Trend Micro Cloud App is great to filter any kind of risk coming form the email. Even if cloud systems like Exchange online is used as corporate email system it adds additional securioty layers, like using AI technology to detect phising, impersonations. It includes mechanisms of analysis in sandbox for uncertain or new threats. Review collected by and hosted on G2.com.
Applying robust filters may have false positives while filtering, which requires some adminsitration time to fine tune the filter or sending back to users filtered legit mails. Review collected by and hosted on G2.com.
With Trend Micro Cloud App Security it is safer to exchange files in the cloud and has reduced malware infections by more than 80% and has a multilayer connected security protects those who use it and their files regardless of where they are located and the device they use is because they have the widest range of protection against threats and also inspects shared files of workers, partners and mobile devices remotely to ensure that threats are not transferred through shared-use services. files in the cloud and how to manage its interface is fast, friendly and very easy to configure and when selecting the third party service in the cloud validating the data you already have protection against attacks and threats Review collected by and hosted on G2.com.
The negative of Trend Micro Cloud is the response time of the technical service since it had a fault that had to be solved quickly and was not possible due to the response time of said service, of rest there are no more complaints Review collected by and hosted on G2.com.
Its functionality is excellent since it avoids attacks sent through emails and thus managing to infect files or documents and with trend micro cloud we can control the use of confidential information and thus Data Loss Prevention (DLP) for OneDrive, SharePoint Online , Dropbox, Box and Google Drive using a large number of customized and pre-integrated compliance templates to control the sharing of controlled data, thus reducing malware infections that the incident response team and the integration with cloud services like Google, SharePoint among others that allows you to secure the files that are uploaded there Review collected by and hosted on G2.com.
The negative part is that on some occasions it has been given that we have an attack and then it turns out that there was no attack, the rest I have nothing against to add
Review collected by and hosted on G2.com.
The protection of the exchange of files from the cloud is now more secure against threats and the loss of data that we use in the company has provided us with a protection that we previously thought we did not need, because although each software in the cloud has security against attacks, the same is in some cases are insufficient and Trend micro cloud app security controls the use of confidential information and thus preventing the loss of data for OneDrive, SharePoint Online, Dropbox, Box and Google Drive among others that uses more of one hundred customized and pre-integrated compliance formats to control the sharing of controlled data, the configuration is very easy, it has a very simple graphic interface to configure, you select the third party service in the corresponding cloud and when validating the data you already have protection against attacks and threats and so you are doing to include all services to give you the most effective protection and thus ensure that threats do not migrate through file sharing services in the cloud. Review collected by and hosted on G2.com.
Sometimes it detects threats that are not such, for the rest I have nothing negative about Trend micro cloud app security, it is known that the software has protection but it is not enough and this additional protection is not unnecessary at all since it complements the weaknesses and power with a double layer of security. Review collected by and hosted on G2.com.
Among some of its functions that I liked most about the application is its protection against ransomware attacks, since previously we had been victims of malicious software attacks, since it has an advanced technology that allowed us to detect these ransomware in emails from the company, on the other hand, has technology that ensures the arrest of all types of vulnerabilities in emails and the ability to stop BEC attacks, it is important to note that it has integration with SharePoint, Dropbox bussines and other cloud services. which also allows to protect against the loss of data in the storage spaces in the cloud independently of the service provider. Make arrests that office 365 goes unnoticed Review collected by and hosted on G2.com.
False positives detention is a notification and activity that has become recurrent, I consider it necessary to fix this point since time is lost in configuring the unnecessary exclusions of the system.
Review collected by and hosted on G2.com.
Quick and easy view of all flagged messages. Secure login with easy navigation, user controls, and pleasing U/I. Navigation lets you see all approved and blocked senders in a concise list. It is also easy to move domains from one list to the other with minimal effort. I prefer this solution over others in the market. Review collected by and hosted on G2.com.
When you 'Deliver and Approve Sender' I need it to recognize the email domain, not the full back-end string of the sender address. I feel the need to go in at least one time per day to release newsletters and messages from vendors and partners. Review collected by and hosted on G2.com.
It is simply a program focused on the protection of files and documents hosted in the most common cloud services today, among which we can highlight OneDrive for business, Exchange. SharePoint, office 365, Gmail and Google drive, in addition to Google g -suite, the program helps to avoid ransomware attacks, in addition to other attacks on company emails, and other attacks on the files contained within the services , it is important to highlight that it has an artificial intelligence that allows to monitor the behavior of emails and activities, protecting and protecting the vulnerabilities of office documents that may be infected by malicious software, it is a system of advanced protection in addition to that offered by Microsoft or Google, allowing the threats to be stopped almost entirely. Review collected by and hosted on G2.com.
The program does not have a mobile client for Android or other mobile phone system, which is important today since it allows the necessary mobility to review and monitor anywhere the activities and the results of the arrests made by the cloud app security Review collected by and hosted on G2.com.
We are using this tool for providing security to the Office 365 and cloud file-sharing services. It mainly comes in picture where it protects Protects Office 365 email from phishing and advanced malware and Enforces compliance for cloud file-sharing services. Seamlessly it also works with Office 365, Box, Dropbox, and Google Drive security and it also preserves full user and administrator functionality.
Pattern Micro Cloud App Security empowers you to grasp the effectiveness of cloud administrations while looking after security. It secures approaching and inside Office 365 email from cutting edge malware and different dangers, and authorizes consistence on other cloud record sharing administrations, including Box, Dropbox, Google Drive, SharePoint Online, and Overdrive Business
. Review collected by and hosted on G2.com.
One thing I don't care for about Trend Micro is that I have had some trouble in reestablishing the product. This might be on the grounds that we have to experience an affiliate, however I don't know. Review collected by and hosted on G2.com.
Security in terms of Business emails, office 365 vulnerabilities as well as security to document exploitation detection is much needed and appreciated featured from the Trend Micro Saas cloud security provider. At organizational level, security in terms of malware or other malicious attacks is the most prominent factor and trend micro cloud protection has meticulous way of detecting any smallest king of threatening aspect. Really, It is not of the best, but due to its machine learning approach it is worth trying it. Review collected by and hosted on G2.com.
One thing that I believe should be improved that its machine ;earning approach, by which sometimes it detects false files as malicious. However, this takes time, as algorithms improves by it self in machine learning, Apart from this, There should be more customization options available, so consumers companies like us, can manipulate software, as per terms of our organization . Review collected by and hosted on G2.com.
It is an application in the cloud that allows you to detect and stop risks and threats as a user, of your data and files. Meets the requirements and needs of your organization to have a tool against vulnerabilities. You can make use of this program online. It can connect and integrate with other applications. For example. Office 365, Box, etc. Among its functions is the visualization and protection of data efficiently and effectively against emails, pages or harmful software that can infect our computers.
Review collected by and hosted on G2.com.
What I do not like is that the duration of the test is very short and make the use of other functions more complex and secure. It has a cost. And it puts us at risk and disadvantage if we do not use this digital tool.
Review collected by and hosted on G2.com.
Excellent program to protect your server from web threats of any malicious software that attempts to block your computer or laptop and even your smartphone. It immediately detects all the vulnerabilities that could put your organization at risk. It integrates with Dropbox, Onedrive and Google Drive. What allows to prevent and analyze the data of them in real time.
Review collected by and hosted on G2.com.
What I do not like is that to update and get better versions have a payment plan. And the other thing that is always warning you that you have little memory. Indicating. Which is more suitable for computers that have a minimum RAM of 512. Review collected by and hosted on G2.com.
It has saved me a lot of times thanks to its advanced analysis and machine learning system that detects malicious files and attacks within the cloud file platform, is reliable, safe and avoids losses. Review collected by and hosted on G2.com.
It is a system concentrated and directed especially for office and risk protection in the same platform in the cloud but often difficult to explore another type of file. Review collected by and hosted on G2.com.
The best part is the updates via the subscription cover most O/S upgrades seamlessly and you can control the rollouts from the management point policy center. I have found as an end-user that the product is very easy to use does not conflict with my existing apps and if the O/S upgrade is a problem it causes very little problems with system operations. Review collected by and hosted on G2.com.
Time between testing for a new O/S is very quick on the deployment but problematic on the UAT testing. Early releases for UAT testing would be better make the experience less painful. Review collected by and hosted on G2.com.
I like that is not heavy because it is cloud base, and it does what it should do. It's very user-friendly, our clients don't have any problem using it at all. They understand it quickly and love the protection it provides. Review collected by and hosted on G2.com.
I think it's a very complete software, cloud base so it is super light. I haven't had any problem with it. Review collected by and hosted on G2.com.
The fact that it makes monitoring and creating an inventory for our Cloud Workloads so much easier to handle and is very very streamlined. Review collected by and hosted on G2.com.
It can be a little bit confusing to try and get acclimated with at first but once you're comfortable that issue goes away. Review collected by and hosted on G2.com.
The ease of use of the product. Trend Micro is a well-known company and has been proven effective by 3rd party independent virus penetration and testing companies. Review collected by and hosted on G2.com.
Trend Micro can improve its customer service by replying to questions and concerns in a more timely manner Review collected by and hosted on G2.com.
Fairly lightweight client side software with minimal resources. Very configurable. Once you get used to the interfaces and admin console, you can deploy via a variety of methods. Review collected by and hosted on G2.com.
Very confusing interface for things like subscriptions, deployed machines, licenses in use etc. etc. trying to deploy to end users via weblink or emails is a confusing mess. Review collected by and hosted on G2.com.