Information Technology Administrator at Tritontek, Inc.
Real User
Top 5
2023-07-21T08:27:00Z
Jul 21, 2023
We use the solution from our US counterpart. We've been seeing some new computers in the US. Some are in Minneapolis and Wisconsin, and they're also using Trend Micro.
I've used it for myself, our company, and our customers. One of our customer use cases is to set specific applications to be used on the mobile and to allow for no other application to be used.
We have had requests from some of our clients that have a bigger mobile environment, where the clients bring their own devices and connect it to the network, and they need access to an encrypted file. Most of the time they use an endpoint encryption mobile device itself and they want to control access for those users. Mostly it is related to the mobile device protection itself which would include the upload and anti-virus. It has to have encryption if there any files being downloaded from the network itself. These are most of the use-cases that we have worked on.
We primarily implement the solution for our clients and apply it to some mobile drives. We take our IRIS file and connect the solution to our mobile devices so that there's more firm protection. We have some GPS locations and we can tag devices on the Trend Micro Mobile Protection server. This way, we can find them if they are lost. We can lock the device from our servers. If someone finds anything and tries to take the data, we can block the data or delete it. Also, if there's a hypermobile we can get special permission from our side and add that permission on our server so we can add items onto our SIEM card for mobile protection.
We use the solution from our US counterpart. We've been seeing some new computers in the US. Some are in Minneapolis and Wisconsin, and they're also using Trend Micro.
I've used it for myself, our company, and our customers. One of our customer use cases is to set specific applications to be used on the mobile and to allow for no other application to be used.
Trend Micro Mobile Security is used to filter and protect the environment from dangerous websites, and unsafe networks.
We have had requests from some of our clients that have a bigger mobile environment, where the clients bring their own devices and connect it to the network, and they need access to an encrypted file. Most of the time they use an endpoint encryption mobile device itself and they want to control access for those users. Mostly it is related to the mobile device protection itself which would include the upload and anti-virus. It has to have encryption if there any files being downloaded from the network itself. These are most of the use-cases that we have worked on.
We primarily implement the solution for our clients and apply it to some mobile drives. We take our IRIS file and connect the solution to our mobile devices so that there's more firm protection. We have some GPS locations and we can tag devices on the Trend Micro Mobile Protection server. This way, we can find them if they are lost. We can lock the device from our servers. If someone finds anything and tries to take the data, we can block the data or delete it. Also, if there's a hypermobile we can get special permission from our side and add that permission on our server so we can add items onto our SIEM card for mobile protection.
My primary use case is the protection of the system environment. It helps prevent intrusion of my system by unknown activities.