Learn what your peers think about Trend Micro Deep Discovery. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
Senior Technical Specialist at Softcell Technologies Limited
Real User
Top 5
2023-03-24T08:09:19Z
Mar 24, 2023
The solution has extension-based features that help it to analyze the environment. The environment can have different platforms like Windows, Linux, and Mac. The tool will give a report which can confirm the analysis of the issues. You can also get clear information on threats or suspicious files.
The most valuable features are monitoring for advanced persistent threats, the system runs in a sandbox allowing for effective zero-day exploits management, and the Inspector has a built-in sandbox.
Network Support Specialist at a financial services firm with 5,001-10,000 employees
Real User
2019-09-23T06:33:00Z
Sep 23, 2019
Generally speaking, it just gives us a broad understanding of exactly what kind of threats occur. The submission point, analyzing point, and virtualization are within the environment that it supports. It helped us to improve our security levels and protect our internal network from any threats outside.
The most valuable feature is that the user can customize images of virtual machines in the sandbox functionality. The other vendors only use images that were created by the vendor but not the customer, end-user or partner. This helps to detect advanced threats and attacks.
Trend Micro Deep Discovery is used for network security, intrusion detection, and threat protection, including malware and phishing prevention, with a focus on on-premises deployment to maintain regulatory compliance.
This powerful tool provides comprehensive scanning and analysis of traffic, emails, and files, and offers sandboxing, zero-day vulnerability protection, and endpoint protection. Companies utilize its capabilities for server protection, virtual environment scanning,...
The tool's most valuable feature is its collaboration with other products. Integrating with other security products was simple and easy.
As a security product, managing threats is crucial for my clients.
The product's initial setup phase was not difficult.
Trend Micro Deep Discovery is a very specific product for threat intelligence with smart protection.
The tool's stability and performance are good.
There is no downtime or server vulnerability with this solution.
The most valuable feature of Trend Micro Deep Discovery is its complete end-to-end visibility of threats.
The solution has extension-based features that help it to analyze the environment. The environment can have different platforms like Windows, Linux, and Mac. The tool will give a report which can confirm the analysis of the issues. You can also get clear information on threats or suspicious files.
DDI's performance is great. It is very very useful in detecting network threats.
The performance and stability are great.
It is a very good solution. It is very light, and it is quite quick to figure out the problem in your network.
One of the most valuable features is the performance, since, so far, we have not faced any issues with Deep Discovery.
The product is very easy to install.
The most valuable features are monitoring for advanced persistent threats, the system runs in a sandbox allowing for effective zero-day exploits management, and the Inspector has a built-in sandbox.
I like the sales operations testing. and support.
The most valuable features are the protection and that it is fast.
The HTML file sandboxing is very good.
Generally speaking, it just gives us a broad understanding of exactly what kind of threats occur. The submission point, analyzing point, and virtualization are within the environment that it supports. It helped us to improve our security levels and protect our internal network from any threats outside.
The most valuable feature is that the user can customize images of virtual machines in the sandbox functionality. The other vendors only use images that were created by the vendor but not the customer, end-user or partner. This helps to detect advanced threats and attacks.