Skip to main content

Trend Micro Email Security

Product by Trend Micro

Trend Micro™ Email Security stops more phishing, ransomware, and BEC attacks. Powered by XGen™, our security uses an optimum blend of cross-generational threat techniques, like machine learning, sandbox analysis, data loss prevention (DLP), and other methods to stop all types of email threats.

Trend Micro™ Email Security stops more phishing, ransomware, and BEC attacks. Powered by XGen™, our security uses an optimum blend of cross-generational threat techniques, like machine learning, sandbox analysis, data loss prevention (DLP), and other methods to stop all types of email threats.

This solution minimizes management overhead and connects with other Trend Micro security layers to share threat intelligence and provide central visibility of threats across your organization. Trend Micro Email Security protects Microsoft® Exchange™, Microsoft® Office 365®, Gmail™, and other hosted and on-premises email solutions.

View Datasheet

Layered protection
Provides comprehensive protection for phishing, spam, and graymail; with multiple techniques, including sender, content and image analysis,machine learning, and more.
Email fraud protection
Protects against BEC with enhanced machine learning and expert rules to analyze both the header and content of the email. Includes TrendMicro™ Writing Style DNA as an additional layer to conduct authorship analysis for BEC protection. (Trend Micro™ Cloud App Security license required for Writing Style DNA)
Document exploit protection
Detects advanced malware and exploits in PDF,Microsoft® Office, and other documents using static and heuristic logic to detect and examine abnormalities.
URL time-of-click
Blocks emails with malicious URLs before delivery and re-checksURL safety when a user clicks on it.
Advanced threat protection
Discovers unknown malware using multiple patternless techniques, including pre-execution machine learning and sandbox analysis. Top rated Trend Micro™ Deep Discovery™ sandbox technology for dynamic analysis of potentially malicious attachments or embedded URLs in a secure virtual environment.
File-password extraction
Heuristically extracts or opens password-protected files by leveraging a combination of user-defined passwords and message content.
Source verification and authentication
Includes Sender Policy Framework(SPF), DomainKeys Identified Mail (DKIM), Domain-based Message Authentication,Reporting, and Conformance (DMARC).
Threat intelligence
Uses the Trend Micro™ Smart Protection Network™, one of the largest threat intelligence databases, to correlate web, email, file, domain registries, andmany other threat sources to identify attacker infrastructures before they are launched.
Cloud Marketplace