First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Trend Micro Internet Security Pro 2008
Trend Micro's latest security and antivirus release, Internet Security Pro 2008, offers a clean interface that's simple to navigate and fairly straightforward to set up. As far as protection goes, there's a broad range of coverage, but you're not going to get as good a cleaning service as some other suites including Symantec's Norton Anti-Virus, even if it's only by a small margin.
- Less resource hungry, easy and clean interface
- Not quite the same level of detection as other suites
From a user perspective it's a clean, easy to use application that covers all the bases. However, if you want the absolute best cleaning service this software may not cover it quite as well.
Price$ 130.00 (AUD)
The software is split into a number of sections. Virus and spyware protection covers e-mail, attachments and other real-time file scanning, but also protects unauthorised changes to the system files and settings. Then there's the home network and firewall section with a personal firewall and a monitor for wireless networks, and lastly there's the online protection, covering phishing sites, spam protection, parental controls and "data theft protection", which is basically a warning that your personal information, such as credit card, log-in or password details are being accessed or requested, allowing you to block it.
Beyond that are the Pro Services. The Pro Services section of the application introduces a number of helpful features. First on the list is Trend Micro's Remote File Lock. This allows you to allocate a set of files as protected. These files will only be accessible once Trend Micro has checked your computer's status on its database. If, for example, your computer is stolen, you can have your vault locked and the software will protect your files until the online database is told otherwise. It's not going to stop the hardest of hackers, but it's a good first point of defence for your sensitive files.
Also found in the Pro section are the system tuner, which cleans up unused files and does other small housecleaning jobs, and more importantly, the Transaction Protector. This is a particularly useful tool when using foreign networks, such as wireless hotspots. It will check the security of the connection you are using and tell you whether it is safe or shows characteristics of a network that may include fake or phishing Web sites. It also has a key encryption tool that encrypts your keystrokes, protecting against key-logger spyware. A small icon shows up in your browser window indicating the safety level and indicates whether your encryption tool is turned on or off.
In PC World tests Trend Micro Internet Security Pro 2008 didn't quite match up to some of the other antivirus suites in terms of detection, but was one of the least taxing application on system resources and did a good job of cleaning what it found. Against AV-Test.org's database of spyware, malware and adware, Internet Security Pro 2008 managed to find 90 per cent of the malware and a paltry 84 per cent of the spyware and adware. In the heuristic tests it managed to pick up just 13 per cent of malicious files. It did, however, perform a good job of cleaning files once detected, cleaning 70 per cent of infected files and registry changes.
All other features worked well within their simple boundaries. We were a little disappointed by the password protection, which isn't enforced during setup. This leaves the application itself open to change and is particularly nasty for the parental filters, which, without a password, can simply be turned off by the child you're trying to protect (and let's face it, the younger they are the more they know about computers).
Latest News Articles
- Samsung Galaxy S5 specs appear online with Quad HD display
- China Bitcoin exchange head 'surprised' at speed of regulations
- 'ZeroAccess' click-fraud botnet disrupted, but not dead yet
- Google to let users download portable file with all their Gmail messages
- Oracle may get second chance to prove Google infringed on Java copyrights
Most Popular Articles
- 1 What's the difference between an Intel Core i3, i5 and i7?
- 2 Laser vs. inkjet printers: which is better?
- 3 Windows 7 Home Premium vs. Windows 7 Professional
- 4 How do I connect my TV to the Internet?
- 5 Samsung’s 2013 Smart TVs: everything you need to know
GGG Evaluation Team
Best Deals on GoodGearGuide
Best Deals on PCWorld
- Software and ServicesView all »
- SecurityView all »
- Servers & StorageView all »
- Desktop PCsView all »
- NotebooksView all »