Trend Micro Internet Security 2009 Pro: Photos

It's that time of year again, with security companies releasing their 2009 range. This gallery gives you an insight into Trend Micro's offering.
By Alex Serpo on
1 of 16 Alex Serpo/ZDNet

There has been a movement towards faster, less intrusive internet security suites in the diverse range of 2009 offerings. Physical installation of Trend Micro Internet Security 2009 is certainly fast, although several update and registration steps are slower.

The suite requires 100MB of disk space, more than stand-alone antivirus, which Trend Micro does not recommend you buy.

2 of 16 Alex Serpo/ZDNet

This is the slowest stage of the installation, which in all takes several minutes.

3 of 16 Alex Serpo/ZDNet

Installation requires you to create an account using an active email address.

4 of 16 Alex Serpo/ZDNet

As the description suggests, the account allows you to retrieve "lost serial numbers" along with other functions. Notice that the "Receive the latest offers and news from Trend Micro" box is ticked by default.

5 of 16 Alex Serpo/ZDNet

Upon installation the Trend Micro requires you to download the latest updates and signatures. This gave a total file size of close to 22MB.

6 of 16 Alex Serpo/ZDNet

Trend Micro Internet Security Pro 2009 has a fairly simple menu that allows to you progressively "drill down" for increasing configuration options.

This is an example of one of its intermediate menus, that allows you to set the strength of your firewall between "minimum" and "maximum".

7 of 16 Alex Serpo/ZDNet

This is a section of the advanced menu, allowing you granular control over what you block using Trend Micro's firewall.

8 of 16 Alex Serpo/ZDNet

One interesting feature of Internet Security Pro 2009 is parental control, which allows you to block a diverse range of content. Different levels of access control can be set up for different users via an administrator account, which requires a password.

9 of 16 Alex Serpo/ZDNet

Here are some examples of the content that can be blocked using parental control, which includes information on the "occult", information that pertains to "gay and lesbian" issues and information that relates to "racism" and hate crimes. There is also the usual sex, violence, drugs, crime and hacking content filters. Parental controls can be set from strong to weak, with ages ranging from "child" to "mature teen".

We put the filter to the test in the next slide.

10 of 16 Alex Serpo/ZDNet

We weren't willing to look for violent or pornographic material that might slip through the filter, so we decided to test some of its more unusual filtering abilities. Here we turned the parental filtering to maximum and then went looking for information on witchcraft and the occult.

11 of 16 Alex Serpo/ZDNet

Nope, no Wicca for us today. Trend Micro says no.

12 of 16 Alex Serpo/ZDNet

Interestingly however, the filter allows us to access the Wikipedia page on witchcraft. This commends the filter to us, as it's filtering information based on its factual credibility.

13 of 16 Alex Serpo/ZDNet

Precise control of what your internet security suite is doing on your computer is important. This it Trend Micro's scanning control panel, allowing you to specify if you want your entire computer scanned, or just a specific file or folder. The suite also offers the option of scanning compressed files.

14 of 16 Alex Serpo/ZDNet

There are a range of other interesting additions that come with Trend Micro 2009, including remote file lock.

15 of 16 Alex Serpo/ZDNet

One curious, but interesting addition is the option of a security protection for mobiles. There have been few reports of mobile malware, but several security vendors are offering mobile security including Trend Micro rival Symantec.

16 of 16 Alex Serpo/ZDNet

Trying to get hold of the Trend Micro's mobile security software directs you to a Web page that asks for your mobile number.

Related Galleries

Developer trends, zero-day risks, 5G speeds, and more: Tech research roundup
Person seated at a booth in a cafe looks at their phone and laptop.

Related Galleries

Developer trends, zero-day risks, 5G speeds, and more: Tech research roundup

10 Photos
Tech salaries, developer skills, cybersecurity, and more: ZDNet's research roundup

Related Galleries

Tech salaries, developer skills, cybersecurity, and more: ZDNet's research roundup

8 Photos
Yubikey Security Key C NFC
Security Key C NFC

Related Galleries

Yubikey Security Key C NFC

8 Photos
First look at the YubiKey Bio
YubiKey Bio

Related Galleries

First look at the YubiKey Bio

10 Photos
iVerify (version 17)
iVerify for iOS and iPadOS

Related Galleries

iVerify (version 17)

5 Photos
OnlyKey hardware security key

Related Galleries

OnlyKey hardware security key

19 Photos
SoloKeys Solo V2
Solo V2

Related Galleries

SoloKeys Solo V2

10 Photos