Find out what your peers are saying about Trend Micro, Sophos, Bitdefender and others in Virtualization Security.
The management console is very useful and easy to operate, allowing policy deployment in a minimal amount of time.
It adds value by providing centralized control over servers and endpoints.
If the customer is interested in technical capabilities, we demonstrate the tools, setup, implementation, and their working.
I can say that knowing you have a product like WatchGuard EPDR that's working 24/7 to help protect students in a school is good for ROI.
Whenever I raise a ticket, whether critical or high priority, their team responds immediately, often over calls, and works towards closing the request with the highest priority.
They have very professional engineers, and they often respond effectively.
A dedicated support engineer will come in within three hours.
They create a case, tell me to refer to articles, and if not resolved, they take a remote session to solve the issue.
Technical support for Panda Adaptive Defense 360 is provided by the reseller, and they also do preventive maintenance yearly.
The technical support from WatchGuard would rate at about an eight on a scale of 1 to 10, where one is the worst technical support and 10 is the best technical support.
Trend Micro Deep Security is highly scalable.
In most organizations, they are using a mix of these security solutions.
You can install it on a script basis for Linux and Windows.
WatchGuard EPDR is very competitive regarding its scalability.
It has been extremely stable throughout our usage, with no major disturbances.
Trend Micro Deep Security is very stable and provides protection at all times without issues.
We believe that software works fine until it is patched, managed, or monitored by the IT teams.
It is very stable with no hanging problems.
WatchGuard EPDR is a very stable solution and is not resource intensive.
The stability is approximately a seven to eight out of ten.
User experience improvement is most crucial, along with enhancements in policy management and the accuracy of the IPS, IDS features for real-time protection.
Additionally, the product is overpriced, which makes it difficult to sell to many customers.
The user interface could be more user-friendly, as navigation sometimes requires familiarity with the console.
Panda Adaptive Defense 360 is not compatible with certain network devices like access points, switches, or routers, which would be an area for improvement.
Other firewalls allow adding categories and in-app controls which WatchGuard currently lacks.
An area for improvement would be the software deployment to seamlessly deploy software packages across multiple machines simultaneously.
We give a fair comparison of all the products, and give them clear insights of the products, which makes it helpful for the customer to make a final decision to purchase the license or product.
Trend Micro Deep Security is considered overpriced, which poses a challenge in selling it to many customers.
The pricing is moderate, not expensive or very cheap.
It is worth the money and provides good return on investment.
The pricing is slightly high, but the product quality justifies it.
Regarding pricing, I am not sure because I did not compare it with other antivirus; maybe it is pricey.
It has multiple security layers, including anti-malware, intrusion prevention, integrity monitoring, web reputation, application control, firewall, and log inspection.
It is well-suited for state government customers who require a complete sense of security.
Trend Micro Deep Security offers valuable features such as virtual patching, which allows me to manage server downtime challenges by taking care of threats.
The cloud of WatchGuard lets me see all my devices, updating me to minute levels with detailed information, such as patch status and vulnerabilities.
The detection capabilities for malicious activities are effective.
The EDR has a high accuracy rate with only a few false positives.
Product | Market Share (%) |
---|---|
Trend Micro Deep Security | 43.2% |
Sophos Virtualization Security | 16.9% |
Entrust CloudControl | 15.3% |
Other | 24.599999999999994% |
Product | Market Share (%) |
---|---|
WatchGuard EPDR | 2.1% |
Microsoft Defender for Endpoint | 9.9% |
CrowdStrike Falcon | 7.9% |
Other | 80.1% |
Company Size | Count |
---|---|
Small Business | 36 |
Midsize Enterprise | 24 |
Large Enterprise | 42 |
Company Size | Count |
---|---|
Small Business | 26 |
Midsize Enterprise | 8 |
Large Enterprise | 1 |
Trend Micro Deep Security is a comprehensive solution for endpoint security and server protection, which prevents ransomware attacks and unauthorized access attempts. Its valuable features include tracing back attacks, antivirus protection, endpoint detection and response, firewall-based solution, threat detection, predictive machine learning and AI monitoring, VPM, virtualization, and sandboxing.
The solution is easy to use, scalable, stable, and reliable, with good technical support. It has helped organizations perform well against malware and vulnerabilities, provide patching from the Protection Cloud, and improve their security posture.
Trend Micro Deep Security Features
Trend Micro Deep Security has many valuable key features. Some of the most useful ones include:
Reviews from Real Users
Trend Micro Deep Security stands out among its competitors for a number of reasons. Two major ones are its robust data and loss prevention feature and its patch management, which saves users money. PeerSpot users take note of the advantages of these features in their reviews:
One PeerSpot reviewer, a Senior Security Advisor at a healthcare company, writes, “DLP, Data Loss Prevention, and the complexity of how we manage the console and how this client, or this tool, will notify us when there is something going wrong within the server and endpoint, is good.”
Nadeem S., CEO at Haniya Technologies, notes of the solution, “Patch management is most valuable. The major selling point of Deep Security is that it is based on the cloud. Deep Security is for the servers and databases of data centers, and generally, for patch management, you have to shut down the machines, and then you have to restart them. So, they need shutdown time, which is a cost.”
EDR for continuous monitoring that prevents the execution of unknown processes. Behavioral analysis and detection of IoAs (indicators of attack) scripts, macros, etc.
Automatic detection and response for targeted attacks and in-memory exploits. Endpoint protection capabilities such as URL filtering, device control and managed firewall.
Zero-Trust Application and Threat Hunting features delivered as managed services. Lightweight agent and easy-to-use Cloud-based console with detailed reporting.
We monitor all Virtualization Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.