Try our new research platform with insights from 80,000+ expert users

Symantec Data Center Security vs Trellix Embedded Control vs Trend Micro Deep Security comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Mindshare comparison

Cloud and Data Center Security Market Share Distribution
ProductMarket Share (%)
Symantec Data Center Security1.8%
Illumio22.8%
Akamai Guardicore Segmentation21.5%
Other53.9%
Cloud and Data Center Security
IoT Security Market Share Distribution
ProductMarket Share (%)
Trellix Embedded Control2.0%
Nozomi Networks27.2%
Armis17.1%
Other53.7%
IoT Security
Virtualization Security Market Share Distribution
ProductMarket Share (%)
Trend Micro Deep Security43.2%
Sophos Virtualization Security16.9%
Entrust CloudControl15.3%
Other24.599999999999994%
Virtualization Security
 

Featured Reviews

Shahram Dehghani - PeerSpot reviewer
A robust solution that provides comprehensive protection for data centers, offering agentless security, powerful intrusion prevention, and a wide range of security features
The primary focus of data center security often revolves around serving customers who offer services to other clients within the data center. For example, if I operate a data center and provide security services, third-party customers might purchase virtual machine products within my data center. These products are automatically deployed, and we safeguard these virtual machines using intrusion prevention system features. This aspect is considered the most valuable part because when we set up these security policies, it's as if we're fortifying the entire infrastructure. It's not just about having good technical support; it's about having a robust IPS and comprehensive DOS prevention system on those operating systems. The advantage of Data Center Security is its ease of use and that it serves as a single unified platform, where I can apply all my security policies to protect that server.
Abdullah Al Hadi - PeerSpot reviewer
Offers DLP solutions with drive encryption, and application control
When installing McAfee ePO, we need to set up a self-check configuration. To join the system, we run a specific command. We configure connections for the data center, data server, and application server during this setup. Sometimes, we encounter communication issues between the database and application servers. These issues can prevent the database from communicating with ePO, leading to problems with updates and other functions. If the database cannot communicate with ePO, it affects our ability to manage configurations and updates, creating various issues. Additionally, roaming users outside the network must receive the latest signatures and updates. In a Citrix environment, a handler is configured to manage communication for these roaming users. However, we sometimes face issues with public and private IP configurations. Users may prefer to keep their IPs private, which can cause complications. For environments without Internet access, we use a DNS server to facilitate updates, which are managed locally. This type of configuration can be complex, but it's crucial for maintaining functionality without external network access. Trellix Embedded Control is a product used by companies in infrastructure development. The specific products and tools they use can vary based on their needs. DLP operates with devices, but network DLP is required for classification tasks. The choice of solutions depends on the organization's infrastructure and customer requirements, guiding the following implementation steps. Clients deploy the solution with their provider within one week.
Avnish Kumar - PeerSpot reviewer
Virtual patching has protected critical workloads and reduced downtime across financial environments
The best features Trend Micro Deep Security offers include virtual patching and comprehensive protection from multiple modules such as anti-malware, web reputation, firewall, integrity monitoring, and log inspection. It is very user-friendly, easy to understand, and helps us integrate multiple products with Deep Security. The user-friendly aspect and integration of Trend Micro Deep Security have helped my team significantly. For example, we can integrate our SIEM product, Active Directory, and multiple platforms. If an operations engineer cannot find something or forgets about a suspicious activity, we can identify the suspicious thing with the help of the SIEM. With Active Directory, we maintain our compliance, checking which server has Deep Security and which does not. By integrating these solutions, we effectively maintain compliance in our environment. Trend Micro Deep Security has positively impacted our organization because we have implemented it for multiple purposes, primarily for server security. It is installed on both multiple virtual and physical servers with minimal performance impact. It has been extremely stable throughout our usage, with no major disturbances.
report
Use our free recommendation engine to learn which Cloud and Data Center Security solutions are best for your needs.
872,019 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
12%
Manufacturing Company
12%
Computer Software Company
8%
Construction Company
7%
No data available
Computer Software Company
13%
Financial Services Firm
12%
Manufacturing Company
10%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business4
Midsize Enterprise2
Large Enterprise5
No data available
By reviewers
Company SizeCount
Small Business36
Midsize Enterprise24
Large Enterprise42
 

Questions from the Community

What do you like most about Symantec Data Center Security?
The granularity of applying the policies is valuable.
What needs improvement with Symantec Data Center Security?
Agent management is a challenging task. We cannot do it from the console. We will have to use other tools.
What is your primary use case for Symantec Data Center Security?
One key use case for data center security is protecting files within the data center. This is especially important fo...
What is your experience regarding pricing and costs for Trellix Embedded Control?
Trellix is expensive, depending on the organization's size and financial capacity. For some, it is economical and fit...
What needs improvement with Trellix Embedded Control?
Customers and organizations are aware of attacks in VPN environments and how to protect against them. Forensic invest...
What is your primary use case for Trellix Embedded Control?
Trellix offers many products, such as DLP solutions for endpoint and network, drive encryption, and application contr...
Is Crowdstrike Falcon better than Trend Micro Deep Security?
I like that Crowdstrike allows me to easily correlate data between my firewalls. What’s most useful for my needs is t...
What's the difference between Trend Micro Deep Security and Trend Micro Apex One?
Trend Micro Deep Security offers a lot of features. It guarantees security for your data center, cloud, and container...
 

Also Known As

No data available
McAfee Embedded Control, Intel Security Controller, McAfee Controller
Deep Security
 

Overview

 

Sample Customers

Information Not Available
Kleberg Bank, Sicredi, Seagate, Loop Technology, Vidant Health, Xcel Energy, Cook County, Berkshire Health Systems, Mauser, China Pacific Insurance, Cologne-Bonn Airport, Bank Central Asia, Boston Medical Center, Boston Scientific
Rush University Medical Center, Guess? Inc., Mazda Motor Logistics Europe, MEDHOST, KSC Commercial Internet Co., Ricoh Company Ltd., Square Enix, SoftBank Telecom, Telecom Italia, United Way of Greater Atlanta, A&W Food Services of Canada
Find out what your peers are saying about Akamai, SentinelOne, Broadcom and others in Cloud and Data Center Security. Updated: October 2025.
872,019 professionals have used our research since 2012.