Try our new research platform with insights from 80,000+ expert users

Kaspersky Anti-Targeted Attack Platform vs Trend Vision One comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Nov 24, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Kaspersky Anti-Targeted Att...
Ranking in Endpoint Detection and Response (EDR)
57th
Average Rating
6.6
Reviews Sentiment
6.1
Number of Reviews
6
Ranking in other categories
No ranking in other categories
Trend Vision One
Ranking in Endpoint Detection and Response (EDR)
4th
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
69
Ranking in other categories
Network Detection and Response (NDR) (3rd), Extended Detection and Response (XDR) (5th), Attack Surface Management (ASM) (2nd), AI-Powered Cybersecurity Platforms (3rd)
 

Mindshare comparison

As of March 2025, in the Endpoint Detection and Response (EDR) category, the mindshare of Kaspersky Anti-Targeted Attack Platform is 0.1%, up from 0.1% compared to the previous year. The mindshare of Trend Vision One is 2.9%, down from 3.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Detection and Response (EDR)
 

Featured Reviews

Muhammad Ali Aziz - PeerSpot reviewer
A cost-effective solution for endpoint protection and EDR
The Kaspersky Anti-Targeted Attack Platform is designed to detect various attacks, such as Mitraframe, and provide alerts for each attack technique and procedure. It also offers alerts for potential threats and conducts thorough analyses through its sandbox environment, which isolates and executes malware or unknown files within virtual machines. This allows for real-time threat detection and feedback on potential threats. The platform is a SOC tool and thus requires skilled resources for effective operation, as it involves both automation and manual understanding of attack scales. Third-party intelligence integration enriches the alert system but may lead to occasional false positives, which can be fine-tuned through exclusion options and custom rule creation. The platform offers extensive customization options, allowing users to create rules specific to file detection or PowerShell activities. It provides visibility into telemetry data, enabling comprehensive monitoring of environmental activities. Integration with frameworks like Mitraframe helps tailor policies and rules to suit specific environments. The platform competes with products like FireEye, Snowflake, and Trend Micro. Integration between Kaspersky and other products is seamless, allowing unified threat detection. It is a solid choice for enterprises seeking advanced threat detection capabilities in the Middle East. Overall, I rate the solution eight out of ten.
DavidBowman - PeerSpot reviewer
It improves the detection speed, but it could be more customizable
They need to stop changing Vision One once a week. They're in a hurry to change things so badly and so fast that I can't find where stuff is half the time, which is a challenge sometimes. I've given one piece of feedback to their product guys. One thing that they're trying to make is a SIEM. It's a product where you input all the logs from your tools, and it creates additional insights into how things look. They've been kind of playing the "me too" game on that, even though that's not what I bought the product for. They have a new gateway where I can take my firewall of email logs and send it over there. In theory, it's supposed to do a more comprehensive evaluation of all my stuff to improve that risk index score. I'm not impressed with it, and I've told them as much. I feel if you're good at something, you should keep working on that and not try to be all the things to all the people. I bought a different email solution even though it would have been 10 times easier to just stay with their email solution because they aren't great at it. They are great at other things, but they're playing the "me too" game with some of their products. Their competitors do this, so they should be doing this, too. They need to pick a product and keep being good at that. If they're going to roll new things out, they should do it but do it right. They have a button to isolate an endpoint because it looks bad, but it doesn't usually work. I've had no chance to argue with the product guys to show them examples of how their button doesn't work. You think it does, but it doesn't work in a real environment. That can be a challenge sometimes. I can see in the data showing what is a false positive. But it doesn't save me time helping them figure out how to fix the problem in their engine. It can help me identify it as a false positive, but it doesn't apply that consistently. It will ignore the false positive for that device, but if they start detecting a false positive on Apple devices, I have eight thousand Apple devices and get 8,000 alerts. I can tell that specific false positive, but it doesn't learn from that particularly well. We use the executive dashboards, but I don't find them particularly useful. One is the ability to customize. That has gotten a little better, and it'll be better in the future. Most of what they have on there are data points that are generic and not particularly actionable. That's why it's called an executive dashboard. Executives want to see if we are secure, but it's hard for me to find out why our attack surface risk went down by x percentage. I don't know. It says that on the dashboard, but it doesn't give me specific details about why. I find it confuses my executives, and it's not useful for me because it doesn't give me things to work on. It will give me generic things on the executive dashboard like you have a thousand accounts with an old password. Those are big generic things, but I also can't tell it that our password policy is different from what your automatic detection model means, and I don't have a problem with that, so quit lowering my risk score. The risk score is useless. In theory, it's based on the random intelligence they're getting from their various customers. I'm in K-12 education, so they have a decent amount of K-12 customers, but it's a subset, and the baseline of what's common in K-12 education is not the same. There's not enough data to make that particularly clean or useful. Vision One is not custom, and that's part of my beef. That index score is based on whatever random report they're looking at from their data sources at any given moment in time. It's nice, but I'd rather have one that's based on your particular circumstances. Instead, it's saying that the number one attack threat surface for school districts is email phishing. It's too generic.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I feel the anti-ransomware update is one of the tool's valuable features."
"The solution is very easy to use. Its interface is very simple, and you can build IOC's indicators. You can use your rules to detect these attacks because you can leverage threat intelligence. Y"
"The product's deployment phase is easy."
"The most valuable use is detailing metadata collection from the endpoint and network."
"Kaspersky Anti-Targeted Attack Platform is stable and runs all the time."
"The email security feature is really good."
"Trend Vision One's most valuable feature is its centralized console, which provides comprehensive security features, including attack surface risk management."
"The workbench alerts provide valuable insights into attack chains and relevant information, while Observer techniques give a comprehensive overview of ongoing activities."
"What I like the most about Trend Micro XDR is that the detection and response domain extends to the network. It goes beyond the endpoint and includes data about the network which lets you pinpoint patient zero as well as the root cause of the attack."
"Trend Micro XDR is a comprehensive solution that is not overly complex to use or manage."
"When we purchased Vision One, what set it apart was that it wasn't a traditional signature-based antivirus. It's a process-aware solution that provides real-time protection. That was a big differentiator three years ago, but now it's a given that every AV provider should be doing that. It combines signature-based telemetry with behavioral awareness and a detection-based solution, making it a good solution for us."
"We can scale the product as needed."
"For our day-to-day use cases, the correlation and attribution of different alerts are valuable. It is sort of an SIEM, but it is intelligent enough to run the queries and intentionally detect and prioritize attacks for you. At the end of the day, it is different data that you see. It correlates data for you and makes it meaningful. You can see that someone got an email and clicked a link. That link downloaded, for example, malware into the memory of the machine. From there, you can see that they started moving laterally to your environment. I quite like it because it gives visibility, so Workbench is what we use every day"
"The most valuable feature is how the stack fully integrates all components of a solution."
 

Cons

"Kaspersky Anti-Targeted Attack Platform is not a good product. We had problems with endpoints and the solution did not detect it. We didn't get any alerts about the attack."
"The blind spot or gap in the platform is network analysis functionality."
"The backup and recovery features of the product are not good."
"The solution lacks cloud integrations."
"In some of the places I have come across, even though they use Kaspersky, the ransomware enters their system."
"I think the tool is still not really good enough for integration compared to other products."
"The solution could always be made to be more secure."
"Results were delayed."
"The support documentation could be more comprehensive."
"Vision One's search could be improved. While the platform is very user-friendly, the search feature uses terms that aren't as intuitive."
"Trend Vision One has some usability issues."
"Trend Micro's support is suboptimal in my region, likely due to proximity to their resources, favouring areas closer to the company. Consequently, we utilize local support providers who offer better service."
"We'd like to see more use of AI around analytics and controls."
"The deployment process could be more streamlined over the existing infrastructure, as it was not as easy as we thought."
 

Pricing and Cost Advice

"Kaspersky is one of the cheaper solutions."
"The solution has competitive pricing."
"Kaspersky Anti-Targeted Attack Platform is cheap."
"It is costly. It is not that affordable for a small organization. Only big organizations can afford it. It is a new feature that has been added, so its price is fair. Its licensing is probably subscription-based. It is for one or two years."
"The price is reasonable. It's not exorbitant. CrowdStrike and other players are on the higher side."
"The price for Trend Vision One is reasonable compared to Microsoft and Symantec."
"It would be nice if it was a little bit cheaper, but I think it has a fair price. It is comparable to others in the market."
"Trend Micro XDR is reasonably priced for its value, comparable to other products like VMware Carbon Black."
"Trend Micro's licensing is outsourced to third-party vendors, resulting in price variations depending on the vendor."
"It is definitely not cheap. I do believe you get what you pay for to some degree. It is cost-effective."
"They've introduced a credit system, where we purchase credits and then allocate them to the specific services we need active."
report
Use our free recommendation engine to learn which Endpoint Detection and Response (EDR) solutions are best for your needs.
839,422 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
41%
Computer Software Company
15%
Government
9%
Financial Services Firm
9%
Educational Organization
26%
Computer Software Company
18%
Financial Services Firm
5%
Healthcare Company
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about Kaspersky Anti-Targeted Attack Platform?
The solution is very easy to use. Its interface is very simple, and you can build IOC's indicators. You can use your rules to detect these attacks because you can leverage threat intelligence. Y
What is your experience regarding pricing and costs for Kaspersky Anti-Targeted Attack Platform?
Its price is reasonable; it's neither very high nor very low, considering its capabilities.
What needs improvement with Kaspersky Anti-Targeted Attack Platform?
I think the tool is still not really good enough for integration compared to other products. If you need to integrate with the ecosystem of the Kaspersky primary, and if we are going to the third p...
What do you like most about Trend Micro XDR?
I appreciate the value of real-time activity monitoring.
What is your experience regarding pricing and costs for Trend Micro XDR?
There are additional costs. Overall, the price-performance ratio is okay.
What needs improvement with Trend Micro XDR?
Trend Vision One is already very powerful. The clarity and usability could be improved a bit. Sometimes it’s difficult to find your way around. It’s such an important tool, and you can do a lot wit...
 

Also Known As

Kaspersky Anti Targeted Attack
Trend Micro XDR, Trend Micro XDR for Users, Trend Vision One - XDR for Networks
 

Interactive Demo

Demo not available
 

Overview

 

Sample Customers

Republic of Serbia, Goods.ru, Tael, Insolar
Panasonic North America, Decathlon, Fischer Homes, Banijay Benelux, Unigel, DHR Health,
Find out what your peers are saying about Kaspersky Anti-Targeted Attack Platform vs. Trend Vision One and other solutions. Updated: January 2025.
839,422 professionals have used our research since 2012.