Trend Micro Internet Security review
A broad and likeable package, but needs better malware detection.
Review Date: 13 Feb 2009
Reviewed By: Darien Graham-Smith
Price when reviewed: £48 (£55 inc VAT)
Value for Money
Ease of Use
The "Pro" in this suite's full title - Trend Micro Internet Security Pro 2009 - means you get not only standard protection but also encryption tools, IM and mobile protection, plus some general PC tune-up tools. One neat feature lets you remotely lock access to files if your laptop's stolen. If you don't need those features, save a fiver and opt for the standard edition.
Whichever edition you go for, the important question is how well it protects you against malware - and the answer here is, sadly, not that well. In this month's malware tests, Trend Micro Internet Security found itself near the bottom of the rankings with a detection rate of 83% - an echo of its disappointing score when we first reviewed it (web ID: 227718).
And when it came to web threats, the package mustered a hit rate of just 9%. We were concerned to see it positively label as "safe" several pages identified by numerous other packages as hosting exploits. And in some cases the software didn't give pages a rating at all, explaining that "Trend Micro has not tested this site". This further dented our confidence in the package: why not test it now?
In terms of system resources, the suite wasn't terrifically light, but nor was it the most intrusive. The user interface is simple enough, although a lot of information and controls are hidden away under collapsing bars. And we did like the email integration, which added a new toolbar and a wealth of antispam settings.
But these good points can't make up for this suite's fundamental weakness at detecting threats - not even when you factor in all its neat extra features.
Author: Darien Graham-Smith
- Google boosts secure logins with USB Security Key
- Poodle bug bites web users in the SSL
- 100,000 Snapchat messages leaked online
- Why security wasn't baked into the web - from the man who made it
- Met Police unveils FALCON to fight cybercrime
- Send a text and these SSDs will self-destruct
- iOS 8.0.2: old problems remain, new bugs added
- Apple patches ShellShock Bash bug
- Ello knocked offline by DDoS attack
- Mozilla patches Firefox NSS vulnerability
- Google Glass: mugger bait, pub problem and other lessons learned from two dangerous weeks
- Twitter, please don't fiddle with my feed
- How Satya Nadella can get some pay-raise karma
- Windows 10: a step back to go forward
- Michael Dell: Cloud infrastructure is the roads, bridges and highways of the 21st century
- How to check your identity hasn’t been sold to the hackers
- Tim Cook: this is how much TV has changed since the 70s
- Westminster wins the .London battle
- 20 years of PC Pro: from deep pan pizza to virtualisation
- Five reasons why the Apple Watch leaves me cold
- Five worst SMB security threats... and how to solve them
- Heartbleed: what you need to know and do
- Measuring me: is your body the future of security?
- The top five consumer security threats for 2014
- Windows XP: Microsoft’s ticking time bomb
- The top five SMB security trends for 2014
- Securing the Internet of Things
- My PC is infected: what now?
- When coding becomes a crime
- Mobile web blocking: what it reveals about porn filtering plans
- How to write your company's IT security policy
- The key to choosing a secure password
- Please stop reposting fake Facebook messages
- Is Facebook safe for business?
- Don't rely on Chrome's password vault
- Facebook Graph Search: don't panic
- Gmail drafts and Pastebin: could they evade the email snoops?
- Applying for a job at GCHQ? Here's your plain-text password
- Google two-step verification: a must for business email
- Yes, I write down my passwords