Trend Micro Deep Discovery and Check Point SandBlast Network compete in providing advanced network security solutions. Check Point SandBlast Network is often seen as superior due to its extensive features and the value it offers.
Features: Trend Micro Deep Discovery offers real-time threat detection, tailored sandboxing solutions, and a comprehensive view of network threats. It supports custom sandboxing with user-defined virtual environments and provides integration with Trend Micro Vision One for enhanced threat visibility. Check Point SandBlast Network provides Threat Emulation, Threat Extraction, and support for zero-day threats with AI-based detection. It includes sandboxing across multiple operating systems and uses static analysis to conserve processing power.
Room for Improvement: Trend Micro Deep Discovery can enhance its reporting capabilities and improve support for diverse platform integrations. Additionally, expanding threat intelligence feeds would benefit users. Check Point SandBlast Network could improve ease of use for new users, optimize resource usage during high traffic, and enhance customization options for sandboxing environments.
Ease of Deployment and Customer Service: Trend Micro Deep Discovery is known for straightforward deployment and intuitive management. Its support is reliable, making it easy to integrate into existing systems. Check Point SandBlast Network also offers an easy deployment process, with strong integration capabilities and extensive customer service that supports high satisfaction levels.
Pricing and ROI: Trend Micro Deep Discovery generally offers a lower initial setup cost, providing good value for its price. In contrast, Check Point SandBlast Network might require a higher upfront investment but usually delivers a strong ROI due to its comprehensive protection features that are considered worth the additional expense.
Protecting around 2,000 users from cyber threats, including ransomware, has positively impacted the organization's growth by reducing disruptions and business loss.
I have seen both money and time saved as a return on investment.
The customer support for Check Point SandBlast Network could be improved as they are sometimes late with their responses.
If I were to rate them from 0 to 10, I would give them a nine or a ten.
The scalability of Check Point SandBlast Network meets our organization's needs as we grow.
The scalability of Check Point SandBlast Network is very nice.
It is scalable but requires growing the box itself because it is a resource-intensive solution.
If it doesn't support scalability, Trend Micro will recommend an upgraded hardware version, requiring only a simple payment for the new appliance.
When configured correctly with adequate resources, it functions properly.
The product updates and security updates are kept current, allowing us seamless integration with Trend Micro and getting daily updates and signatures without problems.
The customer support for Check Point SandBlast Network could be improved as they are sometimes late with their responses.
Simplification of granular tuning for false positive reduction and bypassing benign files would benefit non-expert users.
When we enable sandboxing for all users, the CPU utilization of the firewall increases significantly.
We have multiple components such as Deep Discovery Email Inspector for mail gateways, Deep Discovery Analyzer for sandboxing, and Deep Discovery Inspector, which serves as an IDS detecting malicious network traffic.
Pricing is a bit costly, but considering the features and security offered by Check Point SandBlast Network, it is reasonable.
It is reasonably priced, not very expensive like Proofpoint or other vendors.
The best feature Check Point SandBlast Network offers is real-time threat extraction capabilities, which sanitizes the files, mails, and other content before reaching the end-users.
The key features of Check Point SandBlast Network include its ability to detect zero-day attacks, provide sandboxing capabilities, and offer real-time protection with threat extraction.
Check Point SandBlast Network has positively impacted my organization as it's very accurate and gives almost no false positives, providing excellent threat prevention and protecting against server zero-day attacks.
The most valuable capabilities of Trend Micro Deep Discovery Email Inspector include its ability to perform mail detection and mail filtration against various email attacks such as phishing and spam, serving as an email gateway for both inbound and outbound traffic.
Product | Market Share (%) |
---|---|
Check Point SandBlast Network | 4.0% |
Trend Micro Deep Discovery | 2.4% |
Other | 93.6% |
Company Size | Count |
---|---|
Small Business | 29 |
Midsize Enterprise | 7 |
Large Enterprise | 13 |
Company Size | Count |
---|---|
Small Business | 14 |
Midsize Enterprise | 6 |
Large Enterprise | 9 |
Check Point’s evasion-resistant technology maximizes zero-day protection without compromising business productivity. For the first time, businesses can reduce the risk of unknown attacks by implementing a prevent-first approach. Learn More about Check Point Sandblast
Trend Micro Deep Discovery provides an intuitive interface and extensive threat visibility. It enhances detection with sandboxing and custom virtual machine images. Integration with Trend Micro Office Scan and Vision One ensures robust defense and detailed threat analysis.
Trend Micro Deep Discovery is a comprehensive network security tool used for intrusion detection, malware analysis, and zero-day vulnerability sandboxing. It supports various platforms and can be integrated with email and server protection. It's particularly useful for compliance with regulatory requirements through signature-based behavior analysis and virtual patching. Users benefit from easy installation, management, and responsive technical support.
What are the key features of Trend Micro Deep Discovery?Trend Micro Deep Discovery is implemented across sectors requiring stringent security measures, such as finance, healthcare, and government. It's favored for its ability to analyze diverse network traffic and provide exceptional protection against sophisticated threats while ensuring compliance with strict data regulations. Industry reviews highlight its role in safeguarding sensitive information through robust security frameworks and adaptable deployment options.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.