Trend Micro IoT Security (TMIS) provides IoT risk detection and system protection. In order to provide those features, Trend Micro IoT Security automatically analyzes the system libraries and process behaviors in your IoT devices to create baselines that are used to protect IoT devices against network threats.
To see where this data is processed, refer to our list of data centers and authorized data subprocessors and their locations.
By installing Trend Micro IoT Security, Trend Micro will analyze, receive, and collect the following information:
|Email address||The email address used as the recipient of email reports|
|Password||The password used to encrypt the attachments of email reports, including Trend Micro IoT Security agent package, pattern file for virtual patch and other detail reports|
|MAC address||Information used for display in email reports|
Hosted IPS (HIPS) provides network-based intrusion protection in the Trend Micro IoT Security agent. This feature protects devices by detecting and blocking intrusions from network traffic (with or without encryption) and malicious URL. The Trend Micro IoT Security agent sends the blocked attack information to the Trend Micro IoT Security server for display on the management console.
|Blocked attack information||Data sent to the Trend Micro IoT Security server for display in email reports|