Trend Micro
Trend Micro develops server security, cloud security, and small business content security solutions.
Some of the top features or benefits of Trend Micro are: Comprehensive Security Suite, Cloud and Hybrid Security, User-Friendly Interface, Regular Updates, and Strong Customer Support. You can visit the info page to learn more.
Trend Micro Alternatives & Competitors
The best Trend Micro alternatives based on verified products, community votes, reviews and other factors.
Filter:
10
Open-Source Alternatives.
Latest update:
-
Fully protect your data with the comprehensive detection technologies and unified policies of Symantec's industry leading Data Loss Prevention (DLP).
Key Symantec Data Loss Prevention features:
Comprehensive Coverage Advanced Detection Capabilities Policy Flexibility Detailed Reporting and Analytics
-
BitLocker is a full disk encryption feature included with Windows Vista and later.
Key Microsoft BitLocker features:
Strong Security Seamless Integration TPM Support Enterprise Management Tools
-
Verify your customers in under 15 seconds anywhere in the world with a cutting-edge SaaS & API platform for Identity Verification and AML/KYC compliance.
Key ComplyCube features:
AML & Sanctions Screening PEP Checks Negative Media Screening Watchlist Screening
-
Paubox provides HIPAA compliant email encryption without the hassle of extra steps.
Key Paubox features:
Ease of Use HIPAA Compliance No Extra Steps for End-Users 24/7 Customer Support
-
OpenSSH is a free version of the SSH connectivity tools that technical users rely on.
Key OpenSSH features:
Security Open Source Portability Rich Feature Set
-
Antivirus and Application Security.
Key GravityZone features:
Comprehensive Threat Detection Centralized Management Scalability Performance Optimization
-
Virtru is your data privacy force field, wrapping and protecting emails and files wherever they're shared. Easy-to-use data security software for business. People also askIs Virtru Hipaa compliant?
Key Virtru features:
Ease of Use End-to-End Encryption Access Controls Time-Based Access
-
Sophos develops products for communication endpoint, encryption, network security, email security and mobile security.
Key Sophos features:
Comprehensive Security Features User-Friendly Interface Centralized Management Strong Endpoint Protection
-
Kaspersky offers security systems designed for small business, corporations and large enterprises.
Key Kaspersky Endpoint Protection features:
Comprehensive Security Features Advanced Threat Detection Centralized Management Ease of Deployment
-
Autonomous endpoint protection platform.
Key SentinelOne features:
Real-Time Threat Detection Automated Response User-Friendly Interface Machine Learning and AI Integration
-
ngrok enables secure introspectable tunnels to localhost webhook development tool and debugging tool.
Key ngrok features:
Ease of Use Security Speed of Setup Flexibility
-
Secureworks Red Cloak MDR is a solution that offers endpoint detection and response services with 24/7 threat hunting and incident response in a single solution.
Key Secureworks Red Cloak MDR features:
Comprehensive Threat Detection 24/7 Monitoring Expert Analysis and Response Customization and Flexibility
-
CrowdStrike Falcon Complete is a managed detection response that helps you stop breaches from entering your system.
Key CrowdStrike Falcon Complete features:
Comprehensive Protection 24/7 Monitoring Expert Team Scalability
-
Harmony Endpoint is a cybersecurity software that helps businesses protect against cyber attacks.
Key Harmony Endpoint features:
Comprehensive Security Centralized Management Threat Intelligence Integration User-friendly Interface
Trend Micro discussion
