Try our new research platform with insights from 80,000+ expert users

Cisco Secure Cloud Analytics [EOL] vs Trend Micro Deep Security comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Cisco Secure Cloud Analytic...
Average Rating
8.6
Number of Reviews
7
Ranking in other categories
No ranking in other categories
Trend Micro Deep Security
Average Rating
8.6
Reviews Sentiment
7.0
Number of Reviews
88
Ranking in other categories
Virtualization Security (1st), Cloud and Data Center Security (7th)
 

Featured Reviews

Philippe GNEZZERE - PeerSpot reviewer
Apr 27, 2023
Offers complete visibility of network traffic in a public environment
I use the solution to convey critical action and defeatability.  The product helps me to see malware.  The product's price is high.  I have been working with the tool since 2020.  The tool is stable.  We have 2000 users for the solution.  The product's support is excellent.  Positive The…
Venugopal Potumudi - PeerSpot reviewer
Nov 7, 2022
Easy to implement, good integrations, and helpful technical support services
It is mainly an antivirus product for both desktops as well as servers. It has additional modules which can be enabled in fast manner. It uses the same agent and additional modules like FIM, Filing Integrity Management and ELP services.  The product is easy to implement and easy to integrate with…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The product helps me to see malware."
"Cisco Stealthwatch Cloud is scalable because it is on the cloud."
"When it comes to scalability, there's no size limit. It varies based on licenses and requirements."
"The tool's best feature is its ability to monitor network traffic. It will also inform users whether the traffic generated by a network is legitimate. The tool helps to capture and analyze the network traffic."
"Monitoring the traffic, making sure you have the visibility."
"It tells you if there is any communication going to command and control servers, or if there is any traffic that violates your internal policy, or if any data hoarding is happening where data is being dumped from your machine to outside of the environment. It provides all such meaningful reports to help you understand what's happening."
"The logs in Cisco Stealthwatch Cloud are very good when doing the API integration in the team. It is able to give you important information for the correlations."
"Deep Security is a good product for managing a few servers."
"It has improved functions by bringing us complete security on our clients' virtual environment."
"The traceback feature in XDR is amazing. You can trace back an attack. You can playback where an attack actually occurred and see how the attacker moved. We can easily show this to management, and it makes it easy to make them understand and convince them, which is the best thing."
"The solution is quite secure."
"I switched to Trend Micro because of its good marketing techniques."
"The integration options of Trend Micro Deep Security have been particularly valuable."
"I like the anti-malware features."
"It serves its purpose and works well."
 

Cons

"The product's price is high."
"Cisco Stealthwatch Cloud could improve the graphical user interface. It could be a more user-friendly graphical user interface. so that. Not everybody's a cyber security professional, most of the customers that I deal with are not very skilled. The terms that they use in the solution are quite understandable for a normal CIO."
"The product needs to improve its user-friendliness. It is very tricky and you need to study it before using the standard functionalities."
"If we migrate these things to an event or send us an email if there is any critical event, I would like to configure these things on the initial launch. Because if a system is compromised, there will be a lot of data movement from one post to another post to the outside. Then, we should also get an alert on email as well. We have since we have integrated these things. But a direct email for critical alerts should be there. So, I would like to enhance the critical event configuration."
"The initial setup of Cisco Stealthwatch Cloud is complex."
"The initial setup is a bit complex in terms of deployment and configuration"
"When I used to work on it, I just didn't see anything new happening for about a year and a half. Providing newer data and newer reports constantly would help. There should be more classifications and more interesting data."
"The price could be reduced."
"They need to build in a central console because central integration is not very good right now."
"Another issue is if I want to suggest this solution to a customer, we won't get the pricing immediately, which is a major problem."
"Trend Micro Deep Security security and scalability could be improved."
"I would rate tech support in the range of six to eight out of 10. Time to provide solution could be improved."
"There could be a centralized management server to oversee all platform functionalities."
"The licensing structure could improve."
"The solution should focus on the EDR part and probably have an integrated data leak prevention module."
 

Pricing and Cost Advice

"The solution is quite expensive."
"Cisco Stealthwatch Cloud is an expensive enterprise solution."
"The price of Cisco Stealthwatch Cloud is expensive."
"Purchasing on the AWS Marketplace is like shopping on Amazon Prime."
"The cost runs around forty dollars per server a month."
"It is a very expensive solution. It would be nice if they lower its price. Its license is based on the machines."
"Some of our customers complain about the cost of this solution."
"Purchasing on the AWS Marketplace was easy. We decided to purchase this solution on the AWS Marketplace since we were already there."
"The product has a high price in Kuwait."
"The pricing is okay. Deep Security is single-server license-based, so it will work based on how many licenses you have procured. There is a yearly subscription for each license."
"We have saved a 50% ROI for the on-premise product. It gave us significant improvement overall in productivity, costs, and efficiency."
report
Use our free recommendation engine to learn which Intrusion Detection and Prevention Software (IDPS) solutions are best for your needs.
814,763 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
43%
Financial Services Firm
9%
Manufacturing Company
5%
Government
5%
Educational Organization
38%
Computer Software Company
11%
Financial Services Firm
7%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Cisco Stealthwatch Cloud?
When it comes to scalability, there's no size limit. It varies based on licenses and requirements.
What needs improvement with Cisco Stealthwatch Cloud?
There are two areas of improvement. Firstly, extend the log retrieval limit to at least three months. For example, there is a limit on the number of log messages that can be received. So, I would l...
What is your primary use case for Cisco Stealthwatch Cloud?
We are using Cisco Secure Cloud Analytics, also known as Cisco's WatchCloud, to monitor user activity in the cloud. Specifically, we are looking for users who are uploading or downloading data beyo...
Is Crowdstrike Falcon better than Trend Micro Deep Security?
I like that Crowdstrike allows me to easily correlate data between my firewalls. What’s most useful for my needs is the intelligence modules feature. I also find that Crowdstrike Falcon’s dashboard...
What's the difference between Trend Micro Deep Security and Trend Micro Apex One?
Trend Micro Deep Security offers a lot of features. It guarantees security for your data center, cloud, and containers - all with a unified and comprehensive SaaS solution and without compromising ...
 

Also Known As

Cisco Stealthwatch Cloud, Observable Networks
Deep Security
 

Learn More

Video not available
 

Overview

 

Sample Customers

Options, Schneider Electric, Washington University in St Louis, Gotcha, Kraft Kennedy, PartnerRe, Sumologic, Veterans United, AFGE, Agraform, Artesys, Dynamic Ideas Financials, Department of Agriculture and Commerce
Rush University Medical Center, Guess? Inc., Mazda Motor Logistics Europe, MEDHOST, KSC Commercial Internet Co., Ricoh Company Ltd., Square Enix, SoftBank Telecom, Telecom Italia, United Way of Greater Atlanta, A&W Food Services of Canada
Find out what your peers are saying about Darktrace, Vectra AI, Check Point Software Technologies and others in Intrusion Detection and Prevention Software (IDPS). Updated: October 2024.
814,763 professionals have used our research since 2012.