Use Cases and Deployment Scope
we sell the solution to our customers. The mail is routed to trendmicro servers where it is checked and then returned to our mailserver.
You can create rules for checking mail, spam, attachment size, you can specify blacklist or whitelist, search the logs to understand which rules have been applied to each single incoming mail.
Alternatives Considered
Microsoft Defender Threat Intelligence and Broadcom Symantec Email Threat Detection and Response
Other Software Used
Trend Micro Worry-Free Services Suite, WatchGuard Network Security