Skip to content

Competitive Benchmarks

Sure, you need to know how a security solution works, but it’s even more important to know how WELL it works. When put through the rigors of real-world testing, Trend Micro's products regularly outperform the competitions’. Below are the recent results from a number of respected testing labs.

AVTest Award Best Protection 2014

"Trend Micro Internet Security is the safest product in our test series for consumers in the category of PROTECTION." - Maik Morgenstern, CTO AV-TEST GmbH awarded Trend Micro Internet Security their 2014 Best Protection award for consumer-based security solutions. With 24 vendors being tested over 6 separate test cycles, the Trend Micro solution ranked as the best solution in protecting against both 0-day (real-world) malware and widespread malware samples. Below are the results from the 2014 tests.

0-Day Protection - 2014     Widespread Malware Protection - 2014

Trend Micro™ OfficeScan™ also competed in similar tests by AV-Test in 2014 and performed exceptionally well. OfficeScan achieved certification for all 6 tests in 2014, including the latest in December 2014.

Below are the Trend Micro OfficeScan scores for the two tests performed in the Protection category for 2014.

0-Day Protection: 2014 Microsoft

Widespread Malware Protection: 2014 Microsoft


Advanced _badge Dec 2014

Trend Micro also consistently ranks ahead of the pack against 20+ other security vendors in AV-Comparatives' Whole Product Dynamic Real- World Protection Test. The results below show the averages for Trend Micro Security compared to all vendors, including Microsoft, which is used as a baseline for all tests conducted in 2014.

Real-world-protection-2014-averages- Mar-nov -


Source: (Note: Results include user-dependent scores)

Trend Micro's messaging and mail server security ranked first in Opus One’s seven consecutive anti-spam tests, outperforming seven leading security vendors, including Barracuda Networks, Cisco, McAfee, Microsoft, Proofpoint, Sophos, and Symantec (Figure 1).

Opus One’s methodology relies on actual corporate mail streams, manually analyzed for threats. It provides significant real-world results, unlike results obtained through automated tests based on artificial mail streams.


Figure 1: Trend Micro email security consistently leads the industry



Figure 2: Trend Micro has the highest spam catch rate, outscoring 7 other competitors

Source: Opus One

The smartphone has become a universal tool valued for its productivity and fun factor, but hated for the security problems it can bring. Malware targeting Google's Android platform increased to over 1 million apps in just one year, and the number of malicious and high-risk Android apps is expected to reach at least 3 million by the end of 2014.


In January 2015, AV-Test benchmarked mobile security solutions, and Trend Micro Mobile Security for Android excelled and achieved certification. It ranked higher in safeguarding from Android malware and Potentially Unwanted Apps (PUA) than the average of all vendors tested.

Avtest Certified Mobile 2015-01

Malicious Apps - Jan'15      Potentially Unwanted Apps - Jan'15

The true test of a security vendor is not to do well in just one test, but also over time, and so below we share the average of our results for the past eight tests performed by AV-Test.

Malicious Apps - Avg  Nov'13 - Jan'15     Potentially Unwanted Apps - Avg Nov'13 - Jan'15


Data breaches are occurring at an alarming rate as cyber criminals have been shown to effectively penetrate a victim’s network by bypassing traditional security solutions. Recently NSS Labs developed a new test focused on reviewing a number of breach detection systems to identify their security effectiveness and their total cost of ownership (TCO) of each vendor’s solution.

Trend Micro’s Deep Discovery Inspector Model 1000 was given a “Recommended” rating including “Above Average” rating for its security effectiveness and Value (TCO per Protected – Mbps). This resulted in it being one of the leaders in this new space. Below are the results of the overall Security Value Map and overall recommendation table.

Security Value Map for Breach Detection Systems

Source: NSS Labs

NSS Labs 2014 Recommendations for Breach Detection Systems

Source: NSS Labs

Connect with us on