OfficeScan

OfficeScan

Trend Micro
+
+

Related Products

  • ESET PROTECT Advanced
    2,249 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • Iru
    1,488 Ratings
    Visit Website
  • Bitdefender Ultimate Small Business Security
    3 Ratings
    Visit Website
  • ThreatLocker
    502 Ratings
    Visit Website
  • Guardz
    109 Ratings
    Visit Website
  • NinjaOne
    4,573 Ratings
    Visit Website
  • PowerDMARC
    251 Ratings
    Visit Website
  • 1Password
    16,550 Ratings
    Visit Website
  • Adaptive Security
    83 Ratings
    Visit Website

About

The threat landscape used to be black and white, you kept the bad stuff out and the good stuff in. Now it’s harder to tell the good from the bad, and traditional signature-based antivirus approaches alone are a weak defense against ransomware and unknown threats, which often slip through. Next-generation technologies help with some threats but not others, and adding multiple anti-malware tools on a single endpoint results in too many products that don’t work together. To complicate matters your users are increasingly accessing corporate resources from a variety of locations and devices, and even services in the cloud. You need endpoint security that is smart, optimized, and connected, from a proven vendor you can trust. Trend Micro™ OfficeScan™ infuses high-fidelity machine learning into a blend of threat protection techniques to eliminate security gaps across any user activity and any endpoint.

About

The VFind Security ToolKit (VSTK) is a suite of four powerful network, and computer, anti-malware utilities that provide flexible and uncompromising computer anti-malware protection. The VFind™ Security ToolKit (VSTK) is a suite of four powerful network and computer anti-malware utilities, that provide flexible and uncompromising computer anti-malware protection. CIT: Is a fantastic anti-malware security tool that has multiple uses. It reports on all files that have been removed, added, modified or duplicated. It can tighten baseline configuration control down to a single bit. It can also be used with surgical precision on an entire system or single file. The CIT tool produces a database of cryptographic hash values for every file it is directed to manage. Besides its use in anti-virus protection, the UAD tool is built for making identification based upon direct inspection of the data. It makes no assumptions about the file’s contents based upon the file’s name.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Enterprises seeking an endpoint security solution to protect their applications against potential threats

Audience

Companies searching for a solution providing network and computer anti-malware utilities

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

$1035 one-time payment
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Trend Micro
Founded: 1989
Japan
www.trendmicro.com/en_hk/business/products/user-protection/sps/endpoint/officescan.html

Company Information

CyberSoft
www.cybersoft.com

Alternatives

Alternatives

RAV Endpoint Protection

RAV Endpoint Protection

Reason Cybersecurity
PT MultiScanner

PT MultiScanner

Positive Technologies

Categories

Categories

IT Security Features

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Integrations

Amazon Web Services (AWS)
Apache CloudStack
Docker
Google Cloud Platform
Google Digital Risk Protection
IBM Cloud
Kubernetes
Microsoft 365
Microsoft Azure
Rackspace OpenStack
Trend Micro Cloud App Security
VMware Cloud

Integrations

Amazon Web Services (AWS)
Apache CloudStack
Docker
Google Cloud Platform
Google Digital Risk Protection
IBM Cloud
Kubernetes
Microsoft 365
Microsoft Azure
Rackspace OpenStack
Trend Micro Cloud App Security
VMware Cloud
Claim OfficeScan and update features and information
Claim OfficeScan and update features and information
Claim VFind Security ToolKit and update features and information
Claim VFind Security ToolKit and update features and information