
![Trend Micro Deep Discovery [EOL] Logo](https://images.peerspot.com/image/upload/c_scale,dpr_3.0,f_auto,q_100,w_64/2wuq6mq8liciuy8jm6aqj4dp5bgm.jpg?_a=BACAGSGT)
Trend Micro Deep Discovery and Cisco Secure Network Analytics compete in the advanced threat detection category. Trend Micro's customizable sandboxing and easy setup give it an edge in detecting complex threats, while Cisco provides superior network visibility and integration within its ecosystem.
Features: Trend Micro Deep Discovery offers robust real-time threat detection, customizable sandbox environments, and integration with other Trend Micro products. Cisco Secure Network Analytics provides comprehensive network visibility, efficient anomaly detection, and seamless integration within the Cisco ecosystem.
Room for Improvement: Trend Micro Deep Discovery could improve its support in certain regions, increase virtual image options in sandboxing, and address pricing concerns. Cisco Secure Network Analytics could enhance its AI integration, user interface, and address licensing complexity.
Ease of Deployment and Customer Service: Both solutions are primarily on-premises, with Trend Micro offering cloud options. Trend Micro's support varies regionally, whereas Cisco's is generally consistent. Trend Micro's partnerships provide varied support channels, whereas Cisco's support can be complex.
Pricing and ROI: Trend Micro is competitively priced but viewed as expensive against other security products. Its ROI is strong in threat mitigation. Cisco is often seen as expensive with complex licensing, but its robust security offers significant business value and ROI.
There is a lack of adequate local support from the Indian side.
For technical support of Cisco, the support they provide depends on how the client procures it, and so far, it's understandable.
If I were to rate them from 0 to 10, I would give them a nine or a ten.
There is no dedicated team in India for giving support for Trend Micro Deep Discovery.
If the appliance supports scalability, Trend Micro support will inform us, and we can implement it without replacing the hardware.
Cisco products are incredibly stable, boasting a 200% stability.
Once resolved, the system works well, and overall I think it's good.
The product updates and security updates are kept current, allowing us seamless integration with Trend Micro and getting daily updates and signatures without problems.
The solution should have the ability to analyze security events not only at the network layer but also at the application and OS layers.
Proper management of the database is also important; it should be centralized for easier data collection from a single database.
There is no dedicated team in India for giving support for Trend Micro Deep Discovery.
The solution is not scalable as it is an agent product rather than a product designed for scalability.
We have multiple components such as Deep Discovery Email Inspector for mail gateways, Deep Discovery Analyzer for sandboxing, and Deep Discovery Inspector, which serves as an IDS detecting malicious network traffic.
Cisco solutions are considered to be very expensive.
Regarding cost, for the Bangladesh context, Cisco Secure Network Analytics is a little bit high-priced because we are a developing country, making it tough to manage affordable solutions.
I do not consider it an expensive tool; its price is justified based on the capabilities that we receive when compared to another mail gateway or other vendors.
The solution is very expensive.
Overall, the licensing cost of Trend Micro Deep Discovery was not on the higher side earlier, but now, since the competition has increased, we need to think about the prices.
AI provides suggested common lines and protection features that help safeguard networks from various threats or unwanted situations.
The most valuable features include encrypted traffic analytics and the ability to fulfill requirements at the network level.
The most valuable capabilities of Trend Micro Deep Discovery Email Inspector include its ability to perform mail detection and mail filtration against various email attacks such as phishing and spam, serving as an email gateway for both inbound and outbound traffic.
This solution allows us to see anomalies, network traffic in our network, and zero-day threats.
The impact of the Threat Intelligence Sharing feature on overall defense and security is positive.
| Product | Market Share (%) |
|---|---|
| Trend Micro Deep Discovery | 3.3% |
| Cisco Secure Network Analytics | 5.9% |
| Other | 90.8% |

| Company Size | Count |
|---|---|
| Small Business | 11 |
| Midsize Enterprise | 7 |
| Large Enterprise | 52 |
| Company Size | Count |
|---|---|
| Small Business | 16 |
| Midsize Enterprise | 6 |
| Large Enterprise | 9 |
Cisco Secure Network Analytics is a highly effective network traffic analysis (NTA) solution that enables users to find threats in their network traffic even if those threats are encrypted. It turns an organization’s network telemetry into a tool that creates a complete field of vision for the organization’s administrators. Users can find threats that may have infiltrated their systems and stop them before they can do irreparable harm.
Cisco Secure Network Analytics Benefits
A few ways that organizations can benefit by choosing to deploy Cisco Secure Network Analytics include:
Cisco Secure Network Analytics Features
Some of the many features that Cisco Secure Network Analytics offers include:
Reviews from Real Users
Cisco Secure Network Analytics is a solution that stands out even when compared to many other comparable products. Two major advantages that it offers are the way that it enables users to define the threshold at which the solution will issue a warning to administrators and the predefined alerts that it offers straight out of the box.
Gerald J., the information technology operations supervisor at Aboitiz Equity Ventures, Inc., writes, “StealthWatch lets me see the ports running in and out and the country. It has excellent reporting, telemetry, and artificial intelligence features. With the telemetry, I can set thresholds to detect sudden changes and the alarms go through the PLC parts. I can see all the ports running on that trunk.”
A senior security engineer at a tech services company, says, “Cisco Stealthwatch has predefined alerts for different types of security issues that might happen in the network. Whether it's PCs or servers that are used for botnets or Bitcoin mining we receive the alerts automatically. This functionality is what we receive from the solution out of the box.”
Trend Micro Deep Discovery [EOL] offers real-time network traffic visibility, advanced sandboxing, and threat intelligence sharing, improving threat management for organizations through seamless integration with security products and precise threat detection in simulated environments.
Recognized for its ability to detect advanced persistent threats and zero-day exploits, Trend Micro Deep Discovery [EOL] provides insights into malicious activities while maintaining compatibility with multiple platforms. Its custom sandboxing technology allows detailed environmental simulations to identify threats accurately. Despite the benefits, there are challenges such as the need for enhanced support in regions like India, better scalability, and easier usage for non-technical users. Integration with third-party tools could also improve alongside a simpler pricing model. Security features, stability, and flexibility are areas requiring enhancement to meet broader industry needs.
What are the key features of Trend Micro Deep Discovery [EOL]In industries focused on network security and compliance, Trend Micro Deep Discovery [EOL] finds use in intrusion detection and protection against malware, phishing, and ransomware. Companies deploy it for email filtration and network analysis, ensuring secure data management and virtual patching to address zero-day vulnerabilities. On-premises implementation includes role-based access and scanning of virtual environments, aiding in meeting security compliance standards and reducing server downtime.
We monitor all Network Detection and Response (NDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.