Skip to content

OfficeScan

Unleash the power of physical and virtual desktops.

Consolidate your endpoints under a unified infrastructure; across physical, virtual, cloud and mobile environments; with flexible, cost efficient security that’s easy to deploy and manage from a single console.

Trend Micro OfficeScan
  • Secure virtualised desktops
  • Protect data from loss and theft
  • Lower resource usage
  • Apply virtual patching
  • Protect mobile devices

See how OfficeScan™ security helps you make the most of your endpoints.






OfficeScan is a powerful endpoint security solution that combines on-premise and in-the-cloud security technologies to safeguard file servers, desktops, laptops and mobile devices.

Unique plug-in architecture: OfficeScan, with its flexible architecture, makes it possible to add security services as needed, and, apply future updates, without having to redeploy the entire solution.

  • Data Loss Prevention (DLP) Plug-In
  • Mobile Security Plug-In
  • Intrusion Defense Firewall Plug-In
  • Security for Mac

Optimised for desktop virtualisation security: Isolate control of desktop environments, streamline management, and consolidate and extend the life of existing hardware.

  • Automatically recognises whether an agent is on a physical or virtual endpoint to better target protection
  • Prevents network, CPU, and storage conflicts by serialising scan and update operations per virtual server
  • Shortens scan times of virtual desktops by white-listing base images and previously scanned content

Superior malware protection: Protects endpoints, on or off the corporate network, against viruses, Trojans, worms, spyware, and new variants as they emerge.

  • Reduces the burden of pattern file management and lowers performance impact
  • Improves web performance and privacy by synchronising with a local server
  • Detects and removes active and hidden rootkits
  • Safeguards endpoint mail boxes by scanning POP3 email and Outlook folders for threats
  • Queries up-to-the second data on the safety of a file before it’s accessed

Easy to manage: OfficeScan centralises management capabilities, for heightened visibility and greater control.

  • Automatically cleans endpoints of malware, including processes and registry entries that are hidden or locked
  • Easily integrates with Active Directory to retrieve and synchronise information on endpoints and report on policy compliance
  • Centralises management for physical and virtual endpoints, Macintosh computers, and mobile devices with a single, web-based console
  • Supports easy task-delegation with granular role-based administration


Get more from your existing Trend Micro security with additional protection.

Data Loss Prevention Plug-In

Protect your sensitive data with the Data Loss Prevention plug-in, for maximum visibility and control.

  • Protects private data - on or off network
  • Covers the broadest range of devices, applications, and file types
  • Identifies sensitive data throughout your network
  • Detects data-stealing malware and mitigates risky behavior
  • Aids compliance with greater visibility and enforcement

Mobile Security Plug-In

Secure and manage corporate and employee-owned mobile devices.

  • Enforces policies for data access and protection by enforcing the use of passwords, encrypting data, and remotely removing data from lost or stolen devices.
  • Ensures the proper device configurations and adds protections to prevent malware and reduce the risk of compromised devices
  • Saves time and money with centralised device management along with the ability for end users to select consumer-grade devices at corporate discount prices

Intrusion Defense Firewall Plug-in

Supplement OfficeScan client-level security with network-level Host Intrusion Prevention System (HIPS) for virtual patching.

  • Shield vulnerabilities in operating systems and client applications
  • Delivers true zero-day protection from known and unknown threats.


Security for Mac Plug-in

  • Protect Apple Macintosh clients on your network by preventing them from accessing malicious sites and distributing malware, even if the malware is not targeted at MacOs. Reduces exposure to web-based threats, including new Mac-targeting malware
  • Blocks malware for all systems, including both MacOS and Windows
  • Adheres to MacOS look and feel for positive user experience
  • Saves time and effort with centralised management

Light & Lean: Lower infection rates by 62% and management costs by 40%

When compared to other solutions, OfficeScan gets the job done faster – up to 60% faster . Because OfficeScan leverages our cloud-based Smart Protection Network infrastructure, the bulk of signatures aren’t deployed to the endpoints, freeing up memory for your user’s applications.

Scanning is finished earlier, returning the resources to the user sooner and minimising the impact security scans have on productivity.

Comparison test results consistently prove Trend Micro offers a smaller footprint and higher performance, and leads in overall protection against threats.

Virtual patching for protection from zero-day threats

Hundreds of software vulnerabilities are exposed each month, and timely patching is expensive, prone to error and often impossible.

Trend Micro virtual patching solutions deliver immediate protection while eliminating the operational pains of emergency patching, frequent patch cycles, and costly system downtime.

By installing OfficeScan with the HIPS plug-in for Intrusion Defense Firewall, you can deliver the proven vulnerability shielding that will keep your servers and endpoints protected while preventing costly emergency patching and upgrades as well as reducing the risk of breach disclosure costs. It even helps to extend the life of legacy systems and applications.



The proof is in the results.

Indusface proves Trend Micro offers a smaller footprint and higher performance.

 

TEST RESULTS - PHYSICAL CLIENTS
The descriptions below highlight test cases and results from testing of physical clients.

TEST CASE - BASELINE AV INSTALLATION
Approach: Systems memory, HDD & CPU data are recorded after the installation of the endpoint target.

Tm Performance Chart2 Result: It was observed that Trend Micro OfficeScan 10.6 utilizes the lowest endpoint resource after AV installation on the endpoint system. This observation proves that endpoint resources are available for more end user activity with OfficeScan 10.6, consuming 4-11% less memory than competitors products.


Read why Indusface calls Trend Micro “Best”
AV-Test confirms that Trend Micro leads in overall protection against malware threats.


Product & Operating System Virtualisation Support CPU Memory Disk Space
OfficeScan Server for :Microsoft® Windows® Server 2008, 2008 R2, 2003, 2003 R2; Microsoft Windows Storage Server 2008, 2008 R2, 2003, 2003 R2; Windows Compute Cluster Server 2003; Windows HPC Server 2008
  • Microsoft Virtual Server 2005
  • R2 with SP1 Microsoft
  • Windows Server 2008 R2, 2008 with Hyper-V
  • VMware™ vSphere 4
  • VMware™ ESXi Server 4
  • VMware Server 2 VMware
  • Workstation and Workstation ACE Edition 7
1.86GHz Intel™ Core™2 Duo processor or equivalent 2GB of RAM 3.5GB of available disk space
OfficeScan Client for:
Windows® Server 2008, 2008 R2; Windows Storage Server 2008, 2008 R2; Windows HPC Server 2008
  • Microsoft® Virtual Server 2005 R2
  • Microsoft Windows Server 2008, 2008
  • R2 Hyper-V Microsoft Hyper-V Server 2008
  • R2 VMware™ ESX/ESXi Server 3.5, 4.0, 4.1, 5.0
  • VMware Server 1.0.3, 2
  • VMware Workstation and Workstation ACE Edition 7.0, 7.1
  • VMware vCenter 4.0, 4.1
  • VMware View 4.5
  • Citrix XenApp 4.5, 5.0, 6.0
  • Citrix XenServer 5.5, 5.6
  • Citrix XenDesktop 5.0
2GHz Intel™ Pentium™ processor or equivalent for 32 bit 1GB of RAM 350MB of available disk space
Web installation: Windows® Internet Explorer 7.0 or later
OfficeScan Client for:
Windows® 7
  • Microsoft® Virtual Server 2005 R2
  • Microsoft Windows Server 2008, 2008
  • R2 Hyper-V Microsoft Hyper-V Server 2008
  • R2 VMware™ ESX/ESXi Server 3.5, 4.0, 4.1, 5.0
  • VMware Server 1.0.3, 2
  • VMware Workstation and Workstation ACE Edition 7.0, 7.1
  • VMware vCenter 4.0, 4.1
  • VMware View 4.5
  • Citrix XenApp 4.5, 5.0, 6.0
  • Citrix XenServer 5.5, 5.6
  • Citrix XenDesktop 5.0
1GHz Intel™ Pentium™ processor or equivalent 2GB of RAM 350MB of available disk space
Web installation: Windows® Internet Explorer 7.0 or later
OfficeScan Client for:
Windows® Vista®
  • Microsoft® Virtual Server 2005 R2
  • Microsoft Windows Server 2008, 2008
  • R2 Hyper-V Microsoft Hyper-V Server 2008
  • R2 VMware™ ESX/ESXi Server 3.5, 4.0, 4.1, 5.0
  • VMware Server 1.0.3, 2
  • VMware Workstation and Workstation ACE Edition 7.0, 7.1
  • VMware vCenter 4.0, 4.1
  • VMware View 4.5
  • Citrix XenApp 4.5, 5.0, 6.0
  • Citrix XenServer 5.5, 5.6
  • Citrix XenDesktop 5.0
1GHz Intel™ Pentium™ processor or equivalent 1.5GB of RAM 350MB of available disk space
Web installation: Windows® Internet Explorer 7.0 or later
OfficeScan Client for:
Windows® XP
  • Microsoft® Virtual Server 2005 R2
  • Microsoft Windows Server 2008, 2008
  • R2 Hyper-V Microsoft Hyper-V Server 2008
  • R2 VMware™ ESX/ESXi Server 3.5, 4.0, 4.1, 5.0
  • VMware Server 1.0.3, 2
  • VMware Workstation and Workstation ACE Edition 7.0, 7.1
  • VMware vCenter 4.0, 4.1
  • VMware View 4.5
  • Citrix XenApp 4.5, 5.0, 6.0
  • Citrix XenServer 5.5, 5.6
  • Citrix XenDesktop 5.0
300MHz Intel™ Pentium™ processor or equivalent 512MB of RAM 350MB of available disk space
Web installation: Windows® Internet Explorer 7.0 or later
OfficeScan Client for:
Windows® Embedded POSReady 2009
  • Microsoft® Virtual Server 2005 R2
  • Microsoft Windows Server 2008, 2008
  • R2 Hyper-V Microsoft Hyper-V Server 2008
  • R2 VMware™ ESX/ESXi Server 3.5, 4.0, 4.1, 5.0
  • VMware Server 1.0.3, 2
  • VMware Workstation and Workstation ACE Edition 7.0, 7.1
  • VMware vCenter 4.0, 4.1
  • VMware View 4.5
  • Citrix XenApp 4.5, 5.0, 6.0
  • Citrix XenServer 5.5, 5.6
  • Citrix XenDesktop 5.0
300MHz Intel™ Pentium™ processor or equivalent 512MB of RAM 350MB of available disk space
Web installation: Windows® Internet Explorer 7.0 or later
Web-based Management Console

 

300MHz Intel™ Pentium™ processor or equivalent 128MB of RAM 30MB of available disk space
Web installation: Windows® Internet Explorer 7.0 or later

Trend Micro Mobile Security supports the following platforms:

Mobile Device Operating Systems

  • Android 2.1+
  • iOS 3.x+ (preview only)
  • Microsoft Windows Mobile 5.0 Pocket PC / Pocket PC Phone
  • Microsoft Windows Mobile 5.0 Smartphone
  • Microsoft Windows Mobile 6.x Classic / Professional
  • Microsoft Windows Mobile 6.x Standard
  • Symbian 9.1/ S60 3rd & 5th Editions

See full Mobile System Requirements


Connect with us on