We performed a comparison between ExtraHop Reveal(x) and Trend Micro Deep Discovery based on real PeerSpot user reviews.
Find out what your peers are saying about Darktrace, Vectra AI, Auvik and others in Network Traffic Analysis (NTA)."We had useful information within the hour of deployment. The ability to trace back for historical analysis, as well as the behavioral analysis done with the security information, puts the user in a position to make an informed decision to mitigate the performance or security incidents. Regarding the security incidents, Reveal (x) is able to create incident cards that guide your teams through the incidents and gives you the option to delve into the transaction detail to potentially view payloads as well."
"The security features of this solution are the most valuable."
"ExtraHop Reveal(x) is one of the tools that works out of the box when it comes to threat hunting."
"The solution works well for sending sensors."
"The solution's ability to decrypt SSL traffic is its most valuable feature."
"The most valuable features of ExtraHop Reveal(x) are the detection and alerting of network behavior and anomalies."
"Setting up the solution is relatively easy."
"With ExtraHop Reveal(x), it gives me more visibility into the packets. It doesn't provide the entire packet capture, but it offers more information on how connections are made at the network layer. This can be helpful for detecting network attacks. Additionally, I really like the customizable dashboards and reports. The incident dashboard and alerts provide a good summary initially, and diving deeper into them gives more detailed information. It's also great for analyzing specific attacks and victim logs. The feature that tracks the full attack chain makes it easier to monitor the progress of attacks. Plus, it's connected to the Netria.com app, which I find useful for certain tasks."
"The most valuable features are the protection and that it is fast."
"Generally speaking, it just gives us a broad understanding of exactly what kind of threats occur. The submission point, analyzing point, and virtualization are within the environment that it supports. It helped us to improve our security levels and protect our internal network from any threats outside."
"The most valuable feature is that the user can customize images of virtual machines in the sandbox functionality. The other vendors only use images that were created by the vendor but not the customer, end-user or partner. This helps to detect advanced threats and attacks."
"One of the most valuable features is the performance, since, so far, we have not faced any issues with Deep Discovery."
"It is a very good solution. It is very light, and it is quite quick to figure out the problem in your network."
"The platform provides all essential features for discovery and administration."
"The tool's stability and performance are good."
"Initial setup is easy. It can be done by yourself."
"Netflow - Processing Netflow can be cumbersome as it requires triggers to truly gain value and insight. This in turn can add a bit of load to the hardware. The focus of ExtraHop Reveal (x) is live packet data."
"I would like to see more cloud capability."
"ExtraHop Reveal(x) could improve by allowing a longer look back in the feature. Right now you have a limit of 30 days to look back on your activity. I've used Darktrace before, and they allow you the ability to play back events. This would be a good feature to have in ExtraHop Reveal(x)."
"The solution's reporting part and GUI are areas with certain shortcomings where improvements are required."
"The solution should include more support protocols."
"It needs integration with more security vendors."
"They used to have the ability to decode Citrix sign-on, setup, and tear down. Unfortunately, Citrix has stopped sharing that knowledge. Citrix has continued to change its model of processing, making it harder and harder to troubleshoot."
"Agent management could certainly use some focus. It should also be a little bit easier to work with collections. We should be able to nest collections within collections. There should be better nesting."
"The product's security features need enhancement."
"Trend Micro Deep Discovery is a very expensive solution, making it very hard to sell."
"The product's scalability feature needs to be improved, as it is an area in the product with certain shortcomings."
"I would like the ability to analyze all files in our internal network, at the same time on different operating systems. Not just three of them, but as many as possible."
"The solution needs to be able to integrate better with third-party infrastructure."
"I would like to see them create a rule where It could integrate with the network and start mitigating with auto-detection."
"Trend Micro can improve the pricing in general. There is nothing else they can add or improve in the solution."
"Additionally, better scanning capabilities for third-party applications would ensure comprehensive security without the need for exclusions."
ExtraHop Reveal(x) is ranked 5th in Network Traffic Analysis (NTA) with 12 reviews while Trend Micro Deep Discovery is ranked 6th in Intrusion Detection and Prevention Software (IDPS) with 24 reviews. ExtraHop Reveal(x) is rated 8.6, while Trend Micro Deep Discovery is rated 8.2. The top reviewer of ExtraHop Reveal(x) writes "It helps you visualize how data moves across your network". On the other hand, the top reviewer of Trend Micro Deep Discovery writes "Good threat detection capabilities and offers flexibility for hosting options". ExtraHop Reveal(x) is most compared with Darktrace, Vectra AI, Corelight, Arista NDR and NetWitness XDR, whereas Trend Micro Deep Discovery is most compared with Darktrace, Trend Micro TippingPoint Threat Protection System, Arista NDR, Vectra AI and Fortinet FortiGate IPS.
We monitor all Network Traffic Analysis (NTA) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.