Help Me Choose: Security Software

Protect your business against viruses and threats. Choose Dell-recommended Trend Micro™ Security

Protect your business and your bottom line
Dell and Trend Micro make data protection for small and medium businesses fast, simple and easy on your budget.

Defend your business against viruses and threats with Dell-recommended Trend Micro™ Titanium™ Internet Security for single system small business offices or Trend Micro™ Worry-Free™ Business Security Services for multiple system/server security with centralized management.

Protection Points:

  • Desktop and laptop computers
  • USB devices
  • Servers

Features:

  • Limits employee exposure to risky websites with Web Threat Protection
  • Detects and removes conventional threats (viruses, spyware, spam)
  • Personal firewall booster to prevent hackers from stealing your sensitive data
Two security services to help you choose the right protection to preload on your PC.

If security is not your area of expertise, why make it tough on yourself? We offer you two choices so you can quickly get a solution designed specifically for your size of business: one that’s a snap to install, effortless to configure and that won’t slow you down.


Which Solution Is Right for You?Titanium™ Internet SecurityWorry-Free™ Business Security Services
Simple, single system security for a small officeYesNo
Multiple system/server security with centralized console managementNoYes
I have limited technical expertiseYesNo
I have moderate technical expertise and/or receive IT assistance                          NoYes
I have a server and want to protect itNoYes
I want visibility in the security status of my remote employees/branch officesNoYes



Trend Micro™ is the largest independent security company in the world*.

*Based on data that did not include McAfee®, which is no longer independent, or Symantec™, which sells more than security. Where to buy good IT security, 2011 (C) quocirca, ltd?


Trend Micro™ products, cloud-powered by the Trend Micro™ Smart Protection Network™, are consistently proven by multiple testing labs to protect better than our competition year over year as seen below.

CorporateConsumerCorporateSMBCorporateConsumer
Sept. 2010Sept. 2010Oct. 2010Oct. 2010Jan. 2011Jan. 2011
Trend Micro1st1st1st1st1st1st
Symantec7th8th5th5th5th1st
McAfee2nd2nd4th2nd4th11th
Kaspersky5th9th4th7th
ESET6th10th3rd
Year-Over-Year Performance
   Rankings based on highest percentage of threats blocked

Note: Rankings are based on all vendors participating in each test and based on highest percentage of threats blocked at all layers.

Note: Tests based on Corporate, Small and Medium Business (SMB) and Consumer Endpoint Solutions


Why Trend Micro consistently achieves #1 rankings

Smart Protection Network

  • Sources new threats using smart feedback (from our installed base of products) to provide automated threat intelligence.
  • Identifies new threats using correlated web, email and file threat data.
  • Protection is immediately available to all customers using in-the-cloud reputation databases.
  • Smart Protection Network supports solutions for consumers, SMBs, enterprises, software as a service (SaaS), XSP and partners, and powers our mobile, endpoint, server, messaging, network, gateway, SaaS and partner solutions.

 

Trend Micro™ security products are designed to be simple yet strong so you can focus on growing your business. We offer you two choices so you can get a solution designed specifically for your size of business. From the simple threat protection for individual PCs offered by Trend Micro™ Titanium™ Internet Security to the centralized management console for multiple PC security management offered by Trend Micro™ Worry-Free™ Business Security Services — we have you protected.

Product Overviews

Features and BenefitsTitanium™ Internet SecurityWorry-Free™ Business Security Services
Offered preinstalled on Dell Vostro™, OptiPlex™, Dell Precision™ and Latitude™ computersYesYes
Protects your PC from viruses and spywareYesYes
Finds and blocks malicious links in email and IMYesYes
Restricts internet access by categoriesYesYes
Scans and blocks spam from entering POP3 mail accountsYesYes
Centrally manages systems from anywhere with Web Management ConsoleNoYes
Robust server protection, but no server required to host the solutionNoYes
Ability to add on centrally managed licenses as business growsNoYes