Trend Micro Enterprise Security for Endpoints

Powered by SC Magazine
 

Trend Micro Enterprise Security for Endpoints is a centrally managed security suite for desktops, laptops and mobile devices.

 

We were provided a download for OfficeScan 10.6, Control Manager 6 and some plug-in licenses for intrusion defense firewall and integrated data leakage prevention (DLP). Trend Micro Control Manager 6 provides central threat and DLP policy management across layers of the IT infrastructure. Trend Micro OfficeScan protects enterprise networks from malware, network viruses, web-based threats, spyware and mixed threat attacks. An integrated solution, OfficeScan consists of a client program that resides at the endpoint and a server program that manages all clients. The client guards the endpoint and reports its security status to the server. The server, through the web-based management console, makes it easy to set coordinated security policies and deploy updates to every client. 

The requirements for the OfficeScan Server are Windows 2003 SP2 or later. However, there are a few caveats. OfficeScan requires IIS or Apache web server and Control Manager used our MS SQL instance to install its database. We had some issues getting OfficeScan and Control Manager running on the same server. Trend Micro does not recommend installing Control Manager and Office-Scan 10.6 on the same box. Instead, it was highly recommended to install them on separate machines. After several attempts, we did get both packages to load. We launched the OfficeScan web portal. Once in, we downloaded and installed the two plug-ins mentioned above. 

Enterprise Security Suite for Endpoints includes multiple, purpose-built components. OfficeScan provides real-time protection against the latest viruses and trojans and web-based threats. It uses cloud-based threat intelligence and integrated optional DLP. Intrusion Defense Firewall, a plug-in for OfficeScan, provides network-level, strong endpoint protection by supplementing highly effective OfficeScan client-level security with proactive virtual patching. 

The Data Protection module provides Digital Asset Control and expands the range of devices monitored by Device Control. The Data Loss Prevention plug-in for OfficeScan includes predefined policy templates, multi-channel content filtering and granular device control. All of these solutions can be integrated through the OfficeScan Manager framework, which uses a plug-in architecture to permit easy integration of components to tailor the protection capabilities to the customer's business and security needs. 

The user interface was intuitive and we had no problem adding modules, setting policies and reviewing results. Customers can find endpoints through a scan tool. Reporting was good and offered numerous standard accounts. There was a high-level dashboard summary of key client information and threats. 

Standard support is included for one year in the purchase price and includes eight-hours-a-day/five-days-a-week support. Ongoing renewal is usually 40 percent of the first year's price. Support is available 24/7 for an additional fee of $8 to $12 per user, regardless of the product. Documentation was complete and we did need to use it to deploy and configure the software. 

 

Copyright © SC Magazine, US edition


Trend Micro Enterprise Security for Endpoints
 
:
Overall Rating
Verdict:
Better-than-average endpoint protection; middle of the pack on pricing; on the harder side of ease of use.
Product Info
Supplier:
 
 
 
 
Top Stories
Westpac committed to core banking plan
[Blog post] Now with leadership.
 
The True Cost of BYOD - 2014 survey
Twelve months on from our first study, is BYOD a better proposition?
 
Photos: Unboxing the Magnus supercomputer
Pawsey's biggest beast slots into place.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  27%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  22%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1154

Vote