
Overview
Video 1
Video 1
Video 2
Security built to fit DevOps with robust API's and automated protection. Lock down servers with Application Control, protect Docker containers, and increase malware protection with behavioral analysis, and predictive machine learning. Get proactive protection for EC2 workloads with Trend Micro Deep Security. Secure hybrid environments with the Deep Security AMI and pay hourly per workload protected. Buy and deploy a Deep Security AMI and protect your physical, virtual or cloud resources with an agent or our industry leading virtual appliance, and pay for it all on your AWS bill.
Defend against threats, malware and vulnerabilities with a single product. With protection, starting at just $0.01 / hour, you can: Defend your network against attack with host-based intrusion detection and prevention; Stop patching live systems by shielding from vulnerability exploits; Protect Windows and Linux workloads from malware; Streamline the last mile of compliance with File and System Integrity Monitoring; and, get alerts about potential security events in system logs.
BYOL and SaaS versions of Deep Security are also available.
Security tips & tricks and technical resources available at www.trendmicro.com/aws or email us at aws.marketplace@trendmicro.com with any questions.
Highlights
- Secure Docker containers with DevOps friendly API security processes including automation security and lock down servers with application control built for the cloud.
- Accelerate compliance and streamline audit evidence gathering with a single security tool that delivers IPS, Application Control, Anti-malware, Predictive Machine Learning, Integrity Monitoring, Log Inspection, and Content Filtering.
- Prevent network threats and proactively protect against zero-day exploits with Intrusion Detection and Prevention (IDS/IPS).
Details
Unlock automation with AI agent solutions

Features and programs
Financing for AWS Marketplace purchases
Pricing
Dimension | Cost/host/hour |
---|---|
Any Micro, Small or Medium EC2 instance types | $0.01 |
Any Large EC2 instance types | $0.03 |
Any Xlarge or larger EC2 instance types | $0.06 |
Other Cloud - 1 Core | $0.01 |
Other Cloud - 2 Cores | $0.03 |
Other Cloud - 4+ Cores | $0.06 |
Data Center | $0.06 |
Amazon Workspace | $0.01 |
Vendor refund policy
We do not currently support refunds, but you can cancel at any time.
Custom pricing options
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
Additional details
Usage instructions
To get started with Deep Security, navigate to https://<instance IP or hostname>:8080 to access the installer. See the Getting Started with Deep Security for AWS Marketplace guide for more details: https://help.deepsecurity.trendmicro.com/hc/en-us/articleÂ
Support
Vendor support
Need help? Contact our AWS security experts at aws.marketplace@trendmicro.comÂ
Your purchase also includes 24x7 support from Trend Micro. You can log a support ticket right from the Deep Security console. aws.marketplace@trendmicro.comÂ
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

Standard contract
Customer reviews
Satisfaction with security features boosts customer confidence while encouraging cost consideration
What is our primary use case?
We have many use cases. We deployed it, and we replaced Semantic with Trend Micro Deep Security for one of our customers in the Telecom sector. Some of our customers are actually looking for Microsoft solutions because most of the endpoints and the infrastructure are Microsoft-based, so they want the platform to be the same.
We are satisfied because we have experience deploying it in a big Telecom sector that has 7,000 NPCs, and they are running different services, Microsoft, Linux-based, and some other operating systems with many applications. They remain satisfied.
At different time spans, we often required technical support. Their portal is available, or we engage with this for any technical issue or if there is any breach, so they often get help from them, and their technical team works with our teams to find out different issues.
What is most valuable?
Trend Micro Deep Security has very good features such as virtual patching and almost all other features are the same as all the Endpoint detection and response systems are capable of doing the security features such as deep scanning, secret scanning, and the advantage of Microsoft is that it protects the cloud services as it protects the on-prem.
For threat detection, they use heuristic behavior detection, and sometimes, if they think there is a sort of attack which is new, they alert you, and they detect and show where the attack is coming from. They even suggest patching or any solution to stop that attack.
Trend Micro Deep Security is not a very cheap solution, but customers are satisfied. It's working, so every year, once they purchase it, and after a year, they renew it, or whenever the subscription expires, they renew it, unless there is any security breach.
What needs improvement?
Trend Micro Deep Security should provide a bundle solution for the customer similar to what Microsoft provides. For example, Microsoft provides ATP solution in their Defender, that not only filters the emails but also detects spam and malware in attachments, and it provides security for SharePoint solution, Teams, and other products available on the cloud.
Most of the features are adequate. Customers are satisfied. If there are some new types of attacks which are still not identified, these vendors will improve their solutions according to the attacks.
One important improvement would be to reduce their cost. The countries which are progressing, and which have budget issues, such as third world countries or poor countries, have very limited budgets. They have to pay in dollars, and the dollar is very expensive in most countries.
For how long have I used the solution?
We have been working with Microsoft's Trend Micro Deep Security solutions for the last 3 years.
What was my experience with deployment of the solution?
Implementation is not complex. It has been so far good. One important aspect that should be addressed is they should try to reduce their cost.
What do I think about the stability of the solution?
We have different experiences. Sometimes one Endpoint Security solution could not detect or mitigate any attack type, while the other one works adequately and sometimes, Microsoft solution doesn't work adequately for any sort of attacks. We have different sorts of experiences and responses from the customer side.
There are some minor issues, which are mostly NPC or user end issues such as when they use unwanted software or click on illegitimate or malicious links. There are issues regarding the end user, but as far as the software is concerned, we believe that software works fine until it is patched, managed, or monitored by the IT teams.
What do I think about the scalability of the solution?
It's an enterprise company. They have many endpoints. There are more than 3,000 endpoints, but in most organizations, they are using a mix of these security solutions. They use it for comparison base, and they sometimes have budget issues, so they use it in different departments.
How are customer service and support?
Support in Trend Micro Deep Security is very good. They have very professional engineers, and they often respond effectively. We are satisfied.
How would you rate customer service and support?
Positive
How was the initial setup?
It's not difficult to maintain because we have experience that when the customer is trained adequately, and if they are really concerned about security, they maintain it properly. They have the IT teams, security teams to look after the server endpoints and monitor them, patch them and if there is any vulnerability or any detection found on the endpoints, they try to mitigate that.
What about the implementation team?
Mostly in our country, customers are quickly migrating to the cloud. We get different sorts of requirements from the customers in different sectors, such as customers in the Banking sector have different requirements, customers in the Government sector have different requirements.
What was our ROI?
We give the comparison and demo to the customer. If the customer is interested in technical capabilities, we demonstrate the tools, setup, implementation, and their working. At the end, the customer is more interested in the cost.
What's my experience with pricing, setup cost, and licensing?
We give the comparison and demo to the customer. If the customer is interested in technical capabilities, we demonstrate the tools, setup, implementation, and their working. At the end, the customer is more interested in the cost. This is the strategy. We give a fair comparison of all the products, and give them clear insights of the products, which makes it helpful for the customer to make a final decision to purchase the license or product.
Which other solutions did I evaluate?
If it meets the customer budget, we will recommend Trend Micro Deep Security.
We recommend them because the virtual patching is a very good feature. Customers are very satisfied, especially when there is Microsoft infrastructure. We pitch them the solution stating that if there is any security breach in the market, then this solution is capable, based on the information, it virtually patches your servers even if Microsoft has not released the real patch for that issue.
What other advice do I have?
Implementation is not complex. It has been good so far.
We give the comparison and demo to the customer. If the customer is interested in technical capabilities, we demonstrate the tools, setup, implementation, and their working. At the end, the customer is more interested in the cost. This is the strategy.
It's not difficult to maintain because we have experience that when customers are trained adequately, and if they are really concerned about security, they maintain it properly. They have the IT teams, security teams to look after the server endpoints and monitor them, patch them, and if there is any vulnerability or any detection found on the endpoints, they try to mitigate that.
On a scale from one to ten, I would rate Trend Micro Deep Security as an eight.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Have gained centralized control and timely threat alerts with seamless deployment for efficient server management
What is our primary use case?
What is most valuable?
What needs improvement?
For how long have I used the solution?
What was my experience with deployment of the solution?
What do I think about the stability of the solution?
What do I think about the scalability of the solution?
How are customer service and support?
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
How was the initial setup?
What about the implementation team?
What was our ROI?
What's my experience with pricing, setup cost, and licensing?
Which other solutions did I evaluate?
What other advice do I have?
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Provides a sense of safety and security for government clients
What is our primary use case?
What is most valuable?
What needs improvement?
For how long have I used the solution?
What was my experience with deployment of the solution?
What do I think about the stability of the solution?
What do I think about the scalability of the solution?
How are customer service and support?
How would you rate customer service and support?
Positive
How was the initial setup?
What's my experience with pricing, setup cost, and licensing?
Which other solutions did I evaluate?
What other advice do I have?
Improves security with comprehensive visibility and intrusion tracing
What is our primary use case?
We are using it for NetSpark, and I work for two organizations where I'm using this tool. In both, we are scaling our networks and endpoints, analyzing our traffic, and analyzing the endpoints and security.
How has it helped my organization?
In one organization where I started, we were using a SIEM solution and facing challenges like a lack of complete information. Deep Security has helped us to know where intrusion started, penetrated, and went within our network, thereby improving security.
What is most valuable?
I appreciate the complete visibility of information, including endpoints and detailed tracing from origin to navigation. It helps us detect and protect against network penetrations at the specific point of intrusion.
What needs improvement?
New patterns need improvement, as some new data access points are challenging to investigate and allow entry without detection. Improving this area and providing complete visibility would be beneficial.
For how long have I used the solution?
I have been using this product for nearly eleven months.
What do I think about the stability of the solution?
I would rate the stability as eight out of ten.
How are customer service and support?
I rate technical support a nine.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I previously used QRadar . Compared to QRadar , Trend Micro improves quickly based on feedback and provides more comprehensive solutions.
How was the initial setup?
In one premises, we deployed it on the cloud, which was challenging at the start, while on another it was set on TensorFlow , which was comparatively easy.
What about the implementation team?
Their team was very helpful during the deployment process. Trend Micro's team was particularly cooperative.
What was our ROI?
It has saved us time, money, and resources. We saved nearly forty percent of our time previously spent on manual investigations.
What's my experience with pricing, setup cost, and licensing?
The pricing is very fair, although there are other cheaper options. Due to our limitations, Trend Micro was our best option.
What other advice do I have?
I would rate it an eight out of ten.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Offers sandboxing unit and virtual patch management, stop all the vulnerabilities and exploits
What is our primary use case?
For the servers, they have Deep Security. Plus, they have introduced a new feature, which is threat assessment for networking. And that is the one product that we are actually promoting right now more than anything else in their portfolio.
Normally, customers use it to secure their servers. Especially when it comes to updates for our enterprise clients and any client who has more than 10 or 20 servers, it's very hard for them to have downtime to install all the patches, check them, test them, and then run them.Â
Trend Micro Deep Security is a very good solution for them because it stops all the vulnerabilities and exploits in the server. It downloads all the upcoming updates and gives you a time of your choice when you want to have downtime, maybe over the weekend. Then you can download all the updates, which have been tested on the Trend Micro site, and freely install them on your servers. Then you can bring the servers back up for working.Â
So in that sense, they save a lot of time in downloading and installing updates, while at the same time protecting the servers from all the vulnerabilities and exploits.
How has it helped my organization?
Trend Micro use IPS for remote vulnerabilities. If someone is using a remote desktop to exploit the network, that's where users use the IPS. And IPS in our region or in our country, where we have deployed it, it's only in enterprise companies, not as SMBs or the private sector. Mostly, it has been deployed in the banking sector. Â
What is most valuable?
It's a good product. It's taken the majority of the market share in Pakistan from any other product; the major feature of Deep Security is its virtual patching management, which they download on the cloud. They stop all the vulnerabilities and exploits as long as you don't download all the updates and install them physically on the servers.Â
So, in that sense, it is a very good product. And we've been selling it for a long time; it's been four to five years. And we have a lot of customers for it.
Trend Micro Deep Security has a sandboxing unit, which is one of the major features that actually gives you a chance to detect any kind of threat in your network or on your servers.Â
Also, if users truly want to secure their network and the servers, they may want to use XDR as well, which has all these features we just discussed.
What needs improvement?
Personally, I would like them to separate their products into different categories, rather than putting everything in one box.
What do I think about the scalability of the solution?
It's scalable in the sense that if they bring out any new version or new edition or anything beyond the IPS. So, it's scalable. Â
Which solution did I use previously and why did I switch?
I used to work with Kaspersky for a long time. Recently, I switched and I'm trying to work with Trend Micro. I'm also trying to include Carbon Black as an endpoint security solution in our portfolio. Carbon Black is in the initial phase, but I'm familiar with Trend Micro. I worked with them before, but not as our primary endpoint security solution. That used to be Kaspersky, now it's Trend Micro.
Now, I work with the entire product range of Trend Micro, but mostly, we're focusing on Vision One. So, from a sales point of view, I know a few things and I'm still learning.
What was our ROI?
Financial in the sense that it protects your servers. Simple as that. When you get attacked or compromised, the whole network is down. You lose time and money.Â
And it takes a long time to recover, especially if it's a ransomware attack. So in that sense, Deep Security is a quite good product.
What's my experience with pricing, setup cost, and licensing?
Trend Micro Deep Security is on the expensive side. If I compare it with other endpoint security products, for example, even Kaspersky or Bitdefender or any of the known endpoint security solutions, Trend Micro is a little bit on the expensive side compared to them.
What other advice do I have?
I would rate it a nine. I think it's a very good product. IÂ would recommend Trend Micro Deep Security to others