Acer Predator Connect X5 5G CPE User Manual - Page 42

compromised IoT devices by using Trend Micro's Smart Protection Network,

Page 42 highlights

11.3 IoT security protection can detect and block harmful connections from compromised IoT devices by using Trend Micro's Smart Protection Network, a continuously updated IoT device reputation database. 11.4 Parental Control allows you to block unwanted websites on specifically devices. 42

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56

42
11.3
IoT security protection can detect and block harmful connections from
compromised IoT devices by using Trend Micro's Smart Protection Network, a
continuously updated IoT device reputation database.
11.4 Parental Control allows you to block unwanted websites on specifically
devices.