It offers very good ransomware protection. You have more visibility on the network.
CTO at Cyber Correlate
Good protection with centralized visibility and nice executive dashboards
Pros and Cons
- "The centralized visibility is good."
- "The support should be improved."
What is our primary use case?
How has it helped my organization?
It helps with compliance. We are also well-protected from ransomware and network attacks.
It's improved our organization in two ways: we can have more visibility and have more confidence in security. We also have better reporting for regulatory compliance.
What is most valuable?
The endpoint protection is the most useful. It's powerful. I've faced issues with other products regarding ransomware; however, with Trend Micro, I have no fear of network attacks. I have experience with consistent protection.
Customers have NDR and XDR protection, and it's very good for protection. There are also regulations within our country that require us to use XDR.
The centralized visibility is good. It's great for the IT team as they have to export reports to management for compliance. It helps with reporting. It's essential.
The centralized visibility and management across protection layers helped our efficiency. We have a limited number of security engineers. With Trend Micro and its centralized dashboard, it will show everything we've learned and reflect reporting on the dashboard and this helps when you have a limited amount of users. It simply reduces the number of people that need to be involved in the security effort.
We use the executive dashboards on both sides. We can drill down on them right into XDR detection. It's essential when we have an incident. If we need to know more about the threat, we need to know where and how they are attacking. We can drill down and get forensic data.
The solution's risk index feature is very good. It comes out of the box. Our customers can use it.
The product has helped us decrease our time to detect and respond to threats.
What needs improvement?
It took some time to realize the benefits, as we had some issues with support. It took us three to four months to realize its benefits.
The support should be improved.
We'd like to see deception features in the next release. It would help us to reduce false positive alerts.
Buyer's Guide
Trend Vision One
October 2024
Learn what your peers think about Trend Vision One. Get advice and tips from experienced pros sharing their opinions. Updated: October 2024.
816,406 professionals have used our research since 2012.
For how long have I used the solution?
I've been using the solution for seven years now.
What do I think about the stability of the solution?
The stability is good overall.
What do I think about the scalability of the solution?
The solution is scalable. You simply need the resources on the VM, and you can easily change your license.
How are customer service and support?
We've had issues with support. Their services could be improved.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I have used Fidelis and found you can control the endpoints better. They also have a deception module, which is very powerful. You can manage your endpoints perfectly. It also offers very good network visibility. I use both products. It depends on the customer's needs and approach.
How was the initial setup?
I observed the deployment process.
We had issues. It should be straightforward; however, with a customer, we faced a problem with technical support. It took us almost eight months to deploy. They had issues with the installation on the endpoints and on the network side. We had a problem with a few things, including use cases.
The plan was to deploy in two weeks, and yet it took almost eight months.
From the customer side, there were three engineers, and from Trend Micro, there were one or two engineers working on the solution.
Almost every two weeks, there are maintenance calls. The customer has three people handling maintenance duties.
What about the implementation team?
The solution was deployed by support.
What's my experience with pricing, setup cost, and licensing?
The pricing is average. The costs are acceptable. It's good for small or medium-sized businesses.
What other advice do I have?
I'm a partner.
We're using the latest version of the solution.
I'd rate the solution eight out of ten.
For enterprise customers, I wouldn't recommend the solution. However, it's a good solution for small or medium customers. New users need to ensure they have the correct sizing and licensing.
You need to talk to the right support engineers in order to have a smooth experience.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: partner
System Administrator at a financial services firm with 10,001+ employees
Provides a centralized dashboard, protects older servers, and reduces our time to detect
Pros and Cons
- "The zero-day vulnerability is valuable."
- "The automation capabilities on-premises could be improved, as we currently have to manually activate servers and push policies."
What is our primary use case?
We use FireEye, Microsoft Defender, and Trend Micro for our endpoint solutions. Trend Micro.
We implemented Trend Vision One because we have many production servers and wanted to secure all endpoints.
We are planning to move our XDR to the cloud, but all of our production servers are currently on-premises.
How has it helped my organization?
Trend Vision One's ability to cover all our servers is important because we can detect and quarantine any vulnerabilities as well as block and isolate third-party applications from being installed on our servers.
The centralized visibility empowers us to monitor and manage all our servers from a single console. This includes generating reports, deploying security updates, and identifying offline or outdated servers.
The centralized visibility and management across protection layers have helped increase our efficiency. We receive alerts and make changes all from one place.
Trend Vision One helps us protect our servers, specifically our older servers that are not supported by Microsoft.
It has reduced our time to detect by 50 percent.
Trend Micro XDR has reduced the time spent on false positive alerts by up to 40 percent.
What is most valuable?
The zero-day vulnerability is valuable. As end users, we may not be aware of exploitations and Trend Micro makes suggestions to update to protect our endpoints from attack.
What needs improvement?
The automation capabilities on-premises could be improved, as we currently have to manually activate servers and push policies.
I would like the uninstall process of agents to require two-step verification.
For how long have I used the solution?
I have been using Trend Vision One for ten months.
What do I think about the stability of the solution?
Trend Vision One is stable.
What do I think about the scalability of the solution?
Trend Vision One is scalable.
How are customer service and support?
The technical support is good but we sometimes face delays because they will only respond to our partner who then relays the information to us.
How would you rate customer service and support?
Positive
How was the initial setup?
The migration from on-premises to the cloud allows us to access the cloud and on-premise servers from the cloud. The migration is not complicated but some rule-based ports require a lot of approvals and assistance from our network team.
The migration can be done in a few hours if all the ports are available.
Two people are required for the migration.
What about the implementation team?
We used a third-party service from JVS for the migration.
What other advice do I have?
I would rate Trend Vision One a nine out of ten.
For the on-premises deployment, maintenance is required because we have to manually check the connectivity of the agents. One person is required for the maintenance.
I recommend Trend Vision One, especially for older servers that are not supported by some other endpoint solutions.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Trend Vision One
October 2024
Learn what your peers think about Trend Vision One. Get advice and tips from experienced pros sharing their opinions. Updated: October 2024.
816,406 professionals have used our research since 2012.
Senior Security Manager at a real estate/law firm with 201-500 employees
Enabled me to completely change user behavior and manage all our endpoints almost single handedly
Pros and Cons
- "The integration is also nice because there are many external tools that we can connect to the platform, such as configuration management tools. Because the platform is integrated, I can manage almost the whole company across our global organization."
- "The area for improvement is mobile security. We have just finished a proof of concept for Zero Trust Secure Access. We withdrew from this PoC because it does not have that many points for proxy across Europe. Our organization is across Europe... At this time, they are only located in Germany and the UK."
What is our primary use case?
It's a perfect tool for monitoring infrastructure, including endpoints, servers, and potential attacks via networks. That's especially true for internet-visible hosts, which we can monitor directly from the tool.
We had problems with users not using legitimate tools, such as pendrives. We needed to protect hosts from external threats and third-party actors. That included monitoring behavior, scanning our infrastructure, and exploitation of vulnerabilities.
How has it helped my organization?
The solution has enabled us to completely reorganize our work. I was the first person using this tool in our company, and I completely changed user behavior to become more restricted. In Poland, but also in the United States, we are very strict about abnormal usage of our tools or attempts to download tools that shouldn't be on desktops, laptops, or servers. From my point of view, we are now a completely different organization than when I joined it. Trend Micro is one of the most important security tools we have implemented.
We don't need to use an external vulnerability scanner because Trend Micro XDR has a module for that, and we can save that money.
Trend Micro's Managed XDR is quite nice because I can manage more than 2,000 endpoints. I use the playbooks with particular scenarios for incident management. It's a very nice tool. It competes with anyone on the market. Sometimes, when we detect some kind of threat and we have no idea how we should investigate, troubleshoot, or mitigate the risk, we use the managed service team with Trend Micro engineers. I'm very happy with this team. They are very good professionals.
We respond much faster thanks to the intelligence used by Trend Micro. They have very good knowledge because they have many threat sources. That is why we are reacting much faster than we would if we had to dig deeper without that knowledge and this tool. It would be absolutely impossible to manage this infrastructure by a single admin or even two security admins. We are able to detect and respond about 80 percent faster. It's not only the monitoring and alerting for classic signature threats; there is also a tool for monitoring user behavior. It would be utterly impossible to find abnormal user behavior without this type of tool.
And we have mitigated most of the false positives—more than 90 percent. About one out of 10 alerts may be a false positive. In the beginning, we had to learn about Trend Micro, what was a legitimate action and what was a suspicious or malicious action. We had to learn what the right approach was.
What is most valuable?
This product is simple to use. Sometimes, especially when new features come out, I need to spend a little bit of time discovering how they work. But overall, it's simple. The interface is quite nice.
The integration is also nice because there are many external tools that we can connect to the platform, such as configuration management tools. Because the platform is integrated, I can manage almost the whole company across our global organization. I can almost manage the infrastructure alone. We have minimized the need to expand our team.
It also handles vulnerability management.
We use Trend Micro to cover endpoint protection and server protection. That's one of the key points for our company. And Trend Micro Vision One absolutely gives us centralized visibility and management. Especially when we integrate it with Active Directory, we get full visibility of our endpoint and server infrastructure. That is very important; a 10 on a scale of one to 10.
We also use the solution's Executive Dashboards. We present the findings in steering committees periodically. Sometimes, there is a repetitive alert or event. Directly from this dashboard, I can see the groups of this type of event. For me, it's quite a nice tool for presenting the results to the C level and the whole company for those who are not technically experienced.
And especially because of the new European regulation called NIST 2, we are using the solution's Risk Index feature. We calculate our risk score and we can see how it is changing in the timeline. Is it growing? Is there a new vulnerability detected? We can also compare our risk score with organizations of the same size or in the same industry and see if we are better or worse.
What needs improvement?
The area for improvement is mobile security. We have just finished a proof of concept for Zero Trust Secure Access. We withdrew from this PoC because it does not have that many points for proxy across Europe. Our organization is across Europe, and it will be nice when it is possible to have Trend Micro proxies across many more countries. At this time, they are only located in Germany and the UK. For us, it's not enough. We are waiting for them to increase the points of contact, and after that, we will return to this project.
From my experience, it was quite a nice tool, and I could manage almost all of the actions that I could not manage in a traditional way. Traditionally, I could allow or block usage of an application. But using the Zero Trust Secure Access tool, I could manage the schema of the usage. I will wait for this tool to change in the next few months.
For how long have I used the solution?
I have been using Trend Micro XDR for almost 20 months.
What do I think about the stability of the solution?
It's a stable product. We haven't detected any issues other than the false positives, but that's normal.
What do I think about the scalability of the solution?
We use it in multiple locations because our company is spread across Europe and Asia, as well as the United States and Canada. We have more than 2,000 users, and the solution covers 400 or 500 assets.
If our company were to increase over two to three months to 10,000 users, it would not be a problem. We have the ability to extend as we scale our users. It's very simple and absolutely flexible.
How are customer service and support?
Their technical support is nice. On a scale of one to 10, it's a 10. They respond fast using email, phone, and the customer service portal.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I used competitors' tools, Secureworks, as well as Carbon Black. These are nice tools, but they are very heavy to implement and heavy on daily operations. Trend Micro is much better, much more flexible, and I have much more visibility. It is a cost- and time-saving tool.
How was the initial setup?
Our deployment is a hybrid. We have advanced our implementation a lot. The first implementation was only one of the features called OfficeScan. That was a few years ago, and the implementation was in the United States. After that, we moved forward with the implementation across servers and endpoints, including Mac and Microsoft endpoints.
The whole project took about three months, with the custom discovery and the fine tuning. We had two people involved, one in Europe and one in the US.
Sometimes, maintenance is required if there is a new feature. It needs to be restarted. But this function is done by Trend Micro engineers because we are using the XDR in the cloud. We don't touch it. There is maintenance on our side for Deep Discovery because that part is an on-prem solution. But it's simple to manage.
What other advice do I have?
They are implementing new tools, like Trend Micro Apex One and DDI. They are ready for implementation on the console, and we are waiting to transition to these tools.
For the new features, I prefer doing a proof of concept, like we did for the Zero Trust Secue Access platform. That was a good move because we saved time when it came to resolving issues on the user side. We had a few users in every department, and we tried to discover what would happen if we implemented this tool. That is my approach to being safe with such products. We can do things without any technical training and can disconnect users around the world using one switch. For new features, I'm a big fan of using a proof of concept.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Senior IT Security Analyst at a manufacturing company with 10,001+ employees
Great support, easy to set up, and offers good visibility
Pros and Cons
- "The search features help us try to correlate information and identify any suspicious activity."
- "We do use the automation capability a little. However, we noticed some limitations, especially on the playbook side."
What is our primary use case?
Normally, we use the solution for day-to-day investigations. We get alerts when something is going on in the environment. Right now, we are using that tool for the asset management team to identify services or applications that are not allowed for governance and all of these purposes. In addition to that, we use it for isolating devices. We also have a service with them, an MDR service. They analyze information, and they do investigations for us as well.
How has it helped my organization?
Mainly, we were concerned with the visibility of the environment. We didn't have a tool that was able to allow us to see or have visibility of what the endpoints were doing on the servers in the environment. That was the main reason to adopt this solution - to have visibility on the environment as, in the past, we didn't have that capability.
What is most valuable?
The isolation of devices has been really important. We like all the attack surface-managed NPEs. It's helping us to identify devices and protect us on the network. That's in combination with third-party integrations as well. We have integrations that are helping us to identify devices using our vulnerability management services. It's scanning the network and it's sending all that data to VisionOne. With that information, we identify devices that are protected on the network and the environment.
The reports are a really good feature for showing results to upper management levels.
The search features help us try to correlate information and identify any suspicious activity. That's another feature that has been really important.
We are using it everywhere except for the network, so we don't have the network discovery service from Trend Micro. However, we have it on endpoint servers and email and also the cloud as well. We use cloud conformity to connect that piece.
Trend Micro has a feature called Vision One, that provides us with centralized visibility management across all protection levels. That's helping us to have a centralized view of the console. That's the main reason why we still have that product.
Centralized visibility is important. When we are doing investigations, we can do everything in one console instead of moving to different screens or different windows. The centralized visibility and management across these protection levels helped with our efficiency. It helps us to identify quicker, any potential threat, or any special activity.
They have this feature called Risk Index which I use sometimes to validate the level of rates we have. We don’t use it often - maybe once every one or two weeks. We use it to rank our security operations overall. Mostly, we just check it out of curiosity.
We use the Managed XDR service that they have. It relieves a lot of workload especially during investigations or interim reports about any particular activity - especially with the coverage after hours. It is helping us with the capability there. Also, if something really bad is happening, we have eyes watching all the activity, which is nice.
Using this Managed XDR service enables our team to work on other tasks - especially when we, in certain ways, allocate some of the investigation pieces. We basically create a request for them to investigate things, and that allows us to focus on other things to optimize our security toolset. That's really helpful.
We use the attack surface risk management capability they have. We use that heavily right now. It was a big use case in the past few months. We use it to identify multiple devices without protection, the applications that have been used by our users, and which ones are risky. We are using that on a regular basis. It's helped us identify blind spots and more assets. It's positively affected our security posture by improving a lot of our visibility.
XDR helped us decrease our time to detect or respond to threats. In the past, we didn't have that visibility. When we enabled that tool, at the beginning, it was a little bit noisy. That's something to be expected coming from a new tool. However, after testing through these years, things are improving, and now we can see better results, especially during investigation alerts.
The solution has helped us to reduce the amount of time we spend investigating false positive alerts. In the beginning, there was a large amount of false positives. Right now, we are day to day trying to reduce them. At this point, they are lower compared with the beginning of the implementation. Things are improving. We are reducing false positives as we go which is great.
What needs improvement?
We do use the automation capability a little. However, we noticed some limitations, especially on the playbook side. The API we use. We are integrating that with another product, a SOAR product. The playbooks are a little bit limited in what they can do at this point. Let's say that we want to connect on a specific API. The templates we cannot modify very well. When we noticed that limitation, we decided to go and use Trend Micro VisionOne API and connect it to other tools to develop that activity using another product.
Under attack surface management, when you go to the specific sites or applications that the users are accessing, the capability of downloading that report could be better. Let's say, as an example, we want to identify users using chatGPT, for example. We want to download that data through an API or through the GUI. Right now, it's not available as an option. Maybe having the capability of extracting data from VisionOne for specific areas of the tool could work. That's something that could be useful, especially if we want to generate that report and send it to specific teams. Often, we don't want to provide DX to all the people. Sometimes it's easier to just have that file and share that file with the people who need to have that information.
For how long have I used the solution?
I've been using the solution for around three years now.
What do I think about the stability of the solution?
The stability is good. It's not very common to have any outages. Sometimes there may be a glitch, however, it's rare. Normally we have 95% stability.
What do I think about the scalability of the solution?
The scalability is good, especially when we are talking about third-party integrations. We can have visibility and control of all different assets. So we can have good scalability and visibility and know more about the environment in places where we didn't have any idea things were happening. It's a SaaS tool, and we don't have to do any maintenance, and it's easy to deploy. It's pretty straightforward.
How are customer service and support?
When we have specific issues or problems connecting some products we ask for support. They respond really fast. They always try to mitigate and resolve all the issues we have. If they cannot resolve the problem, they normally share some suggestions on how we can mitigate future problems.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did not use other solutions, although we did use Apex One for a long time. We have also used an EDR product.
How was the initial setup?
I was involved in the deployment. I was the one leading the data during the implementation. The process is pretty straightforward. It was a little tricky to reduce the false positive alerts, however, the portion of deploying to the environment and connecting the pieces was simple.
From our side, we had three or four people involved in the implementation.
What about the implementation team?
We had some help with the deployment and we had some guidance in the beginning. We requested some support from our account manager.
What's my experience with pricing, setup cost, and licensing?
The pricing is good if you look at all the compatibilities and features offered by the product. There are features that can increase the pricing. We can put some credits to some features, however, if we want to enable them. With the amount of credit we have, we are covered for all of our needs.
What other advice do I have?
I'd rate the product eight out of ten.
It is a really good product and easy to deploy. They allow you to have more visibility on your environment, especially if you have any kind of XDR solution. It will increase the visibility of what's happening in the environment. Also, from the perspective of doing maintenance updates or patches, the cloud is the way to go. The product management team does a really good job of increasing the features, and they are listening really closely to what the customer needs via feedback.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
IT Architect at a outsourcing company with 11-50 employees
Great network protection, a centralized view, and user-friendly
Pros and Cons
- "The most valuable feature is the network protection shield on every server, which isolates attacks and prevents our clients from being affected."
- "The deployment process could be more streamlined over the existing infrastructure, as it was not as easy as we thought."
What is our primary use case?
We use Trend Micro XDR to enhance our security framework.
One of our partners was the victim of a major attack, and we realized that our environment was susceptible to the same thing because we were only using an antivirus solution.
Trend Micro XDR is deployed on-premises, and we use it on our core business servers, clients, and the management portal to protect all of our network nodes from attacks.
How has it helped my organization?
Trend Micro Vision One provides centralized visibility and management across protection layers, which is important. It is part of our monitoring tool. The visibility gives us a centralized view of our network nodes, activities, and possible attacks.
The risk index feature plays an important role in our KPIs, which we report to the management team. Our business is dependent on our systems running 24/7.
Trend Micro XDR has helped decrease our time to detect and respond to threats.
Trend Micro XDR has reduced the time we spend investigating false positive alerts by 50 percent.
What is most valuable?
The most valuable feature is the network protection shield on every server, which isolates attacks and prevents our clients from being affected.
What needs improvement?
The deployment process could be more streamlined over the existing infrastructure, as it was not as easy as we thought. We are working with an expert from Trend Micro to improve the rollout process, but it has taken some time and we do not yet have a concrete understanding of the issue. There are some features that we have to install repeatedly before they start running.
For how long have I used the solution?
I have been using Trend Micro XDR for one year.
What do I think about the stability of the solution?
Trend Micro XDR is stable.
What do I think about the scalability of the solution?
Trend Micro XDR is scalable.
How are customer service and support?
The technical support is good.
How would you rate customer service and support?
Positive
How was the initial setup?
The deployment took six to eight weeks to complete. We had around five part-time people involved in the deployment.
What's my experience with pricing, setup cost, and licensing?
Trend Micro XDR is expensive but we got a good deal from Trend Micro. We pay for an annual license.
Which other solutions did I evaluate?
Currently, we are researching the question of whether to use Trend Micro XDR when we switch from our classic NPLS internal corporate lines to an SD-WAN solution. Or if we should use an integrated solution from the SD-WAN and firewall provider, such as Palo Alto or Fortinet.
What other advice do I have?
I would rate Trend Micro XDR eight out of ten.
We have 300 people in our organization that use the solution.
Maintenance is easy and done by two people, who update, patch, and install new servers; client-side, they also update user stations and analyze logs.
I recommend Trend Micro XDR. It is user-friendly.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Cyber Security Analyst at a consultancy with 10,001+ employees
Easy to maintain with advanced protection and helpful support
Pros and Cons
- "We can scale the product as needed."
- "We'd like to see a few more integrations."
What is our primary use case?
We primarily use the solution for the XDR.
We have integrated this with all of our endpoints. Basically, we are using it for incident response. We have a SOC team here, so we are using it in a SOC and the Workload solution. For two or three months, we have been migrating to Workload Security. It is mainly for incident response.
What is most valuable?
We are able to observe attack techniques and targeted attack detection.
We need to explore more on it since it is still a new product for us.
It is quite advanced, and it can help us protect our organization against threats. The targeted threat detection is great.
My understanding is the initial setup is pretty straightforward.
The solution has been stable.
We can scale the product as needed.
Technical support is helpful.
It is easy to maintain.
What needs improvement?
We'd like to see a few more integrations. Specifically, we'd like to see more IOC integration tools.
We haven't implemented the automation piece just yet; however, we will go through that soon. We just need more time to see how it all works.
For how long have I used the solution?
I've been using the solution for six or seven months.
What do I think about the stability of the solution?
This solution seems to be pretty stable so far. I haven't come across any issues. There are no bugs or glitches. It doesn't crash or freeze.
What do I think about the scalability of the solution?
The product is scalable. When we started, we had a few agents and very few endpoints. At this point, we've integrated with most of them. We haven't seen any issues as we've scaled up.
How are customer service and support?
Support has been quite helpful overall. We've dealt with them multiple times, and they have always been helpful. We tend to get the help we need within two or three hours. They ask many questions and get down to solving the problem at hand.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I also work with Microsoft Defender.
We were using OfficeScan and ApexOne as well.
We decided to work with this product as it had a good reputation.
How was the initial setup?
While I wasn't directly involved with the setup, my understanding is it was straightforward. I do not recall hearing about any complexities coming up. The deployment itself took a few months.
In terms of maintenance, we do get hotfixes every once in a while. It's pretty simple to maintain.
What about the implementation team?
Trend Micros assisted our team with the setup process. However, it was mostly handled in-house.
What's my experience with pricing, setup cost, and licensing?
I can't speak to the exact cost.
What other advice do I have?
I'm an end-user. We are using the latest version of the solution.
The support is pretty good. It is really straightforward. It is very easy to understand, and therefore, I highly recommend the solution.
I'd rate the solution nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
IT Security Operations Specialist at a tech services company with 51-200 employees
Improves our security posture because we can patch any vulnerable machines that are prone to risks and attacks
Pros and Cons
- "I love everything about the solution, especially the XDR features, the attack surface management, and the workbench alerts. It oversees vulnerabilities among the system and devices, prioritizing areas that need patching."
- "There are limitations in terms of threat response actions."
What is our primary use case?
I use the solution primarily for EDR. The top challenges in our industry are the accuracy of the detections and the visibility of alerts and events.
We are accessing it via the cloud, and we are monitoring the endpoints and cloud servers.
How has it helped my organization?
Vision One provides centralized visibility and management across protection layers, which is critical for tracking threats, viewing vulnerable assets, and understanding the overall security posture of the organization.
Vision One helps me a lot when it comes to reporting. The reports are very detailed and informative. There are recommendations and analyses of how to mitigate threats. We have comprehensive visibility.
The executive dashboards are very helpful for us in assessing our security posture. We can see what needs to be prioritized and mitigated first.
The risk index feature helps us make security improvements and implement security policies. It helps to have robust security.
Vision One helps to harden security controls and policy implementations.
Vision One improves our organization's security posture by allowing us to apply more robust security controls, implement security policies, and improve the security culture. The centralized visibility enables more efficient security operations.
Vision One makes it convenient to assess and mitigate or block threats across the organization. The XDR is collecting data from more than one client or company and correlating it. The XDR detects the loopholes or vulnerabilities of the system. It uses MITRE ATT&CK techniques to identify and respond to cyber threats or vulnerabilities.
Vision One improves our security posture because we can patch any vulnerable machines that are prone to risks and attacks.
Vision One has decreased our time to detect and respond to threats by 50%.
We use automation capabilities, especially when there is a breach or a risk activity with the user or the endpoint. It helps us by isolating devices automatically. This automation saves us about 20% of the time.
What is most valuable?
I love everything about the solution, especially the XDR features, the attack surface management, and the workbench alerts. It oversees vulnerabilities among the system and devices, prioritizing areas that need patching.
When I started working with it, I knew nothing about this solution. I found it very user-friendly and easy to understand.
What needs improvement?
There are limitations in terms of threat response actions.
For how long have I used the solution?
I have been using Vision One since December 2022. It has been about two years.
What do I think about the stability of the solution?
There are some errors with the solution. I would rate the stability a seven out of ten.
What do I think about the scalability of the solution?
It is scalable. I would rate the scalability of the solution as eight out of ten.
We have clients of various sizes. Our clients are small, medium, and large organizations.
How are customer service and support?
The customer service or technology is responsive, but they take a minimum of one day, and up to three days, which is too long.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I previously used Azure Sentinel. Vision One is an advanced solution compared to Azure Sentinel. I prefer Vision One because of the convenience and easy correlation.
How was the initial setup?
The initial setup is complex due to the various cloud resources that we have. We have workstations, servers, etc. Its implementation can be simplified.
It did not take us very long. We migrated from Apex One to Vision One. It did not take long.
What was our ROI?
It provides returns on investment by saving about 50% of time, money, and resources.
What's my experience with pricing, setup cost, and licensing?
I find it to be a cost-efficient platform.
What other advice do I have?
I would recommend this solution. It helps a lot when it comes to security. It covers endpoint security, email security, web security, and data leak prevention. It has everything.
I would rate Vision One a nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Last updated: Oct 30, 2024
Flag as inappropriateTeam Lead Infosec Incident Management at HighRadius
Good dashboards and easy to navigate but needs more flexibility
Pros and Cons
- "XDR provided a much more deep view into what is actually happening."
- "Results were delayed."
What is our primary use case?
I was team lead with incident responses and incident management. We used the solution for that.
How has it helped my organization?
We were already using Trend Micro endpoint, NGAV by Trend Micro, and we got that upgraded to the XDR version. There was not much of a change after that. The only good thing about upgrading to XDR from NGAV was, having those real-time logs and network activities in front of us.
What is most valuable?
My reviews with Trend Micro are somewhere average. I won't rate it as an excellent tool or utter nonsense. I won't rate the two extremes, however, I would say it's in between them. It was mostly fine.
XDR provided a much more deep view into what is actually happening.
The rest of the features were pretty simple. There's nothing glamorous about them, however, it works. Nothing much really stood out amongst what the others were giving and what Trend Micro was giving. They are all pretty typical.
The dashboard was pretty easy to navigate. It was pretty convenient and user-friendly.
What needs improvement?
Results were delayed. We had all the logs in our hands. We were pretty quick in giving out the results and coming up with a conclusion. Trend Micro was pretty delayed on that front, however.
Their turnaround time or the response to their MDR services was slow. While doing POC, we did MDR as well. They could improve the response time on that. That was my view back then, as it used to take a lot of time to get that case generated, get that case analyzed. In the end, we were more interested in the responses from the actual human analysts. Instead of having a machine-generated thing, we were banking on understanding how an incident is treated and how a response is being given. For us, for example, we were able to do our analysis and come to the same conclusion maybe four or five hours before we received Trend Micro's report. Almost all the results were identical.
There was one feature called Sandbox that I wanted to try on, however, at that time, they had not released it yet.
Since last August, I have been working with another organization, so I am not sure how Trend Micro has developed within the last ten months.
I was never able to test the live response feature, wherein I could take access, remote access of the infected system, and send some commands to kill the processes, or maybe to grab the artifacts, to triage the artifact. By the time it came online, I was moving to another organization.
We'd like a bit of freedom or flexibility on the portal. If I'm the end-user, and I see something bad which might not be bad from Trend Micro's perspective, however, for my organization, was an abnormal activity.
Executing things via PsExec might be something that is normal for some organizations, however, for my organization, it is a highly suspicious thing. If I want to investigate that, having the flexibility for me to investigate it in a deeper sense would be ideal.
That was something that was not possible at that time. I don't know if they have given more freedom to Trend Micro admins.
We'd love more flexibility in terms of implementing some of the configurations, estate-wise. That is something that I would have loved to see in Trend Micro.
For how long have I used the solution?
I used the solution for a month and a half, maybe. Or six weeks.
What do I think about the stability of the solution?
The response time, the analysis, or the human part was something which was requiring improvement. From the tool perspective, there were a lot of things that were to be released at the time I was using it.
We used to see those on the dashboard. For example, the sandbox. They had a sandbox, just like what CrowdStrike does where you can have a license for the sandbox. You can run those EXEs or whatever files, or malicious artifacts through those sandboxes and get a result.
That was something that was under development, though it was being displayed on the dashboard as "coming soon". There were a lot of features that were to be implemented. It was notified to the end-user as "Okay, that these features are coming in, and we are not sure how long it will take."
The trend lines were pretty extensive - like a year or maybe seven months, eight months. Those were the timelines for the actual deployment of those features into the dashboard. Therefore, it's hard to speak to the stability of the product.
What do I think about the scalability of the solution?
The scalability is good. It was just a matter of installing the agent, which was pretty easy to deploy via a group update. Scalability was not an issue. The more licenses we purchased, the more systems we could get coverage upon.
There were endpoints plus servers covered.
We were heavily dependent on them. The reason was, that we had Trend Micro NGAV and we upgraded to Trend Micro XDR.
How are customer service and support?
Their technical support isn't that great.
I used to speak with their CSMs quite frequently. They used to take a lot of feedback from us, asking about how things were, as their detection improvement was something which, also we were part of, not directly, however, we had one more team who used to do VAPT.
We used to post those results and say, "Okay, this is what we did. We did not get any alerts from you. We did not get any communications from you. What if this was an active hands-on keyboard activity and we were under attack?" They used to take that feedback. They used to get it implemented. Detection was then pushed in. They were in that development phase. I am not sure how well they are doing right now.
How would you rate customer service and support?
Negative
Which solution did I use previously and why did I switch?
I've worked with CrowdStrike and Sophos and they provide a much better way to handle things than Trend Micro.
We never had any other tools or other antiviruses, other EDR solutions, that were playing any roles in the infrastructure. We only had ESET, and we were phasing those ESET servers out to Trend Micro. The only tool that we worked on, or XDR that we worked on, was Trend Micro.
How was the initial setup?
The initial setup was pretty straightforward. They had given us one file which we could push through group policy updates. It was implemented throughout the organization. Implementing was pretty easy and it was pretty lightweight.
I was happy about that as it was not a resource-hungry agent which was running in the background, and we could not kill it, we could not limit it. Typically, XDR agents can be a bit resource-hungry, however, this one from Trend Micro was very light.
I'm not sure how long the deployment itself took.
Our IT team was pretty huge. It was around 30 odd people who used to work on it, however, I'm not sure how many of them were dedicated to working on Trend Micro for maintenance.
What about the implementation team?
We had our internal IT team who we used to do the installation.
What was our ROI?
The company I worked for did not lose its money as Trend Micro was a low-cost tool. The features which we were getting were justified by the cost. It was not too costly to have those features.
What's my experience with pricing, setup cost, and licensing?
I'm not sure of the exact price, although it is moderate. I'd rate it 3.5 out of five in terms of affordability.
You could get new features with an added cost per license, or it used to be bulk. Having that modularity helped in choosing and protecting our systems, and keeping the cost down. That modularity helped us in the beginning.
Which other solutions did I evaluate?
We also evaluated CrowdStrike with Trend Micro. CrowdStrike was phenomenal. I have all the good answers for them. If I have to rate them, I will rate each feature four out of five and above since they were that good.
CrowdStrike was too costly for our organization to have, as we had started building the Infosec inside, having Infosec in-house. Previously, it was outsourced. I was the first person who was enrolled for Infosec.
What other advice do I have?
I was an end-user.
I'm not sure which version we were using it.
The solution was on the cloud. We were discussing having it on-prem, however, the cloud made much more sense for such a small organization rather than utilizing the resources on-site.
I'd rate the solution six out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: partners
Buyer's Guide
Download our free Trend Vision One Report and get advice and tips from experienced pros
sharing their opinions.
Updated: October 2024
Product Categories
Endpoint Detection and Response (EDR) Network Detection and Response (NDR) Extended Detection and Response (XDR) Attack Surface Management (ASM)Popular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
Fortinet FortiEDR
Cisco Secure Endpoint
SentinelOne Singularity Complete
Microsoft Defender XDR
Elastic Security
Intercept X Endpoint
Trend Vision One Endpoint Security
VMware Carbon Black Endpoint
Check Point Harmony Endpoint
Trellix Endpoint Security (ENS)
Rapid7 InsightIDR
Buyer's Guide
Download our free Trend Vision One Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the biggest difference between EPP and EDR products?
- What is the difference between EDR and traditional antivirus?
- What is your recommendation for a 5-star EDR with low resource consumption for a financial services company?
- Which is the best EDR for a logistics company with 500-1000 employees?
- What is the best EDR or XDR product for a company with 9000 employees?
- What to choose: an endpoint antivirus, an EDR solution or both?
- Do we need to use both EDR and Antivirus (AV) solutions for better protection of IT assets?
- How does EternalBlue work?
- What are the best on-premise Endpoint Security solutions for a Tech Services company with 10,000 employees?
- What is Mimikatz?