Trend Micro Deep Security and Cisco ACI serve as pivotal solutions within the cybersecurity and networking sectors, respectively. Trend Micro Deep Security has an edge in cloud protection and scalability, while Cisco ACI leads in networking capabilities for data center management.
Features: Trend Micro Deep Security offers remote protection management, virtual patching, and cloud service integration capabilities with platforms like AWS. It emphasizes cloud security and intrusion detection. Cisco ACI is renowned for its software-defined networking, centralized management, and automatic policy enforcement. It caters well to virtual environments such as VMware.
Room for Improvement: Trend Micro Deep Security could enhance integration and database use, improve error notifications, and support Macs better. Transitioning to agent-based solutions is also a concern due to VMware changes. Cisco ACI users seek advancements in its user interface, better multi-site support, and integration with other Cisco products.
Ease of Deployment and Customer Service: Trend Micro Deep Security offers multiple deployment options and handles on-premises and hybrid cloud setups well, though customer support can vary. Cisco ACI provides versatile deployment choices with a focus on on-premises setups and receives positive feedback for customer service, but response times could be improved.
Pricing and ROI: Trend Micro Deep Security is viewed as pricey, which may affect purchase decisions, yet presents competitive value with significant ROI through its security features. Cisco ACI also carries a higher cost, seen as justified by its robust data center management benefits, though it might not suit smaller enterprises due to its upfront investment requirements.
Efficient utilization leads to cost savings and efficiency gains.
If the customer is interested in technical capabilities, we demonstrate the tools, setup, implementation, and their working.
It adds value by providing centralized control over servers and endpoints.
The technical support from Cisco is satisfactory.
When issues occur, the TAC is not able to provide much support, leading to difficulties in finding RCAs.
They have very professional engineers, and they often respond effectively.
Their technical support is top-notch.
Trend Micro's technical support is delayed in responding at times, while at other times, the response is fast.
Expanding your network or your data center with Cisco ACI is not an issue; scalability is a good feature.
The solution offers high performance and scalability with connectivity options up to 100 GS.
The scalability of Cisco ACI supports our organization's growth effectively.
In most organizations, they are using a mix of these security solutions.
Trend Micro Deep Security is highly scalable.
For stability, Cisco ACI rates a nine or 9.5 because I've seen three customers using Cisco ACI and once deployed, the solution is very stable.
Trend Micro Deep Security is very stable and provides protection at all times without issues.
We believe that software works fine until it is patched, managed, or monitored by the IT teams.
Their lack of on-ground offices can result in business losses.
Additionally, the product is overpriced, which makes it difficult to sell to many customers.
Microsoft provides ATP solution in their Defender, that not only filters the emails but also detects spam and malware in attachments, and it provides security for SharePoint solution, Teams, and other products available on the cloud.
The user interface could be more user-friendly, as navigation sometimes requires familiarity with the console.
In general, Cisco ACI is on the higher side; it's not a cheap solution.
Cisco's pricing tends to be on the higher end compared to other vendors.
We give a fair comparison of all the products, and give them clear insights of the products, which makes it helpful for the customer to make a final decision to purchase the license or product.
The pricing is moderate, not expensive or very cheap.
Trend Micro Deep Security is considered overpriced, which poses a challenge in selling it to many customers.
Cisco ACI provides substantial capability; you can design your network accordingly and it's part of the SDN family, providing many benefits to the organization, especially when moving from traditional network infrastructure.
Its features, like easy application deployment, short deployment time for new applications or software, and eliminating the hassle of STP, are appreciated.
It is essential for growing our data center connectivity and enablement for our customers.
For threat detection, they use heuristic behavior detection, and sometimes, if they think there is a sort of attack which is new, they alert you, and they detect and show where the attack is coming from.
It is well-suited for state government customers who require a complete sense of security.
Trend Micro Deep Security offers valuable features such as virtual patching, which allows me to manage server downtime challenges by taking care of threats.
Cisco ACI automates data center networking, centralizing management and configuration of diverse network environments. It's used for micro-segmentation, replacing legacy networks, and deploying software-defined networking.
Cisco ACI enables seamless integration with cloud platforms and multi-site connectivity. It ensures high availability and redundancy, supports network-centric applications, enhances security, and facilitates agile service implementations across different regions and data centers. The platform offers high throughput, ease of configuration, centralized management, and programmability. Users find value in its single management interface, policy-based routing, Service Graphs, and simplified deployment. Cisco ACI also excels in scalability, automation, low latency, and supports data center expansion efficiently.
What are the key features of Cisco ACI?Organizations in industries such as finance, healthcare, and technology implement Cisco ACI to modernize data centers, improve security, and streamline network operations. Its capabilities support expanding infrastructure, integrating with cloud services, and managing complex network architectures with minimal effort.
Trend Micro Deep Security is a comprehensive solution for endpoint security and server protection, which prevents ransomware attacks and unauthorized access attempts. Its valuable features include tracing back attacks, antivirus protection, endpoint detection and response, firewall-based solution, threat detection, predictive machine learning and AI monitoring, VPM, virtualization, and sandboxing.
The solution is easy to use, scalable, stable, and reliable, with good technical support. It has helped organizations perform well against malware and vulnerabilities, provide patching from the Protection Cloud, and improve their security posture.
Trend Micro Deep Security Features
Trend Micro Deep Security has many valuable key features. Some of the most useful ones include:
Reviews from Real Users
Trend Micro Deep Security stands out among its competitors for a number of reasons. Two major ones are its robust data and loss prevention feature and its patch management, which saves users money. PeerSpot users take note of the advantages of these features in their reviews:
One PeerSpot reviewer, a Senior Security Advisor at a healthcare company, writes, “DLP, Data Loss Prevention, and the complexity of how we manage the console and how this client, or this tool, will notify us when there is something going wrong within the server and endpoint, is good.”
Nadeem S., CEO at Haniya Technologies, notes of the solution, “Patch management is most valuable. The major selling point of Deep Security is that it is based on the cloud. Deep Security is for the servers and databases of data centers, and generally, for patch management, you have to shut down the machines, and then you have to restart them. So, they need shutdown time, which is a cost.”
We monitor all Cloud and Data Center Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.