Effective, Safe and Simple
November 10, 2021
Effective, Safe and Simple

Score 9 out of 10
Vetted Review
Verified User
Overall Satisfaction with Trend Micro Email Security
Trend Micro Email Security is actively used for every mailbox in our entire organization, by everyone without exception. We have been using it for 5-6 years as the most important link of our mail security chain. The greater the importance of security today, the more important is mail protection in case of targeted, untargeted attacks from outside.
- Mail analytics SPF, DKIM and DMARC
- Known threats (spam, malware, malicious URLs and graymail)
- Unknown threats (malware, url) detection
- Keyword Filter, Domain Filter.
- It would be great if there was a structure where users would approve or rate their own mails.
- Outlook add-in would be nice.
- Since everything happens on the cloud, a server, software, etc. does not create an e-mail.
- Security has no set price, because customer trust cannot be bought with money.The return on this investment equals all of our customer confidence.
Trend Micro Email Security has a really simple interface for first integration and then policy creation. When you complete these steps, you can start using immediately and make even complex rules with the click of a mouse without getting lost between the pages. With the effect of our trust in the Trend Micro ecosystem, we love and prefer this product much more.
Do you think Trend Micro Email Security delivers good value for the price?
Yes
Are you happy with Trend Micro Email Security's feature set?
Yes
Did Trend Micro Email Security live up to sales and marketing promises?
Yes
Did implementation of Trend Micro Email Security go as expected?
Yes
Would you buy Trend Micro Email Security again?
Yes
Trend Micro Email Security Feature Ratings
Using Trend Micro Email Security
250 - It is active in all mailboxes.
5 - There are 5 people in total, but there is almost no need to interfere with the configuration, except for monitor or mail quarantine operations, everything works in a dynamic structure.
- understand whether external e-mails come from real people.
- Immediate recognition of known pests.
- sandbox scanning for unknown malware.