Our major use case is for data blocking and security, content categorization, and generating accessibility reports to track where data has been accessed, including email shares. Getting all these reports and keeping track of it all.
The main use of the tool was to avoid infections and attacks on the organization. The purpose of having antivirus software installed in an environment is with the agenda to ensure that there is a product to avoid attacks on the organization.
We use Trend Micro mainly to monitor user activities, such as tracking the websites they visit and purchase items. Additionally, we focus on identifying and addressing antivirus threats. We used to explore a feature related to proxy but decided against it as an enterprise solution wasn't readily available for us. Our primary use of Trend Micro revolves around end-user security. Integration with Active Directory has proven beneficial, allowing us to easily push updates or changes directly from the console.
Learn what your peers think about Trend Micro Integrated Data Loss Prevention. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
Trend Micro Integrated Data Loss Prevention filters out any potential leakage of personal data, such as credit cards, ID numbers, addresses, etc. For example, suppose there's any violation or illegal activity while users copy files. In that case, Trend Micro Integrated Data Loss Prevention actively blocks those through different channels, such as on web pages, emails, and CD-ROMs.
Trend Micro Integrated Data Loss Prevention allows you to block or monitor if someone's taking the data out of the environment, based on the policy setting that you configured. The solution provides data leakage protection.
We primarily use it as a main management solution. Our support company handles it and they bought it to integrate and install. They are partners with Trend Micro.
Information Security Specialist at Ministry of Education Computer Center
Real User
Top 10
2019-08-06T07:17:00Z
Aug 6, 2019
We use this solution to protect our data and to ensure that it is not leaked by USB or other methods. We encrypt the data and make sure that it is not copied to other media. We use an on-premises deployment model.
The primary use case as the integrator and the reseller of Trend Micro is encryption and data loss prevention. We also use Trend Micro as an antivirus.
Technical Engineer at a tech vendor with 11-50 employees
Real User
2019-04-17T08:37:00Z
Apr 17, 2019
We use Trend Micro Data Loss Prevention as a primary solution. We need to monitor and administer user accounts, in certain instances voiding contact as a solution for the flex server. We also use Microsft BitLocker.
The primary use is to control and manage the data flow through the main system, along with the logs. We are using the DLP for tracking users' data flow. My company has been using it for over year, but I have been using the solution for four months. We are using the latest version of the solution.
Now more than ever, your data is on the move—whether it’s on a laptop, flash drive, or moving across physical, virtual, and cloud infrastructures. At any point along the way, your financial data, customer information, intellectual property, or trade secrets could be lost or stolen. Securing this data is further complicated by several growing risk factors:Rapidly evolving compliance regulations and mandates, including GDPRContinued growth of workforce mobilityEmployees using their own mobile...
We use the product for endpoint, email, and cloud application security.
Our major use case is for data blocking and security, content categorization, and generating accessibility reports to track where data has been accessed, including email shares. Getting all these reports and keeping track of it all.
The main use of the tool was to avoid infections and attacks on the organization. The purpose of having antivirus software installed in an environment is with the agenda to ensure that there is a product to avoid attacks on the organization.
We use Trend Micro mainly to monitor user activities, such as tracking the websites they visit and purchase items. Additionally, we focus on identifying and addressing antivirus threats. We used to explore a feature related to proxy but decided against it as an enterprise solution wasn't readily available for us. Our primary use of Trend Micro revolves around end-user security. Integration with Active Directory has proven beneficial, allowing us to easily push updates or changes directly from the console.
We use the product for data security for a government client.
Using the solution, we primarily capture all the data and filter out all the files transmitted via USB and CD ROM.
Trend Micro Integrated Data Loss Prevention filters out any potential leakage of personal data, such as credit cards, ID numbers, addresses, etc. For example, suppose there's any violation or illegal activity while users copy files. In that case, Trend Micro Integrated Data Loss Prevention actively blocks those through different channels, such as on web pages, emails, and CD-ROMs.
Trend Micro Integrated Data Loss Prevention allows you to block or monitor if someone's taking the data out of the environment, based on the policy setting that you configured. The solution provides data leakage protection.
We are using this solution to audit the user's data transfer. We monitor the data that is transferred through USB or DVD.
We primarily use it as a main management solution. Our support company handles it and they bought it to integrate and install. They are partners with Trend Micro.
We use this solution to protect our data and to ensure that it is not leaked by USB or other methods. We encrypt the data and make sure that it is not copied to other media. We use an on-premises deployment model.
The primary use case as the integrator and the reseller of Trend Micro is encryption and data loss prevention. We also use Trend Micro as an antivirus.
We use Trend Micro Data Loss Prevention as a primary solution. We need to monitor and administer user accounts, in certain instances voiding contact as a solution for the flex server. We also use Microsft BitLocker.
The primary use is to control and manage the data flow through the main system, along with the logs. We are using the DLP for tracking users' data flow. My company has been using it for over year, but I have been using the solution for four months. We are using the latest version of the solution.