We use the solution to protect the customer's infrastructure. It can ensure that the infrastructure is well protected and that the customer has a good institution.
Trend Micro Deep Security
Trend MicroExternal reviews
External reviews are not included in the AWS star rating for the product.
Protects the customer's infrastructure
What is our primary use case?
What is most valuable?
The solution provides ease of use, especially from non-technical testing. It's one of the best things. The deployment process is one of the easiest things because we didn't train our on-site consultant. The constant training from Trend Micro's side is that they develop internal causes to understand the upgrade because once they upgrade the platform, they also upgrade the technical person's skills.
What needs improvement?
Trend Micro can interact with their consultant to ensure that we receive constant training to understand their platform and how to improve it.
For how long have I used the solution?
Our clients have used Trend Micro Deep Security for 36 months.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
15 users are using this solution.
How was the initial setup?
The initial setup is simple.
What's my experience with pricing, setup cost, and licensing?
You need to pay for a license per user for the product. There is no extra cost. It's pretty variable. It does match the value. It's quite valuable. The ultimate purpose is to ensure that no incident can destroy the company's reputation.
What other advice do I have?
The automation capabilities were perfect. Yeah, they interact with the software. If you install something, there will also be some reports. They will come back with feedback.
One of AI's benefits is improving automation and understanding between different parties. AI is frequently in the news, but everyone does not fully realize its potential. If there is a gap between the workforce and AI, it will remain a buzzword rather than something we fully utilize. We must understand AI, its benefits, and how to use it. Institutions should develop training platforms to bridge this gap and ensure a better understanding of AI's capabilities.
If you use deep security products, you'll be doing yourself a favor. They're not that expensive; they're pretty responsive, and they are perfect for your requirements.
Overall, I rate the solution a nine out of ten.
Which deployment model are you using for this solution?
Provides good vulnerability assessment and real-time scanning features
What is our primary use case?
We are using the solution for IPS and XDR.
What is most valuable?
Trend Micro Deep Security has fantastic and very advanced features. The most valuable and advanced feature of the solution is the ability to check vulnerabilities. The solution's real-time scanning allows me to monitor my entire network.
What needs improvement?
The solution's reports should include more details of events like device control, live health status of the server, and inventory management.
For how long have I used the solution?
I have been using Trend Micro Deep Security for two years.
What do I think about the stability of the solution?
Trend Micro Deep Security is a very stable solution. Our network and servers haven't experienced any downtime.
I rate the solution’s stability ten out of ten.
What do I think about the scalability of the solution?
I rate the solution a nine out of ten for scalability.
How are customer service and support?
The solution's technical support is good and responsive.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We previously used a different solution. We switched to Trend Micro Deep Security because we wanted cloud deployment and more advanced security. Trend Micro Deep Security has modules like vulnerability assessment and TAC mode, which were not available in our previous tool.
How was the initial setup?
The solution's initial setup is very easy. The solution can be deployed within a few minutes.
What's my experience with pricing, setup cost, and licensing?
The solution’s pricing is reasonable.
What other advice do I have?
We are using Trend Micro Deep Security on our servers, which are in TAC mode. We can only monitor them, and the servers are behind the firewall. We are using the solution only in our LAN environment. There is no direct internet traffic on that server. Since we only work in the LAN environment, we don't get any IPS events. It is very easy to deploy the client and manage the console.
Overall, I rate the solution ten out of ten.
Offers a good firewall that blocks unwanted ports
What is our primary use case?
I use the solution in my company to reduce SMB attacks on the data center site and ensure data center protection from flooding and threats.
What is most valuable?
For server security purposes, I like the product's firewall. The firewall has three features we use in our company, of which one controls flooding, the other blocks unwanted ports, and the third allows us to control traffic via Deep Security if the firewall port is open from the switch or router side.
What needs improvement?
In our company's infrastructure, we have not faced any challenges with the product. Considering the lack of issues or challenges faced with the use of the product in our company's environment, I feel that it is a good solution.
Sometimes, the product is not very stable, but it is something that depends on the infrastructure in which the tool is used. The aforementioned area can be considered for improvement.
If Trend Micro Deep Security wants to implement some new features in it, then I would say that it should focus from a networking point of view and see how to control network traffic specifically coming from external to internal traffic on the servers.
For how long have I used the solution?
I have been using Trend Micro Deep Security for two years. My company operates as a system integrator for Trend Micro.
What do I think about the stability of the solution?
If I consider my company's infrastructure, everything is good with the product because we have enabled the threat protection systems to control our environment, so we don't see any suspicious activities.
I rate the solution's stability as ten out of ten.
What do I think about the scalability of the solution?
Scalability-wise, it is a good tool, and I rate the solution as nine out of ten.
How are customer service and support?
When it comes to technical support, I would say that none of the products are bad, and all the tools are usually good. There are a few areas where certain modifications or changes are required, and it is something that varies from client to client. In my opinion, all products, including Symantec and Trend Micro, are good. Based on the infrastructure of users and what they want to implement, there are a few things that Trend Micro should understand. I rate the technical support an eight out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I work with Trend Micro Endpoint Security with Apex One. I also use Symantec.
How was the initial setup?
If I consider my company's infrastructure, everything is good with the product because we have enabled the threat protection systems to control our environment, so we don't see any suspicious activities.
I rate the solution's stability as ten out of ten.
The solution is deployed on the cloud.
Which other solutions did I evaluate?
Symantec and Trend Micro Deep Security are good products, and I don't have any issues with either of the solutions, specifically from a technical perspective.
The costs associated with both the products are taken care of by the sales department or management in our company. Symantec and Trend Micro Deep Security have features that are almost 80 to 90 percent similar. The only area where Symantec needs to improve is related to the remote capabilities it offers.
What other advice do I have?
The product's intrusion prevention system works fine, but we have not implemented any other policies in our company. In our company, we use the default policy in our environment to deal with and prevent intrusions, so we have not customized any policies associated with the intrusion prevention system. With the default policies in place, whenever there is some traffic coming in, the tool will automatically detect, allow, or take action based on the signatures.
I have learned many things while using the product, including the fact that it is very important for a company to decide what they want before purchasing a solution.
I rate the tool a nine out of ten.
Offers troubleshooting insights with a customizable dashboard for real-time monitoring and IPS activity
What is our primary use case?
Our company uses Trend Micro Deep Security as a conventional IPS and for malware detection. The solution is also used for real-time monitoring and to evaluate the monitoring impact on the system. The solution's impact or consumption of memory can also be checked. Trend Micro Deep Security is compatible with various platforms, such as Windows and UNIX.
What needs improvement?
In an older version of Trend Micro Deep Security, our company faced issues syncing the active directory accounts. Anytime we revert to the support team of the solution, they always propose to update the Deep Security Manager to resolve every issue, which is an ineffective approach. I believe the support team should be more proactive in providing effective options or guidance to resolve issues around the product.
Although in our company, we try to add exclusions and troubleshoot for real-time monitoring and upgrade the version, there are clients who consume a lot of memory; on average, 30% of memory remains occupied. The solution's memory consumption impacts certain aspects of the client's infrastructure.
Even after whitelisting one of our company's port scanning servers or tools, the IPS activity continuously monitors and sends false positive alerts, we haven't found a solution to this over the past four months. Trend Micro Deep Security should have a lab-type environment where the solutions for every issue can be found through simulation.
Trend Micro Deep Security is looked upon as a new-generation antivirus that is used on the server end. In future versions of the solution, I would prefer the upgrade process to be simpler than on Linux; the upgrade is a lengthy but easy process. Our company expects the tool's upgrade process to be lighter over the Linux platform, similar to its offering for the Windows platform.
For how long have I used the solution?
I have been using Trend Micro Deep Security for four years.
What do I think about the stability of the solution?
I would rate the stability an eight out of ten. The solution is satisfyingly stable. But at times, I have experienced the solution to be non-responsive and there have been instances where the system had hanged without any notification.
Our company team had to manually intervene in the aforementioned scenarios to understand the issues. Often, I have witnessed the system hang and reboot while upgrading Trend Micro Deep Security, our company team had to manually force restart.
What do I think about the scalability of the solution?
I would rate the scalability an eight out of ten. Scaling the solution across Linux systems might be difficult. There are a few Windows systems in our organization that are quite old and out of support, but they are in production; I have rated the scalability after considering all such factors.
Trend Micro Deep Security is running 24/7 in our organization to receive alerts daily and evaluate the Deep Security Manager to manage issues of our company's clients. In our organization, we are presently trying to onboard more servers and we have plans to expand the solution to the Kubernetes cluster, but the present model of Trend Micro Deep Security does not fit in with the aforementioned cluster or infrastructure.
How are customer service and support?
I would rate the tech support an eight out of ten. Our company expects more accurate and effective solutions from the support team.
How would you rate customer service and support?
Positive
How was the initial setup?
I would rate the initial setup process an eight out of ten. Trend Micro Deep Security is not as robust or automated as any EDR solution, so most configurations must be implemented manually.
The manual configuration tasks include whitelisting, adding exclusions, and creating policies. By streamlining the manual configurations, the solution can become more advanced. From the solution's setup process initiation to production, it's a lengthy and exhausting process of manual tasks.
Our company belongs to the large-scale category with about 1500 system servers, and about three professionals are needed to maintain Trend Micro Deep Security even though we have eight managers, excluding the lab environment.
What was our ROI?
Trend Micro Deep Security is capable of providing an ROI. I would rate the solution's ROI as nine out of ten.
What's my experience with pricing, setup cost, and licensing?
The solution is offered at an average price point. I would rate the pricing an eight out of ten. To our company, Trend Micro Deep Security seems slightly expensive. In our organization, the solution's license is renewed yearly.
What other advice do I have?
The primary advantage of the solution is the insights obtained for a troubleshooting server. For example, the solution's insights often include creating a diagnostics package and directly sharing it with the support team to gain further troubleshooting advice. The insights provided by the solution are vital for the operations on the server side.
In our company, we always prefer Trend Micro Deep Security over an EDR solution due to its security capabilities, alerts, and a configurable dashboard that auto-updates daily. The solution's dashboard provides clarity on the number of infected files and also allows for the tracking of IPS activity. Any kind of ransomware attack is also mitigated by Trend Micro Deep Security.
The solution's features, including real-time monitoring, IPS activity, and firewall alerts, are found to be the most effective in our company for network defense.
In our company, we review the IPS alerts from the Trend Micro Deep Security console to have a fair understanding of what's entering and leaving the server and who is trying to breach the system. IPS is a crucial component in our organization's daily cybersecurity monitoring.
Most of the alerts will be false positives, but the solution can provide alerts at a rapid pace. First, the alerts arrive on the solution's dashboard, and then the SMTP is configured to distribute the same alerts over email. Once the alerts are received in email, our company team reviews them and tries to identify whether it's a real threat incident or a false positive. The solution thus not only tracks and blocks threats but also notifies the responsible engineers of an organization.
It's a robust and reliable solution that provides in-depth insights while troubleshooting. I would advise others to evaluate the licensing cost and the support availability in their region before adopting Trend Micro Deep Security.
I was previously working in the Middle East with the solution, where support was superior, and an executive would jump over a call with me to resolve the issue, but in Europe, the support quality is not the same, and communication is preferred only via email.
I expect to witness improvements in the solution's support quality in Europe, where issues are being solved over a single phone call instead of an extensive email thread. I would rate Trend Micro Deep Security as nine out of ten.
Which deployment model are you using for this solution?
Easy to use, provides excellent anti-malware features, and is easy to implement
What is our primary use case?
We use the solution for Windows Server on Linux distribution. We have several environments. We use the tool to secure on-premise servers.
What is most valuable?
I like the anti-malware features. We use it only for the on-premise environment. The tool helps with server protection. The implementation is easy. It provides high security. We have a hundred workloads. It is a good tool. It is easy to use. It has a good dashboard and great features.
What needs improvement?
The workloads must be better.
For how long have I used the solution?
I have been using the solution for three years.
What do I think about the stability of the solution?
The tool has high stability.
What do I think about the scalability of the solution?
The tool’s scalability is good. We can easily scale it. Our clients are small businesses.
How are customer service and support?
The support is good.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup was easy. I rate the ease of setup a ten out of ten. The deployment took three days.
What other advice do I have?
I will recommend the product to others. Overall, I rate the solution a ten out of ten.
Which deployment model are you using for this solution?
Provides necessary protection against current and relevant threats
What is our primary use case?
I use Trend Micro Deep Security to enhance the security of our servers, which run various operating systems, including Solaris. For our servers, especially those involved in Webex, we deploy agents and enable specific modules like anti-malware, intrusion detection, and firewall protection.
How has it helped my organization?
Trend Micro Deep Security has significantly improved our organization's security posture. It has streamlined reporting processes, enhanced claim filing efficiency, and provided robust protection for our IT systems. With features like real-time threat monitoring, it ensures a secure environment.
What is most valuable?
The integration options of Trend Micro Deep Security have been particularly valuable. The integration options in Trend Micro Deep Security are crucial for our banking organization. With DLP campaigns being a priority, the seamless integration ensures that endpoints are effectively enabled, providing necessary protection against current and relevant threats.
What needs improvement?
There is room for improvement in Trend Micro Deep Security, particularly in endpoint security. Enhancements in agent performance are needed, specifically in reducing server utilization during scanning. This improvement would contribute to increased efficiency and lower operational costs, ensuring a smoother and more responsive system.
For how long have I used the solution?
I have been working with Trend Micro Deep Security for three years.
What do I think about the stability of the solution?
I would rate the stability as a nine out of ten.
What do I think about the scalability of the solution?
I have faced some issues with Trend Micro Deep Security's scalability, like communication errors and settings in green states. Resolving these requires support and knowledge to allocate resources effectively.
How are customer service and support?
The technical support for Trend Micro Deep Security has been decent. However, I believe there's room for improvement in engagement. When raising a case, the ability to quickly connect remotely and discuss specific documentation related to our environment would enhance the overall support experience. I would rate the technical support as a seven out of ten.
How would you rate customer service and support?
Neutral
How was the initial setup?
I would rate the easiness of the initial setup as a seven out of ten. Setting up Trend Micro Deep Security was not entirely straightforward. While there is a comprehensive solution, the complexity arises from the diverse components in our environment. Unlike a single-box setup, we manage multiple components, which requires careful configuration for effective deployment. It took three months to deploy the solution.
What was our ROI?
We have seen a return on investment from using the solution.
What's my experience with pricing, setup cost, and licensing?
I would rate the costliness of the solution as a seven out of ten. The pricing for Trend Micro Deep Security is fixed for five years, and there are no additional costs beyond the standard license increase during this time.
What other advice do I have?
My advice for someone considering Trend Micro Deep Security is to conduct a thorough POC before implementation. Ensure all modules are enabled during the POC and carefully assess how the solution works in your specific environment. Check the enrollment process and functionality before moving forward with the implementation. Overall, I would rate the solution as an eight out of ten.
Which deployment model are you using for this solution?
A reliable and easy-to-use product that has an excellent dashboard and an amazing support team
What is our primary use case?
I used the solution for a UK-based banking company. They had around 200 Linux servers. They had the product installed as an antivirus solution on the servers. We were responsible for managing malware or virus detection. We protected the environment from malicious files.
What is most valuable?
The user interface is the most valuable feature. The customer support provided by the tool is also valuable. The software is regularly updated. We don't face any major issues after updates. It is pretty compatible with every system.
What needs improvement?
The updates for legacy systems are not rolled out frequently. The product must improve on it.
For how long have I used the solution?
I have been using the solution for two years.
What do I think about the stability of the solution?
I rate the product’s stability a ten out of ten.
What do I think about the scalability of the solution?
I rate the tool’s scalability a nine out of ten. I work with a security services company. Four of my colleagues are also using it in their enterprise environment.
How are customer service and support?
The customer support is very good.
How would you rate customer service and support?
Positive
How was the initial setup?
The solution provides proper documentation for setting it up. It's pretty easy. We can follow the steps in the video tutorials. It’s simple to configure. We installed Trend Micro Deep Security Manager on Windows Server and connected all the agents to it. The deployment took around five to seven minutes on each server. It depends on the network speed.
What other advice do I have?
My company is a partner. I am a technical person supporting my clients with the product. Trend Micro is a very reliable company. Its products are easy to use and easy to deploy. It has a pretty good name in the cybersecurity market. Trend Micro continuously conducts workshops and events to engage with its partners. It keeps the partners and customers aware of the new technologies.
Overall, I rate the solution a nine out of ten.
Which deployment model are you using for this solution?
Highly stable product with a straightforward setup process
What is our primary use case?
We use Trend Micro Deep Security to monitor the environment in case of zero-day attacks.
What is most valuable?
The product's most valuable feature is the threat prevention module. It helps with virtual patching and IDS fetching.
What needs improvement?
They should include WAF modules in the product. There should be signature-based advanced and responsive features.
For how long have I used the solution?
We have been using Trend Micro Deep Security for a year.
What do I think about the stability of the solution?
It is a highly stable product. I rate its stability a ten out of ten.
What do I think about the scalability of the solution?
I rate Trend Micro Deep Security's scalability a ten out of ten. We use it 24/7.
How was the initial setup?
The implementation is straightforward. I rate the process a nine out of ten. We require a team of five executives for troubleshooting.
What other advice do I have?
Trend Micro Deep Security has robust virtual patching features. I rate it a ten out of ten.
Has efficient security features and good technical support services
What is our primary use case?
We use Trend Micro Deep Security to protect our network, endpoint, email, servers, etc.
What is most valuable?
The product has robust security features. They release timely updates and have efficient prediction features for threat detection.
What do I think about the stability of the solution?
It is a stable platform.
What do I think about the scalability of the solution?
We have 5000 Trend Micro Deep Security users. It is a scalable platform.
How are customer service and support?
The technical support services are good.
How was the initial setup?
The initial setup process is straightforward. It requires two to three executives for implementation and takes five minutes to complete.
What about the implementation team?
The end users can implement the product themselves.
What's my experience with pricing, setup cost, and licensing?
We purchased Trend Micro Deep Security's yearly license. It is expensive but reasonable compared to other products by Trend Micro.
What other advice do I have?
I recommend Trend Micro Deep Security to others and rate it a nine out of ten.
A scalable and stable solution that provides excellent vulnerability detection features and technical support
What is our primary use case?
I work with the solution as an administrator. I use the solution for servers.
What is most valuable?
Deep Security is a great solution for the server. The most valuable feature of the product is vulnerability detection. It is very fast and clear. It protects from most attacks.
What needs improvement?
The initial setup was complex.
For how long have I used the solution?
I have been using the solution for the past three years.
What do I think about the stability of the solution?
I have not faced any issues with the tool’s stability.
What do I think about the scalability of the solution?
The tool is scalable. We have 40 users and 40 servers in our organization.
How are customer service and support?
The technical support team is very helpful.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We use other solutions along with Trend Micro Deep Security. The choice of the solution depends on the server and users. Deep Security has many features and provides many layers of protection for the server.
How was the initial setup?
Once we get used to the product, it is easy to use.
What about the implementation team?
Trend Micro’s team helped us to deploy the solution and make test addresses for the policy. The deployment took us two hours. Trend Micro’s team helps us with maintaining the solution.
What's my experience with pricing, setup cost, and licensing?
The product has a high price in Kuwait. Sometimes, we face some issues with the pricing. The pricing module should be improved.
What other advice do I have?
I am using the latest version of the solution. I face issues when I want to adjust policies for users on Apex One. I would recommend the solution to others. The product's protection and the team's support are very nice. Overall, I rate the solution a ten out of ten.