Trend Micro Mobile Security Overview

Trend Micro Mobile Security is the #4 ranked solution in our list of top Mobile Data Protection tools. It is most often compared to Lookout: Trend Micro Mobile Security vs Lookout

What is Trend Micro Mobile Security?
Trend Micro Mobile Security Solutions includes Trend Micro Mobile Security for Android and Trend Micro Mobile Security for iOS devices that provide advanced comprehensive protection against ransonware, identity theft, phishing scams, fraudulent websites, etc and safeguards your privacy on Facebook and Twitter. It also includes Trend Micro Password Manager software that helps to securely store all passwords and sensitive information, to access them when needed on PCs, Macs, and mobile phones and tablets.
Trend Micro Mobile Security Buyer's Guide

Download the Trend Micro Mobile Security Buyer's Guide including reviews and more. Updated: December 2020

Trend Micro Mobile Security Customers
Alertboot, Babou, Ponsse
Trend Micro Mobile Security Video

Pricing Advice

What users are saying about Trend Micro Mobile Security pricing:
  • "Each license costs about $10/year. It's fairly inexpensive because it's a new product. In Pakistan, no more than two or three companies can apply for mobile protection right now. I don't know if there are ancillary costs above the standard licensing fee."

Trend Micro Mobile Security Reviews

Filter by:
Filter Reviews
Filter Unavailable
Company Size
Filter Unavailable
Job Level
Filter Unavailable
Filter Unavailable
Filter Unavailable
Order by:
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Showingreviews based on the current filters. Reset all filters
Security Engineer at Digit Labs
Real User
Top 5Leaderboard
Jan 28, 2020
Heightened mobile protection that is user-friendly and offers lots of custom features

What is our primary use case?

We primarily implement the solution for our clients and apply it to some mobile drives. We take our IRIS file and connect the solution to our mobile devices so that there's more firm protection. We have some GPS locations and we can tag devices on the Trend Micro Mobile Protection server. This way, we can find them if they are lost. We can lock the device from our servers. If someone finds anything and tries to take the data, we can block the data or delete it. Also, if there's a hypermobile we can get special permission from our side and add that permission on our server so we can add items… more »

Pros and Cons

  • "The solution offers a lot of custom features."
  • "Sometimes, when generating random numbers to our mobile feed the random number doesn't work. We mainly deal with QR codes because of this. If they could fix the random number generator that would be helpful."

What other advice do I have?

When we originally deployed the solution it was an old version, however, now we are up to date with the newest version. It may be version 9.5 or 9.6. I'd recommend the solution because it is so customizable and user-friendly. I'd rate it ten out of ten.
Network & Security Team Lead at a tech services company with 51-200 employees
Real User
Top 5Leaderboard
Feb 6, 2020
Stable, seamless, simple, and has good sandbox technology

What is our primary use case?

We have had requests from some of our clients that have a bigger mobile environment, where the clients bring their own devices and connect it to the network, and they need access to an encrypted file. Most of the time they use an endpoint encryption mobile device itself and they want to control access for those users. Mostly it is related to the mobile device protection itself which would include the upload and anti-virus. It has to have encryption if there any files being downloaded from the network itself. These are most of the use-cases that we have worked on.

Pros and Cons

  • "Customer service has been excellent. Trend Micro has very good deals and support - also in the Middle East."
  • "There have been some users who have been complaining about the interface being unfriendly and when the application software is installed on their phone making their mobile slow."

What other advice do I have?

On a scale of one to ten, if I speak specifically about the endpoint protection, I would rate it an eight, because I haven't had much experience working on their other products. But from the perspective of their endpoint protection, their sandbox technology is very nice. So I think it would be eight, overall. I would strongly want Micro to work on their other products as well, such as Mobile Device Security, because we have had some difficulties introducing this product to other clients who have larger environments. They are not very comfortable opting for Trend Micro, even for IoT security…
Find out what your peers are saying about Trend Micro, Microsoft, Sophos and others in Mobile Data Protection. Updated: December 2020.
455,108 professionals have used our research since 2012.
Kent Lim
IT Manager at Nexus Legend Sdn Bhd
Real User
Top 20
Dec 3, 2019
Protects environment against intrusion and other threats

What is our primary use case?

My primary use case is the protection of the system environment. It helps prevent intrusion of my system by unknown activities.

What is most valuable?

This solution is able to protect the data, files, and folders that have been hijack or encrypted.

What needs improvement?

This solution is weak and cannot detect the latest ransomware.

For how long have I used the solution?

I have been using this solution for ten years.
Product Categories
Mobile Data Protection
Buyer's Guide
Download our free Mobile Data Protection Report and find out what your peers are saying about Trend Micro, Microsoft, Sophos, and more!