Try our new research platform with insights from 80,000+ expert users
Mehmet COŞKUN - PeerSpot reviewer
Head Computer Engineer at a manufacturing company with 1,001-5,000 employees
Real User
Dec 4, 2023
Is user-friendly, efficient, and provides good visibility into our endpoints
Pros and Cons
  • "It provides comprehensive visibility into all client logs and seamlessly integrates with other products, such as CM."
  • "The time required for Apex One to notify us of detection in the central console should be reduced."

What is our primary use case?

We utilize Trend Micro Apex One for endpoint security across all of our clients, managing it centrally alongside the entire Trend Micro suite.

We implemented Trend Micro Apex One to improve our endpoint security.

How has it helped my organization?

Trend Micro Apex One is able to identify threats and notify us to investigate from a central location. From there we are able to inform the client and disconnect the affected device to protect the environment.

Apex One employs advanced protection features, including behavior analysis, to adapt to and defend against unknown threats. Apex One's ability to recognize abnormal behavior and terminate processes is crucial for safeguarding our organization's security.

Apex One utilizes runtime machine learning to detect ransomware, a crucial feature for safeguarding our data from ransomware attacks.

We utilize Apex Central as a single unified console for comprehensive management, enhanced visibility, and effective cross-layer threat detection, hunting, and investigations. As managers of Apex One, we require a centralized console for comprehensive threat detection, investigation, and hunting across all layers of the environment to effectively monitor and manage client performance.

Apex One's single console provides end-to-end visibility into the entire IT security environment.

The end-to-end visibility has significantly reduced our response time, enabling us to respond within five minutes.

We have integrated Apex One with other security products. Apex One is able to deploy rapid updates within ten minutes of detecting threats in the network sandbox. 

The ability to deploy updates immediately is crucial for me as a security manager.

Apex One is easy to learn.

Administering Apex One is more straightforward than the other products I manage.

Apex One has helped improve our production. We were able to see the benefits within two months.

Apex One offers virtual patching to mitigate vulnerabilities that attackers could exploit.

We have seen a reduction in viruses and malware since the implementation of Apex One.

Apex One has reduced our administrative overhead because it is easy to use.

What is most valuable?

Trend Micro Apex One's centralized management is user-friendly and efficient. It provides comprehensive visibility into all client logs and seamlessly integrates with other products, such as CM. This well-structured design facilitates effortless monitoring of the entire environment from a centralized location.

What needs improvement?

The time required for Apex One to notify us of detection in the central console should be reduced.

Buyer's Guide
Trend Vision One Endpoint Security
December 2025
Learn what your peers think about Trend Vision One Endpoint Security. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
880,315 professionals have used our research since 2012.

For how long have I used the solution?

I have been using Trend Micro Apex One for almost seven years.

What do I think about the stability of the solution?

I would rate the stability of Apex One nine out of ten.

What do I think about the scalability of the solution?

Apex One is scalable and can easily manage up to 5,000 endpoints.

Our client has 5,000 employees, and each employee uses two laptops. Therefore, we have plans to increase the usage to cover 10,000 endpoints.

How are customer service and support?

The technical support is good. They are able to action our requests.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We previously used Kaspersky Endpoint Detection and McAfee. We switched to Trend Micro Apex One because it offered a lower price, better central management, and is a popular solution in our country.

How was the initial setup?

The deployment was straightforward and took approximately six hours to complete. The vendor provided us with resources in advance, including database and IS configurations, before arriving to implement Apex One. This facilitated the download, implementation, and licensing of Apex One. One person was required for the deployment.

What about the implementation team?

The implementation was completed by a third-party vendor.

What's my experience with pricing, setup cost, and licensing?

The price of Apex One is competitive and lower than the prices of the solutions we compared it to.

Which other solutions did I evaluate?

We evaluated the different Kaspersky and McAfee offerings in addition to Trend Micro.

What other advice do I have?

I would rate Trend Micro Apex One nine out of ten.

Two people are required for maintenance.

I recommend Trend Micro Apex One. It is a good solution.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Murali Krishnan L - PeerSpot reviewer
Technical Manager (SOC Operations) at a tech services company with 1,001-5,000 employees
Real User
Top 20Leaderboard
Jun 16, 2024
Helps detect and block ransomware attacks, but the console is not stable
Pros and Cons
  • "The most valuable features are behavior analytics, machine learning, and virtual patching."
  • "The console is unstable, meaning it frequently malfunctions or lags, making it unreliable."

What is our primary use case?

We use Trend Vision One Endpoint Security to protect against ransomware.

How has it helped my organization?

Trend Vision One Endpoint Security does a good job protecting our endpoints against threats such as malware, ransomware, and malicious scripts.

Trend Vision One Endpoint Security has partially advanced protection capabilities that adapt to protect against unknown and new threats.

Machine learning helps detect and block ransomware attacks.

Trend Vision One Endpoint Security provides a helpful single console for cross-layered attack action, threat hunting, and investigations.

Trend Vision One Endpoint Security is easy to use.

The learning curve is not steep.

Before Trend Vision One Endpoint Security, we lacked threat-hunting abilities. Now, we can swiftly pinpoint threats and establish connections between email and endpoint data.

We are using the Trend Vision One platform for consolidated security across hybrid environments. This consolidation has improved our security operations and saved us time.

Trend Micro's Vision One platform offers a full view of our entire IT estate and empowers us to manage cyber threats more effectively. It achieves this through a combination of Zero Trust security principles, and ongoing monitoring for vulnerabilities in our attack surface.

Virtual patching helps protect our endpoints within minutes of detecting a vulnerability while we wait for the full patch which can take some time.

Trend Vision One greatly reduced the viruses and malware we receive. Before Trend Vision One we would receive five callbacks each month but now we may see one or two in six months.

The managed XDR adds great value to Trend Vision One Endpoint Security because we can manage everything from one place.

What is most valuable?

The most valuable features are behavior analytics, machine learning, and virtual patching. 

What needs improvement?

To gain complete visibility across our entire IT security landscape, we need additional Trend Micro products to complement Trend Vision One Endpoint Security. We're also integrating a third-party solution with Trend Micro for a more comprehensive approach. The integration aspect has room for improvement.

The console is unstable, meaning it frequently malfunctions or lags, making it unreliable.

Trend Vision One Endpoint Security initially offered a user-friendly administration experience, but its manageability has declined over time.

The technical support response time has room for improvement.

For how long have I used the solution?

I have been using Trend Vision One Endpoint Security for five years.

What do I think about the stability of the solution?

We currently have issues with assets not showing up on the console which has been lagging.

What do I think about the scalability of the solution?

Trend Micro Vision One scales its endpoint security based on the number of licenses we purchase, allowing us to secure more devices as our organization grows.

How are customer service and support?

The technical support takes a long time to get back to us.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

We've switched from McAfee because it was resource-intensive and some users reported missing malware detection.

How was the initial setup?

The initial deployment was straightforward. The only time-consuming part was deploying across different locations. The deployment took two months for 5,000 users. For the deployment, we have to download the console from the agent. No more than three people are required for the deployment.

What other advice do I have?

I would rate Trend Vision One Endpoint Security seven out of ten.

Two people are required for the maintenance.

I recommend waiting until Trend Micro fixes its stability problems before implementing Trend Vision One Endpoint Security.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Trend Vision One Endpoint Security
December 2025
Learn what your peers think about Trend Vision One Endpoint Security. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
880,315 professionals have used our research since 2012.
Julio Velasco - PeerSpot reviewer
Information Security Coordinator at a maritime company with 10,001+ employees
Real User
Top 5
Jun 6, 2024
It provides a single console for receiving information about our entire environment
Pros and Cons
  • "Trend Micro has advanced protection capabilities that cover unknown and advanced novel threats. It's critical because restoration could be complicated if we lose machines or information on the machine. If we lose some business information, we might run afoul of the law. Apex One can prevent all these incidents. It's an excellent solution."
  • "Initially, it isn't easy to understand the console because most of the applications integrate through Visual One. When we create a new dashboard, it takes some time to adapt, but the IT staff does not have any problems."

What is our primary use case?

We use Trend Micro to troubleshoot and monitor. We implemented it to gain more visibility into the networks we manage. Automatic network mapping helps visualize the network.

How has it helped my organization?

Trend Micro reduces our response time by around 40 percent. We can patch vulnerabilities and create specific rules to fix issues before an official solution is available. We've also reduced viruses and malware by about 30 percent. 

The Trend Micro security products are well-integrated with each other, creating a lot of value for the company. We need a comprehensive solution for preventing all cyberattacks and problems users cause when they don't understand the dangers of clicking on phishing websites, emails, attachments, etc. The company needs to reduce its exposure to threats. If we lose the data, we lose the company. 

What is most valuable?

Apex One provides a single console for receiving information about each machine, virus, malware, etc. The console receives telemetry from each machine that we can consolidate and view on one dashboard. We can see all the problems and vulnerabilities to make the best choices to prevent, restore, or recover. It gives us unified visibility into our entire IT environment. It's easy to administer Apex One. There are some advanced settings, but they aren't difficult to understand, and the documentation is detailed. 

OfficeScan wasn't 100 percent perfect when it was rolled out, but integration with Apex One improved its efficiency for dealing with trending attacks or ransomware. Initially, it wasn't very good, but now we can better control the environment. 

Trend Micro has advanced protection capabilities that cover unknown and advanced novel threats. It's critical because restoration could be complicated if we lose machines or information on the machine. If we lose some business information, we might run afoul of the law. Apex One can prevent all these incidents. It's an excellent solution.

Machine-learning ransomware detection is essential, as ransomware attacks can be difficult to contain. Without this agent, we wouldn't know that we lost all this information, and we might be forced to close the company and lose money.

What needs improvement?

Initially, it isn't easy to understand the console because most of the applications integrate through Visual One. When we create a new dashboard, it takes some time to adapt, but the IT staff does not have any problems.

For how long have I used the solution?

We have used Trend Micro for seven years.

How are customer service and support?

Trend Micro's support has been very helpful.

Which solution did I use previously and why did I switch?


How was the initial setup?

Deployment is simple. The engine was difficult to install the first time, but the latest versions are different. The package is small and doesn't affect the performance. It deploys quickly and we start receiving the telemetry on the console fast. 

What was our ROI?

Trend Micro reduces equipment costs. We don't need to buy services for an on-prem data center.

What's my experience with pricing, setup cost, and licensing?

In Brazil, Trend Micro is cheaper than its big competitors like CrowdStrike and Symantec.

Which other solutions did I evaluate?

We evaluated several products and landed on the Trend Micro stack because it can be integrated with different solutions. They also have products covering various IT areas, such as networks, email, etc., that we can control from one place and manage from our mobile phones. The appeal of Trend Micro is that we can consolidate all our security and IT tasks into one console.

What other advice do I have?

I rate Trend Micro eight out of 10. 

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Security Specialist at a consultancy with 11-50 employees
Real User
Dec 4, 2023
Good monitoring and server protection with helpful machine learning
Pros and Cons
  • "The monitoring is very good."
  • "The performance could always be improved."

What is our primary use case?

We use the solution for security for endpoints. 

I do a lot of POCs to measure response. 

Trend Micro uses agents to communicate with servers. We're using the service gateway. 

We use the cloud and take advantage of virtual patching. Most customers now use the platform. However, I also have a lot of experience with on-premises setups. 

I work on various models and work on multiple Trend Micro products.

How has it helped my organization?

If a machine is not patched properly or the required certificates are not installed, Trend Micro has the ability to remove the existing end device. 

We can access all products and policies now from One Endpoint Security. We can deploy policies and do everything directly from One Endpoint Security. 

What is most valuable?

The monitoring is very good.

It offers good server protection. 

There's event monitoring and monitoring for duplicate system files and suspicious behavior.

It has a lot of features that are not available with other OEM products. Trend Micro offers good virtual patching. Many OEMs rely on Trend Micro based on its bug bounty. Many submit bugs to Trend Micro, and Trend Micro pays people to find bugs. 

The IPS model will protect users until they patch to the latest updates.

There's a malware module that was recently released. It offers damage cleanup services and protection against viruses. It offers real-time protection. 

There's machine learning that protects against unknown tests. If the behavior looks suspicious, Trend Micro will kick in to secure the customer. 

It adapts to protect against stealth threats. Most customers are using One Endpoint Security with XDR. We can analyze potential threats. If there are any glitches running continuously, if any lateral movement is detected, we can move in to secure the endpoint. It helps us move in immediately. We'll be able to recognize things that aren't part of our processes.

It has the capability to integrate with our Active Directory.

It has ransomware detection capabilities. Users may not know which emails are suspicious. However, we can control access via the gateway. It helps protect against unknown suspicious activity.

One Endpoint Security provides a single console across layers for detection, threat hunting, and investigation. It's very important for customers to have this single console so that everything can be located in one place. This single console provides end-to-end visibility into the entire IT security environment for our customers. The configuration and monitoring are important. Every machine must remain compliant in order to ensure no threats can break through. We work hard to make sure every machine is up to date.

The learning curve of Apex One is very low. It's easy to use. 

It's easy enough to administer One Endpoint Security. 

We've seen a reduction in threats and viruses since moving to One Endpoint Security. We've seen a drop of 60% to 70%.

We do use One Endpoint Security as a service. We recommend that our customers use the SaaS offering. It has fewer limitations. It helps reduce the workload for customers by 60%. Overall, the administrative overhead has been reduced by 65%.

What needs improvement?

The performance could always be improved.

The solution has separate XDR agents. They should be working as one agent with One Endpoint Security.

For how long have I used the solution?

I've been using the solution since 2019.

What do I think about the stability of the solution?

I'd rate the stability eight out of ten. Sometimes, there may be performance issues. 

What do I think about the scalability of the solution?

We have customers with as many as 10,000 or 15,000 nodes.

The solution can scale. I'd rate scalability eight or nine out of ten. I haven't had any issues with scaling. 

How are customer service and support?

We've been satisfied with the OEM support. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I've also worked with McAfee, Symantec, Kaspersky, and AVG. I work with a lot of cybersecurity products. Prior to this product, I specifically used Symantec.

I also worked with Crowdstrike; however, it works using a different algorithm. One Endpoint Security is based more on data and works more on a behavioral basis, and Crowdstrike does not work like that.

How was the initial setup?

I tend to do POC setups and sometimes manage troubleshooting for customers. On-premises, we can install an agent from the console if there is an Active Directory. 

The deployment itself takes two to three minutes. 

If there's centralized management, it's fast. We might do a more manual process if it's a smaller organization. If there are more than 5,000 to 10,000 nodes, we need a team to help deploy it. 

Typically, one person is enough to handle maintenance. 

What's my experience with pricing, setup cost, and licensing?

I don't directly deal with pricing. 

Which other solutions did I evaluate?

I did not evaluate other options. 

What other advice do I have?

We use both on-premises and cloud SaaS deployments. We're a Trend Micro partner. 

I'd rate the solution nine out of ten. 

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)
Disclosure: My company has a business relationship with this vendor other than being a customer. partner
PeerSpot user
John Trembly - PeerSpot reviewer
Technical Specialist at a educational organization with 5,001-10,000 employees
Real User
Top 20
Sep 7, 2023
Provides a single dashboard, integrates well, and has predictive machine learning
Pros and Cons
  • "Workload security now has a feature called Activity Monitor for each endpoint."
  • "We have to manually log in to the machines and give them an update command."

What is our primary use case?

We use Trend Micro One Endpoint Security for endpoint security. We are using the SaaS version of One Endpoint Security. 

How has it helped my organization?

I am confident in One Endpoint Security's capability to defend endpoints against threats like malware, ransomware, and malicious scripts. 

One Endpoint Security has predictive machine learning and behavior monitoring, which are essential for endpoint security. Our file scan also scans the memory for malware. Behavior monitoring is particularly effective at detecting ransomware attacks because it can check for unusual encryption methods.

I like the way Trend products integrate with each other. The servers are all tied into Central, which is now integrated into my Vision One console. The on-premises stuff is also integrated with Azure.

We use a single dashboard through The Central to view detections, threat hunting, and investigations. The visibility through the single console is important. When we open the dashboard, it tells us what it has found. For example, I am currently looking at the SaaS version. If I go to One Endpoint Security, I can see all of the agents that are currently connected. It takes a few moments for all of the agents to load. We are currently in a downtime during the summer months. We are a school board, so there are fewer staff members on-site, and not all of the schools are open. We have 12,000 employees and 80,000 students. However, not all of the students are online right now as they would be during the school year. Next Friday, we will have more staff members in the office. When school starts after the Labor Day long weekend in Canada in September, everyone will be back online. Currently, the dashboard only shows 9,140 agents. Last week, it showed 6,400 agents. I have the system set up to remove inactive agents so that the system does not have to constantly scan a bunch of systems that are not even there. I have seen up to 17,000 endpoints on our system.

Vision One is now monitoring my Cloud One workload security and My Cloud Central. This means that Vision One is collecting data from both systems and giving me a comprehensive overview of my security posture. When I open Vision One, I will be able to see visibility into my entire organization. I have configured Vision One to send data to our Syslog server and receive data from our Qualys server. The Qualys server scans my servers for vulnerabilities and reports back to Vision One. I have also set up a service gateway and a workload security data center gateway. The workload security data center gateway feeds data from my VMware ESX servers into Vision One. This allows Vision One to see the real-time status of our VMs, including which ones are powered on, which ones are running the Deep Security Agent, and which ones are still running on my on-prem Deep Security server. Vision One provides me with a risk overview, an exposure overview, and an attack overview. This information includes details about credential access, lateral movement, collection impact, and suspicious mail forwarding rules.

We have our Azure system for Office 365 and on-premises Azure Active Directory also connected to Vision One. This means that Vision One can see all logins to our Azure system and our on-premises AD. I have agents running on our on-premises directory controllers, so this data is also being fed into Vision One. Vision One can also see our Azure domain controllers and our DMZ. I receive alert emails when something serious happens. I haven't received any of these emails since we started using Vision One. However, I receive emails about endpoints that have had files quarantined. The file on the endpoint was too large to move to the main server quarantine, so Vision One just gave me a small error message. Currently, the endpoint protection dashboard shows that out of 19,678 endpoints, agents have been deployed on 13,675. This includes Macs. The dashboard shows one Linux endpoint, which is my service gateway. There are 882 Mac OS endpoints, which is lower than the usual number of 1,100 because not all of them are turned on. There are 12,792 Windows endpoints. The dashboard also shows that 6,003 endpoints have no security protection. These endpoints likely include network equipment, certain Linux servers that are not running Trend Micro software, and proprietary operating systems that are used by our network team and other IT groups. There are also endpoints that are listed in our Active Directory, but they are either turned off or do not have any active systems.

Updates are applied on an hourly basis. If an exploit gets through and an endpoint has not been updated, it will receive the update on the next cycle. The most common reason for an endpoint not receiving an update is a network issue or the endpoint being powered off. Once an endpoint goes online, it is configured to automatically retrieve security updates from the server, or directly from Trend Servers over the internet if the server is unavailable. The first thing the endpoint does when it goes online is update its security patches, signatures, and scan engines. When a detection is made, the endpoint first deletes the file and quarantines it. It then blocks the action of whatever the file was trying to do. The endpoint's virtual patching, behavior monitoring, and predictive machine learning then stop any unusual activity. This may even include an activity that is supposed to happen. We have had members of our ICT department complain that they were unable to install software because the antivirus protection was blocking it. In some cases, we have groups within our organization that are responsible for maintaining their own servers. When they are doing upgrades, they may schedule us to temporarily disable the antivirus protection so that they can complete the upgrade. Even if malware does not get detected by the web reputation system and is downloaded by a user, it may still be detected by the signature-based malware detection system. If it is not detected by either of these systems, it may still be blocked if it tries to contact its master. These master addresses are often common addresses on the internet that are used by bots to communicate with a server that is maintained by the threat actor. If a bot is blocked from contacting its master, it will be unable to function. If we see a large number of bots being blocked, we will investigate the system to see what is causing the issue. In many cases, it turns out to be a legitimate activity that is being blocked by the system. For example, we may have custom scripts running on certain servers that look suspicious to the system. We can manually whitelist these scripts so that they are not blocked. Overall, the system is designed to be overprotective. This is because it is better to block something that is legitimate than to let malware through. We can always fix a false positive, but it is much more difficult to fix a security breach.

I started using One Endpoint Security in August 2020. I learned how to move agents, install software, and get the agent onto the server. I also learned from the documentation, knowledge base, forums, and other users. I found One Endpoint Security to be more difficult to learn than PaperCut because the terminology and concepts are different. PaperCut is just about printing and monitoring, while One Endpoint Security is about cybersecurity. There are also many caveats to consider with One Endpoint Security. I found the scan settings to be particularly challenging. Trend Micro has helpful best practices documents, which I used to learn what the normal settings are for servers and workstations. For example, servers don't need to be scanned for office document exploits because they typically don't have Office installed. I also learned that it's important to balance security with performance. We don't want to scan servers so heavily that it slows them down, but we also don't want to skip important security checks. In January 2021, we changed our policy on security settings. We now tell users that if there are any problems, we will fix them. We would rather have a small problem that we can fix quickly than have to restore a server from backup, which can take days.

One Endpoint Security provides virtual patching, also known as vulnerability protection, to protect against vulnerabilities before they are exploited. Deep Security and Workload Security call this feature intrusion prevention, but it is essentially the same thing.

What is most valuable?

Workload security now has a feature called Activity Monitor for each endpoint. This is a free version of their Endpoint Basecamp product that is automatically installed with every One Endpoint Security agent. Even if we are not licensed for Endpoint Basecamp, it will still be installed. On the servers, I had to remove the Endpoint Basecamp and then deactivate and reactivate the workload security agent to get the Activity Monitor working properly. However, I am glad that we get free monitoring for our servers, even though we do not get it for our workstations.

The agent program version column in the agent screen, we could never sort by. It's so handy to be able to sort by that now. We can go to one end of the scale to see the lowest agent version, and then go to the other end to see how many are updated to the latest agent.

What needs improvement?

Microsoft's new Azure Code Signing is causing a lot of issues for us with One Endpoint Security. We currently have two systems in operation, on-prem and SaaS, and many of the agents won't upgrade beyond version B11564 because these newer versions require Azure Code Signing compliance on the endpoint. If we are not up to date with our Windows updates, we don't have this compliance. Irrespective of the Windows version we are running, we have to apply patches to the machines, if the OS is not damaged, to make them compliant. After that, we can upgrade to the latest version of the respective agent. This process also applies to both Deep Security and Workload Security.

I have two production servers: one for Windows and another for Mac. These servers are available in both on-premise and SaaS versions. Additionally, I have a test server that is located on-premises. The significant distinction with the SaaS version is the absence of a test server where I can install a new version. This means I can't allow the agents on it to upgrade and then perform testing. In contrast, with the production SaaS version of One Endpoint Security, I have numerous agents transitioning and coming online. It's essential that these agents upgrade to a newer version. Among these agents, there are five or six different versions, not counting the really old ones that have yet to upgrade due to ACS non-compliance. I can't leave the testing phase for an extended period because I still have outdated agents that need to be updated. These agents can't be left hanging while I wait to test the newest version that has just been released. New versions seem to come out every couple of months in the SaaS environment. In the past, when I solely used the on-premises version, I would review security bulletins for the SaaS version to identify any issues. I'm apprehensive about potential future situations involving this, primarily because the majority of our agents now operate on the cloud version. If a problem is discovered, rolling back on those agents would be challenging. It would require careful operation to revert them to a different version.

The on-premises version of One Endpoint Security has an update function that allows us to manually update a bunch of servers. For example, if I just turned on a policy, I can force the agents to quickly download the policy and start following the update procedure or update settings. However, this function is not available in the SaaS version. This is because the system cannot communicate with the agent through the firewall. The SaaS version has an automatic update function and an update source entry in the update agents sub-menu, but it does not have a way to force agents to update. This is a problem because we cannot automatically update the agents. We have to manually log in to the machines and give them an update command. Currently, we have no choice but to wait until the agents find the updates themselves.

For how long have I used the solution?

I have been using Trend Micro One Endpoint SecurityOne for three years.

How are customer service and support?

I have the enterprise version, so I can usually talk to someone in the Philippines even during after-hours. I only do this when it's something that can't wait until the next day. If it can wait, I'll let it go until then. But if something is broken and needs to be fixed right away, I'll get in touch with the Philippines team. They have some good people there, and the support is really good. I think Trend's support is probably the best of any of the vendors I work with.

I have a few open tickets, and one of them involves the developers. They keep coming back to me with questions that they have passed on to the service representative I'm working with. The developers want to know why I'm seeing something that they think I shouldn't be seeing. I'm generating a report that is supposed to show me all the endpoints on our workload security server that do not have agent self-protection enabled. This is part of the Vision One report. One of the endpoints that the report identifies is our service gateway. It is running Ubuntu Linux and has a Deep Security agent installed, but agent self-protection is not enabled by default. There is a way to enable it, but it's not typically done for Linux systems. Agent self-protection prevents unauthorized configuration of the Trend Deep Security agent service settings. This means that we can't change or stop the service without first disabling agent self-protection.

How would you rate customer service and support?

Positive

What other advice do I have?

I would rate Trend Micro One Endpoint Security ten out of ten.

My concern arises when an endpoint lacks One Endpoint Security, as we are not actively monitoring for this. While we possess a scanner, this is why I intend to maintain the on-premises system's functionality. I plan to transition away from the deep security system and migrate the application team to the cloud version, although this transition process is currently pending. I need to retain the on-premises One Endpoint Security primarily for assessment scanning purposes. This involves scanning all items listed in our active directory, along with the subnets for our VPN, to identify unprotected endpoints. During a recent scan, I identified nine such endpoints and proceeded to install the agent on them. Occasionally, there are instances where the agent won't install, but no error message indicates a connection issue or existing installation. Some of them show as not having the agent installed, even though they do, which can happen when the endpoint is booting up during the assessment scan and the agent hasn't yet been loaded. Resolving this is relatively swift, although there are instances where devices not compliant with ACS will trigger a message stating that the agent cannot be loaded. These devices are then flagged, and I work on making them ACS-compliant to ensure proper agent protection.

The noteworthy aspect of One Endpoint Security is that we didn't begin using it extensively until the third quarter of 2021 when vulnerability scanning was initiated. Although we had an Central server, we were not using any policies on it. To enable Vulnerability Protection, we needed to implement endpoint policies in Central. Vulnerability protection involves virtual patching, where regular scans check our operating system's vulnerability to known exploits. It also includes monitoring applications for vulnerabilities and guarding against those vulnerabilities until they can be patched. This process is largely automatic, as the rules to counter cyber threats are introduced until the system is patched, at which point they are removed automatically. In contrast, on the Deep Security side, I need to execute this process manually. A weekly automated scan takes place, followed by an emailed report. This report aids in identifying missing policies or necessitated rule adjustments based on scan findings.

We have to constantly monitor the systems to make sure it is okay. I have email alerts coming in from Trend Micro One Endpoint Security, and Central Systems. I have folders for workload security, deep security, and Trend Micro in my inbox. I check these folders even when I'm not online to make sure there are no major alerts. In a way, this gives me peace of mind. As long as the agents are running properly and there is enough memory and disk space, everything is fine. However, I still have to manually check the System Event Log to see if any One Endpoint Securityendpoints are running out of memory or disk space. We also use SCCM. I set up a scheduled script to create a report of all endpoints with less than 1 gigabyte of disk space. I put this report in a folder that is accessible to all of our school techs and team leaders. This way, they can check the report periodically to see if any endpoints need to be reimaged or have some garbage removed from the disk.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Microsoft Azure
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
LuisSilva6 - PeerSpot reviewer
Director of Information Technology at a hospitality company with 10,001+ employees
Real User
Top 5
Apr 16, 2024
The single console and AD integration save a lot of time and work
Pros and Cons
  • "It is updated automatically without much intervention from our side. We can also get some reports easily."
  • "The menus can be more user-friendly or easier. For example, if we want to enable access to the USB ports, it should be more user-friendly. It is not easy. We need to navigate through several menus to be able to give access."

What is our primary use case?

We normally use it as an antivirus and antispam solution. We use it to block USB ports on PCs and do other things like that.

By implementing Trend Vision One Endpoint Security, we wanted to block all the USB ports on the computers. That was our first target. We also wanted a centralized system where we could track and see all the computers at the same time.

How has it helped my organization?

It is a tool that is required for our company's security. There were some cases when the software brought it to our attention that we received some documents with malware that we should not open. It blocked the threat. It is very important for us.

Trend Vision One Endpoint Security has advanced protection capabilities that adapt to protect against unknown and stealthy new threats. The ability to adapt to protect against unknown and stealthy new threats is very helpful. We do not need to be concerned with some threats because it is blocking them. It is easy for us to track all the changes. We cannot install some of the applications by ourselves. We need to get approval from the top company.

Trend Vision One Endpoint Security can detect ransomware with runtime machine-learning capabilities. We do not need to be very concerned about attacks because the software is blocking them and protecting our machines internally. It also automatically sends reports.

It provides us with a single console for cross-layer detection, threat hunting, and investigation. We can have just one console and one system to track all the attacks and threats we have. For us, it is a matter of opening just one system and not navigating through a lot of systems to check what is happening. Everything is consolidated in one console. It saves time.

This single console does not provide end-to-end visibility into the entire IT security environment because we have another one for web filtering. Apex One is there as an antivirus and anti-malware solution for protection from threats.

We have integrated One Endpoint Security with Active Directory. It saves a lot of time for us. It is a worldwide solution. It saves a lot of time and a lot of work, especially for IT.

One Endpoint Security gives us the track for the attacks, and we can prepare our end users to be alert about the threats. We can also give them training.

One Endpoint Security is easy to learn, but when it comes to administration, it is not the easiest tool. It requires some adaptation to the system. Especially, if we do not use it every day, we tend to forget how to go to the system and obtain all the results that we need. It is average in terms of working with the system. It is not the easiest one.

It does not take much time to realize the benefits of One Endpoint Security. After we install the software, all the information automatically pops up on the console, and we can track everything from there. Because it is integrated with Active Directory, it is an easier way of managing the work.

It provides us with virtual patching to protect against vulnerabilities even before a patch is available for the source of the issue. This virtual patching is important.

It gives us safety. In spite of the training, users can forget and click on something they should not. We need the security that One Endpoint Security provides.

There has been a reduction in the alerts that we see. We still get some alerts, but not as many as we used to have before moving to One Endpoint Security. There is about a 75% reduction in alerts.

One Endpoint Security reduced the workload. It is integrated with Active Directory. It is much easier to manage and be aware of any threats. It has reduced about 85% of the workload.

Trend Vision One Endpoint Security saves a lot of time in configuration and management.

What is most valuable?

It is updated automatically without much intervention from our side. We can also get some reports easily.

What needs improvement?

The menus can be more user-friendly or easier. For example, if we want to enable access to the USB ports, it should be more user-friendly. It is not easy. We need to navigate through several menus to be able to give access.

For how long have I used the solution?

I have been using Trend Vision One Endpoint Security for the last 5 years.

What do I think about the stability of the solution?

It is very stable. I do not remember any issues with One Endpoint Security over the last year. For us, it is very stable.

What do I think about the scalability of the solution?

It is good. Most of the time, we do not notice any changes or upgrades. For us, it is straightforward. 

We do not have plans to increase its usage by a lot.

How are customer service and support?

I have interacted with them just for updates, etc. My interactions were not a lot on the technical side. I would rate them an eight out of ten.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We had Trend Vision locally installed, and it was advised by the company to change to the Trend Vision One Endpoint Security. We wanted to centralize the corporate office.

Before that, I used Kaspersky. In a different company, I also used a cloud-based and centralized solution where we could track all the machines. Before that, I used to work with McAfee, but it was not centralized. It required individual management.

How was the initial setup?

I was involved in the local deployment of One Endpoint Security and not the corporate one. We have several offices, and I was just involved in this one. It was straightforward.

It took five days because we had to go to all the computers and implement it one by one, but we did not spend the whole day just doing that. We were doing it in phases and by departments.

In terms of maintenance, we had to change the version. It took two or three days to perform the change.

What about the implementation team?

We had two people for deployment. We deployed it across multiple locations.

What other advice do I have?

Overall, I would rate Trend Vision One Endpoint Security a 9 out of 10. It is one of the best solutions in the market. It gets integrated with Active Directory. It is on the cloud. It provides good protection from threats and viruses.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Microsoft Azure
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Vikas Ingle - PeerSpot reviewer
Infrastructure and Security Lead at a program development consultancy with 201-500 employees
Real User
Top 5
Mar 6, 2024
Easy to manage, competitive price, and good protection
Pros and Cons
  • "Device control works well, and the anti-malware updates are also pretty good. Every two or three weeks, you get updates. The frequency of the release of new definitions is quite good. We had peace of mind."
  • "Trend Micro's encryption is not up to the mark. We tried their encryption product, but we did not like it. Encryption was difficult to manage."

What is our primary use case?

We were using it for our endpoints. We had more than 1,000 points. 

We were using it for anti-malware, DLP, and device control. We also used encryption, which did not work well, but the anti-malware, DLP, and device control capabilities worked very well.

How has it helped my organization?

By implementing Apex One, we wanted malware protection for our endpoints. We also had a requirement for a data loss prevention solution. It was integrated into the Trend Micro suite, so we got three capabilities: malware protection, DLP, and device control. The Trend Micro suite worked for these three use cases for us.

Device control worked as expected. We tried other solutions too, but they did not work the way we configured them, whereas with Trend Micro, it was not difficult.

Apex One was good at defending endpoints against threats such as malware, ransomware, and malicious scripts. In the five to six years that I used it, I did not have a single issue. All the endpoints were protected. I did not have any outbreak or anything else. It was effective.

Apex One had advanced protection capabilities that adapted to protect against unknown and stealthy new threats. It was pretty good. In the reports, we could see the outbreaks mitigated by Trend Micro. It automatically provided an alert.

Apex One provided us with a single console for cross-layer detection and investigation, but I am not sure about threat hunting. As I understand, threat hunting is something that comes under the SIEM solution. I am not sure whether it has threat-hunting capabilities or not. I did not deal with that.

Apex One integrated well with other security products. It was good. We integrated it with our SIEM solution. It was seamless. When a threat was detected, it deployed rapid updates to endpoints. It was very critical. I could see that every two hours, definitions were getting updated.

Apex One has consistently been a good product. It consistently performed well for me. It kept getting updated for any new evolving threats and ransomware. I did not have any issues.

Apex One provides virtual patching to protect against vulnerabilities even before a patch is available for the source of the issue. Because we did not have any issues, we were not very concerned about that, but the feature was there.

What is most valuable?

Device control works well, and the anti-malware updates are also pretty good. Every two or three weeks, you get updates. The frequency of the release of new definitions is quite good. We had peace of mind.

It was easy to administer. It was easy and user-friendly. When new technicians joined, we just provided access to them. They could efficiently manage it. It was not very difficult to train them.

What needs improvement?

Trend Micro's encryption is not up to the mark. We tried their encryption product, but we did not like it. Encryption was difficult to manage.

Other than that, I do not have any input. We did not go into XDR. We were planning, but then we moved to another solution. The product is stable, and they should keep working on handling new threats.

For how long have I used the solution?

I used it for five to six years. I stopped using it three months ago.

What do I think about the stability of the solution?

It was pretty stable. We never had any problem related to stability, where it was not performing or not updating. 

What do I think about the scalability of the solution?

It is easily scalable. If an organization has 500 endpoints and they are expanding to 1,500 endpoints, the migration is not very difficult. It is easy.

How are customer service and support?

We had a support partner to support us. Whenever there was a technical issue, they helped to resolve it. I never went very deep into it because our partner used to handle the technical support service.

Which solution did I use previously and why did I switch?

We were using McAfee. We switched because the pricing of Trend Micro was competitive at the time. 

We were happy with McAfee, and we were happy with Trend Micro. We did not have any issues with either product. We did not see any reduction in viruses and malware after moving to Apex One.

How was the initial setup?

It was an on-premises solution. My team and I were involved in its deployment.

It took us about three to four months to completely implement it. We took our time. We first implemented it on some of the machines and saw the results. We then implemented it on other machines. Within one year of implementing it, we could realize its benefits.

What about the implementation team?

We work with a consultant. He supported us with any technical issues. The initial configuration and installation on a certain number of machines was done by the consultants, and later on, my team handled it. Overall, we had seven to eight people who were involved in its deployment.

For managing it, I had two resources for managing servers and different applications. They could manage Trend Micro along with them. I did not have to have a separate resource for it. The same two people could handle it along with their other responsibilities. They were responsible for monitoring, updating clients, and checking the client status. They checked how many clients were updated and troubleshooted the ones that were not updated. They looked at the compliance reports and alerts.

What's my experience with pricing, setup cost, and licensing?

Its price is competitive.

Which other solutions did I evaluate?

We did not evaluate other options because Apex One was already being used in other groups in my company. They were satisfied with it, and it also had better pricing, so we just went for it. We did not evaluate other products.

What other advice do I have?

It is pretty good. We did not have any surprises. We did not have any kind of attack. Trend Micro provided good protection. It gave us confidence.

It has a lightweight agent. The installation is not very difficult, but the partner should be competitive enough. The product is good. It does not require much maintenance, but you should have a good partner to support you. 

Overall, I would rate Apex One a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Endpoint Solutions Support at a consumer goods company with 10,001+ employees
Real User
Top 5
Dec 19, 2023
Has advanced protection capabilities that adapt to protect against unknown threats
Pros and Cons
  • "It's reduced administrative overhead."
  • "The role-based access control needs improvement."

What is our primary use case?

We protect our client's desktops, laptops, and other devices. The servers will be protected by cloud and workload security. It's a complete end-to-end inter-security solution.

How has it helped my organization?

The solution provides our customers with malware protection. It has a good level of malware protection to protect against malicious threats. It provides protection against a good number of threats, both known and unknown, and we do get more details to help us log and investigate.

What is most valuable?

We like that we can catch any malicious threats. We have device and application control. We have more features when we complete office scans.

The device and application control are quite valuable. If users use USB sticks, they can potentially infect devices. We have a list of approved corporate policies, and certain things can not be let through to the endpoints. It helps keep companies safe.

We have protection from malware and ransomware. We get notifications from the console and can take action if we see any malicious activity. 

One Endpoint Security has advanced protection capabilities that adapt to protect against unknown threats. It can protect clients from both known and unknown threats via machine learning. This is critical. We can't always expect certain attacks. Some threats may be very new. And clients are still protected. It can protect against behavior monitoring, for example, via machine learning. 

One Endpoint Security detects ransomware with runtime machine-learning capabilities. This is important. Clients need to know whether a program is trying to encrypt their files and, if so, if it's legitimate or malicious. It gives good protection to our customers to ensure their security is not violated.

One Endpoint Security provides our customers with a single console for cross-layer detection, threat hunting, and investigation. We depend on the Vision One console. With One Endpoint Security, we do have two consoles. There's one for managing policies and one for agent management. We used to have the central manager console, however, now we are using OPEX Central for policy management. On the other console, there is for agent management, threat hunting, and other remediation. Soon we'll have one console again that will centralize everything, including alerts, actions, auto-response, and remediation.

There are options to integrate with other products. However, we may not use any integrations. Any logs generated get passed to the SOC team. They get logs from Splunk also and centralize the management of logs. However, my understanding is that everything can be integrated. 

It's easy to learn One Endpoint Security. It does have user-friendly interfaces.

The Trend Micro portal allows you to access documentation and manuals.  It shows you, for example, how it can be configured and how to use certain features. We refer to the guidelines and articles a lot. 

There hasn't been any issue with administering the solution.

Once we implemented the solution, we immediately witnessed security benefits.

We've noted a reduction in issues as we have increased transparency, and we do have more control. Based on that, we can easily modify policies, have better control over enrollment, and have better visibility into infection threats and how issues may enter systems. We reduced the number of infections and the number of hosts getting infected. We've seen a 10% to 15% drop in threats. 

We are using One Endpoint Security as a Service. We do find that having endpoint deployment in the cloud is reducing people's workloads. The setup files can be downloaded so long as there is internet connectivity. We can do both online and offline installations now. With client enrollments spread across multiple locations, it may not be feasible for the IT team to be onsite to do deployments. It's much easier to have everything done online and this approach reduces a lot of work for the IT team (including traveling to locations, et cetera). Travel logistics can be completely avoided. We've likely saved more than 50% of our time having online deployments. 

It's also reduced administrative overhead. Many reports, for example, are now automated and sent directly to country administrators. We've saved around 50% of administrative overhead using One Endpoint Security. 

We use Trend Micro's managed XDR services in conjunction with One Endpoint Security. We get a lot of risk alerts and detailed information about events, including which endpoints were involved in which particular threats. We can get a lot of information directly from the XDR console. It's one of the best places to find more information about threats. We do threat hunting and management through the XDR console. 

What needs improvement?

The solution does not have virtual patching. 

The role-based access control needs improvement. We have 40 countries in our environment. We do provide admin access to the countries and cities. A French admin may administrate endpoints in Germany, which is why we need better role-based controls. 

For how long have I used the solution?

We've used the solution for our clients for more than seven or eight years. 

What do I think about the stability of the solution?

The solution is very stable. Even when it's offline, it's not completely dependent on the cloud due to the agent. That way, you can protect your device even without the internet. And when you are connected, you have the SmartScan protection as well. 

What do I think about the scalability of the solution?

We have One Endpoint Security deployed across 40 countries and around 40,000 endpoints. 

We started deploying with 1,000 or 2,00 devices and now we have tens of thousands. It has good scalability. 

We may add more endpoints and increase usage. 

How are customer service and support?

Technical support is good. Sometimes there may be issues, and we can send them across to Trend Micro's technical team to investigate. From time to time we'll get troubleshooting recommendations from them.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I've previously worked with Symantec and McAfee. This is my third solution. I find Trend Micro to be very user-friendly. Everything is integrated under one solution. It's a host-based intrusion prevention system by default and we get protection of all four endpoints with it. 

We previously only used free business services such as lightweight protection and OfficeScan.

How was the initial setup?

The initial deployment of One Endpoint Security was straightforward. We have done both online and offline installations. If a local IT can deploy it they will. If not, it can be done online. The installation of the agent is very easy. If an agent is corrupted, we can use a tool to remove it and install the latest version of a new agent. It's very flexible in that sense. With other products, if an agent is corrupted, it's very hard to remove from the system. Here, it's very easy. You can just remove it and reinstall the agent package. 

With good internet connectivity, you can deploy the solution in 30 to 40 minutes. It's very fast. 

We'll download the MSA package from the console. That'll be given to the IT team, and what they do is push from the SCCM console. Once the systems are online, then they can push it to those systems. It can be done in silent mode without the knowledge of the user.

We have three people handling the deployment, and they are working with nearly 40,000 endpoints. Whoever handles implementation needs to have a good understanding of the endpoint protection software and its requirements and basic knowledge about the antivirus policies, as the policies may need to be altered or changed based on the country's requirements. Sometimes you need to have a scan exclusion and whitelist certain applications or URLs.

As a cloud solution, it doesn't require maintenance. 

What was our ROI?

We have seen ROI reflected in the good protection we're getting on endpoints. 

What's my experience with pricing, setup cost, and licensing?

The pricing is moderate. It's affordable. The costs are variable. You have the flexibility to choose between different options. 

Which other solutions did I evaluate?

We evaluated Windows Defender and Symantec. Trend Micro surpassed all other options. 

What other advice do I have?

We are an MSP, a managed service provider. We provide malware and security solutions. 

I'd rate the solution nine out of ten. It can protect desktops, laptops, and most other devices. I'd recommend it to others. It offers very good protection. You can scale it, and it offers many good features. 

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)
Disclosure: My company has a business relationship with this vendor other than being a customer. msp
PeerSpot user
Buyer's Guide
Download our free Trend Vision One Endpoint Security Report and get advice and tips from experienced pros sharing their opinions.
Updated: December 2025
Buyer's Guide
Download our free Trend Vision One Endpoint Security Report and get advice and tips from experienced pros sharing their opinions.