Skip to content

OfficeScan - Endpoint Protection

Pinterest
More Options

Secure physical and virtual desktops

Secure both physical and virtual endpoints with immediate protection against the latest threats by utilizing leading antimalware and cloud-based global threat intelligence. Optional modules allow instant deployment of data loss prevention, Mac protection, and virtual patching to shield vulnerabilities against zero-day threats.

OfficeScan
  • Secure files servers, PCs, laptops, and virtualized desktops
  • Protect against data loss and theft
  • Lower resource usage
  • Shield vulnerabilities with virtual patching
  • Block Command & Control communications
  • Expand protection as needed

OfficeScan is a powerful endpoint security solution that combines on-premise and in-the-cloud security technologies to safeguard file servers, desktops, laptops, and virtualized desktops.

 

Unique modular architecture: OfficeScan, with its flexible architecture, makes it possible to add security services as needed, and, apply future updates, without having to redeploy the entire solution.

  • Data Loss Prevention (DLP) Module
  • Intrusion Defense Firewall Module
  • Security for Mac Module

Optimized for desktop virtualization security: Isolate control of desktop environments, streamline management, and consolidate and extend the life of existing hardware.

  • Automatically recognizes whether an agent is on a physical or virtual endpoint to better target protection
  • Prevents network, CPU, and storage conflicts by serializing scan and update operations per virtual server
  • Shortens scan times of virtual desktops by white-listing base images and previously scanned content

Superior malware protection: Protects endpoints, on or off the corporate network, against viruses, Trojans, worms, spyware, and new variants as they emerge.

  • Reduces the burden of pattern file management and lowers performance impact
  • Improves web performance and privacy by synchronizing with a local server
  • Detects and removes active and hidden rootkits
  • Safeguards endpoint mail boxes by scanning POP3 email and Outlook folders for threats
  • Queries up-to-the second data on the safety of a file before it’s accessed
  • Identifies and blocks botnet and targeted attack Command and Control (C&C) communications using global and local threat intelligence

Easy to manage: Centralizes management capabilities, for heightened visibility and greater control.

  • Automatically cleans endpoints of malware, including processes and registry entries that are hidden or locked
  • Easily integrates with Active Directory to retrieve and synchronize information on endpoints and report on policy compliance
  • Centralizes management for physical and virtual desktops, laptops, files servers, and Macintosh computers with a single web console
  • Supports easy task-delegation with granular role-based administration
  • Integrates with Trend Micro Control Manager, allowing you to manage multiple OfficeScan servers and other Trend Micro solutions through a single console
  • Allows you to extend endpoint protection to smartphones and tablets by deploying Trend Micro Mobile Security (additional license required)


Get more from your existing Trend Micro security with additional protection.

Data Loss Prevention module

Protect your sensitive data with the Data Loss Prevention module, for maximum visibility and control.

  • Protects private data—on or off network
  • Covers the broadest range of devices, applications, and file types
  • Identifies sensitive data throughout your network
  • Detects data-stealing malware and mitigates risky behavior
  • Aids compliance with greater visibility and enforcement

Security for Mac module

Protect Apple Macintosh clients on your network by preventing them from accessing malicious sites and distributing malware—even if the malware is not targeted at MacOs.

  • Reduces exposure to web-based threats, including new Mac-targeting malware
  • Blocks malware for all systems, including both MacOS and Windows
  • Adheres to MacOS look and feel for positive user experience
  • Saves time and effort with centralized management

Mobile Security Integration (additional license required)

Deploy Trend Micro Mobile Security to extend endpoint protection to mobile devices and the data they carry.

  • Integrate OfficeScan and Trend Micro Mobile Security through Trend Micro Control Manager, enabling unified management and policy deployment across all endpoint security
  • Combines mobile device antimalware, mobile app management, mobile device management (MDM), and data protection in a single solution
  • Enforces policies for data access and protection, passwords, data encryption, and remote lock and wipe
  • Ensures the proper device configurations and adds protections to prevent malware and reduce risk

Intrusion Defense Firewall (IDF) Module

Stop zero-day threats immediately with a network-level Host Intrusion Prevention System (HIPS) that enables virtual patching.

  • Shield vulnerabilities in client operating systems and -applications before patches are available
  • Deploy true zero-day protection from known and unknown threats
  • Protect your critical platforms, including Windows 8

Light & Lean: Lower infection rates by 62% and management costs by 40%

When compared to other solutions, OfficeScan gets the job done faster – up to 60% faster (PDF/engl.) . Because OfficeScan leverages our cloud-based Smart Protection Network infrastructure, the bulk of signatures aren’t deployed to the endpoints, freeing up memory for your user’s applications.

Scanning is finished earlier, returning the resources to the user sooner and minimizing the impact security scans have on productivity.

Comparison test results (PDF/engl.) consistently prove Trend Micro offers a smaller footprint and higher performance, and leads in overall protection against threats.

 

Virtual patching for protection from zero-day threats

Hundreds of software vulnerabilities are exposed each month, and timely patching is expensive, prone to error and often impossible.

Trend Micro virtual patching solutions deliver immediate protection while eliminating the operational pains of emergency patching, frequent patch cycles, and costly system downtime.

By installing OfficeScan with the HIPS plug-in for Intrusion Defense Firewall, you can deliver the proven vulnerability shielding that will keep your servers and endpoints protected while preventing costly emergency patching and upgrades as well as reducing the risk of breach disclosure costs. It even helps to extend the life of legacy systems and applications.



The proof is in the results.

Indusface proves Trend Micro offers a smaller footprint and higher performance.

 

TEST RESULTS - PHYSICAL CLIENTS
The descriptions below highlight test cases and results from testing of physical clients.

TEST CASE - BASELINE AV INSTALLATION
Approach: System memory, HDD & CPU data are recorded after the installation of the endpoint target.

Trend Micro Performance Chart 2Result: It was observed that Trend Micro OfficeScan 10.6 utilizes the lowest endpoint resource after AV installation on the endpoint system. This observation proves that endpoint resources are available for more end user activity with OfficeScan 10.6, consuming 4-11% less memory than competitors products.



Product & Operating SystemVirtualization Support CPUMemoryDisk Space
OfficeScan Server for:
Microsoft® Windows® Server 2008, 2008 R2, 2003, 2003 R2;
Microsoft Windows Storage Server 2008, 2008 R2, 2003, 2003 R2;
Windows Computer Cluster Server 2003;
Windows HPC Server 2008
  • Microsoft Virtual Server 2005 R2 with SP1
  • Microsoft Windows Server 2008 R2, 2008 with Hyper-V
  • VMware™ vSphere 4
  • VMware™ ESXi Server 4
  • VMware Server 2
  • VMware Workstation and Workstation ACE Edition 7
1.86GHz Intel™ Core™2 Duo processor or equivalent 2GB of RAM 3.5GB of available disk space
OfficeScan Client for:
Windows® Server 2008, 2008 R2; Windows Storage Server 2008, 2008 R2; Windows HPC Server 2008
  • Microsoft® Virtual Server 2005 R2
  • Microsoft Windows Server 2008, 2008 R2 Hyper-V
  • Microsoft Hyper-V Server 2008 R2
  • VMware™ ESX/ESXi Server 3.5, 4.0, 4.1, 5.0
  • VMware Server 1.0.3, 2
  • VMware Workstation and Workstation ACE Edition 7.0, 7.1
  • VMware vCenter 4.0, 4.1
  • VMware View 4.5
  • Citrix XenApp 4.5, 5.0, 6.0
  • Citrix XenServer 5.5, 5.6
  • Citrix XenDesktop 5.0
2GHz Intel™ Pentium™ processor or equivalent for 32 bit 1GB of RAM 350MB of available disk space
Web installation: Windows® Internet Explorer 7.0 or later
OfficeScan Client for:
Windows® 7
  • Microsoft® Virtual Server 2005 R2
  • Microsoft Windows Server 2008, 2008 R2 Hyper-V
  • Microsoft Hyper-V Server 2008 R2
  • VMware™ ESX/ESXi Server 3.5, 4.0, 4.1, 5.0
  • VMware Server 1.0.3, 2
  • VMware Workstation and Workstation ACE Edition 7.0, 7.1
  • VMware vCenter 4.0, 4.1
  • VMware View 4.5
  • Citrix XenApp 4.5, 5.0, 6.0
  • Citrix XenServer 5.5, 5.6
  • Citrix XenDesktop 5.0
1GHz Intel™ Pentium™ processor or equivalent 2GB of RAM 350MB of available disk space
Web installation: Windows® Internet Explorer 7.0 or later
OfficeScan Client for:
Windows® Vista®
  • Microsoft® Virtual Server 2005 R2
  • Microsoft Windows Server 2008, 2008 R2 Hyper-V
  • Microsoft Hyper-V Server 2008 R2
  • VMware™ ESX/ESXi Server 3.5, 4.0, 4.1, 5.0
  • VMware Server 1.0.3, 2
  • VMware Workstation and Workstation ACE Edition 7.0, 7.1
  • VMware vCenter 4.0, 4.1
  • VMware View 4.5
  • Citrix XenApp 4.5, 5.0, 6.0
  • Citrix XenServer 5.5, 5.6
  • Citrix XenDesktop 5.0
1GHz Intel™ Pentium™ processor or equivalent 1.5GB of RAM 350MB of available disk space
Web installation: Windows® Internet Explorer 7.0 or later
OfficeScan Client for:
Windows® XP
  • Microsoft® Virtual Server 2005 R2
  • Microsoft Windows Server 2008, 2008 R2 Hyper-V
  • Microsoft Hyper-V Server 2008 R2
  • VMware™ ESX/ESXi Server 3.5, 4.0, 4.1, 5.0
  • VMware Server 1.0.3, 2
  • VMware Workstation and Workstation ACE Edition 7.0, 7.1
  • VMware vCenter 4.0, 4.1
  • VMware View 4.5
  • Citrix XenApp 4.5, 5.0, 6.0
  • Citrix XenServer 5.5, 5.6
  • Citrix XenDesktop 5.0
300MHz Intel™ Pentium™ processor or equivalent 512MB of RAM 350MB of available disk space
Web installation: Windows® Internet Explorer 7.0 or later
OfficeScan Client for:
Windows® Embedded POSReady 2009
  • Microsoft® Virtual Server 2005 R2
  • Microsoft Windows Server 2008, 2008 R2 Hyper-V
  • Microsoft Hyper-V Server 2008 R2
  • VMware™ ESX/ESXi Server 3.5, 4.0, 4.1, 5.0
  • VMware Server 1.0.3, 2
  • VMware Workstation and Workstation ACE Edition 7.0, 7.1
  • VMware vCenter 4.0, 4.1
  • VMware View 4.5
  • Citrix XenApp 4.5, 5.0, 6.0
  • Citrix XenServer 5.5, 5.6
  • Citrix XenDesktop 5.0
300MHz Intel™ Pentium™ processor or equivalent 512MB of RAM 350MB of available disk space
Web installation: Windows® Internet Explorer 7.0 or later
Web-based Management Console

 

300MHz Intel™ Pentium™ processor or equivalent 128MB of RAM 30MB of available disk space
Web installation: Windows® Internet Explorer 7.0 or later

Social Media

Connect with us on