We performed a comparison between Google Kubernetes Engine and Trend Micro Deep Security based on real PeerSpot user reviews.
Find out in this report how the two Container Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The solution is available across AWS, GCP and Azure and is seamless."
"Google Kubernetes Engine (GKE) takes care of managing Kubernetes, including the main control plane. It also offers solutions for monitoring resources and handling external traffic, which is essential for us. Being a cloud-native solution, it relieves us from worrying about these operational aspects."
"Google Kubernetes Engine's most valuable feature is container deployment."
"I am impressed with the product's output scaling."
"I am satisfied with the stability offered by the solution."
"The solution simplified deployment, making it more automated. Previously, Docker required manual configuration, often done by developers on their computers. However, with Google Kubernetes Engine, automation extends to configuration, deployment, scalability, and viability, primarily originating from Docker rather than Kubernetes. Its most valuable feature is the ease of configuration."
"We appreciate that it is quite easy to set up a Kubernetes cluster in Google Cloud, using the managed services within this solution."
"It's easy to manage and deploy. It's the best."
"Patch management is most valuable. The major selling point of Deep Security is that it is based on the cloud. Deep Security is for the servers and databases of data centers, and generally, for patch management, you have to shut down the machines, and then you have to restart them. So, they need shutdown time, which is a cost. Big enterprises don't want to shut down their database or their data center for any kind of patch. Deep Security creates a wall and downloads all patches. You install it on the cloud. So, it saves your server from any kind of intrusion or any kind of penetration, and whenever you get a chance or time, in six, eight, or nine months, you can physically download or install all those patches in one go. So, it saves you time. It also saves your shutdown time and keeps your data center safe."
"Their support is good. They are responsive, which is nice."
"It provides security and protection. The endpoint firewall is valuable."
"Deep Security provides us with a lot of reassurance about security threats. You don't have to worry about a patch not being there in the software. You're confident that all the patches and vulnerabilities are taken care of."
"The most valuable feature of the product is vulnerability detection."
"Deep Security's most valuable features are antivirus and host intrusion detection."
"It helps with virtual patching and IDS fetching."
"It provides the type of data and availability that we need to have. We don't have to worry about intrusions."
"There is a limitation for our infrastructure. It's very complex to see in one dashboard all the components and all the behavior on performance. I am looking for some additional tools for that. If I want to check the disk or file storage, it gets complex. There should be an integrated dashboard so that we can manage everything through a single pane."
"I think that security is an important point, and there should be additional features for the evaluation of data in containers that will create a more secure environment for usage in multi-parent models."
"I would like to see the ability to create multiple notebook configurations."
"Our critique is that we have to do too much work to get the cluster production-ready."
"We would like to see some improvement in the ease of integration with this solution."
"There is room for improvement in the cluster updates process. Specifically, when managing both non-production and production clusters, we need a sequential functionality."
"The product could be cheaper."
"Their documentation is a little here and there. Sometimes, the information is not clear or updated. Their documentation should be a little bit better."
"Some of the reporting and integrations could be more robust."
"AWS products could become more compatible with intrusion detection products leveraging help from Trend Micro."
"The initial setup needs improvement, as it was a bit challenging."
"Requires simplification, a fair amount of trouble shooting required."
"Trend Micro is not government certified or federal complaint. If they could become compliant/certified, this would make it easier for us to use it for our government projects."
"I've not worked with CrowdStrike Falcon, but one of our customers also had CrowdStrike Falcon on some of the devices. I was only supporting Trend Micro. They had a ransomware attack, but Trend Micro didn't detect that particular ransomware attack, whereas CrowdStrike did."
"We are not very happy with Trend Micro Deep Security since it is not able to detect many viruses and bugs."
"The price could be reduced."
Google Kubernetes Engine is ranked 10th in Container Management with 31 reviews while Trend Micro Deep Security is ranked 1st in Virtualization Security with 79 reviews. Google Kubernetes Engine is rated 8.0, while Trend Micro Deep Security is rated 8.6. The top reviewer of Google Kubernetes Engine writes "The auto-scaling feature helps during peak hours, but the support is not great". On the other hand, the top reviewer of Trend Micro Deep Security writes "Offers excellent endpoint protection and great stability ". Google Kubernetes Engine is most compared with Kubernetes, Linode, OpenShift Container Platform, VMware Tanzu Mission Control and Nutanix Kubernetes Engine NKE, whereas Trend Micro Deep Security is most compared with Trend Micro Apex One, CrowdStrike Falcon, Microsoft Defender for Endpoint, Symantec Endpoint Security and VMware Carbon Black Endpoint. See our Google Kubernetes Engine vs. Trend Micro Deep Security report.
We monitor all Container Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.