Try our new research platform with insights from 80,000+ expert users

Symantec Data Center Security vs Trellix Embedded Control vs Trend Micro Deep Security comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Mindshare comparison

Cloud and Data Center Security Market Share Distribution
ProductMarket Share (%)
Symantec Data Center Security2.5%
Illumio19.5%
Akamai Guardicore Segmentation18.8%
Other59.2%
Cloud and Data Center Security
IoT Security Market Share Distribution
ProductMarket Share (%)
Trellix Embedded Control2.6%
Nozomi Networks18.3%
Armis12.9%
Other66.19999999999999%
IoT Security
Virtualization Security Market Share Distribution
ProductMarket Share (%)
Trend Micro Deep Security38.4%
Sophos Virtualization Security19.8%
Juniper vSRX18.1%
Other23.69999999999999%
Virtualization Security
 

Featured Reviews

Muhammad Ejaz ul Hassan - PeerSpot reviewer
CEO at a tech services company with 51-200 employees
Continuous server hardening has protected critical legacy workloads and simplified security control
Symantec is lagging on the reporting side. I have been working for 10 years and I have identified many gray areas. As a user protecting your infrastructure, you need to sell the value to your management. Management buys the tool for preventing threats, and it works for them. However, you cannot sell it because every solution needs to show what happened in the last few years or how you will be protected in the future. Reporting is the most important thing for the CIO level, not the admin level. I have seen Symantec really lag in this area. I am creating my own tool to build a dashboard to share with the CIO level because they want to know what happened last week, last month, and last year. These reports will tell you about activities. Symantec changed the licensing when Broadcom acquired the company. The question of who will provide support became unclear. Support has now changed and they are making money. I have seen that most of the time when you ask implementation questions, they do not answer you. If you have a problem, they give you a low-level engineer at the first level. This delays resolution. Support has to be better.
Abdullah Al Hadi - PeerSpot reviewer
Information Security Engineer at Nhq Distribution Ltd
Offers DLP solutions with drive encryption, and application control
When installing McAfee ePO, we need to set up a self-check configuration. To join the system, we run a specific command. We configure connections for the data center, data server, and application server during this setup. Sometimes, we encounter communication issues between the database and application servers. These issues can prevent the database from communicating with ePO, leading to problems with updates and other functions. If the database cannot communicate with ePO, it affects our ability to manage configurations and updates, creating various issues. Additionally, roaming users outside the network must receive the latest signatures and updates. In a Citrix environment, a handler is configured to manage communication for these roaming users. However, we sometimes face issues with public and private IP configurations. Users may prefer to keep their IPs private, which can cause complications. For environments without Internet access, we use a DNS server to facilitate updates, which are managed locally. This type of configuration can be complex, but it's crucial for maintaining functionality without external network access. Trellix Embedded Control is a product used by companies in infrastructure development. The specific products and tools they use can vary based on their needs. DLP operates with devices, but network DLP is required for classification tasks. The choice of solutions depends on the organization's infrastructure and customer requirements, guiding the following implementation steps. Clients deploy the solution with their provider within one week.
Avnish Kumar - PeerSpot reviewer
Information Technology Service Desk Manager at a tech services company with 10,001+ employees
Virtual patching has protected critical workloads and reduced downtime across financial environments
The best features Trend Micro Deep Security offers include virtual patching and comprehensive protection from multiple modules such as anti-malware, web reputation, firewall, integrity monitoring, and log inspection. It is very user-friendly, easy to understand, and helps us integrate multiple products with Deep Security. The user-friendly aspect and integration of Trend Micro Deep Security have helped my team significantly. For example, we can integrate our SIEM product, Active Directory, and multiple platforms. If an operations engineer cannot find something or forgets about a suspicious activity, we can identify the suspicious thing with the help of the SIEM. With Active Directory, we maintain our compliance, checking which server has Deep Security and which does not. By integrating these solutions, we effectively maintain compliance in our environment. Trend Micro Deep Security has positively impacted our organization because we have implemented it for multiple purposes, primarily for server security. It is installed on both multiple virtual and physical servers with minimal performance impact. It has been extremely stable throughout our usage, with no major disturbances.
report
Use our free recommendation engine to learn which Cloud and Data Center Security solutions are best for your needs.
881,346 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Construction Company
9%
Manufacturing Company
8%
Financial Services Firm
8%
Government
7%
No data available
Financial Services Firm
13%
Computer Software Company
11%
Manufacturing Company
9%
Educational Organization
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business5
Midsize Enterprise2
Large Enterprise5
No data available
By reviewers
Company SizeCount
Small Business36
Midsize Enterprise24
Large Enterprise46
 

Questions from the Community

Ask a question
Earn 20 points
What is your experience regarding pricing and costs for Trellix Embedded Control?
Trellix is expensive, depending on the organization's size and financial capacity. For some, it is economical and fit...
What needs improvement with Trellix Embedded Control?
Customers and organizations are aware of attacks in VPN environments and how to protect against them. Forensic invest...
What is your primary use case for Trellix Embedded Control?
Trellix offers many products, such as DLP solutions for endpoint and network, drive encryption, and application contr...
Is Crowdstrike Falcon better than Trend Micro Deep Security?
I like that Crowdstrike allows me to easily correlate data between my firewalls. What’s most useful for my needs is t...
What's the difference between Trend Micro Deep Security and Trend Micro Apex One?
Trend Micro Deep Security offers a lot of features. It guarantees security for your data center, cloud, and container...
 

Also Known As

No data available
McAfee Embedded Control, Intel Security Controller, McAfee Controller
Deep Security
 

Overview

 

Sample Customers

Information Not Available
Kleberg Bank, Sicredi, Seagate, Loop Technology, Vidant Health, Xcel Energy, Cook County, Berkshire Health Systems, Mauser, China Pacific Insurance, Cologne-Bonn Airport, Bank Central Asia, Boston Medical Center, Boston Scientific
Rush University Medical Center, Guess? Inc., Mazda Motor Logistics Europe, MEDHOST, KSC Commercial Internet Co., Ricoh Company Ltd., Square Enix, SoftBank Telecom, Telecom Italia, United Way of Greater Atlanta, A&W Food Services of Canada
Find out what your peers are saying about Akamai, Broadcom, SentinelOne and others in Cloud and Data Center Security. Updated: January 2026.
881,346 professionals have used our research since 2012.