Skip to content

Our Technology

We continually advance our technologies to deliver on our mission to make the world safe for the exchange of digital information.


Our data-centric security framework addresses the risks and opportunities inherent in cloud computing and the mobility of people, their devices and their data, as well as confronting the dangerous increase in targeted attacks on business and government.


Building on the superior technology of the Trend Micro™ Smart Protection Network™ infrastructure, we’re integrating smarter threat and data protection along with unified security management to deliver adaptive security that protects your important data wherever it resides.


Smarter threat protection brings the power of our cloud-based detection and correlation technologies inside a customer’s environment with intelligent sensors throughout the network to identify and protect against targeted attacks.


Smarter data protection enables integrated data protection and contextual awareness throughout the organisation to ensure the confidentiality and protection of valuable data.

Our History of Innovation Continues



Breakthrough Encryption Key Management and Data Protection for Public and Private Clouds


Virtualisation Security

Agentless Anti-Malware for virtualised desktops and data centers


Data Center Security

Deep Security for Physical, Virtual and Cloud Servers


Trend Micro Smart Protection Network

A Cloud/Client Content Security Infrastructure


Email Archiving

Data Loss Prevention


Web Threat Protection

Web Reputation
2006 Botnet Identification Service
2005 E-mail Reputation Services

Trend Micro and Cisco

Integrated Security in the Network


Integrated Gateway Content Security:

InterScan™ Messaging Security Suite
2002 Two-Hour Virus Response SLA
Threat Lifecycle Management Strategy
Enterprise Protection Strategy (EPS)

Web Filtering

InterScan™ WebManager


Web-based Centralised Management

Trend Micro Control Manager™


Email Server Virus Protection



Internet Gateway Virus Protection



LAN Server Virus Protection

Server Proctect™

Threat Detection and Prevention

All of our solutions are powered by Smart Protection Network  infrastructure, which uses smart feedback, threat correlation and a cloud-client architecture to ensure new threats are blocked as soon as they are identified.

  • One of the world’s largest, most reliable email, file and web reputation databases
  • Patent-pending global correlation engine allows us to identify all components of a threat
  • Intelligent sensors within a corporate network correlate local threat data to identify and protect against targeted attacks
  • Smart feedback from more than 100+ million users continually updates threat response


Data Protection

Combining data loss prevention, device control, encryption and key management with contextual awareness secures data across physical, virtual and cloud environments.

  • Data Protection integrated into endpoint, server, network, messaging, gateway, and SaaS security solutions
  • Patent-pending policy-based key management safely delivers encryption keys to valid devices
  • Identity-based encryption (IBE) available at gateway, desktop and hosted
  • Full disk encryption, USB encryption, file/folder encryption, removable media encryption available for endpoints
  • Certifications include: CAVP, FIPS 140-2 (Level 2 &3); NIST, NIAP, EAL4+, NSA approval, DARTT validation

Learn more about the data protection capabilities in our enterprise, small business and home/home office products.

Infrastructure Support

Securing data as it moves between platforms or cloud vendors, regardless of access device, enables customers to take full advantage of improvements in IT infrastructures.

  • Industry’s first and only agentless anti-malware is optimised for virtual environments
  • Agentless integrity monitoring improves security without increasing footprint
  • Data protection secures information in public, private, and hybrid clouds, and virtual environments
  • Mobile device security and management addresses consumerisation of IT

Learn more about how these technologies help meet the challenges of cloud security and consumerisation.

Connect with us on