Remote File Lock
Protect your sensitive files, even when your computer is lost or stolen.
Wi-Fi Advisor (available through Transaction Protector)
Avoid unsafe hotspots and wireless networks.
Site Inspector (available through Transaction Protector)
Check the credibility of a Web page before making a purchase or carrying out other transactions.
Keystroke Encryption (available through Transaction Protector)
Prevent keystroke monitoring programs from spying on your passwords, account numbers, and other personal information by scrambling information that you type into Web pages.
Enhance performance and privacy by recovering disk space, cleaning up your registry and startup settings, removing cookies, and clearing your browser history.
Prevent Unauthorized Changes
Improved security policies find and stop unwanted attempts to change your operating system and critical software.
Image Spam Filtering
Stop seeing spam that tries to evade filters by delivering images instead of just text.
Worry-Free Web Surfing
Identify suspect Web sites before opening them. Disable links to untrustworthy Web sites received by email (available early 2008).
Customizable Security Warnings
Decide exactly how often you want to receive warnings about security threats.
Security Activity Report
Regular reports summarize how Trend Micro Internet Security Pro has protected you.
Protection Against Viruses
An award-winning anti-virus engine protects against computer viruses, worms, Trojan horse programs, and related security threats. Automatic updates immunize you against new computer virus outbreaks.
Protection Against Spyware
Powerful anti-spyware technology guards your personal information and privacy against spyware, rootkits and other malicious software.
Prevent your computer from exchanging data with the Internet without your approval, and defend against computer attacks from the Internet.
Protection Against Web Threats
Steer clear of online phishing scams that try to steal credit card and bank account numbers. Continuous updates identify the newest risky Web sites.
Wireless Home Network Monitoring
Find and block wireless home network intruders.
Home Network Controls
Manage, configure and update the security of every computer on your home network with an easy-to-use management console.