Which Anti-virus solution from Trend Micro are for servers?

Posted on 2013-12-13
Medium Priority
Last Modified: 2014-01-06
Between Enterprise Security, Server Protect, Office Scan, and Deep Security from Trend Micro, which is best  for our environment?

Our Environment:
- Currently SEP is installed and unmanaged on our servers. We wants something comparible to what we are currently running. We scan on demand, so no scheduled scan.
- 5 ESXi Vsphere 5 host with about 10 VM's (Windows Server 2008 based) on each host.

We dont want anything more or less than what I currently explained about our environment. Just something comparible to how we are running things. Keep in mind this is only for servers. We are still using Symantec AV for our desktops.

Max point to best answer. Thank you.
Question by:jaedenone
LVL 24

Accepted Solution

Mohammed Hamada earned 1500 total points
ID: 39718866
I think Enterprise security comprehend them all. If you read their whitepaper about the security they provide and solutions I think it sums it all in this product.

However i'm not sure if you're going to extend your infrastructure and have more servers. for me I think when you don't have a big infrastructure and a big number of servers then you could go for Microsoft essential for instance.

I have Hyper V and I have about 30 servers on it and i'm using Microsoft essentials and never had any troubles.

Expert Comment

by:Brian Garcia
ID: 39739841
Deep Security is the best among the lists if your environment is VM. But the existing SEP can also provide protection for your servers.

Featured Post

Increase Security & Decrease Risk with NSPM Tools

Analyst firm, Enterprise Management Associates (EMA) reveals significant benefits to enterprises when using Network Security Policy Management (NSPM) solutions, while organizations without, experienced issues including non standard security policies and failed cloud migrations

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Phishing emails are a popular malware delivery vehicle for attack.  While there are many ways for an attacker to increase the chances of success for their phishing emails, one of the most effective methods involves spoofing the message to appear to …
A discussion about Penetration Testing and the Tools used to help achieve this important task.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…

621 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question