<
 
 
 
 
×
>
hide
You are viewing a Web site, archived on 02:49:07 Oct 15, 2004. It is now a Federal record managed by the National Archives and Records Administration.
External links, forms, and search boxes may not function within this collection.
JTF-GNO Online NetDefense [DoD-CERT]
spacer
Mission Statement Antivirus Section Vulnerability Management Access DISA Contact Us Webmaster
Management Products
Client Products
Groupware Products
Gateway Products
Antivirus Support
Malicious Code Conference
 
Antivirus Information Virus Definitions McAfee Software Symantec Software Trend Micro Sotware

Home   Antivirus Information   Trend Micro Software


Trend Micro Software


Self-Extracting Archive File Tutorial.
Downloading Antivirus Software for Home Use Tutorial.

Note:  You will NOT be able to download software if your domain is other than .mil. Read more.

Latest Trend Micro Pattern Files
Pattern Files:
Release Date:
Trend Micro Training
Click here to access information regarding upcoming antivirus vendor training.
Trend Micro Links
Trend Micro Advisories
Trend Micro Virus Map
Trend Micro Knowledge Base (login not required)
Trend Micro News


Management Products

Management products generally are products utilized by administrators to remotely install and configure antivirus software and to monitor the health of the network from a centralized location.

    Client Products

    Client products protect the operating system against the threat of malicious code. They are suited for protecting servers as well as workstations and can be utilized for authorized home use. As part of the DoD License Agreement with Trend Micro, only client products for PDAs are provided.


Groupware Products

Groupware products provide protection to applications such as Lotus Notes and Microsoft Exchange. A client product should be used in addition to the groupware product to protect the operating system where the groupware application resides.


    Gateway Products

    Gateway products protect the network perimeter against malicious code threats entering or exiting the boundaries of your domain. In most cases, the focal point of this defense is SMTP traffic, but can also include other Internet traffice as well.

stratcom · disa · iase · disa cio · lecic · site access · privacy · mission · contact us