Trend Micro Internet Security review
A broad and likeable package, but needs better malware detection.
Review Date: 13 Feb 2009
Reviewed By: Darien Graham-Smith
Price when reviewed: £48 (£55 inc VAT)
Value for Money
Ease of Use
The "Pro" in this suite's full title - Trend Micro Internet Security Pro 2009 - means you get not only standard protection but also encryption tools, IM and mobile protection, plus some general PC tune-up tools. One neat feature lets you remotely lock access to files if your laptop's stolen. If you don't need those features, save a fiver and opt for the standard edition.
Whichever edition you go for, the important question is how well it protects you against malware - and the answer here is, sadly, not that well. In this month's malware tests, Trend Micro Internet Security found itself near the bottom of the rankings with a detection rate of 83% - an echo of its disappointing score when we first reviewed it (web ID: 227718).
And when it came to web threats, the package mustered a hit rate of just 9%. We were concerned to see it positively label as "safe" several pages identified by numerous other packages as hosting exploits. And in some cases the software didn't give pages a rating at all, explaining that "Trend Micro has not tested this site". This further dented our confidence in the package: why not test it now?
In terms of system resources, the suite wasn't terrifically light, but nor was it the most intrusive. The user interface is simple enough, although a lot of information and controls are hidden away under collapsing bars. And we did like the email integration, which added a new toolbar and a wealth of antispam settings.
But these good points can't make up for this suite's fundamental weakness at detecting threats - not even when you factor in all its neat extra features.
Author: Darien Graham-Smith
- Gaming DDoS: forget cyber-jihadis, they're just trolls
- Bug hunters paid to target Oculus Rift
- Chrome to warn against crapware downloads
- Microsoft backtracks on blocking out-of-date Java
- WarKitteh, hacked Blackphone and more from Def Con
- Putting the brakes on smart-car attacks and more from Black Hat 2014
- Microsoft targets Windows in next Patch Tuesday
- Don't pay the CryptoLocker ransom
- Microsoft to block old ActiveX controls in security push
- Malware can live in USBs undetected
- 20 years of PC Pro: our best covers
- Why we've closed the PC Pro forums
- How to turn off Google Location Tracking
- 20 years of PC Pro: our greatest review mistakes
- 20 years of PC Pro: our first A-List
- Wikipedia's "right to be forgotten" protest hits the wrong note
- 3D printing hits the high street for plastic selfies
- 20 years of PC Pro: What amazed us in our first issue
- How Google Glass ruined my lunch hour
- Smartphone battery packs: can a USB power pack beat the festival battery blues?
- Five worst SMB security threats... and how to solve them
- Heartbleed: what you need to know and do
- Measuring me: is your body the future of security?
- The top five consumer security threats for 2014
- Windows XP: Microsoft’s ticking time bomb
- The top five SMB security trends for 2014
- Securing the Internet of Things
- My PC is infected: what now?
- When coding becomes a crime
- Mobile web blocking: what it reveals about porn filtering plans
- How to write your company's IT security policy
- The key to choosing a secure password
- Please stop reposting fake Facebook messages
- Is Facebook safe for business?
- Don't rely on Chrome's password vault
- Facebook Graph Search: don't panic
- Gmail drafts and Pastebin: could they evade the email snoops?
- Applying for a job at GCHQ? Here's your plain-text password
- Google two-step verification: a must for business email
- Yes, I write down my passwords