We use the solution to detect malicious threats, secure the endpoints, and disable the UFT.
Deputy General Manager at a comms service provider with 10,001+ employees
Helps to detect malicious threats, secure the endpoints, and disable the UFT
Pros and Cons
- "We use the solution to detect malicious threats, secure the endpoints, and disable the UFT."
- "The tool needs to improve its subscription."
What is our primary use case?
What needs improvement?
The tool needs to improve its subscription.
For how long have I used the solution?
I am working with the tool for twelve years.
What do I think about the stability of the solution?
The product is stable.
Buyer's Guide
Trend Micro Deep Security
October 2024
Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: October 2024.
815,854 professionals have used our research since 2012.
What do I think about the scalability of the solution?
The product is scalable.
How are customer service and support?
The tech support is good.
How would you rate customer service and support?
Positive
How was the initial setup?
The tool's setup is easy. The tool doesn't take more than five to eight minutes on average to deploy at an endpoint.
What's my experience with pricing, setup cost, and licensing?
The tool's pricing is high.
What other advice do I have?
I would rate the product an eight out of ten. The solution is suitable for enterprises. Cost is a challenge factor for small organizations.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Handles the important task of virtual patching, although the agent-based version has performance issues
Pros and Cons
- "The most valuable feature is the virtual patching."
- "When implementing this solution, sometimes we have challenges with SQL migration."
What is our primary use case?
We recommend the use of this solution to our clients, both with virtual and traditional servers.
How has it helped my organization?
This has helped our customers keep up to date with security patches. Many customers do not patch their software after a new purchase has been released because there are a lot of other technologies and considerations to be carried out. It takes time to go through all of these, and some customers have not been patched for many years. Especially for those customers, this solution will protect them against those vulnerabilities.
What is most valuable?
The most valuable feature is the virtual patching. This offers protection of the application before it can be patched by the actual vendor.
What needs improvement?
Some areas for improvement are:
- There are new additions to the standard product that should be included with the Deep Security version.
- When implementing this solution, sometimes we have challenges with SQL migration.
- Some of our customers complain about the cost of this solution.
- I would like to see an AI component added to the next release of this solution.
- The agent-based version has performance issues and they have to make it more lightweight.
- The forensic analysis capability needs to be improved.
What do I think about the stability of the solution?
This is a stable and well-known solution in the market. It is especially well-known for use in virtualized server networks.
What do I think about the scalability of the solution?
We have not faced scalability issues whatsoever. This solution is commonly used for servers, and not in workstations. We only recommend it for the customer's servers.
How are customer service and technical support?
There are different service levels available for technical support.
When a problem occurs then we collect the logs and submit them. There is some time lost here because we do not always immediately deal with somebody who has sufficient expertise with the solution. This is something that we would like to see change.
Generally, reaching technical support is fine, but in terms of having problems resolved, it varies. Sometimes it can take three days, while other problems can take three months.
How was the initial setup?
The complexity of the initial setup depends on the customer's environment. There are different methods of deployment. If it is an agentless deployment then there are prerequisites for that. The agent-based version is a bit easier to set up than the agentless version.
They have to go through setting up policies, which will take time to implement and fine tune. They have to make sure that the solution is communicating with the management server, and that there are no conflicts with other applications that are running. If there is anything that is broken or should not be running, then that is fixed. Once the initial application is perfectly up and running without any issues, and the policies have been fine-tuned, there should not be an issue.
Depending on the customer's environment, the deployment time varies. We have deployed some solutions in one day, while others have taken months to complete the fine-tuning.
Generally, for any implementation, we will not use more than two staff. For cases with more than one hundred machines, this can be a challenge during deployment.
What about the implementation team?
We do the complete deployment and implementation of this solution for our clients.
Which other solutions did I evaluate?
We resell a variety of products, some of which are similar to the Trend Micro solution, but our recommendation depends on our customer's requirements. Some customers will demand a particular vendor, such as Trend Micro, while others will specify that they do not want to use solutions by a specific vendor. In these cases, we work on alternative solutions for our clients.
Some of the other options our clients consider are solutions by McAfee, Kaspersky, and Symantec.
What other advice do I have?
It is important to implement this kind of solution because many people do not have security on their servers. This includes the vulnerability patching that should be done.
This solution has improved over time. They have been introducing third-party plug-ins and integration, and there is a cloud version available as well.
I would rate this solution a seven out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller.
Buyer's Guide
Trend Micro Deep Security
October 2024
Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: October 2024.
815,854 professionals have used our research since 2012.
Production DBA at BLUE MOTOR FINANCE LIMITED
Endpoint Security in the Cloud, providing a strong set of controls and protection
Pros and Cons
- "Deep Security enables us to bridge the gap between patching windows using the Virtual Patching feature. This allows us to make sure full patching is tested properly in our testing environments before rollout."
- "It provides a comprehensive feature set and a strong security baseline for us with integrations into other security tools."
- "I would like them to add EDR features, moving away from traditional signature-based anti-malware."
What is our primary use case?
Our primary use case is to provide endpoint security for our AWS EC2 instances, covering features, such as host-based firewall, IDS/IPS, anti-malware, and application control.
How has it helped my organization?
Deep Security has given us strong protection and configuration of our endpoint security and enables us to bridge the gap between patching windows using the Virtual Patching feature. This allows us to make sure full patching is tested properly in our testing environments before roll out. This especially helps when, like this month, a patch is released which can’t be used, due to stability/performance issues.
What is most valuable?
- IDS/IPS
- Host-based firewall
I am also currently looking into the newer integrations with our various other security tools.
What needs improvement?
The training needs improvement. It is expensive (classroom training), and it is often hard to find answers by yourself using the documentation.
I would like them to add EDR features, moving away from traditional signature-based anti-malware.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
The product seems very stable. We have only ever had one incident which caused us concern, and Trend Micro identified a way to mitigate it for future occurrences. They also ensured the issue was patched.
What do I think about the scalability of the solution?
It seems to work at the scale that we are currently using it at: Approximately 65 EC2 instances.
How is customer service and technical support?
Customer service team are fantastic and help provide timely resolution to issues and questions
How was the initial setup?
Configuration in our AWS environment is straightforward and policy-based with inheritance, e.g., making it easy to align with Active Directory. Event-based triggers can automate the correct policy implementation.
What's my experience with pricing, setup cost, and licensing?
It is simple and cost-effective to purchase through the AWS Marketplace, which provides an easy understanding of the scale of the costs. Our organization purchased it through the AWS Marketplace because it is easier to track when added to our AWS bill and convenient purchasing model.
The AWS licensing model is scalable and easy to use, but could do with tiered discounts. I am not sure how well this model will scale when we start to use Auto Scaling with AWS resources.
What other advice do I have?
It provides a comprehensive feature set and a strong security baseline for us with integrations into other security tools.
It integrates with AlienVault USM Anywhere and AWS GuardDuty in our environment.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Architecte Infra & Cloud at a construction company with 501-1,000 employees
Easy to use, provides excellent anti-malware features, and is easy to implement
Pros and Cons
- "I like the anti-malware features."
- "The workloads must be better."
What is our primary use case?
We use the solution for Windows Server on Linux distribution. We have several environments. We use the tool to secure on-premise servers.
What is most valuable?
I like the anti-malware features. We use it only for the on-premise environment. The tool helps with server protection. The implementation is easy. It provides high security. We have a hundred workloads. It is a good tool. It is easy to use. It has a good dashboard and great features.
What needs improvement?
The workloads must be better.
For how long have I used the solution?
I have been using the solution for three years.
What do I think about the stability of the solution?
The tool has high stability.
What do I think about the scalability of the solution?
The tool’s scalability is good. We can easily scale it. Our clients are small businesses.
How are customer service and support?
The support is good.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup was easy. I rate the ease of setup a ten out of ten. The deployment took three days.
What other advice do I have?
I will recommend the product to others. Overall, I rate the solution a ten out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Last updated: Apr 2, 2024
Flag as inappropriatePrincipal Solutions Architect at a computer software company with 201-500 employees
Price is reasonable and competitive
Pros and Cons
- "Deep Security's most valuable features are antivirus and host intrusion detection."
- "Deep Security's most valuable features are antivirus and host intrusion detection."
What is most valuable?
Deep Security's most valuable features are antivirus and host intrusion detection.
What needs improvement?
Deep Security's biggest shortcoming is its reporting.
For how long have I used the solution?
I've been using Deep Security for about two or three years.
What do I think about the stability of the solution?
Deep Security is pretty solid.
How was the initial setup?
Deployment took a week or two because we didn't know what we were doing. But once we got it up, it's not like I had to install it multiple times. But if I did, it wouldn't be that bad. Deep Security is pretty low maintenance. It patches itself then downloads all the new buyer signatures, the common vulnerabilities, and everything like that. So it pretty much takes care of itself. However, when we're patching everything else, it could knock one of the agents offline. So we have to deal with that aspect a little bit.
What's my experience with pricing, setup cost, and licensing?
I'm not sure about the exact price, but it's reasonable and competitive. Compared to its competitors, you get a lot of bang for your buck. This was the way to go. There aren't any hidden costs. Everything was straight-up. However, it has a built-in malware detector that sends you alerts, but you need someone to monitor and respond to that. You need an incident response team, and Trend Micro Has a service for that called XDR. So if you want that monitoring service, you have to pay extra.
What other advice do I have?
I would rate Trend Micro Deep Security nine out of 10. It met all our requirements, and Trend Micro provided us with a lot of help getting it set up. I would almost give it a 10, to be honest, but there is some room for improvement with the reporting. For someone implementing Deep Security, I would advise them to pay attention to their kernel numbers. But then again, if we were using Red Hat Linux, Deep Security would be so seamless. Sometimes the kernel versions get out of sync, but as long as you stick to the standards, it's seamless. Once you deviate, the mileage may vary.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Technical Director at a security firm with 1-10 employees
Scalable and secure with an easy initial setup
Pros and Cons
- "The solution is quite secure."
- "The product isn't very user-friendly."
What is most valuable?
As a security competency company, we play a lot on this product. For us, it's one of the best for data center solutions. Deep Security is something that is a classic antivirus. However, it uses two-function device control. Everything is inside. We have virtual patching capabilities, which are very interesting in Deep Security. Virtual patching is just a host IPS solution which, if there is a delay in installing the patch, the patch is available by the editor.
It's a good product overall.
There is not a lot of bugs like you have in other antivirus solutions. It's quite stable.
The initial setup is pretty easy.
The solution is scalable.
The solution is quite secure.
What needs improvement?
The main drawback is that it's complicated. With Trend Micro solutions, everything is complicated. Deep Security has its own management console, and every product in Trend Micro has its own management console. Everything is siloed. Now, they are trying now to connect everything inside the main control management or reporting console, however, it's still not a central management console. It makes for a lot of work when applying policies and security solutions.
The product isn't very user-friendly.
It's a bit old-fashioned in its design and approach.
While, for example, McAfee might have a new version every two months, Trend Micro might not release a new version for two years. While it's very stable, it could be a bit too long in-between versions.
It would be ideal if the solution communicated better with other security solutions from other brands. This is an issue. They need to open up their API or give access, or exchange information with other security products so that everything can communicate together, learn from each other, and block malicious threats better.
For how long have I used the solution?
We've been using the solution for a long time. It's been three or four years or so.
What do I think about the stability of the solution?
The stability is very good. There aren't a lot of bugs or glitches. In comparison, for example, Sophos has some bugs and McAfee has a lot of bugs. When they give you a new version, you know that you have to wait for the service pack, to be sure that it will be up and running in production.
This product doesn't crash or freeze. It's reliable.
What do I think about the scalability of the solution?
The thing users need to understand about the solution is that Deep Security is not by default meant to manage 100,000 PCs. It's for data centers, and it's for less than 300 servers at the same time. That said, even a big company doesn't have a lot of servers available. In terms of scalability, we don't find a limit for the moment based on the customer base we have.
You can also scale via the cloud. It's very flexible and you can deploy on command, on a virtual server in the cloud.
How are customer service and technical support?
We've dealt with technical support in the past. We only call them, from time to time, if we can't figure out the answer ourselves. While four or so years ago they weren't as fast, not we get a quick response. Over the past year, we've been quite pleased with the level of support.
Which solution did I use previously and why did I switch?
We're familiar with older versions of McAfee. We are playing with Sophos for the UTM, the NG Firewall, and for the antivirus, Sophos Intercept X. I've also worked with Kaspersky.
Which is best depends on the client. While Kaspersky, for example, is good for smaller clients, Trend Micro is better for medium to larger ones. However, the solution isn't something you just set and forget. You have to take details, verify, validate, and be aware that a small change will not produce too many logs on the threat detection.
How was the initial setup?
The implementation process is not very complex. If the initial setup is just replacing a competitor antivirus with Trend Micro, it's very easy. The only thing you have to be sure of is that you are setting up the right functionality. Trend Micro Deep Security, has a lot of functions. If you want a classic antivirus, there are very few functions to set up. However, if you want a specific functionality, there may be more steps. There will be more fine-tuning that is required to make sure you are well-protected.
When you have start Deep Security on something that was not equipped with an antivirus, or equipped with, let's say, Bitdefender or Windows Defender, you have very few protections. If you don't take care of covering all these safety functions, you'll be vulnerable. That said, you need to be careful of which functions you activate. You need to make sure it makes sense in terms of the rest of your setup.
What other advice do I have?
It's been one of the four main antivirus solutions, deployed in an industrial way. We've been quite happy with it. You can deploy it on-premises or the cloud, and it's possible to use it with Windows and Linux.
I'd rate the solution at a nine out of ten. We've been very happy with it and found it to be quite secure.
Of course, next-generation solutions such as Crowd Strike or Carbon Black are game-changing.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
HR Analyst Manager at C.E.S.A.R
It is connected into an intelligence database and is quick to pick up new threats
Pros and Cons
- "It is connected into an intelligence database and is quick to pick up new threats. It also reduces my workload with its speed and the protection that it provides."
- "The working interface and the reports for non-technical people could use improvement. They are a bit scary."
What is our primary use case?
We use it for security, specifically for old servers still in the company. It is doing its job.
How has it helped my organization?
I have heard of a lot of threats coming from Europe, but they have never touched our company.
The reports are very extensive. They give us information about things that we are not expecting, such as number of threats that failed due to compromised servers.
What is most valuable?
It is connected into an intelligence database and is quick to pick up new threats. It also reduces my workload with its speed and the protection that it provides.
What needs improvement?
The working interface and the reports for non-technical people could use improvement. They are a bit scary.
For how long have I used the solution?
Less than one year.
What do I think about the stability of the solution?
It is very stable. We are not putting too much stress on it since we are scaling down.
What do I think about the scalability of the solution?
We have not had any problems with scalability. We have very few servers for it to protect. Instead of scaling out, we are shrinking the number of servers (scaling down).
What about the implementation team?
We hired a third-party to do the AWS integration and configuration. The reseller appointed them, and everything was done for us.
What's my experience with pricing, setup cost, and licensing?
On an AWS defined scope, it will cheaper than buying the on-premise service. We did a trial for the on-premise version, but we decided to go with the AWS version. We are downsizing our server room, and it didn't make sense to put more machines in there, as we already have workloads in Indianapolis.
Which other solutions did I evaluate?
We already use Trend Micro for their endpoint protection. Therefore, we selected them for their server product because we liked their endpoint protection product. The process took a week to ten days.
What other advice do I have?
I would recommend it. I have been satisfied, as it is a good product.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Team Lead Cyber Security Administration at a energy/utilities company with 5,001-10,000 employees
Has efficient security features and good technical support services
Pros and Cons
- "They release timely updates and have efficient prediction features for threat detection."
What is our primary use case?
We use Trend Micro Deep Security to protect our network, endpoint, email, servers, etc.
What is most valuable?
The product has robust security features. They release timely updates and have efficient prediction features for threat detection.
What do I think about the stability of the solution?
It is a stable platform.
What do I think about the scalability of the solution?
We have 5000 Trend Micro Deep Security users. It is a scalable platform.
How are customer service and support?
The technical support services are good.
How was the initial setup?
The initial setup process is straightforward. It requires two to three executives for implementation and takes five minutes to complete.
What about the implementation team?
The end users can implement the product themselves.
What's my experience with pricing, setup cost, and licensing?
We purchased Trend Micro Deep Security's yearly license. It is expensive but reasonable compared to other products by Trend Micro.
What other advice do I have?
I recommend Trend Micro Deep Security to others and rate it a nine out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Trend Micro Deep Security Report and get advice and tips from experienced pros
sharing their opinions.
Updated: October 2024
Popular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
SentinelOne Singularity Complete
Prisma Cloud by Palo Alto Networks
Qualys VMDR
Symantec Endpoint Security
Trend Vision One Endpoint Security
Trellix Endpoint Security
Kaspersky Endpoint Security for Business
ESET Endpoint Protection Platform
VMware Carbon Black Endpoint
Check Point Harmony Endpoint
VMware NSX
Buyer's Guide
Download our free Trend Micro Deep Security Report and get advice and tips from experienced pros
sharing their opinions.