Try our new research platform with insights from 80,000+ expert users
it_user369318 - PeerSpot reviewer
Supervisor with 1,001-5,000 employees
Real User
The most valuable feature for us is the fact that we can control what the PC or server is doing protection-wise, even remotely.

What is most valuable?

The most valuable feature for us is mainly the fact that we can control what the PC or server is doing protection-wise, even remotely. We use this protection feature all the time.

How has it helped my organization?

The main benefit it provides us is that it will show what the issues might be and it's scalable. It allows us to know that if we have an issue somewhere on one device or endpoint, we can correct it or get down to a level where we can find out what the problem is. For example, we can apply exclusions to set policies for a certain type of group that can scale for a lot of environments, whether it's Linux or Windows servers or Windows 10 endpoints.

What needs improvement?

I'd like to see some sort of database out-of-the-box. Deep Security uses its own database, with which we have some issues, but we just go right to SQL or another database. Right now, the standard database as to be converted to SQL or Oracle, but that's something that should be out-of-the-box standard.

For how long have I used the solution?

We've used it for four years.

Buyer's Guide
Trend Micro Deep Security
December 2024
Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
831,020 professionals have used our research since 2012.

What was my experience with deployment of the solution?

We've had no issues with deployment, other than the database issue.

What do I think about the stability of the solution?

We had one failure, but it came back up within twenty minutes, so we've really had no downtime.

What do I think about the scalability of the solution?

Yes, it's been scalable. In the coming year, we're going to be testing many more policies and deploying it out in our system.

How was the initial setup?

The setup was a little complex on the security side. But the endpoints -- desktops, laptops, were pretty easy. The server environments were a little more complicated and in-depth.

What about the implementation team?

We implemented with a vendor team.

What was our ROI?

We very much have an ROI, and although I don't have numbers, I can see that we've been able to catch problems before they happen.

What other advice do I have?

Make sure you perform thorough testing as there were different situations that came up for us that we didn't account for. I think that a POC would really be worth the investment because you can find out what the structure can do and what it can't. That's really important.

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
reviewer2205303 - PeerSpot reviewer
Team Lead Cyber Security Administration at a energy/utilities company with 5,001-10,000 employees
Real User
Top 20
Has efficient security features and good technical support services
Pros and Cons
  • "They release timely updates and have efficient prediction features for threat detection."

    What is our primary use case?

    We use Trend Micro Deep Security to protect our network, endpoint, email, servers, etc.

    What is most valuable?

    The product has robust security features. They release timely updates and have efficient prediction features for threat detection.

    What do I think about the stability of the solution?

    It is a stable platform.

    What do I think about the scalability of the solution?

    We have 5000 Trend Micro Deep Security users. It is a scalable platform.

    How are customer service and support?

    The technical support services are good.

    How was the initial setup?

    The initial setup process is straightforward. It requires two to three executives for implementation and takes five minutes to complete.

    What about the implementation team?

    The end users can implement the product themselves.

    What's my experience with pricing, setup cost, and licensing?

    We purchased Trend Micro Deep Security's yearly license. It is expensive but reasonable compared to other products by Trend Micro.

    What other advice do I have?

    I recommend Trend Micro Deep Security to others and rate it a nine out of ten.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Buyer's Guide
    Trend Micro Deep Security
    December 2024
    Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
    831,020 professionals have used our research since 2012.
    Karthikeyan Balasubramani - PeerSpot reviewer
    Senior Technical Consultant at Unicorp Technologies LLC
    Real User
    Protects our servers, has many features, and is easy to set up
    Pros and Cons
    • "It provides security and protection. The endpoint firewall is valuable."
    • "Their support should be improved. We need support in the UAE, but it is always going to some other country or region, and the time schedule is not suitable for us."

    What is our primary use case?

    It is being used for our servers. It has many features such as firewall, IPS, anti-malware, and antivirus.

    What is most valuable?

    It provides security and protection. The endpoint firewall is valuable.

    What needs improvement?

    Their support should be improved. We need support in the UAE, but it is always going to some other country or region, and the time schedule is not suitable for us. 

    For how long have I used the solution?

    I have been using Trend Micro Deep Security for six years, but I have started to use Trend Micro Apex One recently.

    What do I think about the stability of the solution?

    Its stability is good.

    What do I think about the scalability of the solution?

    Scaling is possible. We're scaling up. We have about 40 servers.

    Which solution did I use previously and why did I switch?

    I have used SentinelOne.

    How was the initial setup?

    It is easy. It takes about two hours.

    What about the implementation team?

    It was implemented in our company. Our security team manages it. We have two people on the team.

    What other advice do I have?

    I would rate it a 10 out of 10.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    PeerSpot user
    IT Infrastructure Manager at a computer software company with 51-200 employees
    Real User
    Good Virtual path function for anti-malware and good support
    Pros and Cons
    • "The most valuable feature of this solution is the virtual path function, which is the reason we chose to implement it."
    • "I would like to see an EDR function for the servers, as that would be useful for us."

    What is our primary use case?

    The primary use case of this solution is for anti-malware and virtual paths.

    What is most valuable?

    The most valuable feature of this solution is the virtual path function, which is the reason we chose to implement it.

    What needs improvement?

    I would like to see an EDR function for the servers, as that would be useful for us.

    Detection and Response directly to the servers.

    For how long have I used the solution?

    I have been using Trend Micro Deep Security since last year.

    What do I think about the stability of the solution?

    It's a stable product. We have not had issues.

    We have a team of 40 to support and maintain this solution.

    What do I think about the scalability of the solution?

    This is a scalable solution. We have 2,000 users and a total of 20,000 staff members in our organization. We have more than 40 hospitals in Thailand.

    How are customer service and technical support?

    We are satisfied with the support that we have received.

    Which solution did I use previously and why did I switch?

    We are also using CrowdStrike.

    Also, we were using Kasperky for anti-malware for the servers.

    How was the initial setup?

    The initial setup was not easy because when we deployed it, we had to restart our server, and needed permissions from our client.

    It took approximately six months to deploy.

    What other advice do I have?

    I recommend this solution to others who are interested in using it.

    I would rate this solution a ten out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    CTO at a tech vendor with 1-10 employees
    Real User
    We don't have to worry about intrusions
    Pros and Cons
    • "It provides the type of data and availability that we need to have. We don't have to worry about intrusions."
    • "Trend Micro is not government certified or federal complaint. If they could become compliant/certified, this would make it easier for us to use it for our government projects."

    What is our primary use case?

    We are primarily using the product for IDS, IPS, and deep security.

    How has it helped my organization?

    It provides the type of data and availability that we need to have. We don't have to worry about intrusions.

    What is most valuable?

    • They delivered what they said that they would.
    • The IDS and IPS features.

    What needs improvement?

    Trend Micro is not government certified or federal complaint. If they could become compliant/certified, this would make it easier for us to use it for our government projects.

    For how long have I used the solution?

    Three to five years.

    What do I think about the stability of the solution?

    I would give the product's stability a high rating. We trust the Trend Micro brand.

    What do I think about the scalability of the solution?

    We are not that big in size, so we haven't had any scalability issues.

    How is customer service and technical support?

    We are experiencing major technical support issues right now, and the technical support has been reasonable about fixing them.

    How was the initial setup?

    The integration and configuration of Trend Micro in our AWS environment was easy. We haven't had any issues with this at all.

    What's my experience with pricing, setup cost, and licensing?

    We did not purchase it through the AWS Marketplace because we have used Trend Micro in the past. We have not compared the pricing and licensing of buying it on the AWS Marketplace.

    Which other solutions did I evaluate?

    We also considered Pure Storage. In the end, we decided to only pursue Trend Micro because it is easier for us to install and use. The decision to use Trend Micro was based on cost, brand name, and ease of use.

    What other advice do I have?

    I would recommend Trend Micro. We are happy with them. In the current world, you have to earn the business because it is like a subscription, and they keep us happy.

    We don't have Trend Micro integrated with any other product except for our internal cloud solution. We just use the AWS version of the product.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    it_user400656 - PeerSpot reviewer
    Security Practice Director at Rolta AdvizeX
    Consultant
    It makes controls available to consultants and security architects in the new, software-defined datacenter and traversing up into the cloud.

    Valuable Features

    Deep Security is a really innovative security solution in the world of software-defined data centers and in the NSX space. It makes controls available to consultants and security architects in the new, software-defined datacenter and traversing up into the cloud. It's optimized to support security for virtual desktop infrastructures.

    Room for Improvement

    It's not a well-recognized solution and there's not much buzz around it in the marketplace. When I speak with an auditor about what Trend Micro is doing to cover my compliance footprint, it's not well-understood. That's where the challenge lies.

    Stability Issues

    There were some initial challenges with it, those in my experience have all been worked out, and it's a very stable solution now. We're working on taking it out, we do a lot of consulting in an NSX space, with software-defined networking, and we're taking Trend Micro out to all of our customers.

    Scalability Issues

    It works in relatively small scenarios, and up to the biggest scenario that I can imagine.

    Customer Service and Technical Support

    Never had an issue with Trend Micro support. It's fantastic.

    Initial Setup

    It's in a complex technological space, typically proposed into NSX or cross-hybrid cloud scenario. There are a lot of moving parts and it's a challenging space to implement technologies and controls, but I think Trend Micro does it well.

    Other Advice

    The important thing that I would encourage people to look at with Deep Security is how it plays with Endpoint, how it plays with your particular software-defined data center or hybrid cloud, and make sure that you understand where the capabilities are available to you. Because for most people it's surprising that Trend Micro can do all the things that it can.

    Disclosure: My company has a business relationship with this vendor other than being a customer: We're partners.
    PeerSpot user
    reviewer1405356 - PeerSpot reviewer
    Consultant at a computer software company with 51-200 employees
    MSP
    Provides a view of what's happening and enhances security, but we should be able to have an automated response for some of the threats
    Pros and Cons
    • "In addition to providing our clients a view of what's happening in their data centers, it also does virtual patching in the data center. It enhances the security in the data center big time."
    • "What this product lacks at this stage is the ability to have automated workbooks to do the response. At this stage, the response is more manual, and it is not automated. If there is a response functionality in Deep Security, similar to what we have in EDR these days, to automatically respond to some of the threats, it would be cool. So, we'd like to have an automated response. There should be a response functionality."

    What is our primary use case?

    It gives clients an additional view of what's happening in their data centers.

    Deep Security is on-prem at this stage, but it has got cloud workload protection that has similar functionality in the cloud.

    What is most valuable?

    In addition to providing our clients a view of what's happening in their data centers, it also does virtual patching in the data center. It enhances the security in the data center big time.

    What needs improvement?

    What this product lacks at this stage is the ability to have automated workbooks to do the response. At this stage, the response is more manual, and it is not automated. If there is a response functionality in Deep Security, similar to what we have in EDR these days, to automatically respond to some of the threats, it would be cool. So, we'd like to have an automated response. There should be a response functionality.

    For how long have I used the solution?

    We have been providing this solution for a few years.

    What do I think about the stability of the solution?

    It is stable.

    What do I think about the scalability of the solution?

    It is scalable, but it is fairly expensive.

    In terms of its usage, we're not using it internally. We have three clients at the moment. They are fairly big clients.

    How are customer service and support?

    Their technical support is good.

    How was the initial setup?

    It is a bit more difficult because it needs a bit of hardware, etc. Deep Security is more complex to set up than web security. Implementing Deep Security properly is usually about a week's worth of work because of the change control in the company. It is the change control that's an issue.

    In terms of people required for its deployment, one engineer is usually enough.

    What's my experience with pricing, setup cost, and licensing?

    Most of it is annual at this stage.

    What other advice do I have?

    I would definitely recommend it for medium enterprises. 

    I would rate it a seven out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
    PeerSpot user
    Ahmet Burak Aydin - PeerSpot reviewer
    Security Engineer at Intertech Information Technology and Marketing Inc.
    Real User
    Provides adequate security and technical assistance
    Pros and Cons
    • "The performance is good."
    • "f it had the capability of generating retroactive alerts it would be helpful."

    What is our primary use case?

    We use Trend Micro Deep Security for security protection.

    What is most valuable?

    The performance is good. It is better than FireEye Email Security.

    What needs improvement?

    I would like to see a retroactive alert. If it had the capability of generating retroactive alerts it would be helpful.

    While it is stable, it has room to improve.

    For how long have I used the solution?

    I have been working with Trend Micro Deep Security for six months.

    What do I think about the stability of the solution?

    Trend Micro Deep Security is a stable solution.

    What do I think about the scalability of the solution?

    Trend Micro Deep Security is scalable.

    In our company, we have approximately 1,000 users.

    How are customer service and support?

    I am satisfied with the technical support that we have.

    Which solution did I use previously and why did I switch?

    We are also working with FireEye Email Security.

    How was the initial setup?

    I was not a part of the installation. It was installed by our technical team.

    This solution is maintained and deployed by a team of ten managers and engineers.

    What's my experience with pricing, setup cost, and licensing?

    We don't pay any licensing fees.

    What other advice do I have?

    I would recommend this solution to others who are considering using it.

    I would rate Trend Micro Deep Security a nine out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Buyer's Guide
    Download our free Trend Micro Deep Security Report and get advice and tips from experienced pros sharing their opinions.
    Updated: December 2024
    Buyer's Guide
    Download our free Trend Micro Deep Security Report and get advice and tips from experienced pros sharing their opinions.