Try our new research platform with insights from 80,000+ expert users

MetaDefender vs Trend Micro Deep Discovery comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

MetaDefender
Ranking in Advanced Threat Protection (ATP)
37th
Average Rating
9.0
Reviews Sentiment
6.2
Number of Reviews
2
Ranking in other categories
Anti-Malware Tools (37th), Threat Intelligence Platforms (TIP) (38th), Cloud Detection and Response (CDR) (19th)
Trend Micro Deep Discovery
Ranking in Advanced Threat Protection (ATP)
17th
Average Rating
8.4
Reviews Sentiment
6.9
Number of Reviews
28
Ranking in other categories
Intrusion Detection and Prevention Software (IDPS) (6th), Network Detection and Response (NDR) (8th)
 

Mindshare comparison

As of January 2026, in the Advanced Threat Protection (ATP) category, the mindshare of MetaDefender is 0.9%, up from 0.9% compared to the previous year. The mindshare of Trend Micro Deep Discovery is 2.0%, up from 1.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Advanced Threat Protection (ATP) Market Share Distribution
ProductMarket Share (%)
Trend Micro Deep Discovery2.0%
MetaDefender0.9%
Other97.1%
Advanced Threat Protection (ATP)
 

Featured Reviews

Eido Ben Noun - PeerSpot reviewer
Cyber Security Architect at Diffiesec
Multi‑engine detection has significantly improved secure file transfers and threat prevention
Some feedback indicated that it takes too much time to configure certain policies because there are many options. Some people appreciate this because you can configure anything, but I believe MetaDefender should have a wizard or general policies that can be used for 80 percent of customers. I use the expanded file type and archive coverage feature sometimes, especially for customers who try to scan large archives with the deep scan capabilities of OPSWAT and Deep CDR. This provides full protection because it scans every single file, but sometimes it takes too long. When discussing CAB files or archives for patching or server updates and BIOS updates and operating system updates, the scanning process takes too long, and it was difficult for customers who sometimes decided not to scan because the scanning time was excessive. I use the reporting and audit visibility features. Some capabilities are lacking in reporting because we do not have full statistics that are easy for users to understand. If something requires checking and then referring to documentation to understand it, that is too much for most users. When looking at one of the statistics, you can see how many files have been scanned and then you see a number out of 500 or a different number if you change it. It is not a number of files or scan processes; it is a number of files inside a file. When you scan a PowerPoint presentation file, for example, it counts as forty different files because of all the sub-files. I understand from customers that when they look at the visualization data or statistics, they do not understand what is happening there. Most customers I see do not use the file-based vulnerability assessment feature. It has some good results about vulnerabilities, but I am not certain if it is that helpful because many organizations, when they deploy a file and see that there are vulnerabilities, still deploy it because it is part of the code. It can produce results, but those results do not cause any action. Many products have something more advanced than vulnerabilities and static scoring. They have tools that can inform you about a vulnerability, whether the vulnerability is exploitable, if it is weaponized, and if someone can use this vulnerability in your environment. The file-based vulnerability feature works, but for most people, they do not take any action based on the results or block files because of file-based vulnerabilities.
reviewer2266119 - PeerSpot reviewer
Senior IT Security Engineer at a financial services firm with 5,001-10,000 employees
Has improved email security through advanced filtration and timely threat detection
I work with Trend Micro Apex One. I have used the Deep Discovery's Sandbox analysis feature, and we utilize another appliance known as Deep Discovery Analyzer, abbreviated as DDA. This tool makes analysis for URLs and attachments contained in inbound emails, so whenever we receive an email with a URL or attachment, it will be analyzed by Trend Micro Deep Discovery Analyzer. In evaluating Deep Discovery's real-time visibility on network traffic, it is important to note that we applied our Deep Discovery Analyzer for Trend Micro to conduct sandboxing specifically for email channels only, and we do not utilize it for network channels. For network channel sandboxing, we use a solution called FortiAnalyzer, which belongs to another team called network security. I assess Deep Discovery's effectiveness in identifying sophisticated attack patterns by looking at how it handles high traffic loads, and how effectively it can use its instances and images to analyze numerous URLs and attachments simultaneously. Additionally, I evaluate its ability to maintain round-robin or load balancing across different analyses without leaving samples queued for analysis. The performance is critical when the product updates for signatures are up-to-date, as this aids in the detection and classification of URLs and attachments without delay in the analysis process. On a scale of one to ten, I rate Trend Micro Deep Discovery a nine.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"OPSWAT is the best alternative."
"I like the simplicity, the way it works out of the box. It's pretty easy to run and configure. The integration of the network devices with the ICAP server was easily done."
"The solution has extension-based features that help it to analyze the environment. The environment can have different platforms like Windows, Linux, and Mac. The tool will give a report which can confirm the analysis of the issues. You can also get clear information on threats or suspicious files."
"The tool's most valuable feature is its collaboration with other products. Integrating with other security products was simple and easy."
"The product's initial setup phase was not difficult."
"Generally speaking, it just gives us a broad understanding of exactly what kind of threats occur. The submission point, analyzing point, and virtualization are within the environment that it supports. It helped us to improve our security levels and protect our internal network from any threats outside."
"Trend Micro Deep Discovery Email Inspector includes its ability to perform mail detection and mail filtration against various email attacks such as phishing and spam, serving as an email gateway for both inbound and outbound traffic."
"Initial setup is easy. It can be done by yourself."
"Trend Micro Deep Discovery is a very specific product for threat intelligence with smart protection."
"The most valuable features are monitoring for advanced persistent threats, the system runs in a sandbox allowing for effective zero-day exploits management, and the Inspector has a built-in sandbox."
 

Cons

"Some capabilities are lacking in reporting because we do not have full statistics that are easy for users to understand."
"The documentation is not well written, and I often need to talk with support."
"The scalability is sometimes limited."
"The solution needs to be able to integrate better with third-party infrastructure."
"The solution could be more secure."
"I would like to see integration with third-party tools to improve the visibility of the dashboards."
"The main issue is its high cost."
"Some of the end users may not be technically proficient, so they occasionally face problems due to a lack of knowledge."
"All issues we faced related to false positives regarding many hashes and URLs specifically for mail gateway and sandboxing, which led us to open a threat ticket with Trend Micro support for validation."
"There are certain aspects of flexibility in the policies that should be added to Deep Discovery."
 

Pricing and Cost Advice

"We bought a three-year license, and that was pretty expensive. We agreed that it was really worth buying. It could be cheaper, but we understand that quality comes at a price."
"The licensing cost is a bit pricey. We pay a yearly subscription."
"Trend Micro Deep Discovery is quite expensive compared to other endpoint security products."
"Its price is fine, but Trend Micro can improve the pricing in general. It is a hardware solution. It is based on the number of nodes, and according to the number of nodes, clients decide which box they should acquire. They have to renew their license every year. It is subscription-based."
"The price of the solution is lower compared to the competition."
"Overall, Trend Micro Deep Discovery has proven to be a reliable solution that enhances our security posture while minimizing operational disruptions."
"The tool's licensing costs are yearly. There are no additional costs associated with the product."
"Compared to its competitors, Trend Micro Deep Discovery is a little expensive."
"Overall, the price is good."
report
Use our free recommendation engine to learn which Advanced Threat Protection (ATP) solutions are best for your needs.
881,114 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
14%
Healthcare Company
11%
Computer Software Company
10%
Government
7%
Computer Software Company
11%
Financial Services Firm
9%
Healthcare Company
7%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business15
Midsize Enterprise6
Large Enterprise9
 

Questions from the Community

Ask a question
Earn 20 points
What do you like most about Trend Micro Deep Discovery?
The tool's most valuable feature is its collaboration with other products. Integrating with other security products was simple and easy.
What needs improvement with Trend Micro Deep Discovery?
Server Protect is not commonly used. When considering the Sandbox feature, it only inspects small files, and not all types of files are supported. The solution is very expensive. The solution is no...
 

Also Known As

OPSWAT MetaDefender, MetaDefender Core
Trend Micro Deep Discovery Inspector, Trend Micro Deep Discovery Analyzer
 

Overview

 

Sample Customers

Information Not Available
Allied Telesis, Atma Jaya Catholic University of Indonesia, Babou, Blekinge County Council, Delacour, Hiroshima Prefectural Government, Live Nation Entertainment Inc., Mazda Motor Logistics Europe, McGill University Health Centre, Mikuni Corporation, OKWAVE, Sinar Mas Land, SWICA, UTOC Corporation
Find out what your peers are saying about Palo Alto Networks, Microsoft, Proofpoint and others in Advanced Threat Protection (ATP). Updated: December 2025.
881,114 professionals have used our research since 2012.