
![Trend Micro Deep Discovery [EOL] Logo](https://images.peerspot.com/image/upload/c_scale,dpr_3.0,f_auto,q_100,w_64/2wuq6mq8liciuy8jm6aqj4dp5bgm.jpg?_a=BACAGSGT)
Splunk User Behavior Analytics and Trend Micro Deep Discovery [EOL] compete in the fields of security analytics and threat detection. Splunk has the upper hand in usability and functionality with comprehensive features like real-time data aggregation and customizable dashboards.
Features: Splunk User Behavior Analytics provides powerful analytics, real-time data correlation, and scalable solutions for large enterprises. Customizable dashboards enhance user behavior analysis, while machine learning models automate threat detection. Trend Micro Deep Discovery offers advanced threat intelligence and sandboxing capabilities, protecting against zero-day threats with real-time network traffic visibility and integration with Trend Micro solutions.
Room for Improvement: Splunk faces challenges with high data ingestion costs and the need for improved integration with third-party tools. Its licensing model and complex dashboard configuration also require enhancements. Trend Micro needs improvement in pricing, scalability, and support for various operating systems and third-party integrations.
Ease of Deployment and Customer Service: Splunk offers various deployment options, including hybrid and public cloud, benefiting greatly from flexibility and a supportive community. Trend Micro primarily operates on-premises with limited cloud options, praised for straightforward integration but limited by scalability and traditional support mechanisms.
Pricing and ROI: Splunk's pricing model is often viewed as expensive, as costs are linked to data processed, affecting ROI. Nevertheless, it can save costs by enhancing productivity and reducing incident resolution times. Trend Micro's pricing varies by license type and is considered high compared to simpler antivirus solutions, but justified by its advanced capabilities. Both products deliver positive ROI through effective deployment and usage.
The solution can save costs by improving incident resolution times and reducing security incident costs.
Mission-critical offering a dedicated team, proactive monitoring, and fast resolution.
From the responsiveness perspective, Splunk is very responsive with SLA-bound support for premium tiers.
I would rate their technical support as 8.5 out of 10.
If I were to rate them from 0 to 10, I would give them a nine or a ten.
There is no dedicated team in India for giving support for Trend Micro Deep Discovery.
Splunk User Behavior Analytics is highly scalable, designed for enterprise scalability, allowing expansion of data ingestion, indexing, and search capabilities as log volumes grow.
If the appliance supports scalability, Trend Micro support will inform us, and we can implement it without replacing the hardware.
With built-in redundancy across zones and regions, 99.9% uptime is achievable.
Splunk User Behavior Analytics is a one hundred percent stable solution.
Splunk User Behavior Analytics is highly stable and reliable, even in large-scale enterprise environments with high log injection rates.
The product updates and security updates are kept current, allowing us seamless integration with Trend Micro and getting daily updates and signatures without problems.
Global reach allows deployment of apps and services closer to users worldwide, but data sovereignty concerns exist and region selection must align with compliance requirements.
I encountered several issues while trying to create solutions for this advanced version, which seem unrelated to query or data issues.
High data ingestion costs can be an issue, especially for large enterprises, as Splunk charges based on the amount of data processed.
We have multiple components such as Deep Discovery Email Inspector for mail gateways, Deep Discovery Analyzer for sandboxing, and Deep Discovery Inspector, which serves as an IDS detecting malicious network traffic.
The solution is not scalable as it is an agent product rather than a product designed for scalability.
There is no dedicated team in India for giving support for Trend Micro Deep Discovery.
Reserved instances with one or three-year commitments offer lower rates, providing up to 70% savings.
Compared to all other products in the market, it is the most expensive one in all aspects including professional service and licenses, even the cloud version.
Comparing with the competitors, it's a bit expensive.
I do not consider it an expensive tool; its price is justified based on the capabilities that we receive when compared to another mail gateway or other vendors.
The solution is very expensive.
Overall, the licensing cost of Trend Micro Deep Discovery was not on the higher side earlier, but now, since the competition has increased, we need to think about the prices.
I also utilize it for anomaly detection and behavior analysis, particularly using Splunk's machine learning environment.
The dashboards themselves are nice, very good, and very helpful, but the accuracy of the data or the information that will be presented on the dashboard is something that needs to be questioned.
Features like alerts and auto report generation are valuable.
The most valuable capabilities of Trend Micro Deep Discovery Email Inspector include its ability to perform mail detection and mail filtration against various email attacks such as phishing and spam, serving as an email gateway for both inbound and outbound traffic.
This solution allows us to see anomalies, network traffic in our network, and zero-day threats.
The impact of the Threat Intelligence Sharing feature on overall defense and security is positive.
| Company Size | Count |
|---|---|
| Small Business | 7 |
| Midsize Enterprise | 6 |
| Large Enterprise | 12 |
| Company Size | Count |
|---|---|
| Small Business | 16 |
| Midsize Enterprise | 6 |
| Large Enterprise | 9 |
Splunk User Behavior Analytics focuses on data aggregation and threat detection with automation, deepening insights into user behavior. It offers usability, stability, and strong integration capabilities, making it a preferred choice for organizations needing comprehensive security management.
This platform enhances security management through customizable dashboards and real-time updates. Advanced analytics for anomaly detection and behavioral profiling, coupled with powerful indexing and search capabilities, enable thorough user behavior analysis. Users experience streamlined integration with Active Directory and other monitoring tools. However, improvements are needed in dashboard customization, customer support, and analytics tools to boost user experience. Organizations use Splunk User Behavior Analytics primarily for monitoring and analyzing user behavior, integrating various data sources for effective threat detection while maintaining governance.
What are the key features of Splunk User Behavior Analytics?Splunk User Behavior Analytics is widely implemented across industries for threat detection and insider threat identification. By integrating with tools like Active Directory for monitoring and anomaly detection, organizations benefit from robust security management and effective log analysis. It underpins efforts in security, data indexing, and combining data for comprehensive threat prevention.
Trend Micro Deep Discovery [EOL] offers real-time network traffic visibility, advanced sandboxing, and threat intelligence sharing, improving threat management for organizations through seamless integration with security products and precise threat detection in simulated environments.
Recognized for its ability to detect advanced persistent threats and zero-day exploits, Trend Micro Deep Discovery [EOL] provides insights into malicious activities while maintaining compatibility with multiple platforms. Its custom sandboxing technology allows detailed environmental simulations to identify threats accurately. Despite the benefits, there are challenges such as the need for enhanced support in regions like India, better scalability, and easier usage for non-technical users. Integration with third-party tools could also improve alongside a simpler pricing model. Security features, stability, and flexibility are areas requiring enhancement to meet broader industry needs.
What are the key features of Trend Micro Deep Discovery [EOL]In industries focused on network security and compliance, Trend Micro Deep Discovery [EOL] finds use in intrusion detection and protection against malware, phishing, and ransomware. Companies deploy it for email filtration and network analysis, ensuring secure data management and virtual patching to address zero-day vulnerabilities. On-premises implementation includes role-based access and scanning of virtual environments, aiding in meeting security compliance standards and reducing server downtime.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.