

Trend Micro Deep Discovery and Microsoft Defender for Identity are competing in the network security domain. Trend Micro Deep Discovery has an upper hand due to its superior threat detection capabilities, while Microsoft Defender for Identity excels in feature integration within Microsoft's ecosystem, which is particularly advantageous for organizations already using Microsoft services.
Features: Trend Micro Deep Discovery offers advanced threat detection with real-time alerts, extensive malware analysis, and an impressive ability to uncover hidden network threats. Microsoft Defender for Identity emphasizes identity protection with deep integration with Active Directory, advanced threat identification in hybrid cloud environments, and comprehensive security monitoring.
Room for Improvement: Trend Micro Deep Discovery could enhance its user interface to simplify management, improve geographical support availability, and lower initial setup complexity. Microsoft Defender for Identity could focus on reducing false positives, expanding support for non-Microsoft environments, and enhancing its response time for threat mitigation.
Ease of Deployment and Customer Service: Microsoft Defender for Identity benefits from seamless integration with Microsoft services, ensuring a straightforward deployment and access to extensive support channels. Trend Micro Deep Discovery requires a more intricate initial setup and support that varies by location, necessitating more direct interaction for issue resolution.
Pricing and ROI: Trend Micro Deep Discovery involves higher setup costs mainly due to its hardware needs, providing long-term gains through network threat identification. Microsoft Defender for Identity, often part of the Microsoft 365 suite, presents a lower initial investment for existing Microsoft users, with good returns through improved identity security and seamless service integration.
Generally, the support is more effective than other providers like Oracle.
The quality of support is very good, but troubleshooting can take time due to complex setups and the need to provide many logs.
The people I normally use for support are very knowledgeable, especially when they help remote in and get to where I need to go and show me much faster and help me understand what I should be doing.
If I were to rate them from 0 to 10, I would give them a nine or a ten.
In a Microsoft-centric organization, especially with Azure infrastructure and Office 365, Microsoft Defender for Identity is scalable.
If the appliance supports scalability, Trend Micro support will inform us, and we can implement it without replacing the hardware.
Microsoft Defender for Identity is quite robust and built on Azure hyperscale infrastructure, with a 99% availability.
We do not see any issues with the stability of Microsoft Defender for Identity.
Having recently started using it, reliability is affirmed, but manual investigation is often performed to verify if alerts identified by auto-remediation are accurate.
The product updates and security updates are kept current, allowing us seamless integration with Trend Micro and getting daily updates and signatures without problems.
If Microsoft could develop a feature that indicates when impossible travel is caused by VPN connections, it would prevent unnecessary password resets and session disruptions, especially for VIP users in organizations.
One improvement I would recommend is the integration of an admin application within Teams, allowing easy access to attack information on a mobile platform.
Reducing false positives is something we've been working on with Microsoft.
We have multiple components such as Deep Discovery Email Inspector for mail gateways, Deep Discovery Analyzer for sandboxing, and Deep Discovery Inspector, which serves as an IDS detecting malicious network traffic.
The solution is not scalable as it is an agent product rather than a product designed for scalability.
If they can reduce the costs, organizations will be happy, and it will compensate for using the Azure environment, which is more expensive on the infrastructure as a service side.
Ensuring a fair price according to market standards.
From an organization perspective, using E5 licenses is value for money, especially if Azure and Office 365 are already in use.
I do not consider it an expensive tool; its price is justified based on the capabilities that we receive when compared to another mail gateway or other vendors.
The solution is very expensive.
We receive an advance report of risky users, allowing us to take preemptive action before an attack causes damage to organization details.
The most valuable feature is its hybrid artificial intelligence, which gathers forensic data to track and counteract security threats, much like the CSI series in effect.
The advanced threat protection is one of the strengths of Microsoft Defender for Identity, as it utilizes user and entity analytics and can detect indicative attacks.
The most valuable capabilities of Trend Micro Deep Discovery Email Inspector include its ability to perform mail detection and mail filtration against various email attacks such as phishing and spam, serving as an email gateway for both inbound and outbound traffic.
This solution allows us to see anomalies, network traffic in our network, and zero-day threats.
| Product | Market Share (%) |
|---|---|
| Microsoft Defender for Identity | 5.7% |
| Trend Micro Deep Discovery | 2.4% |
| Other | 91.9% |
| Company Size | Count |
|---|---|
| Small Business | 8 |
| Midsize Enterprise | 4 |
| Large Enterprise | 14 |
| Company Size | Count |
|---|---|
| Small Business | 15 |
| Midsize Enterprise | 6 |
| Large Enterprise | 9 |
Microsoft Defender for Identity offers real-time threat detection and protection for hybrid Active Directory environments. It integrates with Microsoft 365 components for seamless security and monitors advanced behaviors, enhancing identity protection across cloud and on-premises environments.
Microsoft Defender for Identity provides detailed threat insights and user behavior analytics to detect unauthorized access and notify anomalies. It allows setting custom detection rules, enhancing threat response automation. While it needs improvements in cloud security, SIEM integration, and access controls, users leverage its ability to mitigate identity threats like suspicious logins and ransomware. Enhanced integration with Microsoft security products ensures a coordinated threat response for identity control and privilege management.
What are the key features of Microsoft Defender for Identity?In specific industries, organizations implement Microsoft Defender for Identity to secure on-premises and hybrid Active Directory environments through user and entity behavior analytics, malicious activity detection, and integration with Microsoft security tools. This approach enhances security posture assessment and helps mitigate identity threats like identity harvesting and unauthorized access.
Trend Micro Deep Discovery provides an intuitive interface and extensive threat visibility. It enhances detection with sandboxing and custom virtual machine images. Integration with Trend Micro Office Scan and Vision One ensures robust defense and detailed threat analysis.
Trend Micro Deep Discovery is a comprehensive network security tool used for intrusion detection, malware analysis, and zero-day vulnerability sandboxing. It supports various platforms and can be integrated with email and server protection. It's particularly useful for compliance with regulatory requirements through signature-based behavior analysis and virtual patching. Users benefit from easy installation, management, and responsive technical support.
What are the key features of Trend Micro Deep Discovery?Trend Micro Deep Discovery is implemented across sectors requiring stringent security measures, such as finance, healthcare, and government. It's favored for its ability to analyze diverse network traffic and provide exceptional protection against sophisticated threats while ensuring compliance with strict data regulations. Industry reviews highlight its role in safeguarding sensitive information through robust security frameworks and adaptable deployment options.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.