Security Consultant and Cybersecurity Support at a tech services company with 51-200 employees
Real User
2020-02-13T07:51:00Z
Feb 13, 2020
Normally we use the solution to send the traffic. We get traffic on it and once I get the traffic, I get the SPN diagnosis and all the network services diagnostics and whatever else that I run in the office file server. It scans through that. For example, when we download some files, in our portal we are uploading some of the activity documents, as well as Excel and Word documents, etc. They get scanned through and we have DDI Rules that are enabled for the file management. Basically, any uploading, downloading, etc. of items from our website server get scanned and analyzed.
Network Support Specialist at a financial services firm with 5,001-10,000 employees
Real User
2019-09-23T06:33:00Z
Sep 23, 2019
We use the onsite version, not cloud. Our primary use case is for intrusion detection, including threats, malware, and basically anything that might be a threat. Traffic that is intercepted from emails going outbound or inbound is also analyzed.
Learn what your peers think about Trend Micro Deep Discovery. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
Trend Micro Deep Discovery is used for network security, intrusion detection, and threat protection, including malware and phishing prevention, with a focus on on-premises deployment to maintain regulatory compliance.
This powerful tool provides comprehensive scanning and analysis of traffic, emails, and files, and offers sandboxing, zero-day vulnerability protection, and endpoint protection. Companies utilize its capabilities for server protection, virtual environment scanning,...
Normally we use the solution to send the traffic. We get traffic on it and once I get the traffic, I get the SPN diagnosis and all the network services diagnostics and whatever else that I run in the office file server. It scans through that. For example, when we download some files, in our portal we are uploading some of the activity documents, as well as Excel and Word documents, etc. They get scanned through and we have DDI Rules that are enabled for the file management. Basically, any uploading, downloading, etc. of items from our website server get scanned and analyzed.
We use the onsite version, not cloud. Our primary use case is for intrusion detection, including threats, malware, and basically anything that might be a threat. Traffic that is intercepted from emails going outbound or inbound is also analyzed.
I work for a distribution partner company. We use the on-prem, physical model of this solution.