Elastic Security vs Trend Micro Smart Protection comparison

Cancel
You must select at least 2 products to compare!
Elastic Logo
15,437 views|12,779 comparisons
86% willing to recommend
Trend Micro Logo
3,071 views|1,991 comparisons
84% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Elastic Security and Trend Micro Smart Protection based on real PeerSpot user reviews.

Find out in this report how the two Log Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Elastic Security vs. Trend Micro Smart Protection Report (Updated: March 2020).
769,789 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"ELK is open-source, and it will give you the framework you need to build everything from scratch.""Just the ability to do a lot more than just up-down is nice, which a lot of people take for granted.""The solution is quite stable. The performance has been good.""I like that it's a SIEM platform. I like that I can sell Elastic Security quickly. Elastic Security has a large community that can support users.""The most valuable feature for me is Discover.""Elastic is straightforward, easy to integrate, and highly customizable.""It's simple and easy to use.""It's very stable and reliable."

More Elastic Security Pros →

"The stability is good and I like the level of performance I can get.""Trend Micro Smart Protection includes compliance features where you can establish rules against endpoint vulnerabilities and attack parameters. It offers Smart Detection, Smart Update, and sandboxing to detect and analyze suspicious files, providing a smart approach to zero-day threat detection. Trend Micro Smart Protection offers rapid response to zero-day threats with a strong team backing up the discovery process. Virtual patching is a crucial feature, effectively closing vulnerable ports and access points. Regarding web reputation services, aggregating data from multiple sources, including Trend Micro, Proofpoint, and others, helps inform threat prevention efforts and automate responses.""The most valuable feature of Trend Micro Smart Protection is automatic scanning.""The tool will query the information from the cloud to identify suspicious or malicious files that can be a threat. It will provide you with real-time updates on the latest and ongoing attacks and malware information.""The administration through the cloud is valuable.""The most valuable aspect of the solution is that it also protects our smartphones. It's one of the reasons we use Trend Micro specifically.""It is their most comprehensive endpoint protection solution. It includes DLP and Office 365. It also includes device control and the rest of the little bells and whistles that the traditional AV vendors have.""The solution gives users peace of mind that, form an endpoint perspective, they are protected once it is installed."

More Trend Micro Smart Protection Pros →

Cons
"Its documentation should be a bit better. I have to spend at least a couple of hours to find the solution for a simple thing. When we buy Elastic, training is not included for free with Elastic. We have to pay extra for the training. They should include training in the price.""Upgrades currently released as stacks when it should be a plugin or an extension to save removal and reinstallation.""Elastic Security's maintenance is hard and its scalability is a challenge. There are complications in scaling and upgrading. The solution needs to also provide periodic upgrade checks.""This type of monitoring is not very mature just yet. We need more real-time information in a way that's easier to manage.""There is room for improvement in the Kibana dashboard and in the asset management for the program.""There is an area of improvement in the Logs list. The load list may need to be paginated as there are limits.""We are paying dearly for the guy who is working on the ELK Stack. That knowledge is quite rare and hard to come by. For difficulty and availability of resources, I would rate it a five out of 10.""Sometimes, the solution isn't the easiest to use."

More Elastic Security Cons →

"Trend Micro Smart Protection is a very system-intensive product, and it would be better if it could be made less burdensome on the resources.""Recently our end users are feeling that their system resources are too occupied and slowed because of the Trend Micro agent - that the agent is doing lots and lots of background activities which include that Application Control, Advanced Threat Protection. We raised the complaint with them and are waiting for their technical support. The support could be faster for all the Trend Micro solutions.""I'm not sure about the cloud migration part, in terms of whether it is seamless or not.""It does not provide insights into what is being done.""I've not explored all of the features up to now. I still need to see all of the features implemented first to be able to see if anything is missing. However, as of right now, it's working very well for us.""I cannot recall noticing any missing features.""It is onsite. It does have its challenges in terms of scalability.""The solution could be more stable and secure."

More Trend Micro Smart Protection Cons →

Pricing and Cost Advice
  • "We use the open-source version, so there is no charge for this solution."
  • "We are using the free, open-source version of this solution."
  • "Elastic Stack is an open-source tool. You don't have to pay anything for the components."
  • "There is no charge for using the open-source version."
  • "This is an open-source product, so there are no costs."
  • "It's a monthly cost with Elastic SIEM, but I am not sure of the exact cost."
  • "It is easy to deploy, easy to use, and you get everything you need to become operational with it, and have nothing further to pay unless you want the OLED plugin."
  • "Compared to other products such as Dynatrace, this is one of the cheaper options."
  • More Elastic Security Pricing and Cost Advice →

  • "We pay for the solution on a yearly basis. We pay approximately 100 Euros a year per user. There are no additional fees above this."
  • "This solution provides good value for the price."
  • "The licensing is on a yearly basis and I believe our organization paid about $2,000/year. However, it's been a while since I looked at the pricing and we no longer use the solution."
  • "Our organization has paid licensing for three years, which averaged about $4.00 USD per user. We've been satisfied with the licensing. It's quite reasonable."
  • "Its price is fine. Price-wise, it is competitive with any other vendor."
  • "If I'm not mistaken, for three years, for 400 licenses, we paid nearly 15,000 euros. We don't have any additional costs that we have to pay on top of that."
  • "The pricing is good compared to Symantec and McAfee."
  • "The cost seems competitive."
  • More Trend Micro Smart Protection Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Log Management solutions are best for your needs.
    769,789 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:With Datadog, we have near-live visibility across our entire platform. We have seen APM metrics impacted several times lately using the dashboards we have created with Datadog; they are very good core… more »
    Top Answer:It is an extremely stable solution. Stability-wise, I rate the solution a ten out of ten.
    Top Answer:The product offers an amazing pricing structure. Price-wise, the product is very competitive.
    Top Answer:In terms of licensing cost, it falls within the average range compared to competitors, almost 7 out of 10.
    Top Answer:No online encryption or cloud services are available for the tool, so my company has to install it mostly in an on-premises environment. Encryption or cloud services need to be made available in the… more »
    Ranking
    5th
    out of 95 in Log Management
    Views
    15,437
    Comparisons
    12,779
    Reviews
    25
    Average Words per Review
    488
    Rating
    7.7
    Views
    3,071
    Comparisons
    1,991
    Reviews
    12
    Average Words per Review
    386
    Rating
    7.6
    Comparisons
    Also Known As
    Elastic SIEM, ELK Logstash
    Trend Micro Smart Protection Complete
    Learn More
    Overview
    Elastic Security is a robust, open-source security solution designed to offer integrated threat prevention, detection, and response capabilities across an organization's entire digital estate. Part of the Elastic Stack (which includes Elasticsearch, Logstash, and Kibana), Elastic Security leverages the power of search, analytics, and data aggregation to provide real-time insight into threats and vulnerabilities. It is a comprehensive platform that supports a wide range of security needs, from endpoint protection to cloud and network security, making it a versatile choice for organizations looking to enhance their cybersecurity posture.


    Elastic Security combines the features of a security information and event management (SIEM) system with endpoint protection, allowing organizations to detect, investigate, and respond to threats in real time. This unified approach helps reduce complexity and improve the efficiency of security operations.

    Additional offerings and benefits:

    • The platform utilizes advanced analytics, machine learning algorithms, and anomaly detection to identify threats and suspicious activities.
    • It offers extensive integration options with other tools and platforms, facilitating a more cohesive and comprehensive security ecosystem.
    • With Kibana, users gain access to powerful visualization tools and dashboards that provide real-time insight into security data.

    Finally, Elastic Security benefits from a global community of users who contribute to its threat intelligence, helping to enhance its detection capabilities. This collaborative approach ensures that the solution remains on the cutting edge of cybersecurity, with up-to-date information on the latest threats and vulnerabilities.

    Traditional security solutions can’t keep up with your users. Turning to multiple point products to address the myriad of challenges only increases complexity and may leave gaps in your security. Plus, you need a flexible solution that can grow and change with you as you migrate from on-premises to the cloud. To effectively counter today’s evolving threat landscape, you need integrated security that consolidates your view across all layers of protection and all deployment models.
    Trend Micro™ Smart Protection Complete is a connected suite of security capabilities that protects
    your users no matter where they go or what they do. This modern security delivers the best protection at multiple layers: endpoint, application, and network, using the broadest range of threat protection techniques available. Plus, you can evolve your protection along with your business using flexible on-premises, cloud, and hybrid deployment models that fit your IT environment today and tomorrow. In addition, you can manage users across multiple threat vectors from a single “pane of glass,” giving you complete visibility of the security of your environment.

    Sample Customers
    Texas A&M, U.S. Air Force, NuScale Power, Martin's Point Health Care
    Atma Jaya Catholic University of Indonesia, Blekinge County Council, Bulgarian American Credit Bank, Cancer Research UK, Delacour, Evalueserve, Gulftainer, Hiroshima Red Cross Hospital & Atomic-bomb Survivors Hospital, Mazda Motor Logistics Europe, MEDHOST, Nikigolf, Ochsner Health System, SIAX Computing Solutions, Tegen
    Top Industries
    REVIEWERS
    Financial Services Firm29%
    Computer Software Company25%
    Healthcare Company13%
    Comms Service Provider8%
    VISITORS READING REVIEWS
    Computer Software Company17%
    Financial Services Firm10%
    Government9%
    Comms Service Provider7%
    REVIEWERS
    Financial Services Firm23%
    Computer Software Company19%
    Comms Service Provider15%
    Pharma/Biotech Company8%
    VISITORS READING REVIEWS
    Computer Software Company20%
    Manufacturing Company9%
    Financial Services Firm8%
    Government7%
    Company Size
    REVIEWERS
    Small Business60%
    Midsize Enterprise18%
    Large Enterprise23%
    VISITORS READING REVIEWS
    Small Business26%
    Midsize Enterprise18%
    Large Enterprise56%
    REVIEWERS
    Small Business33%
    Midsize Enterprise33%
    Large Enterprise33%
    VISITORS READING REVIEWS
    Small Business27%
    Midsize Enterprise20%
    Large Enterprise53%
    Buyer's Guide
    Elastic Security vs. Trend Micro Smart Protection
    March 2020
    Find out what your peers are saying about Elastic Security vs. Trend Micro Smart Protection and other solutions. Updated: March 2020.
    769,789 professionals have used our research since 2012.

    Elastic Security is ranked 5th in Log Management with 58 reviews while Trend Micro Smart Protection is ranked 31st in Endpoint Protection Platform (EPP) with 38 reviews. Elastic Security is rated 7.6, while Trend Micro Smart Protection is rated 8.0. The top reviewer of Elastic Security writes "A stable and scalable tool that provides visibility along with the consolidation of logs to its users". On the other hand, the top reviewer of Trend Micro Smart Protection writes "Offers strong, all-around cybersecurity but is expensive". Elastic Security is most compared with Wazuh, Splunk Enterprise Security, Microsoft Sentinel, IBM Security QRadar and Microsoft Defender for Endpoint, whereas Trend Micro Smart Protection is most compared with Trend Micro Apex One, Check Point Harmony Endpoint, CrowdStrike Falcon, HP Wolf Security and Microsoft Defender for Endpoint. See our Elastic Security vs. Trend Micro Smart Protection report.

    We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.