9/27/2012

Trend Micro Internet Security 2010 1yr/1user/3PC Review

Trend Micro Internet Security 2010 1yr/1user/3PC
Average Reviews:

(More customer reviews)
Trend Micro Internet Security 2010 is one of the most obnoxious computer security programs I have ever had the misfortune of using. I couldn't get it off my machine fast enough.
[*Note: the help file refers to both 2009 and 2010 as the name of the this product being reviewed, so I am not sure which version actually came on the disk. Most likely it is a hybrid of both.]
Subscription-based paid-to-use "premium" security products are fighting a battle they may not be able to win. Many of the services and features such software products used to solely offer, can now be found for free in the operating system itself, or for free as a downloaded program. Case in point, Trend Micro Internet Security 2010 has a feature to control when Windows user accounts access the internet via a time schedule. Versions of Microsoft Windows, after XP, offer that set of tools for free right in the OS, as "parental controls." They don't work the exact same way, but they are close enough for most parents. In the case of the OS provided controls, the computer itself cannot be used outside of the time limits. In the case of the Trend Micro product, just the internet is disabled outside of the time limits. But, for kids these days, 90% of the time if they want to be on the computer, they want to be online. For the rest of that 10% of the time they need to be typing up school work, that is what parental control overrides are for, should the need arise.
[Note, my comments in square brackets, like these, are optional. You may skip them without missing any important information.]
--------------------------------------------------------------------------
EXECUTIVE REVIEW FOR THE IMPATIENT:
Installation Process: ...........................2/5
Malicious Code ("Virus") Protection: .......4/5
Resource Use & Computer Slow Down: ...3/5
Firewall Protection: ............................4/5
Internet/Child Controls: ......................3/5
Network Map/Management: .................2/5
Irritation level/User Friendliness: ..........1/5
Overall: ...........................................2/5
--------------------------------------------------------------------------
[Note: throughout this review I will be using the word "virus" in quotes. That is because I consider that word to be a media invented label for malicious computer software/code which is used to scare people into behaving irrationally. (I have actually been called out to look at employee PCs to diagnose slowness/lag only to find an insane number of redundant security programs running by people who have been frightened into thinking "viruses" are just lurking around everywhere, trying to get into their computers -- security programs tend to be very resource hungry -- they slow computers down, see the screen shots I am posting with this review). A virus, in biology, is a microorganism you can "catch" if you are exposed to it, no matter what safety precautions you might be taking. A computer "virus" doesn't work the same way. If you practice safe computing practices, your odds of your computer being compromised by malicious computer code (AKA a "virus") are very small. Yes, the bad guys are working on new and improved ways of figuring out how to get their malicious code onto your computer, and they are most certainly getting more inventive. But, the fact still remains that if you take the proper steps and follow the proper procedures, your risk of your computer being compromised is very small. At the end of this review I will list some basic steps you can follow (for free) to secure your computer.]
[Note: the computer used to test this product is a 3.2GHz, dual core processor, with 2GB of RAM, running Windows XP SP3 running Spybot Search & Destroy, and PC Tools' Free Firewall and no other security software]
--------------------------------------------------------------------------
TREND MICRO INTERNET SECURITY 2010:
--------------------------------------------------------------------------
INSTALLATION PROCESS:
Unlike Norton 360 and McAfee Family Protection 2010 3-User, which I have also reviewed, this product INSISTS on you removing all other security programs it can detect. The full list can be found here: [...]
If you leave them installed and ignore their warnings, the installation program will automatically run their uninstall programs anyway, when it detects them. Among the programs that Trend Micro objects to you having installed: Spybot Search & Destroy, anything from Norton, anything from McAfee, most 3rd party firewall and security suites (although not PC Tools, which I am currently using -- go figure). Norton and McAfee might complain about you having other security software installed, but that is it. Trend Micro will just flat out refuse to install if you refuse to cooperate. See uploaded screen shots from install process which I am adding with this review.
[Interestingly enough, Spybot recognizes what Trend Micro's program is trying to do, and calls them on it. The uninstall program has a list of options for when you are uninstalling, and one of them is, "forced to uninstall by Trend Micro product due to alleged incompatibilities." It lets you know that they cannot reproduce these supposed incompatibilities, and that you can re-install Spybot once you are done installing the Trend Micro product. Seems to me that Trend Micro (and the rest of the companies listed in Spybot's list) are up to some shady business practices. I don't like this strong arm tactic of Trend Micro's at all. It is one thing to advise me that there might be problems, it is another thing ENTIRELY to refuse to install unless all other competing products have been uninstalled. It just so happens that Spybot has a nifty "Windows Start Up" editing tool which I find quite useful to purge the junk that software will try to put into my startup process. I don't know if the Trend Micro product will contain this functionality or not, but I DO know I am going to re-install Spybot right after I am done installing this thing. Minus 1 star right here, Trend Micro, and I haven't even finished installing the dang thing yet! (Note: I did re-add Spybot soon after I wrote this part of the review, and as I predicted, it conflicted with nothing, also note the Trend Micro product DOES NOT include the same functions Spybot most especially the "Windows Start Up" editing tools.)]
--------------------------------------------------------------------------
MALICIOUS CODE ("VIRUS") PROTECTION:
I ran the standard battery of tests on their "virus" & spyware protection functions. Arguably, this is the main function of the software, so one would expect it to perform the best, and it came through pretty well.
Detecting old/known "viruses": Succeeded. As a security and computer professional, I have quite a few old/quarantined "virus" files in the archives. I peppered a few of them through the test system, including some non-Windows ones, and the product found all of them on the first scan it ran during installation.
Detecting/Protecting against "zero day" (brand new) "viruses": Succeeded. Visited a well known cyber criminal "hang out" and downloaded code for the "latest and greatest" "virus" being worked on. (Modified the code so it wouldn't do any actual harm to the target PC), compiled it and ran it. The program's threat detection noted the behavior of the program trying to run, and blocked it. It may not be able to detect everything right away, but it knows about basic "threat behavior" -- specifically attempts to insert sneaky start-up code, attempts to modify the master boot record, and attempts to overwrite existing, legitimate program executables.
Detecting/Protecting against website threats: Succeeded. Visited known insecure websites, and all such visits in all major browsers (MIE, Firefox, Safari, Opera, Chrome), was blocked. However, you cannot simply check a box, or push a button that says, "I know the risks, override," like many other security products. Instead, you have to physically go into the filters and white list something manually. Making it a chore, instead of a quick and easy fix.
Only complaint: unlike Norton 360, Trend Micro's Internet Security 2010 doesn't download updates nearly as often. Norton's 360 downloads updates roughly every 15 minutes. Trend Micro's product does so roughly once or twice a day. This leaves a larger opening for "zero day" threats to land. Perhaps Trend Micro is stealthily checking in the background and I am not aware that it is checking, but I only see notices of updates being checked for/downloaded about once/twice a day. Whereas with Norton's 360, it was all the time.
--------------------------------------------------------------------------
RESOURCE USE & COMPUTER SLOW DOWN:
All computer security software that does any sort of "scanning" is going to take up resources, both RAM and CPU. There is just no avoiding that with the modern approach to scanning methods. Trend Micro's product claims that it has a, "20% faster scan time." They do not elaborate what, specifically, it is 20% faster than, but I am going to assume previous versions. The scanning process is rather fast. Even the "deep" scans didn't take that long. However, they still do take up to 40-50% of the CPU resources. RAM use is relatively low, CPU use is rather high while it is scanning. It runs two levels of scans, one is a process called "tsc.exe" which is part of their spyware, etc. detection and removal tools. The other is called "SfCtlCom.exe" and it is the standard "virus" scanning and removal...Read more›

Click Here to see more reviews about: Trend Micro Internet Security 2010 1yr/1user/3PC

Trend Micro Internet Security 2010 provides easy-to-use protection for your home network, identity, and online activities from the present and future web threats.

Smart Protection for Your Family
Easy-to-use security for your home Trend Micro Internet Security protects you and your family against cybercriminals and inappropriate content without slowing down your computer.
Surf the web with confidence With easy-to-use security features, Trend Micro Internet Security protects your personal information when you email or surf the web:
20% smaller file size, 20% faster scan time
Detects and removes viruses, spyware, and other malicious threats from your computer, email, instant messages, and downloads
Proven leadership in anti-spam technology, including email and image spam
Finds and blocks untrustworthy links in email and instant messages
Stops websites from installing dangerous downloads on your computer
Quick Scan allows you to quickly find and remove most malware when you are running short on time.

Protect your children online Enhanced parental controls help you to protect your children from inappropriate content when they go online.
Block websites with inappropriate content based on specific categories
Choose when and for how long your children are allowed to go online
Monitor online activity reports to fine-tune your controls if necessary

Enjoy smart features tailored to your activities Trend Micro Internet Security safeguards your computer and personal information against the latest threats:
Prevent unauthorized software from changing your critical applications, without impacting your PC performance
Pause security updates or scans when you give presentations, watch movies, or play games
Automatically prevent suspicious software on USB devices from opening.
Helps you to easily manage all the devices connected to your home network

Security made easy Protect your personal information with easy-to-use Trend Micro Internet Security.Surf the Internet without slowing down your computer.
Key Features of Trend Micro Internet Security
Get Essential Protection
Protects against current and future viruses An award-winning anti-virus engine protects against computer viruses, worms, Trojan horse programs, and related security threats. Automatic updates immunize you against new computer virus outbreaks for the full duration of your subscription.
Defends your personal information with anti-spyware technology Powerful anti-spyware technology guards your personal information and privacy against spyware, rootkits, and other malicious software.
Safeguards against attacks with a personal firewall Prevent your computer from exchanging data without your approval and defend against attacks from the Internet.
Prevents unauthorized changes Improved security policies find and stop unwanted attempts to change your operating system and critical software.
Offers customizable security warnings Decide how often you want to receive warnings about security threats.
Safeguards Multiple Computers Install Trend Micro Internet Security on up to three PCs per household.
Surf the Web Safely
Protects against web threats Steer clear of online phishing scams that try to steal your credit card or bank account numbers. Continuous updates identify the newest risky websites.
Secure Web surfing Find and block malicious or untrustworthy hyperlinks in email, websites, or instant messages.
Blocks image spam Stop seeing spam that tries to evade filters by delivering images instead of just text.
Device Access Control Automatically prevent suspicious software on USB devices from opening.
Protect Your Children Online
Enhanced Parental Controls Take charge of when and where your children go on the Internet. Block websites with inappropriate content, prevent access at specific times, and even stop them from entering personal information onto web pages.
Smart Features for Your Online Activities
Home Network Map See the computers and other devices connected to your network at a glance, manage the security of other computers remotely, and block wireless home network intruders from accessing yours.
Security Activity Dashboard Get a comprehensive and customizable snapshot of all the security activities on your computer through easy-to-use charts and graphs.
State Aware Work on your presentations, watch movies, or play games without security updates or scans getting in the way.


Buy NowGet 24% OFF

Click here for more information about Trend Micro Internet Security 2010 1yr/1user/3PC

No comments:

Post a Comment