The most valuable feature for us is that it's agentless, meaning we can implement it without having to protect every guest at a guest-by-guest level. That's huge for us.
Epic Client Systems Manager at a healthcare company with 1,001-5,000 employees
It's agentless, meaning we can implement it without having to protect every guest at a guest-by-guest level.
What is most valuable?
How has it helped my organization?
Everything on our ESXi host is protected and we don't have to worry about pushing an anti-virus to individual guests. All we have to do is activate Deep Security in the console and we're set.
What needs improvement?
There's a little room for improvement as far as being more concise with the error messages. It's a small thing, and maybe that's coming in a newer version. Better notifications would be nice, such as error messages that a particular ESXi host is not protected properly.
If there's a problem, you have to drill down manually. You have to click and click and click to see what the message is. It would be nice to have a more transparent meaning instead of having to click so much to get to different levels.
For how long have I used the solution?
I've used it for six months.
Buyer's Guide
Trend Micro Deep Security
January 2025

Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
838,713 professionals have used our research since 2012.
What do I think about the stability of the solution?
We did have one issue where the signature files we received were not valid files. It caused the host to continuously try to scan, causing a performance issue. We had it resolved within a couple of hours by powering up our Deep Security appliances until we got the proper update. Then we were able to move on.
How are customer service and support?
Customer Service:
Mike Horton is our account rep. He and technical support work as a team. We all work well together.
Technical Support:Technical support is where Trend Micro really shines. They're not a big group, which is great because you feel like you're not just a customer, but also a partner in the product. You really feel like they're interested in making sure you know how to work the product to its full potential.
What other advice do I have?
Be involved with the installation so that you really get a feel for what the product's doing. If they provide any support or any training, definitely attend that. It is an intuitive product but there's a lot of moving parts. You're doing virus scanning so you definitely want to make sure you understand what you're doing because if you do have an issue, it’s very important piece of your infrastructure to make sure you're protecting your server.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.

Supervisor with 1,001-5,000 employees
The most valuable feature for us is the fact that we can control what the PC or server is doing protection-wise, even remotely.
Valuable Features:
The most valuable feature for us is mainly the fact that we can control what the PC or server is doing protection-wise, even remotely. We use this protection feature all the time.
Improvements to My Organization:
The main benefit it provides us is that it will show what the issues might be and it's scalable. It allows us to know that if we have an issue somewhere on one device or endpoint, we can correct it or get down to a level where we can find out what the problem is. For example, we can apply exclusions to set policies for a certain type of group that can scale for a lot of environments, whether it's Linux or Windows servers or Windows 10 endpoints.
Room for Improvement:
I'd like to see some sort of database out-of-the-box. Deep Security uses its own database, with which we have some issues, but we just go right to SQL or another database. Right now, the standard database as to be converted to SQL or Oracle, but that's something that should be out-of-the-box standard.
Use of Solution:
We've used it for four years.
Deployment Issues:
We've had no issues with deployment, other than the database issue.
Stability Issues:
We had one failure, but it came back up within twenty minutes, so we've really had no downtime.
Scalability Issues:
Yes, it's been scalable. In the coming year, we're going to be testing many more policies and deploying it out in our system.
Initial Setup:
The setup was a little complex on the security side. But the endpoints -- desktops, laptops, were pretty easy. The server environments were a little more complicated and in-depth.
Implementation Team:
We implemented with a vendor team.
ROI:
We very much have an ROI, and although I don't have numbers, I can see that we've been able to catch problems before they happen.
Other Advice:
Make sure you perform thorough testing as there were different situations that came up for us that we didn't account for. I think that a POC would really be worth the investment because you can find out what the structure can do and what it can't. That's really important.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Buyer's Guide
Trend Micro Deep Security
January 2025

Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
838,713 professionals have used our research since 2012.
Team Lead Cyber Security Administration at a energy/utilities company with 5,001-10,000 employees
Has efficient security features and good technical support services
Pros and Cons
- "They release timely updates and have efficient prediction features for threat detection."
What is our primary use case?
We use Trend Micro Deep Security to protect our network, endpoint, email, servers, etc.
What is most valuable?
The product has robust security features. They release timely updates and have efficient prediction features for threat detection.
What do I think about the stability of the solution?
It is a stable platform.
What do I think about the scalability of the solution?
We have 5000 Trend Micro Deep Security users. It is a scalable platform.
How are customer service and support?
The technical support services are good.
How was the initial setup?
The initial setup process is straightforward. It requires two to three executives for implementation and takes five minutes to complete.
What about the implementation team?
The end users can implement the product themselves.
What's my experience with pricing, setup cost, and licensing?
We purchased Trend Micro Deep Security's yearly license. It is expensive but reasonable compared to other products by Trend Micro.
What other advice do I have?
I recommend Trend Micro Deep Security to others and rate it a nine out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Technical Consultant at Unicorp Technologies LLC
Protects our servers, has many features, and is easy to set up
Pros and Cons
- "It provides security and protection. The endpoint firewall is valuable."
- "Their support should be improved. We need support in the UAE, but it is always going to some other country or region, and the time schedule is not suitable for us."
What is our primary use case?
It is being used for our servers. It has many features such as firewall, IPS, anti-malware, and antivirus.
What is most valuable?
It provides security and protection. The endpoint firewall is valuable.
What needs improvement?
Their support should be improved. We need support in the UAE, but it is always going to some other country or region, and the time schedule is not suitable for us.
For how long have I used the solution?
I have been using Trend Micro Deep Security for six years, but I have started to use Trend Micro Apex One recently.
What do I think about the stability of the solution?
Its stability is good.
What do I think about the scalability of the solution?
Scaling is possible. We're scaling up. We have about 40 servers.
Which solution did I use previously and why did I switch?
I have used SentinelOne.
How was the initial setup?
It is easy. It takes about two hours.
What about the implementation team?
It was implemented in our company. Our security team manages it. We have two people on the team.
What other advice do I have?
I would rate it a 10 out of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
IT Infrastructure Manager at a computer software company with 51-200 employees
Good Virtual path function for anti-malware and good support
Pros and Cons
- "The most valuable feature of this solution is the virtual path function, which is the reason we chose to implement it."
- "I would like to see an EDR function for the servers, as that would be useful for us."
What is our primary use case?
The primary use case of this solution is for anti-malware and virtual paths.
What is most valuable?
The most valuable feature of this solution is the virtual path function, which is the reason we chose to implement it.
What needs improvement?
I would like to see an EDR function for the servers, as that would be useful for us.
Detection and Response directly to the servers.
For how long have I used the solution?
I have been using Trend Micro Deep Security since last year.
What do I think about the stability of the solution?
It's a stable product. We have not had issues.
We have a team of 40 to support and maintain this solution.
What do I think about the scalability of the solution?
This is a scalable solution. We have 2,000 users and a total of 20,000 staff members in our organization. We have more than 40 hospitals in Thailand.
How are customer service and technical support?
We are satisfied with the support that we have received.
Which solution did I use previously and why did I switch?
We are also using CrowdStrike.
Also, we were using Kasperky for anti-malware for the servers.
How was the initial setup?
The initial setup was not easy because when we deployed it, we had to restart our server, and needed permissions from our client.
It took approximately six months to deploy.
What other advice do I have?
I recommend this solution to others who are interested in using it.
I would rate this solution a ten out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
CTO at a tech vendor with 1-10 employees
We don't have to worry about intrusions
Pros and Cons
- "It provides the type of data and availability that we need to have. We don't have to worry about intrusions."
- "Trend Micro is not government certified or federal complaint. If they could become compliant/certified, this would make it easier for us to use it for our government projects."
What is our primary use case?
We are primarily using the product for IDS, IPS, and deep security.
How has it helped my organization?
It provides the type of data and availability that we need to have. We don't have to worry about intrusions.
What is most valuable?
- They delivered what they said that they would.
- The IDS and IPS features.
What needs improvement?
Trend Micro is not government certified or federal complaint. If they could become compliant/certified, this would make it easier for us to use it for our government projects.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
I would give the product's stability a high rating. We trust the Trend Micro brand.
What do I think about the scalability of the solution?
We are not that big in size, so we haven't had any scalability issues.
How is customer service and technical support?
We are experiencing major technical support issues right now, and the technical support has been reasonable about fixing them.
How was the initial setup?
The integration and configuration of Trend Micro in our AWS environment was easy. We haven't had any issues with this at all.
What's my experience with pricing, setup cost, and licensing?
We did not purchase it through the AWS Marketplace because we have used Trend Micro in the past. We have not compared the pricing and licensing of buying it on the AWS Marketplace.
Which other solutions did I evaluate?
We also considered Pure Storage. In the end, we decided to only pursue Trend Micro because it is easier for us to install and use. The decision to use Trend Micro was based on cost, brand name, and ease of use.
What other advice do I have?
I would recommend Trend Micro. We are happy with them. In the current world, you have to earn the business because it is like a subscription, and they keep us happy.
We don't have Trend Micro integrated with any other product except for our internal cloud solution. We just use the AWS version of the product.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Security Practice Director at Rolta AdvizeX
It makes controls available to consultants and security architects in the new, software-defined datacenter and traversing up into the cloud.
Valuable Features
Deep Security is a really innovative security solution in the world of software-defined data centers and in the NSX space. It makes controls available to consultants and security architects in the new, software-defined datacenter and traversing up into the cloud. It's optimized to support security for virtual desktop infrastructures.
Room for Improvement
It's not a well-recognized solution and there's not much buzz around it in the marketplace. When I speak with an auditor about what Trend Micro is doing to cover my compliance footprint, it's not well-understood. That's where the challenge lies.
Stability Issues
There were some initial challenges with it, those in my experience have all been worked out, and it's a very stable solution now. We're working on taking it out, we do a lot of consulting in an NSX space, with software-defined networking, and we're taking Trend Micro out to all of our customers.
Scalability Issues
It works in relatively small scenarios, and up to the biggest scenario that I can imagine.
Customer Service and Technical Support
Never had an issue with Trend Micro support. It's fantastic.
Initial Setup
It's in a complex technological space, typically proposed into NSX or cross-hybrid cloud scenario. There are a lot of moving parts and it's a challenging space to implement technologies and controls, but I think Trend Micro does it well.
Other Advice
The important thing that I would encourage people to look at with Deep Security is how it plays with Endpoint, how it plays with your particular software-defined data center or hybrid cloud, and make sure that you understand where the capabilities are available to you. Because for most people it's surprising that Trend Micro can do all the things that it can.
Disclosure: My company has a business relationship with this vendor other than being a customer: We're partners.
Consultant at a computer software company with 51-200 employees
Provides a view of what's happening and enhances security, but we should be able to have an automated response for some of the threats
Pros and Cons
- "In addition to providing our clients a view of what's happening in their data centers, it also does virtual patching in the data center. It enhances the security in the data center big time."
- "What this product lacks at this stage is the ability to have automated workbooks to do the response. At this stage, the response is more manual, and it is not automated. If there is a response functionality in Deep Security, similar to what we have in EDR these days, to automatically respond to some of the threats, it would be cool. So, we'd like to have an automated response. There should be a response functionality."
What is our primary use case?
It gives clients an additional view of what's happening in their data centers.
Deep Security is on-prem at this stage, but it has got cloud workload protection that has similar functionality in the cloud.
What is most valuable?
In addition to providing our clients a view of what's happening in their data centers, it also does virtual patching in the data center. It enhances the security in the data center big time.
What needs improvement?
What this product lacks at this stage is the ability to have automated workbooks to do the response. At this stage, the response is more manual, and it is not automated. If there is a response functionality in Deep Security, similar to what we have in EDR these days, to automatically respond to some of the threats, it would be cool. So, we'd like to have an automated response. There should be a response functionality.
For how long have I used the solution?
We have been providing this solution for a few years.
What do I think about the stability of the solution?
It is stable.
What do I think about the scalability of the solution?
It is scalable, but it is fairly expensive.
In terms of its usage, we're not using it internally. We have three clients at the moment. They are fairly big clients.
How are customer service and support?
Their technical support is good.
How was the initial setup?
It is a bit more difficult because it needs a bit of hardware, etc. Deep Security is more complex to set up than web security. Implementing Deep Security properly is usually about a week's worth of work because of the change control in the company. It is the change control that's an issue.
In terms of people required for its deployment, one engineer is usually enough.
What's my experience with pricing, setup cost, and licensing?
Most of it is annual at this stage.
What other advice do I have?
I would definitely recommend it for medium enterprises.
I would rate it a seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner

Buyer's Guide
Download our free Trend Micro Deep Security Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2025
Popular Comparisons
Juniper vSRX
Sophos Virtualization Security
Buyer's Guide
Download our free Trend Micro Deep Security Report and get advice and tips from experienced pros
sharing their opinions.