Virtual patching is a wonderful feature where we do a recommendation scan and an internal assessment on the server, and it updates the IPS signatures to block any attack. I have seen instances where it has prevented attacks on the end-of-support servers such as 2018 R2, and many years ago, even 2007 servers that were end-of-support. It certainly helped there.
The VPN is the most prized characteristic of Trend Micro Deep Security, which in addition addresses all zero-day vulnerabilities. This allows us to confidently transfer our system physically, as it presents to the external world, whether it be an intruder or a hacker, that our system is completely secure without any weak spots. Even if the latest security patches have not been installed or updated, the software virtually covers them for you.
Consultant at a computer software company with 51-200 employees
MSP
2022-03-02T11:30:34Z
Mar 2, 2022
In addition to providing our clients a view of what's happening in their data centers, it also does virtual patching in the data center. It enhances the security in the data center big time.
DGM-IT at a construction company with 10,001+ employees
Real User
2021-12-15T10:55:00Z
Dec 15, 2021
One of the most valuable features is that it's a firewall-based solution. We just open the required reports to the server—to server communication—and that's how we use Deep Security.
Patch management is most valuable. The major selling point of Deep Security is that it is based on the cloud. Deep Security is for the servers and databases of data centers, and generally, for patch management, you have to shut down the machines, and then you have to restart them. So, they need shutdown time, which is a cost. Big enterprises don't want to shut down their database or their data center for any kind of patch. Deep Security creates a wall and downloads all patches. You install it on the cloud. So, it saves your server from any kind of intrusion or any kind of penetration, and whenever you get a chance or time, in six, eight, or nine months, you can physically download or install all those patches in one go. So, it saves you time. It also saves your shutdown time and keeps your data center safe.
Sr.Customer Engineer- Projects at a tech services company with 201-500 employees
Real User
2021-05-24T21:04:00Z
May 24, 2021
The traceback feature in XDR is amazing. You can trace back an attack. You can playback where an attack actually occurred and see how the attacker moved. We can easily show this to management, and it makes it easy to make them understand and convince them, which is the best thing.
In terms of valuable features, I would say its intrusion prevention. Each and every IP connecting to the server gets scanned so we know everyone who is accessing our server and we can block whichever IP's do not belong to us at the firewall.
Deep Security enables us to bridge the gap between patching windows using the Virtual Patching feature. This allows us to make sure full patching is tested properly in our testing environments before rollout.
For day-to-day efficiency, it provides a good dashboard, so our team can be active 24/7 instead of doing a lot of manual stuff. We just look at the dashboard, and it's all done.
It is connected into an intelligence database and is quick to pick up new threats. It also reduces my workload with its speed and the protection that it provides.
Senior Cyber Security Consultant at Infosec Ventures
Reseller
2017-12-12T07:45:00Z
Dec 12, 2017
There are compliance issues for legacy applications and after applying OS security patches. The product's HIPS (Host Intrusion Prevention System) modules do the job for you automatically, without any downtime.
Trend Micro Deep Security is a comprehensive solution for endpoint security and server protection, which prevents ransomware attacks and unauthorized access attempts. Its valuable features include tracing back attacks, antivirus protection, endpoint detection and response, firewall-based solution, threat detection, predictive machine learning and AI monitoring, VPM, virtualization, and sandboxing.
The solution is easy to use, scalable, stable, and reliable, with good technical support....
There's useful monitoring on offer.
I like the anti-malware features.
The integration options of Trend Micro Deep Security have been particularly valuable.
It helps with virtual patching and IDS fetching.
They release timely updates and have efficient prediction features for threat detection.
Installation is not an issue. They offer good support for installation.
It is a scalable solution. If required, we can scale it more. That's not an issue...The solution's initial setup process was straightforward.
The tool provides information on server activities and hosts.
Virtual patching is a wonderful feature where we do a recommendation scan and an internal assessment on the server, and it updates the IPS signatures to block any attack. I have seen instances where it has prevented attacks on the end-of-support servers such as 2018 R2, and many years ago, even 2007 servers that were end-of-support. It certainly helped there.
The VPN is the most prized characteristic of Trend Micro Deep Security, which in addition addresses all zero-day vulnerabilities. This allows us to confidently transfer our system physically, as it presents to the external world, whether it be an intruder or a hacker, that our system is completely secure without any weak spots. Even if the latest security patches have not been installed or updated, the software virtually covers them for you.
The initial setup was straightforward.
You can scale the solution to different versions.
It's scalable.
Signatures are frequently updated.
It is stable and we have not faced any challenges during the rolled out
Support and threat prevention are the most valuable features of this solution.
It provides security and protection. The endpoint firewall is valuable.
In addition to providing our clients a view of what's happening in their data centers, it also does virtual patching in the data center. It enhances the security in the data center big time.
Aside from the basic antivirus features, there are additional features such as vulnerability protection, firewall, etc. which are helpful.
One of the most valuable features is that it's a firewall-based solution. We just open the required reports to the server—to server communication—and that's how we use Deep Security.
Deep Security's most valuable features are antivirus and host intrusion detection.
Deep Security is a good product for managing a few servers.
Patch management is most valuable. The major selling point of Deep Security is that it is based on the cloud. Deep Security is for the servers and databases of data centers, and generally, for patch management, you have to shut down the machines, and then you have to restart them. So, they need shutdown time, which is a cost. Big enterprises don't want to shut down their database or their data center for any kind of patch. Deep Security creates a wall and downloads all patches. You install it on the cloud. So, it saves your server from any kind of intrusion or any kind of penetration, and whenever you get a chance or time, in six, eight, or nine months, you can physically download or install all those patches in one go. So, it saves you time. It also saves your shutdown time and keeps your data center safe.
We like the Smart protection and the Virtual patching.
It serves its purpose and works well.
The solution is quite secure.
The traceback feature in XDR is amazing. You can trace back an attack. You can playback where an attack actually occurred and see how the attacker moved. We can easily show this to management, and it makes it easy to make them understand and convince them, which is the best thing.
Some of the main features of this solution are it is reliable and can be used in small to large size businesses.
It's easy to use and the interface is simple.
The most valuable feature of this solution is the virtual path function, which is the reason we chose to implement it.
The customer service/technical support for this solution is very fast.
It integrates well with the cloud; for example, AWS, and Google Cloud Provider.
Automated virtual patching is a good feature.
This product offers good protection against many types of malware.
The initial setup was straightforward and we didn't have any problem with it.
In terms of valuable features, I would say its intrusion prevention. Each and every IP connecting to the server gets scanned so we know everyone who is accessing our server and we can block whichever IP's do not belong to us at the firewall.
The vulnerability scanning reduces false positives by quite a bit.
The most valuable feature is the virtual patching.
The most valuable features are web security, email filtering, and content filtering.
Deep Security enables us to bridge the gap between patching windows using the Virtual Patching feature. This allows us to make sure full patching is tested properly in our testing environments before rollout.
It has improved functions by bringing us complete security on our clients' virtual environment.
There is a degree of set it and forget it in regards to the actual endpoints and what you can do with the console, which is nice.
For day-to-day efficiency, it provides a good dashboard, so our team can be active 24/7 instead of doing a lot of manual stuff. We just look at the dashboard, and it's all done.
Their support is good. They are responsive, which is nice.
It provides the type of data and availability that we need to have. We don't have to worry about intrusions.
The integration and configuration of this product in our AWS environment was good. We haven't had any problems at all.
The file integrity and log inspection are game-changing features for us.
Trend Micro gave our security teams a certain degree of comfort by just having it in the background, as they have familiarity with the product.
It is connected into an intelligence database and is quick to pick up new threats. It also reduces my workload with its speed and the protection that it provides.
There are compliance issues for legacy applications and after applying OS security patches. The product's HIPS (Host Intrusion Prevention System) modules do the job for you automatically, without any downtime.