Trend micro with Major features
Updated July 14, 2023

Trend micro with Major features

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with Trend Micro Apex One

We are using software as a global antivirus in all systemnacross the site.
Also it is installed in major equipment software.
Product has addressed problems by cont. providing update to quarantine the bugs and kept away the systems. Real-time and scheduled scan is one of the best feature and reasons to cont. with software. Also scope is to integrate with third party systems.



  • Real-time and scheduled scanning.
  • Third party software supports and recommend Trendmicro
  • Best online support
  • Client somentime found it offline during working.
  • If anyhow it is offline client can't make it online.
  • Some major third party company not agreed with policy
  • Quarantine policy
  • Scanning pattern
  • Restrictions
  • No attacks malware
  • No impact on system performances
  • Silent work
Another organization was using this software and Trend micro is widely used now a days and remote support is a positive thing. Also policy and updates are always on time delivered by the vendor. Online many software were compared by SME.

Do you think Trend Micro Apex One delivers good value for the price?

Yes

Are you happy with Trend Micro Apex One's feature set?

Yes

Did Trend Micro Apex One live up to sales and marketing promises?

Yes

Did implementation of Trend Micro Apex One go as expected?

Yes

Would you buy Trend Micro Apex One again?

Yes

Software is always updated and add-on are available. Also now a days operators has widely used so getting hands on not an issue. Immediate scanning when external device connected and detected.

Client has no any control as more admin has on the software. This to be improved. Other wise it is one other best..

Trend Micro Apex One Feature Ratings

Anti-Exploit Technology
9
Endpoint Detection and Response (EDR)
7
Centralized Management
10
Infection Remediation
9
Vulnerability Management
9
Malware Detection
10