Skip to main content

Help us improve the Digital Marketplace - send your feedback

Trustmarque Solutions Limited

TRUSTMARQUE TREND MICRO ONE PRODUCT SUITE

Cloud-delivered and powered by over 250 million global sensors, Trend Micro One continuously discovers your dynamic attack surface, assesses your risk, and helps you respond with the right security at the right time. Zero Trust strategy and executive risk dashboards enable you to be more confident in your security strategy.

Features

  • Cloud Security - comprehensive security for cloud applications
  • Network Security - Protection from known, unknown and undisclosed threats
  • User Protection - Complete user protection security
  • Email Security - Cross-generational blend of threat techniques
  • Web Security - Forward-looking threat protection on web threats
  • Workload Security - Secure your data center, cloud, and containers
  • Central Security Visibility - Increase risk visibility, understand broader threats.
  • Advanced Threat Detection - collect and correlates deep activity data
  • Cross Platform Detection and Response - collect and correlates data
  • Managed Cross Platform Detection and Response – Threat detection

Benefits

  • Cloud Security - Automated, flexible, all in one cloud security
  • Network Security - Prevent, detect, respond
  • User Protection - Protect users and their information
  • Email Security - Layered protection guards against persistent/ targeted attacks
  • Web Security - Protect users at any location
  • Workload Security - Automatically detect new workloads and protect them.
  • Central Security Visibility - Increase risk visibility
  • Advanced Threat Detection - Powerful security analytics
  • Cross Platform Detection and Response - Collect and correlate
  • Managed Cross Platform Detection and Response

Pricing

£10.65 a unit

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@trustmarque.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 6 8 3 9 1 7 5 0 9 8 9 7 0 9

Contact

Trustmarque Solutions Limited Lorraine Spence
Telephone: 01904 924089
Email: tenders@trustmarque.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Trend Micro One
Cloud deployment model
Hybrid cloud
Service constraints
No constraints regarding maintenance arrangements or specific hardware configurations. All supported platforms can be found at docs.trendmicro.com
System requirements
Please visit trendmicro.com

User support

Email or online ticketing support
Email or online ticketing
Support response times
Trend Micro will make a commercially reasonable effort to ensure that its technical staff promptly answer
Customer’s calls, respond to Customer’s questions, and correct software/service deficiencies, according to the
severity definitions and target initial response times identified in the following link https://success.trendmicro.com/dcx/s/solution/000285802?language=en_US
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AAA
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AAA
Web chat accessibility testing
Full testing such as short hand word identification
Onsite support
No
Support levels
Standard 9-6.30pm 5 days a week support is complimentary to Trend Micro customers.

Premium Support is 24x7 and charged based upon which solution is being supported. Further information can be requested from Account Manager.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Chargeable onsite training is available. Complimentary online training is available. Best practice guides and user documentation is availabe at https://success.trendmicro.com/dcx/s/solution/1118282-compilation-of-best-practices-while-using-trend-micro-products-for-business?language=en_US and docs.trendmicro.com
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
All information regarding customer data collection can be found here https://success.trendmicro.com/dcx/s/data-collection-disclosure?language=en_US
End-of-contract process
Trend Micro will work proactively with the customer to ensure timely renewal is in place to avoid any issues to the customer's security services

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
Yes
Compatible operating systems
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
WCAG 2.1 AAA
Description of service interface
Online SaaS interface that allows management and configuration
Accessibility standards
WCAG 2.1 AAA
Accessibility testing
Full testing such as short hand word identification
API
Yes
What users can and can't do using the API
Details can be found here https://automation.deepsecurity.trendmicro.com/article/20_0/
API documentation
Yes
API documentation formats
HTML
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
Configuration and Mangagement based on users requirements

Scaling

Independence of resources
Automscaling is in place

Analytics

Service usage metrics
Yes
Metrics types
1. CPU
2. Disk
4. Memory
5. Network
Reporting types
Reports on request

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Trend Micro

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with CSA CCM v3.0
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Via CSV or ODF through management interface
Data export formats
  • CSV
  • ODF
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
Private network or public sector network
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Trend Micro Service Levels can be found here https://success.trendmicro.com/dcx/s/solution/000285802?language=en_US
Approach to resilience
This information is available upon request
Outage reporting
Email Alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
2-factor authentication and Username or password
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users receive audit information on a regular basis
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users receive audit information on a regular basis
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
SGS
ISO/IEC 27001 accreditation date
28/12/2021
What the ISO/IEC 27001 doesn’t cover
https://www.trendmicro.com/en_us/about/trust-center/compliance.html
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
Yes
Who accredited the PCI DSS certification
Security Standards Council
PCI DSS accreditation date
June 2018
What the PCI DSS doesn’t cover
https://www.trendmicro.com/en_us/about/trust-center/compliance.html
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
  • ISO 27001, 27014 & 27034
  • ISO 27017
  • ISO 20000
  • SOC 2 Type 2
  • FIPS 140-2
  • Common Criteria EAL2+
  • FedRAMP
  • ICSA Labs Certification
  • NetSecOPEN
  • HIPAA

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
https://www.trendmicro.com/en_us/about/trust-center/compliance.html

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
All information can be found here https://www.trendmicro.com/en_us/about/trust-center/security-practices.html
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
https://www.trendmicro.com/en_us/about/trust-center/company.html
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
All information can be found here https://www.trendmicro.com/en_us/about/trust-center/compliance.html
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
All information can be found here https://www.trendmicro.com/en_us/about/trust-center/compliance.html

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
Yes
Connected networks
Other
Other public sector networks
More information on request

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

Trustmarque's Environmental Policy and Carbon Reduction Plan include delivering and supporting actions on reducing our carbon footprint and our impact on climate change. We have set a target to achieve net zero by 2035. Our policies include 'Virtual First 'meetings, energy reduction plans, flexible working, green software solutions and associated services from innovative suppliers to promote digital environmental innovation, promoting sustainable procurement. Please contact Trustmarque to discuss the provision of Social Value. Any Social Value deliverable must be agreed with Trustmarque and be proportionate to the contract value and scope.

Pricing

Price
£10.65 a unit
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
30 day free trials are available for many of our solutions and can be found here https://www.trendmicro.com/en_us/business/products/trials.html
Link to free trial
https://www.trendmicro.com/en_us/business/products/trials.html

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@trustmarque.com. Tell them what format you need. It will help if you say what assistive technology you use.