No more typing reviews! Try our Samantha, our new voice AI agent.

Illumio vs Trellix Embedded Control vs TrendAI Deep Security comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Mindshare comparison

Cloud and Data Center Security Mindshare Distribution
ProductMindshare (%)
Illumio16.1%
Akamai Guardicore Segmentation15.2%
VMware NSX10.2%
Other58.5%
Cloud and Data Center Security
IoT Security Mindshare Distribution
ProductMindshare (%)
Trellix Embedded Control2.5%
Nozomi Networks13.3%
Armis11.9%
Other72.3%
IoT Security
Virtualization Security Mindshare Distribution
ProductMindshare (%)
TrendAI Deep Security35.7%
Juniper vSRX18.9%
Sophos Virtualization Security16.9%
Other28.5%
Virtualization Security
 

Featured Reviews

Irfan Sharfi - PeerSpot reviewer
Security Professional at a tech vendor with 10,001+ employees
Micro-segmentation has transformed endpoint protection and now isolates internal threats effectively
Illumio can be improved in several areas based on our feedback. Sometimes, the PCE experiences slowness, especially when deploying around 300,000 endpoint devices. When these devices communicate within the network, loading the map or connections can cause latency, which needs improvement for a more user-friendly and faster experience. Regarding improvements to the interface, I believe we can add more features to the graphical user interface, such as proper logs. While the logs currently indicate what was blocked or allowed, clicking on a specific log should provide more information, such as which extra-scope rule is causing a denial, offering better analysis for troubleshooting.
Abdullah Al Hadi - PeerSpot reviewer
Information Security Engineer at Nhq Distribution Ltd
Offers DLP solutions with drive encryption, and application control
When installing McAfee ePO, we need to set up a self-check configuration. To join the system, we run a specific command. We configure connections for the data center, data server, and application server during this setup. Sometimes, we encounter communication issues between the database and application servers. These issues can prevent the database from communicating with ePO, leading to problems with updates and other functions. If the database cannot communicate with ePO, it affects our ability to manage configurations and updates, creating various issues. Additionally, roaming users outside the network must receive the latest signatures and updates. In a Citrix environment, a handler is configured to manage communication for these roaming users. However, we sometimes face issues with public and private IP configurations. Users may prefer to keep their IPs private, which can cause complications. For environments without Internet access, we use a DNS server to facilitate updates, which are managed locally. This type of configuration can be complex, but it's crucial for maintaining functionality without external network access. Trellix Embedded Control is a product used by companies in infrastructure development. The specific products and tools they use can vary based on their needs. DLP operates with devices, but network DLP is required for classification tasks. The choice of solutions depends on the organization's infrastructure and customer requirements, guiding the following implementation steps. Clients deploy the solution with their provider within one week.
reviewer2759025 - PeerSpot reviewer
Information Technology Service Desk Manager at a tech vendor with 5,001-10,000 employees
Virtual patching has protected critical workloads and reduced downtime across financial environments
The best features Trend Micro Deep Security offers include virtual patching and comprehensive protection from multiple modules such as anti-malware, web reputation, firewall, integrity monitoring, and log inspection. It is very user-friendly, easy to understand, and helps us integrate multiple products with Deep Security. The user-friendly aspect and integration of Trend Micro Deep Security have helped my team significantly. For example, we can integrate our SIEM product, Active Directory, and multiple platforms. If an operations engineer cannot find something or forgets about a suspicious activity, we can identify the suspicious thing with the help of the SIEM. With Active Directory, we maintain our compliance, checking which server has Deep Security and which does not. By integrating these solutions, we effectively maintain compliance in our environment. Trend Micro Deep Security has positively impacted our organization because we have implemented it for multiple purposes, primarily for server security. It is installed on both multiple virtual and physical servers with minimal performance impact. It has been extremely stable throughout our usage, with no major disturbances.
report
Use our free recommendation engine to learn which Cloud and Data Center Security solutions are best for your needs.
893,244 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
18%
Computer Software Company
11%
Manufacturing Company
8%
Insurance Company
6%
No data available
Financial Services Firm
16%
Manufacturing Company
9%
Computer Software Company
7%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business4
Midsize Enterprise1
Large Enterprise12
No data available
By reviewers
Company SizeCount
Small Business37
Midsize Enterprise24
Large Enterprise47
 

Questions from the Community

What is your experience regarding pricing and costs for Illumio Adaptive Security Platform?
It will be the same price as the Akamai price for Guardicore. It's expensive, that's true. But when you compare it to...
What needs improvement with Illumio Adaptive Security Platform?
Illumio does not have much in terms of application dependency mapping features. They lack layer 7 process level segme...
What is your primary use case for Illumio Adaptive Security Platform?
Illumio's use case compared to Akamai is exactly the same. For the purpose of micro-segmentation, it is the same.
What is your experience regarding pricing and costs for Trellix Embedded Control?
Trellix is expensive, depending on the organization's size and financial capacity. For some, it is economical and fit...
What needs improvement with Trellix Embedded Control?
Customers and organizations are aware of attacks in VPN environments and how to protect against them. Forensic invest...
What is your primary use case for Trellix Embedded Control?
Trellix offers many products, such as DLP solutions for endpoint and network, drive encryption, and application contr...
Is Crowdstrike Falcon better than Trend Micro Deep Security?
I like that Crowdstrike allows me to easily correlate data between my firewalls. What’s most useful for my needs is t...
What's the difference between Trend Micro Deep Security and Trend Micro Apex One?
Trend Micro Deep Security offers a lot of features. It guarantees security for your data center, cloud, and container...
What is your experience regarding pricing and costs for Trend Micro Deep Security?
My experience with pricing is that it is really challenging because its pricing is very high. However, the setup cost...
 

Also Known As

Illumio Adaptive Security Platform, Illumio ASP
McAfee Embedded Control, Intel Security Controller, McAfee Controller
Deep Security
 

Overview

 

Sample Customers

Plantronics, NTT Innovation Institute Inc.
Kleberg Bank, Sicredi, Seagate, Loop Technology, Vidant Health, Xcel Energy, Cook County, Berkshire Health Systems, Mauser, China Pacific Insurance, Cologne-Bonn Airport, Bank Central Asia, Boston Medical Center, Boston Scientific
Rush University Medical Center, Guess? Inc., Mazda Motor Logistics Europe, MEDHOST, KSC Commercial Internet Co., Ricoh Company Ltd., Square Enix, SoftBank Telecom, Telecom Italia, United Way of Greater Atlanta, A&W Food Services of Canada
Find out what your peers are saying about Akamai, Broadcom, Illumio and others in Cloud and Data Center Security. Updated: April 2026.
893,244 professionals have used our research since 2012.