Skip to content

OfficeScan - Endpoint Protection

Pinterest
More Options

Secure physical and virtual desktops

OfficeScan™ secures both physical and virtual endpoints with immediate protection against threats delivered through leading malware protection and cloud-based global threat intelligence. Optional modules allow instant deployment of data loss prevention, virtual desktop infrastructure and Mac protection. OfficeScan also works in conjunction with proactive security technologies like application control, vulnerability protection, mobile security, and endpoint encryption to further enhance your threat protection.

OfficeScan
  • Secure file servers, PCs, laptops, and virtualized desktops
  • Protect against data loss and theft
  • Reduce resource use
  • Block command and control (C&C) communications
  • Expand protection as needed

OfficeScan is a powerful endpoint security solution that combines on-premise and in-the-cloud security technologies to safeguard file servers, desktops, laptops, and virtualized desktops.

 

Unique modular architecture: OfficeScan, with its flexible architecture, makes it possible to add security services as needed, and, apply future updates quickly and easily.

  • Data Loss Prevention (DLP) Module (deploys as a plug-in)
  • Security for Mac Module (deploys as a plug-in)
  • Virtual desktop infrastructure (deploys as a plug-in)
  • Endpoint Encryption
  • Endpoint Application Control
  • Vulnerability Protection
  • Control Manager (central management)

Optimized for desktop virtualization security: Isolate control of desktop environments, streamline management, and consolidate and extend the life of existing hardware.

  • Automatically recognizes whether an agent is on a physical or virtual endpoint to better target protection
  • Prevents network, CPU, and storage conflicts by serializing scan and update operations per virtual server
  • Shortens scan times of virtual desktops by white-listing base images and previously scanned content

Superior malware protection: Protects endpoints on or off the corporate network against viruses, Trojans, worms, spyware, and new variants as they emerge.

  • Reduces the burden of pattern file management and lowers performance impact
  • Improves web performance and privacy by synchronizing with a local server
  • Detects and removes active and hidden rootkits
  • Safeguards endpoint mail boxes by scanning POP3 email and Microsoft Outlook folders for threats
  • Queries up-to-the-second data on the safety of a file before it’s accessed
  • Identifies and blocks botnet and targeted attack C&C communications using global and local threat intelligence
  • Secures users and endpoint systems from accessing malicious web content without relying on updates to assure zero-day protection
  • Proactively detects malware variants, reducing the number of required signatures

Easy to manage: Centralizes management capabilities for heightened visibility and greater control.

  • Manages by user across threat vectors for complete visibility into the security of your environment
  • Automatically cleans endpoints of malware, including processes and registry entries that are hidden or locked
  • Easily integrates with Active Directory to retrieve and synchronize information on endpoints and report on policy compliance
  • Centralizes management for physical and virtual desktops, laptops, file servers, and Mac computers within a single web console
  • Supports easy task-delegation with granular role-based administration
  • Integrates with Trend Micro Control Manager, allowing you to manage multiple OfficeScan servers and other Trend Micro solutions through a single console
  • Allows you to extend endpoint protection to smartphones and tablets by deploying Trend Micro Mobile Security (additional license required)


Get more from your existing Trend Micro endpoint security with additional protection, available through optional security modules and complementary endpoint solutions:

Data Loss Prevention module

Plugs into OfficeScan to protect your sensitive data with integrated data loss prevention for maximum visibility and control.

  • Protects private data—on or off network
  • Prevents data leaks via USB drives or connected mobile devices, Bluetooth connection, and other media
  • Covers the broadest range of devices, applications, and file types
  • Aids compliance with greater visibility and enforcement
  • Provides visibility to confidential information stored on the local hard drive using data discovery

Security for Mac module

Plugs into OfficeScan to provide a layer of protection for Mac clients on your network by preventing them from accessing malicious sites and distributing malware—even if the malware is not targeted at a  Mac operating system.

  • Reduces exposure to web-based threats, including fast-spreading Mac-targeting malware such as Flashback
  • Adheres to Mac OS look and feel for positive user experience
  • Saves time and effort with centralized management across endpoints, including Macs

Virtual Desktop Infrastructure (VDI) Module

Plugs into OfficeScan to let you consolidate your endpoint security into one solution for both physical and virtual desktops.

  • Recognizes whether an agent is on a physical or virtual endpoint, and optimizes protection and performance for its specific environment
  • Serializes scans and updates, and white lists base images and previously scanned content to preserve the host resources

Vulnerability Protection

Stop zero-day threats immediately with a network-level Host Intrusion Prevention System (HIPS) that enables virtual patching.

  • Eliminates risk exposure due to missing patches with virtual patching
  • Reduces down-time for recovery with incremental protection against zero day attacks
  • Allows patching on your own terms and timelines
  • Enhances firewall protection for remote and mobile enterprise endpoints

Mobile Security Integration (additional license required)

Deploy Trend Micro Mobile Security to extend endpoint protection to mobile devices and the data they carry.

  • Integrate OfficeScan and Trend Micro Mobile Security through Trend Micro Control Manager, enabling unified management and policy deployment across all endpoint security
  • Combines mobile device anti-malware, mobile app management, mobile device management (MDM), and data protection in a single solution
  • Enforces policies for data access and protection, passwords, data encryption, and remote lock and wipe
  • Ensures the proper device configurations and adds protections to prevent malware and reduce risk

Endpoint Encryption

Ensure data privacy by encrypting data stored on your endpoints—including PCs, Macs, DVDs, and USB drives, which can easily be lost or stolen.

  • Protects data at rest with full disk encryption software
  • Automates data management with self-encrypting hard drives
  • Encrypts data in specific files, shared folders, removable media
  • Sets granular policies for device control and data management

Endpoint Application Control

Enhances your defenses against malware and targeted attacks by preventing unwanted and unknown applications from executing on your corporate endpoints.

  • Protects against users or machines executing malicious software
  • Further simplifies management and deployment when used with OfficeScan
  • Provides advanced whitelist and blacklist features to enforce corporate policies
  • Uses correlated threat data from billions of records daily

Trend Micro Control Manager™

This centralized security management console ensures consistent security management and complete visibility and reporting across multiple layers of interconnected security. It also extends visibility and control across on-premise, cloud and hybrid deployment models. Centralized management combines with user-based visibility to improve protection, reduce complexity, and eliminate redundant and repetitive tasks in security administration.

Light & Lean: Lower infection rates by 62% and management costs by 40%

When compared to other solutions, OfficeScan gets the job done faster – up to 60% faster (PDF/engl.) . Because OfficeScan leverages our cloud-based Smart Protection Network infrastructure, the bulk of signatures aren’t deployed to the endpoints, freeing up memory for your user’s applications.

Scanning is finished earlier, returning the resources to the user sooner and minimizing the impact security scans have on productivity.

Comparison test results (PDF/engl.) consistently prove Trend Micro offers a smaller footprint and higher performance, and leads in overall protection against threats.

 

Virtual patching for protection from zero-day threats

Hundreds of software vulnerabilities are exposed each month, and timely patching is expensive, prone to error and often impossible.

Trend Micro virtual patching solutions deliver immediate protection while eliminating the operational pains of emergency patching, frequent patch cycles, and costly system downtime.

By installing OfficeScan with the HIPS plug-in for Intrusion Defense Firewall, you can deliver the proven vulnerability shielding that will keep your servers and endpoints protected while preventing costly emergency patching and upgrades as well as reducing the risk of breach disclosure costs. It even helps to extend the life of legacy systems and applications.



The proof is in the results.

Trend Micro OfficeScan recently ranked #1 in anti-malware tests by AV-Test, an independent IT research lab that certifies endpoint security solutions. See below for some of the results and all the details on OfficeScan's performance, usability, and protection as compared to other major vendors. AV-Test's January/February 2014 Report



Social Media

Connect with us on