Cisco Cognitive Threat Analytics vs Trend Micro Deep Discovery comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Cisco Cognitive Threat Analytics and Trend Micro Deep Discovery based on real PeerSpot user reviews.

Find out what your peers are saying about Darktrace, Vectra AI, Check Point Software Technologies and others in Intrusion Detection and Prevention Software (IDPS).
To learn more, read our detailed Intrusion Detection and Prevention Software (IDPS) Report (Updated: April 2024).
769,662 professionals have used our research since 2012.
Featured Review
Philippe GNEZZERE
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The most valuable feature of Cisco Cognitive Threat Analytics is its reliability."

More Cisco Cognitive Threat Analytics Pros →

"Generally speaking, it just gives us a broad understanding of exactly what kind of threats occur. The submission point, analyzing point, and virtualization are within the environment that it supports. It helped us to improve our security levels and protect our internal network from any threats outside.""The performance and stability are great.""The most valuable feature of Trend Micro Deep Discovery is its complete end-to-end visibility of threats.""The product is very easy to install.""The most valuable features are monitoring for advanced persistent threats, the system runs in a sandbox allowing for effective zero-day exploits management, and the Inspector has a built-in sandbox.""The solution has extension-based features that help it to analyze the environment. The environment can have different platforms like Windows, Linux, and Mac. The tool will give a report which can confirm the analysis of the issues. You can also get clear information on threats or suspicious files.""As a security product, managing threats is crucial for my clients.""The product's initial setup phase was not difficult."

More Trend Micro Deep Discovery Pros →

Cons
"Cisco Cognitive Threat Analytics could improve by having quicker detection and response and web analysis."

More Cisco Cognitive Threat Analytics Cons →

"The solution needs improvement in terms of pricing.""Scalability becomes an issue when managing a higher number of customers.""The stability of the solution could be improved. It should be 100% stable, but it's not there right now.""I would like to see integration with third-party tools to improve the visibility of the dashboards.""I would like to see them create a rule where It could integrate with the network and start mitigating with auto-detection.""The product's scalability feature needs to be improved, as it is an area in the product with certain shortcomings.""Trend Micro Deep Discovery is a very expensive solution, making it very hard to sell.""The solution should support multiple platforms in Windows, Linux, and Mac. Customers can have different software types. The virtual environment should be able to install and analyze them. The tool also gives only a minimum level of extension support. It may not be able to extract files and give details about them. I would also like to see third-party product integration in the tool. The solution's current integration is only with Trend Micro products only."

More Trend Micro Deep Discovery Cons →

Pricing and Cost Advice
  • "Cisco Cognitive Threat Analytics could reduce the price to allow all countries to afford it. The price is expensive."
  • More Cisco Cognitive Threat Analytics Pricing and Cost Advice →

  • "Overall, the price is good."
  • "The price of the solution is lower compared to the competition."
  • "The licensing cost is a bit pricey. We pay a yearly subscription."
  • "Its price is fine, but Trend Micro can improve the pricing in general. It is a hardware solution. It is based on the number of nodes, and according to the number of nodes, clients decide which box they should acquire. They have to renew their license every year. It is subscription-based."
  • "The tool’s licensing costs depend on the customers."
  • "The tool's licensing costs are yearly. There are no additional costs associated with the product."
  • "Compared to its competitors, Trend Micro Deep Discovery is a little expensive."
  • "The pricing is okay for some, and sometimes, some people find it expensive."
  • More Trend Micro Deep Discovery Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Intrusion Detection and Prevention Software (IDPS) solutions are best for your needs.
    769,662 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The most valuable feature of Cisco Cognitive Threat Analytics is its reliability.
    Top Answer:Cisco Cognitive Threat Analytics could reduce the price to allow all countries to afford it. The price is expensive.
    Top Answer:Cisco Cognitive Threat Analytics could improve by having quicker detection and response and web analysis.
    Top Answer:As a security product, managing threats is crucial for my clients.
    Top Answer:The pricing is okay for some, and sometimes, some people find it expensive. It can definitely be more expensive than Sophos. However, it is not very expensive. OEMs also include support charges.
    Top Answer:Sometimes, our customers face challenges like console management and report generation. Also, some of their end users may not be technically proficient, so they occasionally face problems due to a… more »
    Ranking
    Views
    66
    Comparisons
    52
    Reviews
    1
    Average Words per Review
    245
    Rating
    10.0
    Views
    3,770
    Comparisons
    2,320
    Reviews
    10
    Average Words per Review
    389
    Rating
    8.2
    Comparisons
    Also Known As
    Cognitive Threat Analytics, CTA
    Trend Micro Deep Discovery Inspector, Trend Micro Deep Discovery Analyzer
    Learn More
    Overview

    Cognitive Threat Analytics (CTA) enhances web security with breach detection and analytics to stop threats in the network. Online threats have become increasingly sophisticated, targeted attacks are on the rise, and cybercriminals launch their campaigns through a variety of vectors. They can serve up malvertising and deploy exploit kits that install rootkits. They can establish a botnet presence within your infrastructure. Once cybercriminals establish a foothold, more than 90 percent of their threats use the web. There, they can establish channels for command-and-control communications and exfiltrate sensitive information. Analyzing more than 10 billion web requests daily, Cisco Cognitive Threat Analytics finds malicious activity that has bypassed security controls, or entered through unmonitored channels (including removable media), and is operating inside an organization’s environment. Cognitive Threat Analytics is a cloud-based product that uses machine learning and statistical modeling of networks. It creates a baseline of the traffic in your network and identifies anomalies. It analyzes user and device behavior, and web traffic, to discover command-and-control communications, data exfiltration, and potentially unwanted applications operating in your infrastructure.

    Deep Discovery is available as a physical or virtual network appliance. It’s designed to quickly detect advanced malware that typically bypasses traditional security defenses and exfiltrates sensitive data. Specialized detection engines and custom sandbox analysis detect and prevent breaches.

    Sample Customers
    Transplace
    Allied Telesis, Atma Jaya Catholic University of Indonesia, Babou, Blekinge County Council, Delacour, Hiroshima Prefectural Government, Live Nation Entertainment Inc., Mazda Motor Logistics Europe, McGill University Health Centre, Mikuni Corporation, OKWAVE, Sinar Mas Land, SWICA, UTOC Corporation
    Top Industries
    VISITORS READING REVIEWS
    Computer Software Company47%
    Healthcare Company11%
    Aerospace/Defense Firm6%
    Financial Services Firm6%
    REVIEWERS
    Financial Services Firm17%
    Computer Software Company17%
    Legal Firm8%
    Wholesaler/Distributor8%
    VISITORS READING REVIEWS
    Computer Software Company21%
    Manufacturing Company9%
    Financial Services Firm9%
    Government6%
    Company Size
    VISITORS READING REVIEWS
    Small Business17%
    Midsize Enterprise4%
    Large Enterprise79%
    REVIEWERS
    Small Business54%
    Midsize Enterprise15%
    Large Enterprise31%
    VISITORS READING REVIEWS
    Small Business24%
    Midsize Enterprise17%
    Large Enterprise60%
    Buyer's Guide
    Intrusion Detection and Prevention Software (IDPS)
    April 2024
    Find out what your peers are saying about Darktrace, Vectra AI, Check Point Software Technologies and others in Intrusion Detection and Prevention Software (IDPS). Updated: April 2024.
    769,662 professionals have used our research since 2012.

    Cisco Cognitive Threat Analytics is ranked 23rd in Intrusion Detection and Prevention Software (IDPS) with 1 review while Trend Micro Deep Discovery is ranked 6th in Intrusion Detection and Prevention Software (IDPS) with 22 reviews. Cisco Cognitive Threat Analytics is rated 10.0, while Trend Micro Deep Discovery is rated 8.4. The top reviewer of Cisco Cognitive Threat Analytics writes "Simple deployment, reliable, and helpful support". On the other hand, the top reviewer of Trend Micro Deep Discovery writes "Good threat detection capabilities and offers flexibility for hosting options". Cisco Cognitive Threat Analytics is most compared with Cisco Secure Network Analytics, whereas Trend Micro Deep Discovery is most compared with Darktrace, Trend Micro TippingPoint Threat Protection System, Arista NDR, Vectra AI and Palo Alto Networks Advanced Threat Prevention.

    See our list of best Intrusion Detection and Prevention Software (IDPS) vendors.

    We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.