

Trend Micro Deep Security and CrowdStrike Falcon compete in the cybersecurity protection category. While both have strong offerings, CrowdStrike Falcon seems to have the upper hand in advanced threat detection and AI features as per the data comparisons in each section.
Features: Trend Micro Deep Security offers multi-layer protection that includes anti-malware, intrusion prevention, integrity monitoring, firewall, and virtual patching. It also supports cloud integration with AWS, vCloud, and Azure. CrowdStrike Falcon is notable for its advanced endpoint detection and response capabilities, offering threat intelligence, behavior-based detection, and real-time response. It is appreciated for its ease of use and advanced AI features.
Room for Improvement: Trend Micro Deep Security could benefit from improved agent distribution, more intuitive error messaging, and enhanced Mac support. Users also suggest better global visibility, integrations, and a more user-friendly interface. CrowdStrike Falcon faces challenges with seamless integrations, enhanced forensic capabilities, and a need to reduce false positives. Users have noted the requirement for more comprehensive reporting, improved dashboard navigation, and support for legacy systems.
Ease of Deployment and Customer Service: Trend Micro Deep Security is versatile, supporting both on-premises and cloud environments, with strong local support but mixed impressions on deployment and technical assistance. CrowdStrike Falcon is praised for seamless cloud deployment and proactive support, especially for distributed environments. However, the setup can be challenging, and the quality of technical support varies.
Pricing and ROI: Trend Micro Deep Security is perceived as expensive but justified by its comprehensive feature set and strong ROI, particularly in threat mitigation and server protection. CrowdStrike Falcon has a higher price point, justified by its advanced features and EDR capabilities. À la carte pricing offers customization but may increase costs. Users report positive ROI due to enhanced security and operational efficiencies.
CrowdStrike Falcon saves time and offers good value for money, especially for enterprise companies, because it can stop breaches.
It's very easy to deploy without many IT admins, saving time.
The management console is very useful and easy to operate, allowing policy deployment in a minimal amount of time.
It adds value by providing centralized control over servers and endpoints.
If the customer is interested in technical capabilities, we demonstrate the tools, setup, implementation, and their working.
On a scale of one to ten, I would rate the technical support as a 10 because they resolve many issues for us.
The CrowdStrike team is very efficient; I would rate them ten out of ten.
They could improve by initiating calls for high-priority cases instead of just opening tickets.
Whenever I raise a ticket, whether critical or high priority, their team responds immediately, often over calls, and works towards closing the request with the highest priority.
They have very professional engineers, and they often respond effectively.
A dedicated support engineer will come in within three hours.
It has adequate coverage and is easy to deploy.
In terms of scalability, I find CrowdStrike to be stable, and I have not encountered any limitations with it.
There's no scalability limitation from CrowdStrike itself, as it just requires agent deployment.
Trend Micro Deep Security is highly scalable.
In most organizations, they are using a mix of these security solutions.
You can install it on a script basis for Linux and Windows.
I have never seen instability in the CrowdStrike tool.
We are following N-1 versions across our environment, which is stable.
The biggest issue occurred when every computer worldwide experienced a blue screen.
It has been extremely stable throughout our usage, with no major disturbances.
Trend Micro Deep Security is very stable and provides protection at all times without issues.
We believe that software works fine until it is patched, managed, or monitored by the IT teams.
Simplifying the querying process, such as using double quote queries or directly obtaining logs based on IP addresses or usernames, would be beneficial.
Another concern is CrowdStrike's GUI. It changes annually, making it hard to work and find options.
Threat prevention should be their first priority.
User experience improvement is most crucial, along with enhancements in policy management and the accuracy of the IPS, IDS features for real-time protection.
Additionally, the product is overpriced, which makes it difficult to sell to many customers.
The user interface could be more user-friendly, as navigation sometimes requires familiarity with the console.
It is expensive compared to SentinelOne, but as the market leader, it is worth it.
The licensing cost and setup costs are affordable.
The solution is a bit expensive.
We give a fair comparison of all the products, and give them clear insights of the products, which makes it helpful for the customer to make a final decision to purchase the license or product.
Trend Micro Deep Security is considered overpriced, which poses a challenge in selling it to many customers.
The pricing is moderate, not expensive or very cheap.
I can investigate by accessing the customer's host based on the RTR environment and utilize host search to know details for the past seven days, including logins, processes, file installations, malicious processes, and network connections.
The real-time analytics aspect of CrowdStrike performs well because we get all logs in real-time, with no delay, allowing us to take action immediately.
Being an EDR solution, it helps us identify attacks in real-time.
It has multiple security layers, including anti-malware, intrusion prevention, integrity monitoring, web reputation, application control, firewall, and log inspection.
Patching allows us to virtually patch servers without downtime, which is critical given our limited patching windows, and helps prevent servers from being exploited.
The IPS module offers virtual patches to resolve issues immediately, making it an excellent product that I recommend for anyone with servers.
| Product | Market Share (%) |
|---|---|
| CrowdStrike Falcon | 10.4% |
| Wazuh | 8.1% |
| Darktrace | 6.3% |
| Other | 75.2% |
| Product | Market Share (%) |
|---|---|
| Trend Micro Deep Security | 38.4% |
| Sophos Virtualization Security | 19.8% |
| Juniper vSRX | 18.1% |
| Other | 23.69999999999999% |


| Company Size | Count |
|---|---|
| Small Business | 46 |
| Midsize Enterprise | 34 |
| Large Enterprise | 62 |
| Company Size | Count |
|---|---|
| Small Business | 36 |
| Midsize Enterprise | 24 |
| Large Enterprise | 46 |
CrowdStrike Falcon offers robust endpoint protection and threat detection, leveraging cloud-native architecture and AI-driven capabilities for advanced security. Its design ensures minimal system impact, making it a preferred choice for organizations seeking efficient protection solutions.
CrowdStrike Falcon provides comprehensive security features, including endpoint detection and response, real-time threat insights, and advanced AI-driven detection mechanisms. Its cloud-native architecture facilitates effortless scalability and seamless integration with cloud services, securing endpoints, servers, and roaming users. While Falcon delivers strong threat intelligence and automated detection, it faces challenges in operating system compatibility, reports require enhancements, and integration with some technologies is limited. High pricing and occasional false positives are noted areas for improvement, along with expanded support for older systems.
What are the key features of CrowdStrike Falcon?In industries requiring fortified cybersecurity measures, CrowdStrike Falcon is deployed for endpoint protection and incident response. It offers advanced threat defense and integrates well with cloud services, making it a suitable replacement for traditional antivirus solutions. For sectors engaging in forensic investigations and real-time malware defense, Falcon's capabilities align with their security demands, serving industries from healthcare to finance.
Trend Micro Deep Security is a comprehensive solution for endpoint security and server protection, which prevents ransomware attacks and unauthorized access attempts. Its valuable features include tracing back attacks, antivirus protection, endpoint detection and response, firewall-based solution, threat detection, predictive machine learning and AI monitoring, VPM, virtualization, and sandboxing.
The solution is easy to use, scalable, stable, and reliable, with good technical support. It has helped organizations perform well against malware and vulnerabilities, provide patching from the Protection Cloud, and improve their security posture.
Trend Micro Deep Security Features
Trend Micro Deep Security has many valuable key features. Some of the most useful ones include:
Reviews from Real Users
Trend Micro Deep Security stands out among its competitors for a number of reasons. Two major ones are its robust data and loss prevention feature and its patch management, which saves users money. PeerSpot users take note of the advantages of these features in their reviews:
One PeerSpot reviewer, a Senior Security Advisor at a healthcare company, writes, “DLP, Data Loss Prevention, and the complexity of how we manage the console and how this client, or this tool, will notify us when there is something going wrong within the server and endpoint, is good.”
Nadeem S., CEO at Haniya Technologies, notes of the solution, “Patch management is most valuable. The major selling point of Deep Security is that it is based on the cloud. Deep Security is for the servers and databases of data centers, and generally, for patch management, you have to shut down the machines, and then you have to restart them. So, they need shutdown time, which is a cost.”
We monitor all Extended Detection and Response (XDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.