Skip to content

Worry-Free Business Security™
The only solution that delivers complete user protection for small businesses

Worry-Free Business Security Services Edition

 

Buy now  Renew now

Services Edition
Hosted and managed by Trend Micro

No IT staff? No problem. Hassle-free security for all devices: PCs / Macs, Servers, Virtual Machines & Mobile.

Learn more

 

Worry-Free Business Security Standard Edition

 

Buy now  Renew now

Standard Edition
Hosted and managed by you

Limited IT Resources? No problem. Easy to manage security for PCs/Macs, Servers and Virtual Machines.

Learn more

 

Worry-Free Business Security Advanced Edition

 

Buy now  Renew now

Advanced Edition
Hosted and managed by you

Complete security, designed for small businesses with PCs / Macs, File Servers, Virtual Machines, Mobile Devices & Mail Servers.

Learn more

 

Worry-Free
Business Security
Services

Worry-Free
Business Security
Standard
Worry-Free
Business Security
Advanced
Platforms
PCs, laptops, Windows servers
Mac clients (iMacs and MacBooks) and servers
Android devices (each seat comes with anti-virus protection for two Android devices)      
NEW and UNIQUE - Mobile device security (for Microsoft Exchange ActiveSync users only)**      
Centralised management
Web management console Hosted by Trend Micro. Can be accessed anywhere via Internet. Via LAN or VPN Via LAN or VPN
Management server location Hosted by Trend Micro. Server maintenance free. On-premises On-premises
Updates and patches pushed to users Automatic Manual with complete control Manual with complete control
Policy pushed to users Via Internet. Can be pushed anywhere. Via LAN or VPN Via LAN or VPN
Antivirus and web security
Defends against viruses, spyware and other malware
UNIQUE - Advanced URL filtering blocks inappropriate websites

 

Web threat protection stops viruses and threats before they reach your business
Data protection
Device control - limits access of USB drives and other attached devices to prevent data loss and block threats
UNIQUE - Data loss prevention via business email messages, sent accidentally or deliberately      
Messaging security and antispam
Real-time scan for POP3 mail accounts
Blocks spam from entering POP3 mail accounts    
Stops spam and email-based viruses before they reach mail servers  Via separately purchased Hosted Email Security


Via included Hosted
Email Security
Threat protection and multi-layer antispam for Microsoft Exchange Servers      
Technical support
Business hour support
24x7 support and access to advanced engineers

Via separately purchased Select Support

Via separately purchased Select Support

Via separately purchased Select Support

 

**Mobile device security features in Worry-Free Business Security Advanced:

  • Device access control
  • Remote wipe
  • Security policy:
    • Enhanced password
    • Lock after inactivity timeout
    • Wipe after retry limit
    • Enforced exchange encryption
  • Supports Android, iOS, Blackberry, and Windows Phone

Close comparisson chart

Complete user protection for all your employees

  • Protects email, web, file sharing, and more
  • Filters URLs by blocking access to inappropriate websites, increasing employee productivity
  • Prevents data loss via email messages and USB drives
  • Blocks spam and safeguards against phishing as well as social engineering attacks
  • Protects Windows, Mac, and mobile devices

Easy to use and small foot print solution

  • Installs easily and is simple to use
  • Designed specifically for small businesses and requires no IT expertise
  • Provides centralized visibility and control
  • Provides protection with limited impact on performance

Stops threats in the cloud before they can reach your network and devices

Flexible deployment options

  • Features on-premises or hosted/cloud-based options
  • Options include: With or without email protection

 



Installation guides

Installation guides

Provides detailed installation instructions for:

Rescue disc

Rescue disc

Allows you to use a CD, DVD, or USB drive to examine your computer without launching Microsoft Windows.

Videos

Videos

Installation and upgrade walkthrough video guides for Worry-Free Business Security 9.0.

Best practice guide

Best practice guide

Guidelines to use Worry-Free Business Security 9 more efficiently (PDF).


Administration guides

Administration guides

Provides detailed operation instructions for:

Documentation center

Documentation center

Helpful documents to Trend Micro products.

Trend Micro YouTube channel

Trend Micro YouTube channel

For tips and information.

Frequently asked questions

Frequently asked questions

Please read through the FAQs before contacting our support team.


ReadMe

ReadMe

Contains useful information about:

Self service website check

Self service website check

This free service lets you check the safety of a particular URL that might seem suspicious.

Additional resources

Find more useful information around Worry-Free Business Security 9.

What small and medium-sized businesses need to know about IT security

Read our white papers and find out all about online threats and how you can protect yourself against them:

Open all

5 predictions for 2013 and beyond

5 predictions for 2013 and beyond

Cybercriminals will refine their methods in order to gain access to corporate data—including that of small and medium-sized businesses. This was predicted for 2013 by IT security experts. Read the PDF to find out more and how you can take action.
Download free PDF

5 things about web threats and cybercrime

5 things about web threats and cybercrime

Most small and medium-sized businesses are convinced that cybercriminals primarily target the data of larger enterprises. That is a mistake. Find out the hackers' tactics and how you can protect your business.
Download free PDF

5 mobile security threats

5 mobile security threats

Employees are increasingly using their private mobile devices for personal and business purposes. However, in most cases their devices are lacking sufficient protection. Businesses should know how to protect mobile devices from attacks. Find out what you need to look out for.
Download free PDF

5 things about social networking

5 things about social networking

Many people access social networks such as Facebook, Twitter and LinkedIn from their workplace. But this very common practice is risky. Cybercriminals are using social networks to access the confidential data of businesses and their employees. So you need to define policies for Internet use in your business. Read the PDF to find out what policies you should consider and what else your business should protect.
Download free PDF

5 cloud computing myths

5 cloud computing myths

If you use a cloud service you pay more than for your own hardware and software. This is simply a common error about the cloud. Read here how you can bring the benefits of the cloud to your business.
Download free PDF

 

5 facts about e-mail-based threats

5 facts about e-mail-based threats

Cybercriminals use e-mails for their attacks. For example, e-mails are still the most common malware vector. Read here which threats stem from infected e-mails and how to protect yourself against spam and phishing.
Download free PDF

 

5 things about Mac security

5 things about Mac security

Two in five businesses work with Macs. And employees are increasingly using private Mac devices at their workplace. And even if many Mac users believe they are, Macs are no better protected against malware than other devices. Find out which threats you can expect and what will help counter them.
Download free PDF

5 facts about data storage

5 facts about data storage

Business emails, financial documents, project and personal data are just some of the sensitive data for which businesses need to provide multiple levels of protection. But not enough companies are actually doing it. Read here why you require a server for secure data storage and how you can store your data in the cloud.
Download free PDF



Social Media

Connect with us on