Features and Benefits

CPM for Mac reduces business risks by preventing infection, identity theft, data loss, network downtime, lost productivity, and compliance violations. Additionally, it provides your large enterprise with a number of features and benefits.

Ease of Management

  • Uses small, state-of-the-art pattern files, and enhanced log aggregation for faster, more efficient updates, and reduced network use.
  • Supports native 64-bit and 32-bit processing for optimized performance.
  • Integrates with the IBM BigFix Console to provide centralized security, including the centralized deployment of security policies, pattern files, and software updates on all protected clients and servers.

Superior Malware Protection

  • Delivers powerful protection against viruses, Trojans, worms, and new variants as they emerge.
  • Protects against a wide variety of spyware/grayware, including adware, dialers, joke programs, remote-access tools, key loggers, and password-cracking applications.
  • Detects and removes active and hidden rootkits.
  • Cleans endpoints of malware, including processes and registry entries that are hidden or locked.

Web Reputation Technology

The CPM for Mac Web Reputation technology pro-actively protects client computers within or outside the corporate network from malicious and potentially dangerous websites. Web Reputation breaks the infection chain and prevents the downloading of malicious code.

In addition to file-based scanning, CPM for Mac now includes the capability to detect and block web-based security risks, including phishing attacks. Use the IBM BigFix location awareness features to have CPM for Mac enforce different web reputation policies according to the client computer's location. The client's connection status with the BigFix Server or any BigFix Relay can be used to determine the location of the client.

  • Web Reputation opens a blocking page whenever access to a malicious site is detected. The page includes links to the Trend Micro Web Reputation Query system, where users can find details about the blocked URL or send feedback to Trend Micro.
  • Proxy server authentication for Web Reputation is also supported. You can specify a set of proxy authentication credentials on the web console. HTTP proxy servers are supported.