled breadth and depth of data, high-quality analysis, curation, and labeling to reveal meaningful, actionable insights

          Learn more
      • Security for AI Stacks
        • Security for AI Stacks

          Secure your AI journey and eliminate vulnerabilities before attacks happen – so you can innovate with confidence

          Learn more
      • AI Ecosystem
        • AI Ecosystem

          Shaping the future of cybersecurity through AI innovation, regulatory leadership, and trusted standards

          Learn more
      • AI Factory
        • AI Factory

          Accelerate enterprise AI deployment with security, compliance, and trust

          Learn more
      • Digital Twin
        • Digital Twin

          High-fidelity digital twins enable predictive planning, strategic investments, and resilience optimisation

          Learn more
    • All Products, Services, and Trialsproducts
      • All Products, Services, and Trials
        Learn moreproducts
    • Deployment Optionsproducts
      • Trend Vision One™
        Deployment Options

        Your environment, your choice – deploy Trend Vision One™ as SaaS or customer hosted

        See moreproducts
  • Solutions
    • By Industry
      • By Industry
        • By Industry
          Learn more
      • Healthcare
        • Healthcare

          Protect patient data, devices, and networks while meeting regulations

          Learn more
      • Federal
        • Federal
          Learn more
      • Automotiveopen on a new tab
        • Automotive
          Learn moreopen on a new tab
      • 5G Networks
        • 5G Networks
          Learn more
      • Financial Servicesservices
        • Financial Services

          AI-powered cyber risk management to safeguard customer data, build trust and simplify compliance

          Learn moreservices
      • Critical Infrastructure
        • Critical Infrastructure

          Defend What Matters Most with Sovereign Protection

          Learn more
    • NIS2 Directive
      • NIS2 Directive
        Learn more
    • The Cyber Assessment Framework (CAF)
      • The Cyber Assessment Framework (CAF)

        What Enterprises and Institutions Need to Know

        Learn more
    • Small & Midsized Business Security
      • Small & Midsized Business Security

        Stop threats with easy-to-use solutions designed for your growing business

        Learn more
    • Cyber Insurance
      • Cyber Insurance
        • Cyber Insurance

          Bolster your digital security and privacy with cyber insurance

          Learn more
      • Breach Coaches
        • Breach Coaches

          Minimize risk and maximise security with a breach coach

          Learn more
      • Insurability
        • Insurability

          How Trend can help establish eligibility with multiple capabilities

          Learn more
      • Pre-Breach Servicesservices
        • Pre-Breach Services

          Fortify your cyber defences with pre-breach assessment services

          Learn moreservices
      • Incidence Response Planning
        • Incidence Response Planning

          Outsmart cyber threats by preparing with an Incident Response Plan

          Learn more
      • Invision Cyber
        • Invision Cyber

          Intelligent, risk-based coverage uniquely tailored to your security posture

          Learn more
  • Research
    • Research
      • Research
        • Research
          Learn more
      • Research, News, and Perspectives
        • Research, News, and Perspectives
          Learn more
      • Research and Analysis
        • Research and Analysis
          Learn more
      • Security Newsopen on a new tab
        • Security News
          Learn moreopen on a new tab
      • Zero Day Initiatives (ZDI)
        • Zero Day Initiatives (ZDI)
          Learn more
  • Services
    • Our Servicesservices
      • Our Servicesservices
        • Our Services

          Extend your team with trusted 24/7 cybersecurity experts to predict, prevent, and manage breaches.

          Learn moreservices
      • Service Packagesservices
        • Service Packages

          Augment security teams with 24/7/365 managed detection, response, and support

          Learn moreservices
      • Cyber Risk Advisoryservices
        • Cyber Risk Advisory

          Assess, understand, and mitigate cyber risk with strategic guidance

          Learn moreservices
      • Managed Detection and Response (MDR)services
        • Managed Detection and Response (MDR)

          Augment threat detection with expertly managed detection and response (MDR) for email, endpoints, servers, cloud workloads, and networks

          Learn moreservices
      • Incident Responseservices
        • Incident Responseservices
          • Incident Response

            Our trusted experts are on call whether you're experiencing a breach or looking to proactively improve your IR plans

            Learn moreservices
        • Insurance Carriers and Law Firmsservices
          • Insurance Carriers and Law Firms

            Stop breaches with the best response and detection technology on the market and reduce clients’ downtime and claim costs

            Learn moreservices
      • Red and Purple Teamingservices
        • Red and Purple Teaming

          Run real-world attack scenarios to build readiness and fortify your defences

          Learn moreservices
      • Support Servicesservices
        • Support Services
          Learn moreservices
  • Partners
    • Partner Program
      • Partner Program
        • Partner Program Overview

          Grow your business and protect your customers with the best-in-class complete, multilayered security

          Learn more
      • Partner Competencies
        • Partner Competencies

          Stand out to customers with competency endorsements that showcase your expertise

          Learn more
      • Partner Successes
        • Partner Successes
          Learn more
      • Service Providers (xSP)
        • Service Providers (xSP)

          Deliver proactive security services from a single, partner-centric security platform built for MSPs, MSSPs, and DFIR teams

          Learn more
    • Alliance Partners
      • Alliance Partners
        • Alliance Partners

          We work with the best to help you optimise performance and value

          Learn more
      • Technology Alliance Partners
        • Technology Alliance Partners
          Learn more
      • Find Alliance Partners
        • Find Alliance Partners
          Learn more
    • Partner Resources
      • Partner Resources
        • Partner Resources

          Discover resources designed to accelerate your business’s growth and enhance your capabilities as a Trend Micro partner

          Learn more
      • Partner Portal Loginopen on a new tab
        • Partner Portal Login
          Loginopen on a new tab
      • Trend Campus
        • Trend Campus

          Accelerate your learning with Trend Campus, an easy-to-use education platform that offers personalised technical guidance

          Learn more
      • Co-Selling
        • Co-Selling

          Access collaborative services designed to help you showcase the value of Trend Vision One™ and grow your business

          Learn more
      • Become a Partneropen on a new tab
        • Become a Partner
          Learn moreopen on a new tab
      • Distributors
        • Distributors
          Learn more
    • Find Partnersopen on a new tab
      • Find Partners

        Locate a partner from whom you can purchase Trend Micro solutions

        Learn moreopen on a new tab
    • Trend Vision One Marketplace
      • Trend Vision One™
        Marketplace

        Browse Trend-approved partner solutions for our leading platform

        Learn more
  • Company
    • Why Trend Micro
      • Why Trend Micro
        • Why Trend Micro
          Learn more
      • Industry Accolades
        • Industry Accolades
          Learn more
      • Strategic Alliances
        • Strategic Alliances
          Learn more
    • Customer Storiescustomer stories
      • Customer Storiescustomer stories
        • Customer Success Stories

          Real-world stories and case studies of how global customers use Trend to predict, prevent, detect, and respond to threats

          Learn morecustomer stories
      • ESG Business Impactopen on a new tab
        • ESG Business Impact

          See how cyber resilience led to measurable impact, smarter defence, and sustained performance.

          Learn moreopen on a new tab
      • Voice of the Customer
        • Voice of the Customer

          Hear directly from our users. Their insights shape our solutions and drive continuous improvement.

          Learn more
      • The Human Connection
        • The Human Connection

          Meet the people behind the protection – our team, customers, and improved digital well-being.

          Learn more
    • Compare Trend Micro
      • Compare Trend Micro
        • Compare Trend Micro

          See how Trend outperforms the competition

          Let's go
      • vs. Crowdstrike
        • Trend Micro vs. Crowdstrike

          Crowdstrike provides effective cybersecurity through its cloud-native platform, but its pricing may stretch budgets, especially for organisations seeking cost-effective scalability through a true single platform

          Let's go
      • vs. Microsoft
        • Trend Micro vs. Microsoft

          Microsoft offers a foundational layer of protection, yet it often requires supplemental solutions to fully address customers' security problems

          Let's go
      • vs. Palo Alto Networks
        • Trend Micro vs. Palo Alto Networks

          Palo Alto Networks delivers advanced cybersecurity solutions, but navigating its comprehensive suite can be complex and unlocking all capabilities requires significant investment

          Let's go
      • vs. SentinelOne
        • Trend Micro vs. SentinelOne
          Let's go
    • About Us
      • About Us
        • About Us
          Learn more
      • Trust Center
        • Trust Center
          Learn more
      • History
        • History
          Learn more
      • Diversity, Equity and Inclusion
        • Diversity, Equity and Inclusion
          Learn more
      • Corporate Social Responsibility
        • Corporate Social Responsibility
          Learn more
      • Leadership
        • Leadership
          Learn more
      • Security Experts
        • Security Experts
          Learn more
      • Internet Safety and Cybersecurity Education
        • Internet Safety and Cybersecurity Education
          Learn more
      • Legal
        • Legal
          Learn more
      • Investorsopen on a new tab
        • Investors
          Learn moreopen on a new tab
      • Formula 1 Partnership
        • Formula 1 Partnership

          Official partner of the McLaren Formula 1 Team

          Learn more
    • Connect With Usopen on a new tab
      • Connect With Usopen on a new tab
        • Connect With Us
          Learn moreopen on a new tab
      • Newsroomopen on a new tab
        • Newsroom
          Learn moreopen on a new tab
      • Events
        • Events
          Learn more
      • Careers
        • Careers
          Learn more
      • Webinars
        • Webinars
          Learn more
  • Unlock your free trial products
  • Contact Us
Looking for home solutions?
Under Attack?
0 Alerts
Unread
All
Support
  • Business Solutions open on a new tab
  • Consumer Solutions open on a new tab
  • Education and Certification services
  • Contact Support open on a new tab
  • Find a Support Partner open on a new tab
Resources
  • AI Innovation
  • Trend Micro vs. Competition
  • Cybersecurity Terms Library
  • Threat Encyclopedia
  • Glossary of Terms
  • Webinars
Log In
  • Trend Vision One open on a new tab
  • Support open on a new tab
  • Partner Portal open on a new tab
  • Cloud One open on a new tab
  • Product Activation and Management open on a new tab
  • Referral Affiliate open on a new tab
arrow_back
search
close
  • Security News
  • Internet of Things
  • Inside the Smart Home: IoT Device Threats and Attack Scenarios

Inside the Smart Home: IoT Device Threats and Attack Scenarios

July 30, 2019
  • Email
  • Facebook
  • Twitter
  • Google+
  • Linkedin

Download IoT Device Security: Locking Out Risks and Threats to Smart Homes Download IoT Device Security: Locking Out Risks and Threats to Smart Homes

By Ziv Chang, Trend Micro Research

A smart home is made up of a number of different devices connected to the internet of things (IoT), each with a specific set of functions. No matter how different these devices are from one another, they have the shared goal of streamlining the tasks and simplifying the lives of their users. Together they paint an enticing image of comfort and convenience. However, just as these devices have revolutionized home living, they have also given rise to new complications for home security.

We detail different smart home attack scenarios and discuss the different attack layers of IoT devices in our paper, "IoT Device Security: Locking Out Risks and Threats to Smart Homes." Here we give an overview of the possible attack scenarios for various smart home devices and suggest security solutions.

Inside a smart home

A smart home gives users extensive access to many aspects of their home, even from a remote location. For example, users can monitor their home in real time through a mobile app or web interface. They can also initiate certain actions remotely, such as communicating with their children using a smart toy or unlocking a smart lock for a trusted friend.

Smart home devices also provide automatic and chained functions that can make day-to-day living more convenient for users. For example, in the morning the smart coffee maker starts brewing before the users need to get up for work. Once the users are in the kitchen, the smart refrigerator alerts them that they are low on supplies, if it has not yet ordered the needed items. As the users go out the door, the smart lock automatically locks behind them. And now that the house is empty, the smart robot vacuum cleaner starts its scheduled cleaning.

This scenario and plenty of others are possible if users have good control and visibility over the deployed devices in their smart homes. But problems arise if this control and visibility, unbeknown to the users, shift to malicious actors.

Compromised devices in a smart home

Existing vulnerabilities, poor configuration, and the use of default passwords are among the factors that can aid a hacker in compromising at least one device in a smart home system. Once a single device is compromised, hackers can take a number of actions based on the capabilities and functions of the device. We illustrate some of them here.

Starting from the front door, there can be a smart lock. If compromised, the smart lock can give hackers control over who comes in or out of the house. The most obvious action available for hackers, then, would be to let intruders or accomplices in to the house, and another would be to lock out the actual residents.

Inside the living room, several other devices can be set up. One of these can be a smart speaker, which serves as the conduit for voice-initiated home automation commands. If compromised, a voice-activated device such as a smart speaker can allow hackers to issue voice commands of their own.

In the kitchen, devices like a smart refrigerator and a smart coffee maker can cause major issues if successfully hacked. Hackers can set up a smart refrigerator to register wrong expiration dates or order an immense amount of groceries online. And even a smart coffee maker can cause great inconvenience if commanded by hackers to brew coffee incessantly.

Smart devices can now also be found even in the bathroom, most commonly in the form of smart toilets. A smart toilet has different features, such as sensing the right amount of water for flushing waste, that can be very helpful for users. But hackers can use some of its features to make the device act up, by making the toilet flush repeatedly or let water flow continuously from the bidet.

Hover overTap warning sign for more info.

Specific members of the household can also be targeted depending on the device being compromised. In the case of children, compromised smart toys pose a particular risk. Hackers can, for example, communicate with the child directly or quietly record the child’s activities using the toy. Vulnerable smart toys illustrate how even items that are safe enough for child use can still cause harm if compromised.

Smart bulbs can be installed all around the house, from the basement to the attic. They can be turned on or off depending on the time of day or amount of movement or ambient light detected. But hackers can use these seemingly simple devices to disturb residents, by switching them on at inconvenient times, among other actions.

Devices like smart robot vacuum cleaners, which have some mobility around the house, can provide hackers information about the home’s layout. This information can be used by the hackers in planning further activities and movements.

The point where smart devices are connected can also prove useful for hackers. Hackers can use the home gateway to redirect or modify connections to their advantage. This demonstrates that anything connected to the smart home network can be as useful to a resourceful hacker as it is to the actual owner.

Outside a smart home

Although our discussion of compromise and its consequences has centered on smart homes, the same problems can exist anywhere vulnerable or misconfigured devices are deployed. The consequences of a successful attack on a particular IoT system depend on the kind of environment the system is used for.

Many, if not all, of the devices mentioned above can easily be seen in an enterprise setting. An office pantry or break room, for example, can contain a smart refrigerator and a smart coffee maker. And smart bulbs certainly will not be out of place in an enterprise, especially as they can help the business conserve energy if deployed on a large scale.

Portable and wearable smart devices add another layer of complexity to IoT security concerns, as these devices traverse both enterprise and home environments, and have even given rise to updates on many companies’ “bring your own device” (BYOD) policies. These devices, such as smartwatches and smart yoga mats, are typically brought by users to the office, and then brought back home at the end of the work day. A malware infection picked up in one environment, for example, can spread to the other if the BYOD policies in place are weak or if adequate security measures are not taken to prevent such a threat.

Securing smart devices

More than showing what hackers can do with smart devices, these scenarios show how deeply the IoT has become integrated in people’s lives. This is apparent in how there is an applicable IoT device for every part of a home, from the living room and the kitchen to the bathroom and the attic. This deep involvement in people’s lives is what makes IoT attacks both viable for hackers and impactful for users. Arguably, nowhere have cyberthreats been more potentially invasive and personal than in smart homes.

It is all the more reason, then, for users to secure the IoT devices in their smart homes. Here are some security measures that users can take to protect and defend their smart homes against attacks on IoT devices:

  • Map all connected devices. All devices connected to the network, whether at home or at the enterprise level, should be well accounted for. Their settings, credentials, firmware versions, and recent patches should be noted. This step can help assess which security measures the users should take and pinpoint which devices may have to be replaced or updated.
  • Change default passwords and settings. Make sure that the settings used by each device are aligned toward stronger security, and change the settings if this is not the case. Change default and weak passwords to avoid attacks like brute force and unwanted access.
  • Patch vulnerabilities. Patching may be a challenging task, especially for enterprises. But it is integral to apply patches as soon as they are released. For some users, patches may disrupt their regular processes, for which virtual patching could be an option.
  • Apply network segmentation. Use network segmentation to prevent the spread of attacks, and isolate possibly problematic devices that cannot be immediately taken offline.

Read our paper, “IoT Device Security: Locking Out Risks and Threats to Smart Homes,” for more on this topic, including descriptions of other attack scenarios, a discussion of the different attack layers of an IoT device, and further security steps users can follow to keep their smart homes safe.


HIDE

Like it? Add this infographic to your site:
1. Click on the box below.   2. Press Ctrl+A to select all.   3. Press Ctrl+C to copy.   4. Paste the code into your page (Ctrl+V).

Image will appear the same size as you see above.

Posted in Internet of Things, Research, Vulnerabilities, Exploits, Device Management

Related Posts

  • Agentic Edge AI: Development Tools and Workflows
  • Agentic Edge AI: Autonomous Intelligence on the Edge
  • Exploiting Trust in Open-Source AI: The Hidden Supply Chain Risk No One Is Watching
  • Unveiling AI Agent Vulnerabilities Part V: Securing LLM Services
  • Unveiling AI Agent Vulnerabilities Part IV: Database Access Vulnerabilities

Recent Posts

  • How Unmanaged AI Adoption Puts Your Enterprise at Risk
  • Estimating Future Risk Outbreaks at Scale in Real-World Deployments
  • The Next Phase of Cybercrime: Agentic AI and the Shift to Autonomous Criminal Operations
  • Reimagining Fraud Operations: The Rise of AI-Powered Scam Assembly Lines
  • The Devil Reviews Xanthorox: A Criminal-Focused Analysis of the Latest Malicious LLM Offering

We Recommend

  • Threat Landscape
  • Virtualization & Cloud
  • Ransomware
  • Security Technology
  • Complexity and Visibility Gaps in Power Automate
    • Trend Micro State of AI Security Report 1H 2025
    • Email Threat Landscape Report: Evolving Threats in Email-Based Attacks
  • AI Security Starts Here: The Essentials for Every Organization
    • AI in the Crosshairs: Understanding and Detecting Attacks on AWS AI Services with Trend Vision One™
    • Today’s Cloud and Container Misconfigurations Are Tomorrow’s Critical Vulnerabilities
  • The AI-fication of Cyberthreats: Trend Micro Security Predictions for 2026
    • Trend 2025 Cyber Risk Report
  • Stay Ahead of AI Threats: Secure LLM Applications With Trend Vision One
    • The Road to Agentic AI: Navigating Architecture, Threats, and Solutions
    • The Road to Agentic AI: Defining a New Paradigm for Technology and Cybersecurity

2025 Trend Micro Cyber Risk Report

2025 Trend Micro Cyber Risk Report

View the report

The AI-fication of Cyberthreats: Trend Micro Security Predictions for 2026

2026 Trend Micro Security Predictions

View the 2026 Trend Micro Security Predictions

Trend Vision One™ - Proactive Security Starts Here.

Resources

  • Blog
  • Newsroom
  • Threat Reports
  • Find a Partner

Support

  • Business Support Portal
  • Contact Us
  • Downloads
  • Free Trials

About Trend

  • About Us
  • Careers
  • Locations
  • Upcoming Events
  • Trust Center

Country Headquarters

  • Trend Micro - United Kingdom (GB)
  • Podium Level (East) 2 Kingdom Street
    Paddington Central
    London W2 6BD, United Kingdom

Select a language

close
  • English
  • English (US)
  • English (UK)
  • Español (ESP)
  • Español (MEX)
  • Deutsch
  • Italiano
  • Français
  • 中文 (台灣)
  • 中文 (香港)
  • 日本語
  • 한국어 (Korean)
  • Русский (Asia)
  • Português
  • عربي
  • Polski
  • Türkçe

Experience our enterprise cybersecurity platform for free

  • Claim your 30-day trial
  • Privacy
  • Legal
  • Terms of Use
  • Sitemap
Copyright ©2025 Trend Micro Incorporated. All rights reserved.