No more typing reviews! Try our Samantha, our new voice AI agent.

Trellix Intrusion Prevention System vs Trend Micro Deep Discovery [EOL] comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Feb 26, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Trellix Intrusion Preventio...
Average Rating
8.4
Reviews Sentiment
6.6
Number of Reviews
16
Ranking in other categories
Intrusion Detection and Prevention Software (IDPS) (13th)
Trend Micro Deep Discovery ...
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
29
Ranking in other categories
No ranking in other categories
 

Featured Reviews

BS
Large account Manager at Softcell Technologies Limited
Has offered reliable threat protection and detailed network insights but could expand features beyond existing capabilities
The best features of Trellix Intrusion Prevention System include advanced ATP (Advanced Threat Protection), which uses signatures, behavior analysis, and machine learning to stop zero-day exploits and malware advanced persistent threats (APTs). They track and collect data from APTs, which allows them to track malicious files entering the environment. The system offers inline prevention and real-time automatic blocking of malicious packets before they reach the network. It integrates with the Trellix ecosystem and provides application visibility and control. The solution provides deep insight into network traffic, applications, and protocols for better information. All packets coming through the application are analyzed and reported. They share intelligence updates regularly to protect from different malicious files and sector-specific threats. It supports both on-premise and cloud environments.
reviewer2266119 - PeerSpot reviewer
Senior IT Security Engineer at a financial services firm with 5,001-10,000 employees
Has improved email security through advanced filtration and timely threat detection
I work with Trend Micro Apex One. I have used the Deep Discovery's Sandbox analysis feature, and we utilize another appliance known as Deep Discovery Analyzer, abbreviated as DDA. This tool makes analysis for URLs and attachments contained in inbound emails, so whenever we receive an email with a URL or attachment, it will be analyzed by Trend Micro Deep Discovery Analyzer. In evaluating Deep Discovery's real-time visibility on network traffic, it is important to note that we applied our Deep Discovery Analyzer for Trend Micro to conduct sandboxing specifically for email channels only, and we do not utilize it for network channels. For network channel sandboxing, we use a solution called FortiAnalyzer, which belongs to another team called network security. I assess Deep Discovery's effectiveness in identifying sophisticated attack patterns by looking at how it handles high traffic loads, and how effectively it can use its instances and images to analyze numerous URLs and attachments simultaneously. Additionally, I evaluate its ability to maintain round-robin or load balancing across different analyses without leaving samples queued for analysis. The performance is critical when the product updates for signatures are up-to-date, as this aids in the detection and classification of URLs and attachments without delay in the analysis process. On a scale of one to ten, I rate Trend Micro Deep Discovery a nine.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable features are the customization of the signature and the unlimited amount of custom signatures in IPS."
"The threat intelligence updates are very accurate."
"The most valuable features in Trellix for me are the automated signature updates. It is a great and convenient feature."
"We feel safer now."
"It has a lot of functions, such as firewall, we create rules to protect our network, monitor traffic in and out, have disk encryption on-premises, and when we detect malware, we scan the PC and can delete or block it."
"It works very well overall, and is excellent for enterprise-level businesses."
"The solution is very stable, reliable, and free of bugs or glitches, and it does not crash or freeze."
"The best feature of the Trellix Intrusion Prevention System is the rules that Trellix provides, I think that's the best value from IPS."
"Initial setup is easy; it can be done by yourself."
"This solution allows us to see anomalies, network traffic in our network, and zero-day threats."
"All in all, the variety of products provided by Trend Micro will give you a huge step up into checking and defending yourself from any threats."
"The real-time visibility on network traffic provided by Trend Micro Deep Discovery is good, and my customer is satisfied."
"The most valuable feature is that the user can customize images of virtual machines in the sandbox functionality. The other vendors only use images that were created by the vendor but not the customer, end-user or partner. This helps to detect advanced threats and attacks."
"The tool's stability and performance are good."
"Generally speaking, it just gives us a broad understanding of exactly what kind of threats occur. The submission point, analyzing point, and virtualization are within the environment that it supports. It helped us to improve our security levels and protect our internal network from any threats outside."
"The platform provides all essential features for discovery and administration."
 

Cons

"Trellix Intrusion Prevention System does not provide virtual patching."
"In terms of high-security attacks, not all of them are developed. You cannot do a rule that includes all high severities."
"The Network Security Managers could be more stable, agile, and work faster."
"The pricing could be improved."
"The platform’s GUI could be the latest."
"Some of the documentation is not as straightforward as it could be. It's much too general - especially in areas related to updates."
"The pricing could be improved."
"Currently, the settings and confirmations on the McAfee console are complex and complicated for our branches."
"I would like to see integration with third-party tools to improve the visibility of the dashboards."
"The scalability is sometimes limited."
"There are certain aspects of flexibility in the policies that should be added to Deep Discovery."
"Sometimes there needs to be a stability test done. We did tests and checked up to around 20 or 25 samples; out of those tests, two missed and were later detected on the endpoint, so it is not completely stable and it misses things."
"I would like to see them create a rule where it could integrate with the network and start mitigating with auto-detection."
"Trend Micro can improve the pricing in general. There is nothing else they can add or improve in the solution."
"There were a few instances where legitimate traffic (WPAD) was flagged as C2 communication."
"I would like the ability to analyze all files in our internal network, at the same time on different operating systems. Not just three of them, but as many as possible."
 

Pricing and Cost Advice

"I rate the product’s pricing an eight out of ten."
"The tool is competitively priced."
"The price of the solution is lower compared to the competition."
"Overall, Trend Micro Deep Discovery has proven to be a reliable solution that enhances our security posture while minimizing operational disruptions."
"Overall, the price is good."
"The tool’s licensing costs depend on the customers."
"Trend Micro Deep Discovery is quite expensive compared to other endpoint security products."
"The licensing cost is a bit pricey. We pay a yearly subscription."
"The tool's licensing costs are yearly. There are no additional costs associated with the product."
"Its price is fine, but Trend Micro can improve the pricing in general. It is a hardware solution. It is based on the number of nodes, and according to the number of nodes, clients decide which box they should acquire. They have to renew their license every year. It is subscription-based."
report
Use our free recommendation engine to learn which Intrusion Detection and Prevention Software (IDPS) solutions are best for your needs.
892,287 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Manufacturing Company
12%
Comms Service Provider
11%
Financial Services Firm
11%
Computer Software Company
7%
Financial Services Firm
11%
Manufacturing Company
8%
Computer Software Company
8%
Healthcare Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise6
Large Enterprise6
By reviewers
Company SizeCount
Small Business16
Midsize Enterprise6
Large Enterprise9
 

Questions from the Community

What needs improvement with McAfee Network Security Platform?
Trellix Intrusion Prevention System does not provide virtual patching. Patching involves updates on the OS side to address vulnerabilities, which is a different functionality. Trellix Intrusion Pre...
What is your primary use case for McAfee Network Security Platform?
We do not use Trellix Intrusion Prevention System; rather, we sell the Trellix Intrusion Prevention System solution. The typical use case for our clients is to find out what vulnerable files exist....
What advice do you have for others considering McAfee Network Security Platform?
I have experience working with other tools, specifically Trellix solutions such as DLP, EDR, and MDR, as well as with other Imperva tools. My team has worked with Trellix Intrusion Prevention Syste...
What do you like most about Trend Micro Deep Discovery?
The tool's most valuable feature is its collaboration with other products. Integrating with other security products was simple and easy.
What needs improvement with Trend Micro Deep Discovery?
Server Protect is not commonly used. When considering the Sandbox feature, it only inspects small files, and not all types of files are supported. The solution is very expensive. The solution is no...
 

Also Known As

McAfee Network Security Platform, McAfee NSP, IntruShield Network Intrusion Prevention System, IntruShield Network IPS
Trend Micro Deep Discovery Inspector, Trend Micro Deep Discovery Analyzer
 

Overview

 

Sample Customers

Desjardins Group, HollyFrontier, Nubia, Agbar, WNS Global Services, INAIL, Universidad de Las Américas Puebla (UDLAP), Cook County, China Pacific Insurance, Bank Central Asia, California Department of Corrections and Rehabilitation, City of Chicago, Macquarie Telecom, Sutherland Global Services, Texas Tech University Health Sciences Center, United Automotive Electronic Systems
Allied Telesis, Atma Jaya Catholic University of Indonesia, Babou, Blekinge County Council, Delacour, Hiroshima Prefectural Government, Live Nation Entertainment Inc., Mazda Motor Logistics Europe, McGill University Health Centre, Mikuni Corporation, OKWAVE, Sinar Mas Land, SWICA, UTOC Corporation
Find out what your peers are saying about Fortinet, Darktrace, Check Point Software Technologies and others in Intrusion Detection and Prevention Software (IDPS). Updated: April 2026.
892,287 professionals have used our research since 2012.