Try our new research platform with insights from 80,000+ expert users
Senior Talent Sourcer, Digital at Digitaltrack
Reseller
Top 5
Supports virtual patching, and is easy to deploy, use, and manage
Pros and Cons
  • "Virtual patching is a wonderful feature where we do a recommendation scan and an internal assessment on the server, and it updates the IPS signatures to block any attack. I have seen instances where it has prevented attacks on the end-of-support servers such as 2018 R2, and many years ago, even 2007 servers that were end-of-support. It certainly helped there."
  • "I've not worked with CrowdStrike Falcon, but one of our customers also had CrowdStrike Falcon on some of the devices. I was only supporting Trend Micro. They had a ransomware attack, but Trend Micro didn't detect that particular ransomware attack, whereas CrowdStrike did."

What is most valuable?

The virtual patching features of Trend Micro Deep Security are very good. If you're running an unpatched server and you need to do n-1 patching, you need to wait for a month for the patch to be rolled out. That one month is a long time for an attacker to do an attack. Virtual patching is a wonderful feature where we do a recommendation scan and an internal assessment on the server, and it updates the IPS signatures to block any attack. I have seen instances where it has prevented attacks on the end-of-support servers such as 2018 R2, and many years ago, even 2007 servers that were end-of-support. It certainly helped there.

Another big advantage of Trend Micro at the time was that it supported Linux. Nowadays, most of the vendors seem to be supporting the Linux operating system, but Trend Micro was the initial organization that started supporting Linux and anti-malware solutions. It only had the anti-malware solution. It didn't do file integrity monitoring or other things.

Trend Micro Deep Security is easy to use and deploy.

What needs improvement?

I've not worked with CrowdStrike Falcon, but one of our customers also had CrowdStrike Falcon on some of the devices. I was only supporting Trend Micro. They had a ransomware attack, but Trend Micro didn't detect that particular ransomware attack, whereas CrowdStrike did. I was not a big fan of CrowdStrike till then, but when I saw that Trend Micro couldn't detect that particular attack but CrowdStrike could, my opinion changed. All the servers with Trend Micro were impacted, but all the devices on which CrowdStrike agents were running weren't impacted. CrowdStrike detected and blocked the attack immediately. From that perspective, I have high regard for CrowdStrike because the role of an EDR is to detect and respond immediately and block an attack. Containment is the first priority. Trend Micro can give numerous ifs and buts about why it couldn't detect that attack, and even though I'm a fan of Trend Micro and have extensive experience with Trend Micro Deep Security and Trend Micro Apex One, in that particular instance, CrowdStrike literally beat Trend Micro.

A disadvantage of Trend Micro as compared to CrowdStrike is that it doesn't work well with other solutions. If you have McAfee for anti-malware and IPS and the firewall of Trend Micro, they don't go very well. I had challenges deploying it with Carbon Black as well as McAfee and Symantec. It's because of the way Trend Micro works. It integrates with the NIC driver, so if two agents are running, it doesn't work well because they both want to integrate with the NIC driver.

How was the initial setup?

It's easy to deploy. I've deployed it for more than 12,000 devices, which includes endpoints and servers. It's easy to deploy and easy to manage. You can do it automatically through the script. The ease of implementation and ease of management are there, but there are a few challenges. Linux compatibility has some issues because it's a kernel-based rollout. Especially with CentOS, I face challenges. CentOS is now Red Hat, so if we are running CentOS, we have to deploy Red Hat agents and not CentOS agents. It's not that easy to manage on Linux. If it's a stable, standard Linux version, it works, but with beta versions, there are some challenges.

What's my experience with pricing, setup cost, and licensing?

CrowdStrike had an advantage over Trend Micro when it came to pricing. Trend Micro had several modules, so it was a little priced up, but CrowdStrike was not. However, even CrowdStrike has increased their price now, so probably both of them are on par, but the number of modules that Trend Micro has is far more than CrowdStrike. It comes with file integrity monitoring, application control, and web reputation. It has outbound URL protection, and it also has ransomware protection for servers, whereas CrowdStrike Falcon is a straightforward solution. It isn't an apple-to-apple comparison. It's a big apple versus small apple kind of comparison.

Buyer's Guide
Trend Micro Deep Security
November 2024
Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
823,875 professionals have used our research since 2012.

What other advice do I have?

My general advice to everyone is to first define your must-haves. What is it that you are looking for in a product? Nowadays, there are so many products with overlapping features, so you need to first decide what it is you are looking for. From a feature perspective, you should define must-haves and nice-to-have. 

You also need to test it out if you are running multiple products on the same server. You need to test it out on the utilization side because there is a huge utilization hit if you are running multiple agents on the same server. You need to work it out because Trend Micro, CrowdStrike, or any other agent would require a good amount of memory. There should be dedicated memory for them. If there is a 16-gig memory, at least 2-gig memory should be dedicated to them. There should be 2 gigs for it to just work and 8 gigs for the OS, so we are talking about a minimum of 10 gigs. If your servers are running on low memory, there'll be a huge utilization hit on the servers. Therefore, you need to choose the right agent. If you are running multiple agents, then you probably need to do a capacity evaluation before purchasing any of the tools. There are trial versions available, and PoCs are also available, so you can certainly check on it and see the utilization. Do proper homework before purchasing the tool. The tool is good, and it will perfectly work fine, but it also depends on the implementation.

At this time, I'd rate it an eight out of ten because of the challenge that I faced when I was dependent on this, but it couldn't protect the server. However, by now, Trend Micro would have fixed the problem that I faced a year ago. I know their Singapore EDR team. I worked with them, and they are quick in terms of fixing any bugs or issues. They would've definitely looked into it, but that was one instance for me where CrowdStrike outperformed Trend Micro.

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
PeerSpot user
Anil Chauhan - PeerSpot reviewer
Information Security Specialist at SG Fleet Group Ltd
Real User
Top 20
Offers a super easy setup phase to users
Pros and Cons
  • "The most valuable features of the solution are the log inspection and the IPS, which are the most effective compared to other tools."
  • "The tool needs to be made more user-friendly. The dashboard is there, but the solution's false positives are a bit higher."

What is our primary use case?

I work in a finance-based company, so what we look at would be an anti-malware suite to inspect IPS policies, firewalls, and other such stuff.

What is most valuable?

The most valuable features of the solution are the log inspection and the IPS, which are the most effective compared to other tools.

Log inspection completely reviews all the logs on the machine rather than me going and investigating. I can take a quick look into the issues with Trend Micro Deep Security.

What needs improvement?

The tool needs to be made more user-friendly. The dashboard is there, but the solution's false positives are a bit higher.

For how long have I used the solution?

I have been using Trend Micro Deep Security for three years. I am a customer of the solution.

What do I think about the stability of the solution?

It is a stable solution. Stability-wise, I rate the solution a six to seven out of ten.

What do I think about the scalability of the solution?

I have no complaints about the scalability of the product. Scalability-wise, I rate the solution a seven out of ten.

How are customer service and support?

If I speak about the support directly from Trend Micro's team, I rate the technical support as five out of ten.

If I consider the support that I get from Trend Micro's sales engineering team, I would rate the support as a seven or eight. The support team does not reply, and if they do, they provide a response after a week, even if you say that we urgently need their help. The local team in my country, which is the engineering team from the sales side, contacted us and asked whether they could help us in any way with the ticket raised from our end.

How would you rate customer service and support?

Neutral

How was the initial setup?

The product's initial setup phase was super easy. Trend Micro's team was there to support us when we were setting it up. The sales team and sales engineering team were also helpful.

If ten means very easy setup and one means difficult, I rate the setup phase a seven to eight.

Within business hours, the solution was deployed in two days, considering that there was a need to set up policies and servers.

What other advice do I have?

With Trend Micro's virtual patching in place, the IPS rules are quite effective, so I don't have to patch my systems right away. Trend Micro has been quite aggressive in releasing the IPS rules, which protect our servers from any such incidents.

I wouldn't think that I have seen any reduction in security-related costs since implementing the solution. I have not seen a reduction in the pricing of the security suite, given the fact that the risks have been increasing worldwide or at a global level. We have to put more money to protect ourselves.

I would not blame Trend Micro for not ensuring that users see the cost reductions. Considering the many developments in the general market, the tool has to stay updated.

The compliance management in Trend Micro Deep Security has not very much improved the security audits, especially since we are using the on-prem version. With the on-prem version, you don't get much of the compliance management part. The SaaS version is quite different and we are looking to switch to it.

The fact that Trend Micro Deep Security has integrated everything with Trend Vision One is something that is more than sufficient.

We are using the tool's on-prem version, so I don't think I have seen anything related to AI.

I have not seen anything related to automation in the tool.

The suite is better, so when you are buying a product, make sure that you squeeze everything into one since that is where the real money lies.

I think the major value for my company does not come from Trend Micro Deep Security but from Trend Micro Vision One, XDR Telemetry, and everything else.

If a person has completed the integration, you don't have to look at the different modules of Trend Micro Deep Security, as you can just log into Trend Vision One and do all the XDR analysis.

I rate the tool an eight out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Buyer's Guide
Trend Micro Deep Security
November 2024
Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
823,875 professionals have used our research since 2012.
VP of Enterprise Architecture at Broadridge
Real User
IDS and IPS are its most valuable features
Pros and Cons
  • "Trend Micro gave our security teams a certain degree of comfort by just having it in the background, as they have familiarity with the product."
  • "AWS products could become more compatible with intrusion detection products leveraging help from Trend Micro."

What is our primary use case?

It's for security: IDS, IPS, intrusion detection, and securing our perimeter in general. E.g., OWASP rules.

How has it helped my organization?

Trend Micro gave our security teams a certain degree of comfort by just having it in the background, as they have familiarity with the product.

What is most valuable?

IDS and IPS are its most valuable features.

What needs improvement?

AWS products could become more compatible with intrusion detection products leveraging help from Trend Micro.  

For how long have I used the solution?

One to three years.

What do I think about the stability of the solution?

We have had no stability issues.

What do I think about the scalability of the solution?

Scalability hasn't been an issue.

We have different workloads, so it depends on if we're talking about development, QA, or the testing environment. They are all separate accounts. We have a central account to try to manage all of them. A lot of these type products, like Trend Micro, fit into these shared environments. 

Right now, we've got a few production workloads, but most of the workloads are still in development.

What about the implementation team?

Automation is a big part of everything that we do. The team setting it up would have had to set up Chef scripts and other things to make sure that we could automatically deploy. This would have been part of the configuration and management into the AWS environment.

Which other solutions did I evaluate?

We were looking for a tool to help secure our environment. There wasn't anything immediately available as an AWS native service, so we looked for a third-party tool which could do it. 

We would like to see more from AWS natively on the intrusion detection side.

What other advice do I have?

Take a good look at all the different options. If there are things which I think teams are familiar with, that always gives a product a bit of a leg up. This is not just from the perspective of the people who support and deploy the product, but even the security teams who may be already familiar with the product and know how effective it is. It gives them a lot more comfort seeing something that they have some background with.

Our company uses the on-premise and AWS versions. I work with the AWS version, and have been happy with it. I am seeing more of the end result of it rather than the infrastructure and security perimeter.

We decided to use AWS because it was something the teams were familiar with. Our teams, who are currently using Trend Micro, were already familiar with the product and wanted to make use of it in the cloud as well. It was just a matter of continuity.

It is integrated with a SIEM, security incident and event management, platform. A lot of the output which comes from Trend Micro, we fed into the SIEM system so the security teams and the monitoring teams have a single pane of glass view into all the security features of our environment.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Muhammad Huzaifa Khan - PeerSpot reviewer
IS Analyst at a financial services firm with 1,001-5,000 employees
Real User
Top 10
Improves security with comprehensive visibility and intrusion tracing
Pros and Cons
  • "It helps us detect and protect against network penetrations at the specific point of intrusion."
  • "New patterns need improvement, as some new data access points are challenging to investigate and allow entry without detection."

What is our primary use case?

We are using it for NetSpark, and I work for two organizations where I'm using this tool. In both, we are scaling our networks and endpoints, analyzing our traffic, and analyzing the endpoints and security.

How has it helped my organization?

In one organization where I started, we were using a SIEM solution and facing challenges like a lack of complete information. Deep Security has helped us to know where intrusion started, penetrated, and went within our network, thereby improving security.

What is most valuable?

I appreciate the complete visibility of information, including endpoints and detailed tracing from origin to navigation. It helps us detect and protect against network penetrations at the specific point of intrusion.

What needs improvement?

New patterns need improvement, as some new data access points are challenging to investigate and allow entry without detection. Improving this area and providing complete visibility would be beneficial.

For how long have I used the solution?

I have been using this product for nearly eleven months.

What do I think about the stability of the solution?

I would rate the stability as eight out of ten.

How are customer service and support?

I rate technical support a nine.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I previously used QRadar. Compared to QRadar, Trend Micro improves quickly based on feedback and provides more comprehensive solutions.

How was the initial setup?

In one premises, we deployed it on the cloud, which was challenging at the start, while on another it was set on TensorFlow, which was comparatively easy.

What about the implementation team?

Their team was very helpful during the deployment process. Trend Micro's team was particularly cooperative.

What was our ROI?

It has saved us time, money, and resources. We saved nearly forty percent of our time previously spent on manual investigations.

What's my experience with pricing, setup cost, and licensing?

The pricing is very fair, although there are other cheaper options. Due to our limitations, Trend Micro was our best option.

What other advice do I have?

I would rate it an eight out of ten.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
SOC at Airline Company
Real User
Provides good support and threat prevention
Pros and Cons
  • "Support and threat prevention are the most valuable features of this solution."
  • "Trend Micro is scalable if you have the budget for it."

What is our primary use case?

Trend Micro Deep Security protects our organization from threats. Trend Micro has kept us compliant with PCI and PPA.

What is most valuable?

Support and threat prevention are the most valuable features of this solution.

For how long have I used the solution?

I have been using Trend Micro Deep Security for five years.

What do I think about the stability of the solution?

The solution is stable. Trend Micro gets threat intelligence and is always up-to-date with all cybersecurity threats zero-day. Updates are provided through our email. If anything needs to be adjusted on our system, or their product, they will advise us right away.

What do I think about the scalability of the solution?

Trend Micro is scalable if you have the budget for it. All of our 2,500 employees are covered with Trend Micro Deep Security.

How are customer service and support?

The support from Trend Micro Deep Security is good. The company has a good knowledge base where we can troubleshoot any issues. We also have a support portal with them where we can raise issues that we can't solve on our own. This includes on-call support with them in case the issue needs to be resolved urgently.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Prior to using Trend Micro, we were using Sophos.

How was the initial setup?

The initial setup of the product was straightforward. All you need to do is install the firmware, ensure the firewall connections are open, and you are done. 

What about the implementation team?

It took about one month for us to deploy Trend Micro Deep Security. We had an integrator deploy the pilot of the first 30. After the pilot, our team deployed the rest.

What's my experience with pricing, setup cost, and licensing?

If you need an additional 10 or 20 licenses, you will need to pay additional fees.

What other advice do I have?

This product is one of the leaders in terms of endpoint protection, server protection, and network protection. They provide good support, and it is easy to deploy. They are scalable, and the threat intelligence is very good. They stay up to date with what is happening in the cyber world.

Personally, I like anti-malware and integrity monitoring. The anti-malware has its own behavioral monitoring and machine learning. It detects all species and objects in the server or the file integrity monitoring. If there are any changes on the server side, they will alert you. I would like to see these tools as part of Trend Micro Deep Security.

I would rate Trend Micro Deep Security a nine out of ten overall.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Bussines Develop Manager at Empower IT
Real User
Comprehensive, eager technical support, at a great price point
Pros and Cons
  • "We find that their technical support team is always accessible and willing to assist."
  • "We have had some issues when it drains some of the resources of the server."

What is most valuable?

The most valuable feature we have found is threat detection.

What needs improvement?

We have had some issues when it drains some of the resources of the server. When that happens it slows down some of the processes and causes the CPU to run a little harder.

For how long have I used the solution?

We have been using Trend Micro Deep Security for the past six months.

What do I think about the stability of the solution?

The stability is good for our purposes.

What do I think about the scalability of the solution?

Trend Micro Deep Security is scalable.

How are customer service and support?

We find that their technical support team is always accessible and willing to assist.

How would you rate customer service and support?

Positive

How was the initial setup?

It can be complex to implement depending on what features you enable because Deep Security is such a comprehensive product. However, if we just enabled everything out of the box, then it's quite easy. Your choice of how many layers of security you want makes a difference.

What's my experience with pricing, setup cost, and licensing?

The cost runs around forty dollars per server a month. 

Which other solutions did I evaluate?

I know that there is another product that we use that's a competitor. It has a team of specialists that monitor the logs. If you've got the product installed on a server, they monitor it live. That's very useful because it adds another dynamic.

What other advice do I have?

Learn as much as you can about the product because it is very comprehensive. Read the documentation before you install it and learn about the system first. I would rate Trend Micro Deep Security a nine out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Mangesh Masaye - PeerSpot reviewer
Manager at UPL
Real User
Top 10
Cloud-based antivirus with additional, useful features and quality support
Pros and Cons
  • "Aside from the basic antivirus features, there are additional features such as vulnerability protection, firewall, etc. which are helpful."
  • "Some of the reporting and integrations could be more robust."

What is our primary use case?

I am a manager for a non-profit and use this solution for its antivirus capabilities.

What is most valuable?

Aside from the basic antivirus features, there are additional features such as vulnerability protection, firewall, etc. which are helpful.

Since this is a SaaS service, we do not need to worry about getting version upgrades as everything is updated on the backend by Trend Micro.

Since this is a cloud-based product, we do not need any on-premise environment for antivirus.

What needs improvement?

Some of the reporting and integrations could be more robust.

For how long have I used the solution?

I have been using the solution for four or five years.

What do I think about the stability of the solution?

The solution is stable.

What do I think about the scalability of the solution?

The solution is scalable.

How are customer service and support?

Support is very good. There is a portal where you can go to raise support tickets, and there are three phone numbers that we can use to reach support. We also have been assigned a technical account manager to who we can reach out to with anything critical.

Which solution did I use previously and why did I switch?

We used McAfee in the past.

How was the initial setup?

The solution was straightforward to install. There is a default version that is ready to use as soon as it is installed and anything specific that the company desires can then be set.

We have about six to eight people with access to management.

What about the implementation team?

We used a combination of an integrator, a technical account manager, and our in-house team.

What's my experience with pricing, setup cost, and licensing?

There is a subscription cost to use this product.

What other advice do I have?

I would recommend this product and would rate it a nine out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Mustufa Kamaal Afghan - PeerSpot reviewer
Specialist Enterprise Security Architect at Ooredoo Qatar
Real User
Top 20
Excellent deep security solution with low footprint
Pros and Cons
  • "The solution has a low footprint and does not have a lot of impact on the host."
  • "The solution should focus on the EDR part and probably have an integrated data leak prevention module."

What is our primary use case?

Our company uses Trend Micro for anti-malware support on servers and user PCs. Its normal anti-virus, file integrity monitoring, and threat prevention modules are also active in our systems.

What is most valuable?

The overall vision and execution of the vendor are really good. The solution has a low footprint and does not have a lot of impact on the host. The reporting mechanism is also good, and at any given point in time, we can see how many endpoints are compliant. The product support is also good.

What needs improvement?

The solution should focus on the EDR part and probably have an integrated data leak prevention module as well.

In future releases, the solution should provide one agent who takes care of EDR, end-point security, DLP, and application control.

For how long have I used the solution?

I have been using Trend Micro Deep Security for more than five years.

What do I think about the stability of the solution?

It is a stable solution. I would rate its stability a ten out of ten.

What do I think about the scalability of the solution?

The solution is scalable. I would rate its scalability a ten out of ten. Currently, the solution is being used by around 4,000 users in our organization.

How are customer service and support?

The customer service and support team is good.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup is straightforward and only a matter of a couple of clicks. Once you have a design in place, deployment is not a challenge. In terms of time– one part goes into solution deployment and the other into solution adaptation. Solution deployment does not take much time; solution adaptation does.

What about the implementation team?

The solution was deployed by consultants. I think one professional from the system integrator or the OEM and one in-house resource are enough for this deployment.

Moreover, it is just like any other IT solution in terms of maintenance. Since it is installed on a server host, whatever general maintenance is required for that host is what’s needed—just general IT maintenance. We have an in-house team of IT and security engineers who take care of the maintenance.

What's my experience with pricing, setup cost, and licensing?

Just like in any other IT solution. General IT maintenance, we have an in-house team of IT and security engineers who take care of the maintenance.

What other advice do I have?

Before deploying a solution, new users must refer to market research. For companies like ours, we select top-of-the-line products. Although this is the best product suiting our requirements, the decision should be based on individual evaluation.

Overall, I rate the solution an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Trend Micro Deep Security Report and get advice and tips from experienced pros sharing their opinions.
Updated: November 2024
Buyer's Guide
Download our free Trend Micro Deep Security Report and get advice and tips from experienced pros sharing their opinions.