Information Security

Defending the digital infrastructure


Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Product Review: Trend Micro Worry-Free Business Security 5.0

Trend Micro Worry-Free Business Security (WFBS) delivers comprehensive client/server protection for small businesses against a variety of Web threats for Microsoft Windows 2000/XP/Vista, Small Business Server 2003/2008 and Exchange Server.


Trend Micro Worry-Free Business Security 5.0

Trend Micro
Price: Starts at $59.32 per user (one-year license for 51-250 seats)

Trend Micro Worry- Free Business Security (WFBS) delivers comprehensive client/server protection for small businesses against a variety of Web threats for Microsoft Windows 2000/XP/Vista, Small Business Server 2003/2008 and Exchange Server.

Installation/Configuration A-  

WFBS was a snap to install, configure and administer, stepping us through the configuration for the Security Server and agents to be deployed on client machines. Compared to enterprise-class security applications, WFBS didn't require extensive network setting inputs. The client/server security and remote messaging agents were created equally fast and simply. Client agents can be installed remotely via login scripts or downloaded from an internal or secured website.

The Vulnerability Scanner can scan the network and automatically deploy agents to unprotected systems. We logged in to the Web Console through a browser connection. An SSL connection to the Security Server is optional, which we thought introduced unnecessary risk. The Web Console was just about the most uncluttered security product interface we have ever encountered- eight menus are instantly accessible with a single mouseclick.

Policy B  

Policy creation is straightforward. Policies include the usual choices found in antivirus/antispyware, firewall and behavior monitoring applications. There are also settings to secure wireless connections and client privileges. The default scanning policies provide real-time scanning for incoming and outgoing traffic, automatic cleaning for infected files and deletion for malicious code that cannot be otherwise disabled.

Logging & Reporting B-  

WFBS can automatically generate a variety of useful reports aimed at IT and management. For instance, we were able to provide statistical analysis of security events for a security administrator as well as content filtering reports, informing managers which employees attempted to visit prohibited websites or send/receive inappropriate email.

The Outbreak Defense menu logged detailed information regarding infections and cleanups. Potential vulnerabilities based upon known threats were also identified. To quickly find a specific event or type of events, WFBS includes a Log Query screen that allows results to be exported to a CSV or text file.

Effectiveness A-  

WFBS can be effectively handled by an administrator or small IT department.

The Live Status menu let us view the health of our environment through color-coded buttons for specific threats as well as clients requiring updated agents. WFBS effectively scanned and protected all of our servers and client machines from a multitude of common threats, including viruses, spyware/adware, spam, infected URLs, phishing and malicious Java and ActiveX applets.

Using only the default settings, WFBS provided adequate security for messaging. The only problems we encountered were with large and compressed files that appeared to hang up the system.

We found the Web Repudiation feature that scans Web pages for malicious code prior to being displayed particularly useful in preventative network and system health. WFBS also includes a basic firewall,which is adequate for use with mobile laptops.


WFBS is an easy and affordable way for smaller organizations to cover all security bases.

Testing methodology: We tested Worry-Free Business Security on Windows Small Business and Exchange servers connected to a variety of Microsoft Windows endpoints, including desktops and wireless laptops.

Article 7 of 16

Dig Deeper on Information security policies, procedures and guidelines

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

Get More Information Security

Access to all of our back issues View All