Trend Micro Internet Security review
A broad and likeable package, but needs better malware detection.
Review Date: 13 Feb 2009
Reviewed By: Darien Graham-Smith
Price when reviewed: £48 (£55 inc VAT)
Value for Money
Ease of Use
The "Pro" in this suite's full title - Trend Micro Internet Security Pro 2009 - means you get not only standard protection but also encryption tools, IM and mobile protection, plus some general PC tune-up tools. One neat feature lets you remotely lock access to files if your laptop's stolen. If you don't need those features, save a fiver and opt for the standard edition.
Whichever edition you go for, the important question is how well it protects you against malware - and the answer here is, sadly, not that well. In this month's malware tests, Trend Micro Internet Security found itself near the bottom of the rankings with a detection rate of 83% - an echo of its disappointing score when we first reviewed it (web ID: 227718).
And when it came to web threats, the package mustered a hit rate of just 9%. We were concerned to see it positively label as "safe" several pages identified by numerous other packages as hosting exploits. And in some cases the software didn't give pages a rating at all, explaining that "Trend Micro has not tested this site". This further dented our confidence in the package: why not test it now?
In terms of system resources, the suite wasn't terrifically light, but nor was it the most intrusive. The user interface is simple enough, although a lot of information and controls are hidden away under collapsing bars. And we did like the email integration, which added a new toolbar and a wealth of antispam settings.
But these good points can't make up for this suite's fundamental weakness at detecting threats - not even when you factor in all its neat extra features.
Author: Darien Graham-Smith
- Europol warns: public Wi-Fi isn't safe
- Hundreds of NHS sites vulnerable to hackers
- Second Bitcoin site closed after £345,000 hack
- Hackers take Meetup.com offline over $300 ransom
- Child-abuse image sellers demand Bitcoin-only payments
- London firm at centre of hack redirecting 300,000 routers
- Briton charged with hacking US Federal Reserve
- Apple quietly pulls support for OS X Snow Leopard
- RSA: NSA exploits position of trust with security firms
- Google buys UK startup to fight click fraud
- Move over Delia: IBM Watson is cooking tonight
- Eric Schmidt on the double-edged smartphone: friend and foe
- Getty joins the race to the bottom
- Hour of Code: five steps to learn how to code
- Sony Xperia Z2 Tablet review: first look
- Sony Xperia Z2 review: first look
- Samsung Galaxy Gear 2 review: first look
- Nokia XL review: first look
- Samsung Galaxy S5 review: first look
- Nokia X review: first look
- Measuring me: is your body the future of security?
- The top five consumer security threats for 2014
- Windows XP: Microsoft’s ticking time bomb
- The top five SMB security trends for 2014
- Securing the Internet of Things
- My PC is infected: what now?
- When coding becomes a crime
- Mobile web blocking: what it reveals about porn filtering plans
- The men trying to save us from the machines
- Windows 8 picture passwords: are they safe?
- The key to choosing a secure password
- Please stop reposting fake Facebook messages
- Is Facebook safe for business?
- Don't rely on Chrome's password vault
- Facebook Graph Search: don't panic
- Gmail drafts and Pastebin: could they evade the email snoops?
- Applying for a job at GCHQ? Here's your plain-text password
- Google two-step verification: a must for business email
- Yes, I write down my passwords
- How to deal with a ransomware attack