Trend Micro Web Security Room for Improvement

Chris Sette
IT Manager at Meriden Public Schools
The system should generate reports when an attack has been stopped, contained, or removed. As it is now, if an attack is halted then we don't know about it unless we search through the logs. View full review »
Find out what your peers are saying about Trend Micro, Cisco, Zscaler and others in Web Security Gateways. Updated: June 2020.
425,794 professionals have used our research since 2012.