Try our new research platform with insights from 80,000+ expert users

Symantec Data Center Security vs Trellix Embedded Control vs Trend Micro Deep Security comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Mindshare comparison

Cloud and Data Center Security
IoT Security
Virtualization Security
 

Featured Reviews

Atul-Vats - PeerSpot reviewer
Offers a complete system lockdown feature and the ability to restrict users but has a complex policy structure
The negative aspect of that particular product is the fact it has a very, very, very complex policy structure. A user or administrator making the policy in the DCS should have a very thorough knowledge of the operating system or policy making. You have to be very specific about the data structure. If you want to secure a Linux server, an administrator should be very confident about how the directory structure of Linux, how Linux works, and where it puts the important logs. You have to be very cautious about the complete path, and you have to write it over there in the policy part. If you are not very specific, there will be a lot of noise in the system. You're going to receive thousands of events that are false positives. The fine-tuning of the policy is a very complex thing in the DCS itself. Another negative aspect that I have observed is if the product gets installed on the kernel level of any non-Windows server, it has some issues, comparability issues. Sometimes the product doesn't work properly, so it shuts down the machine and crashes the system. There are many cases in which I've observed the DCS crashing the system.
Abdullah Al Hadi - PeerSpot reviewer
Offers DLP solutions with drive encryption, and application control
When installing McAfee ePO, we need to set up a self-check configuration. To join the system, we run a specific command. We configure connections for the data center, data server, and application server during this setup. Sometimes, we encounter communication issues between the database and application servers. These issues can prevent the database from communicating with ePO, leading to problems with updates and other functions. If the database cannot communicate with ePO, it affects our ability to manage configurations and updates, creating various issues. Additionally, roaming users outside the network must receive the latest signatures and updates. In a Citrix environment, a handler is configured to manage communication for these roaming users. However, we sometimes face issues with public and private IP configurations. Users may prefer to keep their IPs private, which can cause complications. For environments without Internet access, we use a DNS server to facilitate updates, which are managed locally. This type of configuration can be complex, but it's crucial for maintaining functionality without external network access. Trellix Embedded Control is a product used by companies in infrastructure development. The specific products and tools they use can vary based on their needs. DLP operates with devices, but network DLP is required for classification tasks. The choice of solutions depends on the organization's infrastructure and customer requirements, guiding the following implementation steps. Clients deploy the solution with their provider within one week.
Nikhilesh Verma - PeerSpot reviewer
Offers a good firewall that blocks unwanted ports
In our company's infrastructure, we have not faced any challenges with the product. Considering the lack of issues or challenges faced with the use of the product in our company's environment, I feel that it is a good solution. Sometimes, the product is not very stable, but it is something that depends on the infrastructure in which the tool is used. The aforementioned area can be considered for improvement. If Trend Micro Deep Security wants to implement some new features in it, then I would say that it should focus from a networking point of view and see how to control network traffic specifically coming from external to internal traffic on the servers.
report
Use our free recommendation engine to learn which Cloud and Data Center Security solutions are best for your needs.
848,253 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Manufacturing Company
20%
Financial Services Firm
16%
Computer Software Company
15%
Government
5%
No data available
Educational Organization
40%
Computer Software Company
9%
Financial Services Firm
8%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about Symantec Data Center Security?
The granularity of applying the policies is valuable.
What needs improvement with Symantec Data Center Security?
Agent management is a challenging task. We cannot do it from the console. We will have to use other tools.
What is your primary use case for Symantec Data Center Security?
One key use case for data center security is protecting files within the data center. This is especially important fo...
What is your experience regarding pricing and costs for Trellix Embedded Control?
Trellix is expensive, depending on the organization's size and financial capacity. For some, it is economical and fit...
What needs improvement with Trellix Embedded Control?
Customers and organizations are aware of attacks in VPN environments and how to protect against them. Forensic invest...
What is your primary use case for Trellix Embedded Control?
Trellix offers many products, such as DLP solutions for endpoint and network, drive encryption, and application contr...
Is Crowdstrike Falcon better than Trend Micro Deep Security?
I like that Crowdstrike allows me to easily correlate data between my firewalls. What’s most useful for my needs is t...
What's the difference between Trend Micro Deep Security and Trend Micro Apex One?
Trend Micro Deep Security offers a lot of features. It guarantees security for your data center, cloud, and container...
 

Also Known As

No data available
McAfee Embedded Control, Intel Security Controller, McAfee Controller
Deep Security
 

Overview

 

Sample Customers

Information Not Available
Kleberg Bank, Sicredi, Seagate, Loop Technology, Vidant Health, Xcel Energy, Cook County, Berkshire Health Systems, Mauser, China Pacific Insurance, Cologne-Bonn Airport, Bank Central Asia, Boston Medical Center, Boston Scientific
Rush University Medical Center, Guess? Inc., Mazda Motor Logistics Europe, MEDHOST, KSC Commercial Internet Co., Ricoh Company Ltd., Square Enix, SoftBank Telecom, Telecom Italia, United Way of Greater Atlanta, A&W Food Services of Canada
Find out what your peers are saying about Akamai, Illumio, VMware and others in Cloud and Data Center Security. Updated: March 2025.
848,253 professionals have used our research since 2012.