Ahmed Elmenshawy - PeerSpot reviewer
PS IT Security Engineer at Alex Bank
Real User
Top 5Leaderboard
Helps us with user behavior analysis and has an easy setup process
Pros and Cons
  • "The platform provides all essential features for discovery and administration."
  • "The product's security features need enhancement."

What is our primary use case?

We use the product for signature-based user behavior analysis. It helps us detect threats in virtual environments as well.

What is most valuable?

The platform provides all essential features for discovery and administration. There is no need for customization options as the features are designed with a user-centered approach. We can identify the root cause of the problem and share the results with the users.

What needs improvement?

The product's security features need enhancement.

For how long have I used the solution?

We have been using Trend Micro Deep Discovery for ten months.

Buyer's Guide
Trend Micro Deep Discovery
May 2024
Learn what your peers think about Trend Micro Deep Discovery. Get advice and tips from experienced pros sharing their opinions. Updated: May 2024.
772,649 professionals have used our research since 2012.

What do I think about the stability of the solution?

I rate the product's stability an eight out of ten.

What do I think about the scalability of the solution?

I rate Trend Micro Deep Discovery's scalability an eight out of ten. We use it 24/7.

How are customer service and support?

The technical support team replies on time in case of any issues.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup process is easy. It doesn't require a lot of experience for implementation. It needs five executes for deployment and maintenance.

What other advice do I have?

I recommend Trend Micro Deep Discovery to others and rate it an eight out of ten. I advise others to implement it in a test environment if they use it for IPS and IDS purposes.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
DGM-IT at a construction company with 10,001+ employees
Real User
Useful for zero-day vulnerability protection
Pros and Cons
  • "One of the most valuable features is the performance, since, so far, we have not faced any issues with Deep Discovery."
  • "This solution could be improved with faster technical support and cheaper licensing prices."

What is our primary use case?

Our primary use case of Deep Discovery is as a sandbox. It sorts the DDAN, our on-premise Deep Discovery Analyzer solution, so if Deep Security or Trend Micro isn't able to find out whether a particular file or memory is a threat or not, they will send that file signature or file to the DDAN. The DDAN will then deploy that file inside their virtual sandbox, analyze the implications, and return the result to the concerned agent. We mainly use it for zero-day vulnerability protection. 

Deep Discovery is deployed on-premise. 

What is most valuable?

One of the most valuable features is the performance, since, so far, we have not faced any issues with Deep Discovery. 

What needs improvement?

This solution could be improved with faster technical support and cheaper licensing prices. 

For how long have I used the solution?

We have been using Deep Discovery for a couple of years. 

What do I think about the stability of the solution?

I'm satisfied with the stability and performance of Deep Discovery. So far, we have not faced any issues. 

What do I think about the scalability of the solution?

In our organization, we have around one thousand licenses for Trend Micro. Whether or not we increase our usage will depend on business requirements. 

How are customer service and support?

Trend Micro's technical support could be better and faster. 

How was the initial setup?

The installation was done by a Trend Micro implementation partner. It took about one or two weeks. 

For deployment and maintenance, we have a team of two engineers and a few managers. 

What about the implementation team?

We implemented Deep Discovery through a Trend Micro partner. 

What's my experience with pricing, setup cost, and licensing?

The licensing cost is a bit pricey. We pay a yearly subscription. 

What other advice do I have?

I rate Deep Discovery an eight out of ten. I would recommend Deep Discovery to others. If people are ready to invest as a capital, then I can recommend a Deep Discovery license. Otherwise, they can go with their cloud-based solution. 

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Trend Micro Deep Discovery
May 2024
Learn what your peers think about Trend Micro Deep Discovery. Get advice and tips from experienced pros sharing their opinions. Updated: May 2024.
772,649 professionals have used our research since 2012.
OzgurEkinci3 - PeerSpot reviewer
Solutions Architect at NGN
Real User
Top 5
Ahead of its competitors in providing MSP services to customers

What is our primary use case?

We use the solution for its security features. Trend Micro has an MSP portal where you can create customer accounts, assign some licenses, and make your customers use those licenses from a portal. Trend Micro is ahead of its competitors in providing MSP services to customers.

What is most valuable?

Trend Micro Endpoint Encryption is stable and easy to use. It's very useful for an MSP company, making it easy and efficient to work with.

What needs improvement?

Security features could be improved.

For how long have I used the solution?

I have been using Trend Micro Endpoint Encryption for one year.

What do I think about the stability of the solution?

The product is very stable.

What do I think about the scalability of the solution?

The solution is scalable because it doesn't require an on-premise server installed. Everything is being monitored and managed from the cloud portal, irrespective of the number of agents. You can manage all from one portal.

How are customer service and support?

Vendors are locally present in our country. We contact them via email, etc. We are very flexible with vendor support.

How was the initial setup?

The initial setup is straightforward. One person is enough for it.

An MSP company creates customer accounts from Trend Micro's MSP portal. Then, the customer gets the key. After that, they can log in to the Trend Micro portal. They will see the agent to be downloaded for Windows and Linux. It takes about two or three minutes to deploy.

What about the implementation team?

Deployment can be done by yourself.

What's my experience with pricing, setup cost, and licensing?

The MSP's model and licensing is global and has very reasonable prices. Also, the perpetual license model is reasonable. It's cheap for the assembly companies. Licensing is very straightforward.

What other advice do I have?

Around five to ten technical persons are using the support. We will be able to sell those agents to more than 20 companies.

Only one technical person is enough for a large company for the installation and the management. In terms of management, many logs, alarms, and entries are happening in the portal.

Trend Micro can be a viable option for SMBs looking for a basic EDR or PRT solution. However, for larger organizations or those with highly complex security needs demanding advanced services and sophisticated department knowledge, Trend Micro's capabilities might not be sufficient.

Overall, I rate the solution a seven out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
NaveedAli - PeerSpot reviewer
Senior manager IT infrastructure at Machine Learning 1 Limited ·
Real User
Top 20
Reliable product with efficient endpoint detection capabilities
Pros and Cons
    • "Additionally, better scanning capabilities for third-party applications would ensure comprehensive security without the need for exclusions."

    What is our primary use case?

    Our primary use case for Deep Discovery revolves around its ability to manage Windows updates and maintain security without necessitating frequent reboots of our servers. One of the standout features we leverage is virtual patching, which significantly minimizes downtime by eliminating the need for immediate updates and reboots.

    How has it helped my organization?

    The solution has substantially improved our organization by providing robust security measures accepted by various audit teams, including those from the IT and financial sectors. Previously, we faced observations related to outdated Windows servers during audits. However, these concerns have been alleviated with Deep Discovery's virtual patching, as the servers are deemed secure without needing constant updates.

    What needs improvement?

    They could improve the product's ability to control normal traffic and prevent attacks like SQL injection and cross-site scripting. Additionally, better scanning capabilities for third-party applications would ensure comprehensive security without the need for exclusions. This would enhance overall protection by allowing us to scan and manage third-party applications more effectively.

    For how long have I used the solution?

    We have been using Trend Micro Deep Discovery for almost six months now.

    What do I think about the stability of the solution?

    The product is stable and reliable. We haven't encountered any significant bugs or issues related to stability.

    What do I think about the scalability of the solution?

    The solution is scalable. We have managed to cover a significant portion of our protection servers and plan to expand further. We have implemented perpetual protection server licenses, adding more access points per our budgetary constraints. This year, we plan to increase the number of licenses to accommodate our expanding needs.

    How are customer service and support?

    Although we have yet to contact customer support frequently, our local vendor has been very supportive. We also find the online documentation and community forums valuable for troubleshooting and solutions.

    How was the initial setup?

    The initial setup was straightforward. Having used Trend Micro products for three years, we were familiar with the dashboard and the setup process. We initially tested the solution in a non-production environment to understand its impact and later deployed it in production without significant challenges.

    What other advice do I have?

    Overall, Trend Micro Deep Discovery has proven to be a reliable solution that enhances our security posture while minimizing operational disruptions. Regular updates and improvements can further solidify its effectiveness in various IT environments.

    The endpoint detection capabilities are particularly effective, especially in identifying malware and antivirus threats. Integration with our existing systems was straightforward, requiring minimal effort beyond configuring IP addresses.

    I rate it an eight out of ten. There is always room for improvement in any product or service. Given the current market conditions, with new technologies and emerging threats, it's essential to implement updates and enhancements continuously. It ensures that the product remains effective against new challenges. Despite its robust features and reliable support, no solution is perfect, and that's why there is always potential for further improvement. This ongoing need for innovation and adaptation is why I rated it an 8, reserving the remaining points for future enhancements.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    Flag as inappropriate
    PeerSpot user
    Kulwinder Singh - PeerSpot reviewer
    Network Security Associate Manager at Eir evo
    Real User
    Top 5
    Provides complete end-to-end visibility of threats
    Pros and Cons
    • "The most valuable feature of Trend Micro Deep Discovery is its complete end-to-end visibility of threats."
    • "Trend Micro Deep Discovery's technical support could be improved, and it could be made more active."

    What is our primary use case?

    We use Trend Micro Deep Discovery to identify ransomware attacks.

    What is most valuable?

    The most valuable feature of Trend Micro Deep Discovery is its complete end-to-end visibility of threats.

    What needs improvement?

    Trend Micro Deep Discovery's technical support could be improved, and it could be made more active.

    For how long have I used the solution?

    I have been using Trend Micro Deep Discovery for four to five months.

    How was the initial setup?

    Trend Micro Deep Discovery's initial setup is easy.

    What other advice do I have?

    Trend Micro Deep Discovery's interface and threat mechanism are very proactive.

    Overall, I rate Trend Micro Deep Discovery a nine out of ten.

    Which deployment model are you using for this solution?

    Private Cloud
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Ahmet Burak Aydin - PeerSpot reviewer
    Security Engineer at Intertech Information Technology and Marketing Inc.
    Real User
    Useful for threat protection and to block phishing emails
    Pros and Cons
    • "Initial setup is easy. It can be done by yourself."
    • "The solution could be more secure."

    What is our primary use case?

    This solution can be used as threat protection and to block phishing emails.

    We are using version 6.0.

    There are 15 people using this solution in my organization.

    What needs improvement?

    The solution could be more secure.

    What do I think about the stability of the solution?

    It's stable.

    What do I think about the scalability of the solution?

    It's scalable.

    How are customer service and support?

    We are using local technical support. We haven't had any problems with it.

    How was the initial setup?

    Initial setup is easy. It can be done by yourself.

    What other advice do I have?

    I would rate this solution 9 out of 10.

    I would recommend this solution to anyone who wants to start using it.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Nadeem Syed - PeerSpot reviewer
    CEO at Haniya Technologies
    Reseller
    Top 5Leaderboard
    Easy to use, easy to deploy, and helpful for quickly figuring out the problems in the network
    Pros and Cons
    • "It is a very good solution. It is very light, and it is quite quick to figure out the problem in your network."
    • "Trend Micro can improve the pricing in general. There is nothing else they can add or improve in the solution."

    What is our primary use case?

    Deep Discovery is good for network protection. There is also an Email Inspector.

    What is most valuable?

    It is a very good solution. It is very light, and it is quite quick to figure out the problem in your network.

    It is very easy to use. It is also very easy to install and deploy.

    What needs improvement?

    Trend Micro can improve the pricing in general. There is nothing else they can add or improve in the solution.

    What do I think about the stability of the solution?

    It is very stable.

    What do I think about the scalability of the solution?

    There are quite a lot of clients who use this solution. It is an enterprise solution, and 80% of the enterprise-level companies are using it over here.

    How are customer service and support?

    We do hear of issues from our clients. We go over there for technical support, but there is nothing major for which they require support from Trend Micro itself.

    How was the initial setup?

    It is straightforward. It doesn't take much time. It usually takes an hour or two. It requires a maximum of a day.

    What's my experience with pricing, setup cost, and licensing?

    Its price is fine, but Trend Micro can improve the pricing in general. 

    It is a hardware solution. It is based on the number of nodes, and according to the number of nodes, clients decide which box they should acquire. They have to renew their license every year. It is subscription-based.

    What other advice do I have?

    Trend Micro has divided most of the solutions into different sectors. If you want to go for the end-to-end solution, they are very much in a position to provide that. You do not have to add different kinds of products or vendors. Trend Micro covers almost everything.

    I would definitely recommend this solution. It is a very good solution. I would rate it a nine out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer:
    PeerSpot user
    PeerSpot user
    Pre-Sales Engineer at Elcore Distribution AG
    Real User
    Intuitive, user-friendly, and easy to use solution that helps to detect advanced threats and attacks
    Pros and Cons
    • "The most valuable feature is that the user can customize images of virtual machines in the sandbox functionality. The other vendors only use images that were created by the vendor but not the customer, end-user or partner. This helps to detect advanced threats and attacks."
    • "I would like the ability to analyze all files in our internal network, at the same time on different operating systems. Not just three of them, but as many as possible."

    What is our primary use case?

    I work for a distribution partner company. We use the on-prem, physical model of this solution.

    What is most valuable?

    It's intuitive and has a user-friendly interface. It's also flexible. We can put files, web links in this solution through other Windows.

    The most valuable feature is that the user can customize images of virtual machines in the sandbox functionality. The other vendors only use images that were created by the vendor but not the customer, end-user or partner. This helps to detect advanced threats and attacks. It helps to clone the internal structure, IT structure of some companies. So you could clone the computer of the director or the financial department and place it to the sandbox. The bad guys who are looking for a way to get into your organization when they get to a computer, they think that it's a real computer. They see software or something connected with finance and they think that this is a real computer and not a laboratory or a sandbox so they run the bad script and think that they're stealing some important information or encrypting some important information. Antivirus solutions can stop attacks when they know how these attacks play out. If we don't know how the attack is going to go, we can't identify it. It customizes the images and Trend Micro helps to identify these unknown attacks.

    Different parts of the organization can quickly receive information about the bad scripts. It helps to protect the organization's infrastructure from these attacks. 

    What needs improvement?

    We'd like to see more video guides. I'd also like for them to increase the numbers of different virtual images. Now the solution can use only three different images. For example, it's Windows 7, Windows 10, and the Windows servers are 2016. Only three of them at the same time. It would be more useful if the solution can operate with around five or six different images like Windows 7 2019, Windows 8.1. I would like the ability to analyze all files in our internal network, at the same time on different operating systems. Not just three of them, but as many as possible.

    For how long have I used the solution?

    I have been using this solution for a year and a half.

    What do I think about the stability of the solution?

    It's very stable.

    What do I think about the scalability of the solution?

    It's a solution for enterprise antivirus protection. It's not for small companies. The price of this solution corresponds to its class.

    In my company only I use this solution. It's a stand-alone laboratory. It's a stand-alone server that analyzes files, URLs, and messages from all IT infrastructure in an organization. It's not a solution for one person or 10 people. It's a solution for all employees inside an organization.

    How are customer service and technical support?

    We haven't had the need to contact technical support. It's very easy to use. 

    Which solution did I use previously and why did I switch?

    The main difference from other solutions is that it uses customized images inside sandboxes. They're similar in functionality. All of them run, scan, and notice every change that some files, some scripts, some links do inside the system. The environment is imported inside the sandbox and in this way, Trend Micro is the leader in the world's markets of sandbox solutions.

    How was the initial setup?

    The initial setup was straightforward and very easy. You don't need special knowledge or courses to complete an installation of this solution. It's very easy.

    What about the implementation team?

    We implemented it ourselves. 

    What other advice do I have?

    I would rate it a ten out of ten. 

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Buyer's Guide
    Download our free Trend Micro Deep Discovery Report and get advice and tips from experienced pros sharing their opinions.
    Updated: May 2024
    Buyer's Guide
    Download our free Trend Micro Deep Discovery Report and get advice and tips from experienced pros sharing their opinions.