Please share with the community what you think needs improvement with Trend Micro Email Security.
What are its weaknesses? What would you like to see changed in a future version?
The solutions manufacturer tries to upgrade the customer to move from on-premises to the cloud. They plan to replace virtual appliances with hardware appliances. I think that this is not a good idea. A virtual appliance is more flexible in implementation and usage, and they think that it is not a good idea to leave the development as is.
There is a lot of room for improvement towards the phishing kind of email filtering, with the different hijacking attacks, and with the kind of password attacks which these phisher attackers do. The engine is intelligent enough to block any link which is coming in the email because it checks the quality of the reputation of the link. But it is written by a very intelligent person using a very localized domain so it lacks that functionality. There are other solutions available in the market, such as Proofpoint and Barracuda, that have slightly better intelligence around that, maybe they have more attack feeds coming in or maybe they are working a little harder on the resource side. Their response towards such emails is very granular whereas Trend Micro's is higher. Maybe email security is not the goal for Trend Micro, because the other players like Proofpoint, Barracuda and Microsoft are working essentially on the email security. So they are very focused and since the products are completely driven towards email security they give a better posture and have better performance there. But from a threat prevention point of view and as the first wall of anti-virus defense, Trend Micro tends to be a superior product.
How do you or your organization use this solution?
Please share with us so that your peers can learn from your experiences.
There are many cybersecurity tools available, but some aren't doing the job that they should be doing.
What are some of the threats that may be associated with using 'fake' cybersecurity tools?
What can people do to ensure that they're using a tool that actually does what it says it does?