Skip to main content
TrustRadius
Trend Micro Worry-Free Services Suite

Trend Micro Worry-Free Services Suite

Overview

What is Trend Micro Worry-Free Services Suite?

Trend Micro offers an end-to-end hosted security solution which they call the Worry-Free Business Security suite for midsize and larger enterprises, which provides a wide range of services such as endpoint protection, email encryption, general antivirus and threat detection and…

Read more
Recent Reviews

TrustRadius Insights

Users have found that Worry Free Services Advanced by Trend Micro provides hassle-free cloud deployment, eliminating the need for internal …
Continue reading
Read all reviews

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Trend Micro Worry-Free Services Suite?

Trend Micro offers an end-to-end hosted security solution which they call the Worry-Free Business Security suite for midsize and larger enterprises, which provides a wide range of services such as endpoint protection, email encryption, general antivirus and threat detection and prevention, as well…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

19 people also want pricing

Alternatives Pricing

What is Microsoft Defender for Endpoint?

Microsoft Defender for Endpoint (formerly Microsoft Defender ATP) is a holistic, cloud delivered endpoint security solution that includes risk-based vulnerability management and assessment, attack surface reduction, behavioral based and cloud-powered next generation protection, endpoint detection…

What is Kaspersky Endpoint Security Cloud?

Kaspersky Endpoint Security Cloud provides a solution for organizations' IT security needs, blocking ransomware, file-less malware, zero-day attacks and other emerging threats. Kaspersky’s cloud-based approach helps users to work securely on any device, and collaborate safely online, at work or at…

Return to navigation

Product Details

Trend Micro Worry-Free Services Suite Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(26)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Users have found that Worry Free Services Advanced by Trend Micro provides hassle-free cloud deployment, eliminating the need for internal infrastructure and specialized teams for endpoint protection. The antivirus software effectively protects digital assets and intellectual property, ensuring a secure environment for users. One of the key benefits of this solution is its satisfactory performance, with minimal resource consumption from the operating system. Administrators appreciate the cloud-based nature of the solution, which allows them to manage policies and make changes remotely. Additionally, the software is continuously updated, providing reliable protection against malware and passing ethical hacker tests.

Another important use case of Trend Micro Worry-Free Business Security is its ability to protect companies from virus and malware infections. Over the past two years, this software has successfully safeguarded organizations from these threats, providing peace of mind to users. Another advantage is that the software has little to no impact on the performance of workstations, servers, and other end-user devices, ensuring uninterrupted productivity. The cloud-based deployment of this solution also comes in handy after a server crash or other emergencies that require alternative applications. Furthermore, users appreciate the centralized management provided by the cloud admin console, enabling easy control and administration for IT professionals. Lastly, Trend Micro Worry-Free Business Security delivers reliable protection and security when accessing the internet and downloading files, adding an extra layer of defense to organizations' digital activities.

Hybrid Deployment Option: Several users have praised the hybrid deployment option of the product, which allows them to have control over their environment whether it is on-prem or in the cloud. This flexibility has been highly advantageous for organizations with diverse infrastructure setups.

Ease of Maintenance and Updates: Many reviewers have expressed appreciation for the ease of maintenance and updates provided by the product. They highlight that updates are available as soon as they are released, without requiring any additional actions from the user. This streamlined process saves time and effort for IT teams.

Compatibility with Cloud and Collaboration Platforms: The compatibility of the product with popular cloud and collaboration platforms such as Office 365, Google Mail, and On-Cloud Storage has been seen as a valuable feature by a number of users. This integration allows for seamless protection across multiple environments, making it convenient for organizations using these platforms.

Cons:

  1. Installation Process: Some users have expressed frustration with the installation process as it requires an agent to be installed on the protected computer. This additional step can make the setup more cumbersome and time-consuming.
  2. Lack of Notifications: Several reviewers have mentioned that there are instances where the infected host does not receive alerts and notifications. Instead, these messages are solely directed to Control Manager, potentially causing delays in detecting and addressing security issues.
  3. Limited Capabilities: A number of users have felt that the software lacks certain capabilities found in more robust platforms within its price range. These missing features may limit the effectiveness of the solution and require organizations to seek additional tools or compromise on their security requirements.

Attribute Ratings

Reviews

(1-8 of 8)
Companies can't remove reviews or game the system. Here's why
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Real Time Reporting.
  • Next Generation Streaming Analysis.
  • Profile Configuration to suite.
  • Easy Deployment.
  • Good Value.
  • Granular Web Reputation Controls.
  • Some Configuration areas are limited.
  • Installation speed can be slow even on modern devices with enterprise-speed net connections.
  • Revisions to Web Categorization globally is clunky.
  • Lacks Device controls such as remote reboot.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • Very granular control settings like URL filter/block and separate policies for servers vs workstations.
  • Password restrictions on exiting and uninstalling the software on the end points.
  • You can force updates and scans at any time from admin console.
  • Price increases regularly.
  • When you actually want to uninstall the agent, sometimes it will refuse to do so. Luckily TM has a special uninstall tool if needed.
  • Can take awhile to dial in the thresholds against false positives.
Brian Duffy | TrustRadius Reviewer
Score 6 out of 10
Vetted Review
Verified User
Incentivized
  • Cloud management reports.
  • User management.
  • Administration tools are intuitive and easy to use.
  • Apple Mac client is troublesome.
  • Policies are clunky and difficult to understand.
  • Security Agent dashboard lacks tools needed to remediate problems.
  • Technical support was less than satisfactory.
David Schwartz | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Policy creation: each type of device (server, pc, mobile) can have its own policy type, and can be even further separated into device locations or department groups.
  • Agent creation and rollout: enrolling a device into the system is super simple and can be completed by just sending the user an email with very simple instructions to complete the installation, or a system admin/tech support can manually download the installer to the machine if needed.
  • Tech support: their support staff is excellent and willing to go the extra mile to help! I've contacted them via email and the support portal and the response time is extremely prompt, and I've got a resolution or answer to my questions within the first 2 conversations, if not the first response.
  • Sales: upon renewal, I did have to reach out myself to confirm the renewal of our agreement, but it didn't take long to confirm. You'd just think someone would reach out to me ahead of time to set up the renewal agreement.
  • Agent uninstalls: Occasionally when you remove an agent from the portal it "should" complete an uninstall of the client the next time the PC connects and comes online, but I've noticed that that doesn't always work, and I'll have to manually uninstall using the uninstall password to free up the license.
Mauro Osvaldo Sepulveda Gutierrez | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • On cloud management
  • Malware detection works very well
  • License per user is not expensive
  • Good performance
  • Application control: when you try to apply policies for blocking applications you must select the path of the app location, but if the executable moves lead to another location the app will not be blocked.
  • The issue solutions suggested by the application sometimes aren't very effective
Mitch Hubbell | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • It provides a high level of security from viruses and malware.
  • Installation is incredibly simple.
  • The administrator console is incredibly well laid out and gives you quality information about your environment.
  • It can be a bit aggressive sometimes, but that's not always a bad thing
Jose A Garcia | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
ResellerIncentivized
  • Hybrid deployment, can be on-prem or cloud specific, we are using cloud based
  • Central Control Manager capabilities to have control about what happens in the environment
  • No need to have internal infrastructure to host further than your workstations or terminals
  • No need to have dedicated team for security or endpoint protection
  • Maintenance and updates are available just as released, no need to take actions on that side
  • Great capabilities as a connected threat defense platform
  • Endpoint protection features and quality for SMBs
  • Cloud and collaboration platforms compatible including Office 365, Google Mail and On-Cloud Storage
  • Not too much to say about cons
  • The installation needs an agent installed on the protected computer
  • Sometimes the infected host does not get the alert but the notification just goes to Control Manager
  • Can lack special capabilities found in more robust platforms in the same range
  • Pricier compared to other vendors
Return to navigation