We usually create new entries and copy traffic to the Discovery appliance for analysis in order to detect low-level attacks, viruses, and hacking attempts. We assess competitive products by deploying the solution to analyze the effectiveness and capabilities.
Head of Technical - Systems and Security at a tech consulting company with 51-200 employees
Real User
Top 5
2024-07-01T14:42:57Z
Jul 1, 2024
It's a good fit for organizations that follow strict data regulations and need to keep sensitive data on-premises. In Sri Lanka, for example, financial data cannot be used in the cloud. So, Deep Discovery is a good solution because it's an on-premises device. We can do the sandboxing on-site. This is a strong selling point. We are distributors. A couple of our customers use this product. There are three customer references in Sri Lanka that use Deep Discovery.
Senior manager IT infrastructure at Machine Learning 1 Limited ·
Real User
Top 5
2024-04-25T07:56:14Z
Apr 25, 2024
Our primary use case for Deep Discovery revolves around its ability to manage Windows updates and maintain security without necessitating frequent reboots of our servers. One of the standout features we leverage is virtual patching, which significantly minimizes downtime by eliminating the need for immediate updates and reboots.
I use the solution in my company, but there is nothing to work on the tool. In our company, we just installed Trend Micro Deep Discovery on our servers, and that is it, after which we forgot about it.
We use the solution for its security features. Trend Micro has an MSP portal where you can create customer accounts, assign some licenses, and make your customers use those licenses from a portal. Trend Micro is ahead of its competitors in providing MSP services to customers.
Product manager at a comms service provider with 10,001+ employees
Real User
Top 20
2024-01-11T13:21:17Z
Jan 11, 2024
The most applicable use case I find particularly easier to maneuver around is role-based access. The admin consoles in Trend Micro Deep Discovery have a specific layer for providing role-based access, which is also available in other solutions. However, the product's usability is more accurate and efficient when adhering to industry standards.
DGM-IT at a construction company with 10,001+ employees
Real User
2021-12-15T11:02:00Z
Dec 15, 2021
Our primary use case of Deep Discovery is as a sandbox. It sorts the DDAN, our on-premise Deep Discovery Analyzer solution, so if Deep Security or Trend Micro isn't able to find out whether a particular file or memory is a threat or not, they will send that file signature or file to the DDAN. The DDAN will then deploy that file inside their virtual sandbox, analyze the implications, and return the result to the concerned agent. We mainly use it for zero-day vulnerability protection. Deep Discovery is deployed on-premise.
Security Consultant and Cybersecurity Support at a tech services company with 51-200 employees
Real User
2020-02-13T07:51:00Z
Feb 13, 2020
Normally we use the solution to send the traffic. We get traffic on it and once I get the traffic, I get the SPN diagnosis and all the network services diagnostics and whatever else that I run in the office file server. It scans through that. For example, when we download some files, in our portal we are uploading some of the activity documents, as well as Excel and Word documents, etc. They get scanned through and we have DDI Rules that are enabled for the file management. Basically, any uploading, downloading, etc. of items from our website server get scanned and analyzed.
Network Support Specialist at a financial services firm with 5,001-10,000 employees
Real User
2019-09-23T06:33:00Z
Sep 23, 2019
We use the onsite version, not cloud. Our primary use case is for intrusion detection, including threats, malware, and basically anything that might be a threat. Traffic that is intercepted from emails going outbound or inbound is also analyzed.
Trend Micro Deep Discovery is used for network security, intrusion detection, and threat protection, including malware and phishing prevention, with a focus on on-premises deployment to maintain regulatory compliance.
This powerful tool provides comprehensive scanning and analysis of traffic, emails, and files, and offers sandboxing, zero-day vulnerability protection, and endpoint protection. Companies utilize its capabilities for server protection, virtual environment scanning,...
We usually create new entries and copy traffic to the Discovery appliance for analysis in order to detect low-level attacks, viruses, and hacking attempts. We assess competitive products by deploying the solution to analyze the effectiveness and capabilities.
It's a good fit for organizations that follow strict data regulations and need to keep sensitive data on-premises. In Sri Lanka, for example, financial data cannot be used in the cloud. So, Deep Discovery is a good solution because it's an on-premises device. We can do the sandboxing on-site. This is a strong selling point. We are distributors. A couple of our customers use this product. There are three customer references in Sri Lanka that use Deep Discovery.
Our primary use case for Deep Discovery revolves around its ability to manage Windows updates and maintain security without necessitating frequent reboots of our servers. One of the standout features we leverage is virtual patching, which significantly minimizes downtime by eliminating the need for immediate updates and reboots.
I use the solution in my company, but there is nothing to work on the tool. In our company, we just installed Trend Micro Deep Discovery on our servers, and that is it, after which we forgot about it.
We use the solution for its security features. Trend Micro has an MSP portal where you can create customer accounts, assign some licenses, and make your customers use those licenses from a portal. Trend Micro is ahead of its competitors in providing MSP services to customers.
The most applicable use case I find particularly easier to maneuver around is role-based access. The admin consoles in Trend Micro Deep Discovery have a specific layer for providing role-based access, which is also available in other solutions. However, the product's usability is more accurate and efficient when adhering to industry standards.
The solution is used for server protection.
We use Trend Micro Deep Discovery to identify ransomware attacks.
The solution can scan the virtual environment and give reports.
It's been useful in checking network traffic.
Deep Discovery is good for network protection. There is also an Email Inspector.
Our primary use case of Deep Discovery is as a sandbox. It sorts the DDAN, our on-premise Deep Discovery Analyzer solution, so if Deep Security or Trend Micro isn't able to find out whether a particular file or memory is a threat or not, they will send that file signature or file to the DDAN. The DDAN will then deploy that file inside their virtual sandbox, analyze the implications, and return the result to the concerned agent. We mainly use it for zero-day vulnerability protection. Deep Discovery is deployed on-premise.
We primarily use the solution as a firewall and for endpoint protection. It's used for security purposes for the most part. We use it for protection.
We are using this solution for network security.
We are integrators. We work on integrated systems. Our clients use this solution to know what is happening in the network and to analyze it.
The primary use case of this solution is to protect the equity, command, and control and botnet infections.
Normally we use the solution to send the traffic. We get traffic on it and once I get the traffic, I get the SPN diagnosis and all the network services diagnostics and whatever else that I run in the office file server. It scans through that. For example, when we download some files, in our portal we are uploading some of the activity documents, as well as Excel and Word documents, etc. They get scanned through and we have DDI Rules that are enabled for the file management. Basically, any uploading, downloading, etc. of items from our website server get scanned and analyzed.
We use the onsite version, not cloud. Our primary use case is for intrusion detection, including threats, malware, and basically anything that might be a threat. Traffic that is intercepted from emails going outbound or inbound is also analyzed.
I work for a distribution partner company. We use the on-prem, physical model of this solution.