Try our new research platform with insights from 80,000+ expert users

Illumio vs Trellix Embedded Control vs Trend Micro Deep Security comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Mindshare comparison

Cloud and Data Center Security Market Share Distribution
ProductMarket Share (%)
Illumio19.5%
Akamai Guardicore Segmentation18.8%
Cisco Secure Workload11.5%
Other50.2%
Cloud and Data Center Security
IoT Security Market Share Distribution
ProductMarket Share (%)
Trellix Embedded Control2.6%
Nozomi Networks18.3%
Armis12.9%
Other66.19999999999999%
IoT Security
Virtualization Security Market Share Distribution
ProductMarket Share (%)
Trend Micro Deep Security38.4%
Sophos Virtualization Security19.8%
Juniper vSRX18.1%
Other23.69999999999999%
Virtualization Security
 

Featured Reviews

US
Cyber Security Architect at a tech vendor with 10,001+ employees
Have created granular security policies based on roles and application behavior
The best feature that Illumio offers is that we can easily understand how to label the applications, how to install Illumio agent on the client machines, how to install the agent on the servers, and how to do the ring-fencing. The log analysis is very simple, and we can map the traffic very easily, such as the traffic view and map view. We have many views to do that, and then we have a topology environment where we can expand the topology and understand how we want to prepare our policy based on the requirement. These are some of the very good use cases that Illumio provides, which none of the other vendors can offer in such an easy and usable way. The most important feature is the traffic review analysis, where we use the draft view and the reported view that helps us understand how the application interacts with other applications in the environment, and based on that, we are able to define the policies. It has increased the business for the organization. We are creating business by supporting the client. The client is getting more security and is more confident in their network because they now have the micro-segmentation feature in their environment. This is new technology and that's how it helps the organization as a whole. The clients we support are benefited, and at the same time, we are making money out of it. This is definitely a good approach. After implementing Illumio, there has been significant progress. Most of the app owners now understand what applications are communicating, how these applications interact with others, and we are more aware of which application is talking to what other servers and applications, and their roles. For instance, whether an application is talking to the DB server or an app server. We have a more granular understanding of the traffic view. Additionally, after implementing Illumio, there is greater segmentation, and fewer incidents are occurring. There have been times when an attack was halted from expanding laterally.
Abdullah Al Hadi - PeerSpot reviewer
Information Security Engineer at Nhq Distribution Ltd
Offers DLP solutions with drive encryption, and application control
When installing McAfee ePO, we need to set up a self-check configuration. To join the system, we run a specific command. We configure connections for the data center, data server, and application server during this setup. Sometimes, we encounter communication issues between the database and application servers. These issues can prevent the database from communicating with ePO, leading to problems with updates and other functions. If the database cannot communicate with ePO, it affects our ability to manage configurations and updates, creating various issues. Additionally, roaming users outside the network must receive the latest signatures and updates. In a Citrix environment, a handler is configured to manage communication for these roaming users. However, we sometimes face issues with public and private IP configurations. Users may prefer to keep their IPs private, which can cause complications. For environments without Internet access, we use a DNS server to facilitate updates, which are managed locally. This type of configuration can be complex, but it's crucial for maintaining functionality without external network access. Trellix Embedded Control is a product used by companies in infrastructure development. The specific products and tools they use can vary based on their needs. DLP operates with devices, but network DLP is required for classification tasks. The choice of solutions depends on the organization's infrastructure and customer requirements, guiding the following implementation steps. Clients deploy the solution with their provider within one week.
Avnish Kumar - PeerSpot reviewer
Information Technology Service Desk Manager at a tech services company with 10,001+ employees
Virtual patching has protected critical workloads and reduced downtime across financial environments
The best features Trend Micro Deep Security offers include virtual patching and comprehensive protection from multiple modules such as anti-malware, web reputation, firewall, integrity monitoring, and log inspection. It is very user-friendly, easy to understand, and helps us integrate multiple products with Deep Security. The user-friendly aspect and integration of Trend Micro Deep Security have helped my team significantly. For example, we can integrate our SIEM product, Active Directory, and multiple platforms. If an operations engineer cannot find something or forgets about a suspicious activity, we can identify the suspicious thing with the help of the SIEM. With Active Directory, we maintain our compliance, checking which server has Deep Security and which does not. By integrating these solutions, we effectively maintain compliance in our environment. Trend Micro Deep Security has positively impacted our organization because we have implemented it for multiple purposes, primarily for server security. It is installed on both multiple virtual and physical servers with minimal performance impact. It has been extremely stable throughout our usage, with no major disturbances.
report
Use our free recommendation engine to learn which Cloud and Data Center Security solutions are best for your needs.
881,346 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
18%
Computer Software Company
12%
Manufacturing Company
8%
Insurance Company
6%
No data available
Financial Services Firm
13%
Computer Software Company
11%
Manufacturing Company
9%
Educational Organization
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business3
Midsize Enterprise1
Large Enterprise8
No data available
By reviewers
Company SizeCount
Small Business36
Midsize Enterprise24
Large Enterprise46
 

Questions from the Community

What is your experience regarding pricing and costs for Illumio Adaptive Security Platform?
My experience was really good because I think it's not very expensive if we compare it with Guardicore. I believe tha...
What needs improvement with Illumio Adaptive Security Platform?
Illumio can be improved if we have more interactive sessions with the tech team. The support of Illumio can be better...
What is your primary use case for Illumio Adaptive Security Platform?
The main use case for Illumio is providing micro-segmentation where we don't want to segment the network based on IP ...
What is your experience regarding pricing and costs for Trellix Embedded Control?
Trellix is expensive, depending on the organization's size and financial capacity. For some, it is economical and fit...
What needs improvement with Trellix Embedded Control?
Customers and organizations are aware of attacks in VPN environments and how to protect against them. Forensic invest...
What is your primary use case for Trellix Embedded Control?
Trellix offers many products, such as DLP solutions for endpoint and network, drive encryption, and application contr...
Is Crowdstrike Falcon better than Trend Micro Deep Security?
I like that Crowdstrike allows me to easily correlate data between my firewalls. What’s most useful for my needs is t...
What's the difference between Trend Micro Deep Security and Trend Micro Apex One?
Trend Micro Deep Security offers a lot of features. It guarantees security for your data center, cloud, and container...
 

Also Known As

Illumio Adaptive Security Platform, Illumio ASP
McAfee Embedded Control, Intel Security Controller, McAfee Controller
Deep Security
 

Overview

 

Sample Customers

Plantronics, NTT Innovation Institute Inc.
Kleberg Bank, Sicredi, Seagate, Loop Technology, Vidant Health, Xcel Energy, Cook County, Berkshire Health Systems, Mauser, China Pacific Insurance, Cologne-Bonn Airport, Bank Central Asia, Boston Medical Center, Boston Scientific
Rush University Medical Center, Guess? Inc., Mazda Motor Logistics Europe, MEDHOST, KSC Commercial Internet Co., Ricoh Company Ltd., Square Enix, SoftBank Telecom, Telecom Italia, United Way of Greater Atlanta, A&W Food Services of Canada
Find out what your peers are saying about Akamai, Broadcom, SentinelOne and others in Cloud and Data Center Security. Updated: January 2026.
881,346 professionals have used our research since 2012.