Skip to content

Enterprise Security for Endpoints

Protect  physical and virtual desktops, laptops, and servers

Enterprise Security for Endpoints

Secure physical and virtual desktops, laptops and files servers, whether on or off network. Enterprise Security for Endpoints delivers award-winning protection, including antimalware, web reputation technology to block access to malicious websites, and HIPS protection. Powered by Trend Micro™ Smart Protection Network™ cloud-based security, pattern files are managed in the cloud—not on your endpoints—to free computing resources and optimize performance.

Trend Micro Enterprise Security for Endpoints combines the power of integrated data and threat protection with the cost benefits of faster scans and better performance. With an interlocking defense across desktops, laptops, and servers, you can consolidate endpoint protection in one centrally managed solution to lower management costs with the industry’s most proactive protection from today’s threats.

Client Protection

Secure any endpoint—with the industry’s most reliable protection

OfficeScan
Secures all endpoints—physical and virtual—while reducing the impact on your endpoint resources. An expandable modular architecture gives you the option to build data protection and other security technologies into a single endpoint agent that is deployed and managed from a central management console. Security for Mac and Intrusion Defense Firewall modules are included as part of the suite.

Intrusion Defense Firewall
This OfficeScan module provides a network-level host intrusion prevention system (HIPS) to shield against vulnerabilities in operating systems and client applications. The result: true zero-day protection from known and unknown threats.

Mobile Security (Suite Edition) provides a single point of visibility and control for mobile device management and security—protecting data by enforcing password use, encrypting data, and remotely wiping data from lost or stolen devices.

Security for Mac
Achieve a consistent security deployment and policy across all endpoints, regardless of form factor or operating system with enterprise-class threat protection for Apple Mac laptops and desktops.

Virtual Desktop Security  
This VDI functionality allows you to efficiently extend your endpoint security to virtual environments.  It recognizes whether an agent is on a physical or virtual endpoint to optimize performance and target protection.

File Server Protection

Secure your servers from malware and other web threats

ServerProtect for Microsoft Windows/Novell NetWare 
Protects enterprise-class servers from virus, spyware, and rootkit while simplifying and automating security operations on servers.

ServerProtect for Linux
Prevents your Linux file servers from becoming unwitting hosts for viruses, trojans and a full range of other malware. Note: ServerProtect for Storage is available as an optional add on.

Centralized Management

Streamline administration by centralizing protection policies from a single console

Control Manager
Streamlines the administration of multiple Trend Micro security solutions through Trend Micro Control Manager, a web-based management console that tracks security performance, reports malware events and policy violations, and automates routine tasks.


Smart

Get consistent security that delivers proactive protection across all endpoints

  • Reduce risk with comprehensive endpoint threat prevention
  • Stop threats before they can reach end users with cloud-based security that correlates web, email, and file threat data for immediate protection

Simple

Increase security at lower costs with a consolidated, cloud-client architecture and simplified management. According to Osterman Research, “Cloud-Client Enterprise Security Impact Report,” you can:

  • Reduce IT management costs with a unified endpoint security suite, centrally managed via Trend Micro Control Manager
  • Lower endpoint infection rates by 53 percent

Security That Fits

Streamline administration by enforcing threat protection policies from a single console

  • Centralize policy deployment and security management across multiple Trend Micro security products
  • Coordinate polices across endpoints—from file servers  to physical and virtual desktops and laptops
  • Gain enterprise-wide visibility for effective security against targeted attacks and data loss

Get proven protection from a leading provider of enterprise security. When you choose Enterprise Security for Endpoints as your security solution, you get:

Trend Micro Smart Protection Network
Immediate protection with Trend Micro Smart Protection Network cloud-based security that correlates email, web, and file reputation technologies to deliver global threat intelligence.

Protection proven by independent tests
Trend Micro security consistently dominates real-world benchmark testing—securing No. 1 ratings in independent tests performed by NSS Labs, Dennis Technology, and AVTest.org. 

Better protection at a lower cost (PDF)
The results don’t lie: Access test results to see why users can expect 53 percent fewer endpoint infections, 41 percent lower security management costs, and 50 percent better performance.


Trend Micro Enterprise Security for Endpoints protects your physical and virtual desktops, laptops, and servers. You can also easily extend this protection using the OfficeScan modular architecture to add data protection, Macintosh security, and virtual patching—without having to redeploy the entire solution.

Endpoint Security

Integrated Data Loss Prevention
Provides integrated endpoint DLP and advanced device control with multichannel monitoring, robust rules, and predefined policy templates—all centrally managed with your endpoint security suite through Trend Micro Control Manager.  Integrated Data Loss Prevention is also included as a component of Enterprise Data Protection described above.

Mobile Security (Suite Edition)
Extend your endpoint security platform to also protect smartphones and tablets by adding Trend Micro Mobile Security. This 4-in-1 solution combines mobile device antivirus security, mobile device management (MDM), data protection, and application management. It can be centrally managed through Trend Micro Control Manager, making it easy to enforce policies for data access and protection, passwords, data encryption, remote lock and wipe, and even selective wipe. Mobile Security is also included as a component of Enterprise Data Protection.

Endpoint Encryption
Encrypts data stored on PCs, laptops, notebooks, CDs, DVDs, and USB drives with leading full disk encryption, folder and file encryption, removable media encryption, granular device control, data management, and key management. Endpoint Encryption is also available as a component of Enterprise Data Protection.

Security for Storage Systems

ServerProtect for EMC Celerra™ / NetApp™ / Hitachi Data Systems
Secures storage systems, preventing data theft and attacks by detecting and removing malware.

Messaging Security

Email Encryption
Automates policy-based email encryption for data protection that doesn’t rely on end user discretion. It also eliminates the headaches of key management with our hosted key service and removes the need for recipients to install client software. Email Encryption is also available as a component of Enterprise Data Protection.  

InterScan Messaging Security
Protects the email gateway from spam and other email threats.

Data Privacy and Email Encryption Module for InterScan Messaging Security
Prevents data loss with email gateway data protection and email encryption.

Data Loss Prevention Module for ScanMail for Microsoft Exchange
Prevents data loss at the mail server with data protection for email.

Collaboration Security

PortalProtect
Secures Microsoft SharePoint with antimalware, web reputation, content filtering, and DLP protection.

IM Security
Provides security for Microsoft Lync and Office Communication Server.



Enterprise Security for Endpoints supports a wide variety of enterprise environments. To view system requirements for specific suite components, click on the desired product below and scroll down the page to view the system requirements tab or link on the right.

Client/Mobile Device

Management


Sociala media

Ta kontakt med oss på