We performed a comparison between Check Point Security Management and Trend Micro Deep Discovery based on real PeerSpot user reviews.
Find out in this report how the two Advanced Threat Protection (ATP) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."We can track logs of each firewall which is very helpful."
"We can easily push the policies to any of our gateways."
"We are now able to monitor the different VPN communities in real-time."
"The SSL VPN monitoring based on users and tunnel monitoring are great value-added features present in the management console."
"HA Structure provides good coverage and works fine."
"The most beneficial features for us are the alert classifications, which help us prioritize critical issues, and the detailed reports that provide insights into attack origins and purposes, such as TLS violations or content violations."
"The firewall's blades are the solution's most valuable feature."
"This solution is easy to install and deploy. It is also user-friendly."
"The product is very easy to install."
"The most valuable feature of Trend Micro Deep Discovery is its complete end-to-end visibility of threats."
"The tool's stability and performance are good."
"The HTML file sandboxing is very good."
"The performance and stability are great."
"The solution has extension-based features that help it to analyze the environment. The environment can have different platforms like Windows, Linux, and Mac. The tool will give a report which can confirm the analysis of the issues. You can also get clear information on threats or suspicious files."
"The product's initial setup phase was not difficult."
"Deep Discovery is scalable and compatible with other products. It's crucial to have that compatibility because it's an integral part of our security solution. It integrates smoothly. The interface is user-friendly, so administration is simple."
"The migration from R77 Manager to R80 is a major upgrade. It's not very easy to do. There should be some kind of Wizard for a direct upgrade from the R77 to the R80. There should be an easy way for the customers to do the upgrade."
"Among the things that I would like in the future is for the solution to have its application on Android and iOS, as many of the administrators have adopted remote administration positions due to what has happened since the pandemic. This would help us to have an easier and simpler administration."
"It would be helpful if we could enable URL and application traffic control remote access."
"If the SmartView monitor can be integrated in the R80.40 and R81 versions, that would be ideal in understanding the trends and graphs of how traffic is observed hitting the different Check Point Firewall Gateways that the Security Management controls."
"In future releases I'd like to see better integration with other applications and solutions. Also, the cost of the license is too high, it's too expensive."
"The upgrade procedure already made huge improvements, yet it remains more challenging compared to other products."
"The reporting should be improved in future releases. It needs to be very explicit. This is very important."
"I would like to bind users to their network, as well as their local office machine."
"The solution should support multiple platforms in Windows, Linux, and Mac. Customers can have different software types. The virtual environment should be able to install and analyze them. The tool also gives only a minimum level of extension support. It may not be able to extract files and give details about them. I would also like to see third-party product integration in the tool. The solution's current integration is only with Trend Micro products only."
"I would like to see integration with third-party tools to improve the visibility of the dashboards."
"The solution needs to be able to integrate better with third-party infrastructure."
"The product's scalability feature needs to be improved, as it is an area in the product with certain shortcomings."
"There are certain aspects of flexibility in the policies that should be added to Deep Discovery."
"The stability of the solution could be improved. It should be 100% stable, but it's not there right now."
"Deep Discovery is easy to manage, but there is still room for improvement on the administration and operations side. Competing products have a cleaner interface that makes it easier to manage their products. Trend Micro offers a lot of features in one product suite, but it can be unwieldy for the customer to manage all that with a single interface."
"Trend Micro Deep Discovery's technical support could be improved, and it could be made more active."
More Check Point Security Management Pricing and Cost Advice →
Check Point Security Management is ranked 13th in Advanced Threat Protection (ATP) with 55 reviews while Trend Micro Deep Discovery is ranked 17th in Advanced Threat Protection (ATP) with 23 reviews. Check Point Security Management is rated 8.8, while Trend Micro Deep Discovery is rated 8.4. The top reviewer of Check Point Security Management writes "Great DDoS protection, high availability, and useful firewall rule implementation". On the other hand, the top reviewer of Trend Micro Deep Discovery writes "Good threat detection capabilities and offers flexibility for hosting options". Check Point Security Management is most compared with Wazuh, Fortinet FortiAnalyzer, IBM Security QRadar, LogRhythm SIEM and Splunk Cloud Platform, whereas Trend Micro Deep Discovery is most compared with Darktrace, Trend Micro TippingPoint Threat Protection System, Arista NDR, Vectra AI and Palo Alto Networks Advanced Threat Prevention. See our Check Point Security Management vs. Trend Micro Deep Discovery report.
See our list of best Advanced Threat Protection (ATP) vendors.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.