sb-nz logo
Story image

Hands-on review: Trend Micro Maximum Security 10

14 Sep 2015

As a long-term user of a famous antivirus programme (which shall remain un-named), I was excited to try this product and see how it measured up. As a frequent user of Macs and Windows machines, I wanted to see how it handled both environments. Given the opportunity to try it on multiple devices, I decided that I would trial it on my iPhone 6 as well.

As luck would have it, I chose to install first on my Windows machine. I’ll explain why it was lucky in a couple of paragraphs’ time.

An hour later, I’d uninstalled my existing software and my new software was still unpacking itself. I paused, giving myself time to reflect on why this sort of stuff is given to unsuspecting newbies like me to trial. I made a mental note to thank the editor personally. Meanwhile my software was 44% unpacked.

Half an hour later and things were looking up. The software was installed on my Windows PC and setting up access for my iPhone was a breeze. Having already downloaded the software from the App Store all I had to do was log in and do my first scan. That first scan was blisteringly fast. I liked the interactivity of the interface; it makes suggestions on how you can improve performance - a nice touch.

Remember I mentioned I was lucky I installed first on my Windows laptop? Well, let’s just say that sharing with my other devices was a simple matter of using the ‘Protect another device’ window. It was fast and easy to navigate and it gives options on how you share information between devices.  

I began with the Cloud Storage Scanner, opting to receive an email report of the results. Linking to my Cloud drive took mere seconds, and then I could close my browser while it ran in the Cloud. Completing the ‘Protection Settings’ took seconds. In less than a minute I’d set my scan preferences, my PC Health Checkup, and scanning schedule. Then it was time for the full scan. In minutes a friendly message informed me that two threats had been detected and resolved.

Meanwhile my scan was 70% done, and I was enjoying the speed at which it worked, and its friendly yet non-intrusive interface. At the end of the scan it suggested fixing two vulnerabilities to my system, and was assured that I had no worms or viruses. As that finished I checked my emails to find that my cloud storage had been checked and was good to go.

The good: competitively priced from $79.95 for four devices, with a range of options for 10 items for up to two years, easy to install, runs smoothly in the background, and has an interactive interface.

The bad: Really, I can’t see any. The hardest part was uninstalling my old software.

Verdict: simple to use, a friendly interface, not system-hungry

Story image
Cyber-pandemic: The most notable cyber attacks of 2020
2020 and the COVID-19 pandemic saw employees move to remote working, keeping IT professionals on high alert for cyberattacks. More
Story image
CISOs, don't underestimate the importance of soft skills
There is increasing importance on Chief Information Security Officers (CISOs) having and developing the skill of emotional intelligence, a new report states.More
Story image
Endace and Corelight step in to enhance incident response workflows
Endace and Corelight have entered into a strategic partnership to deliver security teams with insights and detailed forensic data to further enable rapid incident response.More
Story image
Latest Tenable launch provides holistic approach to vulnerability management
Tenable.ep is reportedly the industry’s first, all-in-one, risk-based vulnerability management platform designed to scale as dynamic compute requirements change.More
Story image
Kaspersky ranked number one in channel partner satisfaction
“Being recognised for the second consecutive year as the number one cybersecurity vendor for channel satisfaction, reflects the investment we have made in the Kaspersky United partner program over the past two years."More
Story image
ExtraHop reveals methods used by attackers in SUNBURST breach
The network detection and response company says between late March and early October 2020, detections of probable malicious activity increased by approximately 150%, including detections of lateral movement, privilege escalation and command and control beaconing.More