Trend Micro Deep Discovery and Microsoft Defender for Identity are competing in the network security domain. Trend Micro Deep Discovery has an upper hand due to its superior threat detection capabilities, while Microsoft Defender for Identity excels in feature integration within Microsoft's ecosystem, which is particularly advantageous for organizations already using Microsoft services.
Features: Trend Micro Deep Discovery offers advanced threat detection with real-time alerts, extensive malware analysis, and an impressive ability to uncover hidden network threats. Microsoft Defender for Identity emphasizes identity protection with deep integration with Active Directory, advanced threat identification in hybrid cloud environments, and comprehensive security monitoring.
Room for Improvement: Trend Micro Deep Discovery could enhance its user interface to simplify management, improve geographical support availability, and lower initial setup complexity. Microsoft Defender for Identity could focus on reducing false positives, expanding support for non-Microsoft environments, and enhancing its response time for threat mitigation.
Ease of Deployment and Customer Service: Microsoft Defender for Identity benefits from seamless integration with Microsoft services, ensuring a straightforward deployment and access to extensive support channels. Trend Micro Deep Discovery requires a more intricate initial setup and support that varies by location, necessitating more direct interaction for issue resolution.
Pricing and ROI: Trend Micro Deep Discovery involves higher setup costs mainly due to its hardware needs, providing long-term gains through network threat identification. Microsoft Defender for Identity, often part of the Microsoft 365 suite, presents a lower initial investment for existing Microsoft users, with good returns through improved identity security and seamless service integration.
Generally, the support is more effective than other providers like Oracle.
The quality of support is very good, but troubleshooting can take time due to complex setups and the need to provide many logs.
Technical support from Microsoft rates an eight on a scale of 1 to 10 for response time.
If I were to rate them from 0 to 10, I would give them a nine or a ten.
In a Microsoft-centric organization, especially with Azure infrastructure and Office 365, Microsoft Defender for Identity is scalable.
If the appliance supports scalability, Trend Micro support will inform us, and we can implement it without replacing the hardware.
Microsoft Defender for Identity is quite robust and built on Azure hyperscale infrastructure, with a 99% availability.
We do not see any issues with the stability of Microsoft Defender for Identity.
Having recently started using it, reliability is affirmed, but manual investigation is often performed to verify if alerts identified by auto-remediation are accurate.
The product updates and security updates are kept current, allowing us seamless integration with Trend Micro and getting daily updates and signatures without problems.
If Microsoft could develop a feature that indicates when impossible travel is caused by VPN connections, it would prevent unnecessary password resets and session disruptions, especially for VIP users in organizations.
One improvement I would recommend is the integration of an admin application within Teams, allowing easy access to attack information on a mobile platform.
Reducing false positives is something we've been working on with Microsoft.
We have multiple components such as Deep Discovery Email Inspector for mail gateways, Deep Discovery Analyzer for sandboxing, and Deep Discovery Inspector, which serves as an IDS detecting malicious network traffic.
If they can reduce the costs, organizations will be happy, and it will compensate for using the Azure environment, which is more expensive on the infrastructure as a service side.
Ensuring a fair price according to market standards.
From an organization perspective, using E5 licenses is value for money, especially if Azure and Office 365 are already in use.
I do not consider it an expensive tool; its price is justified based on the capabilities that we receive when compared to another mail gateway or other vendors.
We receive an advance report of risky users, allowing us to take preemptive action before an attack causes damage to organization details.
The most valuable feature is its hybrid artificial intelligence, which gathers forensic data to track and counteract security threats, much like the CSI series in effect.
The advanced threat protection is one of the strengths of Microsoft Defender for Identity, as it utilizes user and entity analytics and can detect indicative attacks.
The most valuable capabilities of Trend Micro Deep Discovery Email Inspector include its ability to perform mail detection and mail filtration against various email attacks such as phishing and spam, serving as an email gateway for both inbound and outbound traffic.
Product | Market Share (%) |
---|---|
Microsoft Defender for Identity | 6.4% |
Trend Micro Deep Discovery | 2.4% |
Other | 91.2% |
Company Size | Count |
---|---|
Small Business | 7 |
Midsize Enterprise | 3 |
Large Enterprise | 14 |
Company Size | Count |
---|---|
Small Business | 14 |
Midsize Enterprise | 6 |
Large Enterprise | 9 |
Microsoft Defender for Identity integrates with Microsoft tools to monitor user activity, providing advanced threat detection and analysis using AI. It enhances proactive threat response and security visibility, making it essential for securing on-premises and cloud environments like Active Directory.
Microsoft Defender for Identity offers comprehensive monitoring and AI-driven user behavior analysis. It detects threats through real-time alerts and identifies lateral movements and entity tagging, ensuring robust security management. With excellent visibility via its dashboard, it supports customized detection rules and seamlessly integrates with SIEM platforms. While SecureScore and SecureScan provide robust environment security, there is room for improvement in cloud security, on-premises application integration, and remediation capabilities. Azure integration is limited, and the administrative interface could be more user-friendly. Users experience frequent false positives, affecting threat detection efficiency.
What key features stand out in Microsoft Defender for Identity?In specific industries such as education and finance, Microsoft Defender for Identity is crucial for securing on-premises Active Directory and Azure Active Directory environments. It effectively detects suspicious activities and manages conditional access policies, offering user and entity behavior analytics, endpoint detection and response capabilities. This helps prevent unauthorized access and strengthens overall security, making it an invaluable asset for organizations aiming to safeguard their digital infrastructure.
Trend Micro Deep Discovery provides an intuitive interface and extensive threat visibility. It enhances detection with sandboxing and custom virtual machine images. Integration with Trend Micro Office Scan and Vision One ensures robust defense and detailed threat analysis.
Trend Micro Deep Discovery is a comprehensive network security tool used for intrusion detection, malware analysis, and zero-day vulnerability sandboxing. It supports various platforms and can be integrated with email and server protection. It's particularly useful for compliance with regulatory requirements through signature-based behavior analysis and virtual patching. Users benefit from easy installation, management, and responsive technical support.
What are the key features of Trend Micro Deep Discovery?Trend Micro Deep Discovery is implemented across sectors requiring stringent security measures, such as finance, healthcare, and government. It's favored for its ability to analyze diverse network traffic and provide exceptional protection against sophisticated threats while ensuring compliance with strict data regulations. Industry reviews highlight its role in safeguarding sensitive information through robust security frameworks and adaptable deployment options.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.