

In the cybersecurity landscape, Trend Micro Deep Discovery and Microsoft Defender Vulnerability Management are competing products. Trend Micro Deep Discovery leads in threat detection, while Microsoft Defender excels in vulnerability management with system integration.
Features: Trend Micro Deep Discovery offers extensive threat detection, seamless IT infrastructure integration, and complete end-to-end threat visibility. Microsoft Defender Vulnerability Management provides accurate vulnerability assessment, seamless Microsoft ecosystem integration, and a vital security scorecard to assess security profiles.
Room for Improvement: Trend Micro Deep Discovery could improve user interfaces for administrative tasks, enhance cross-platform compatibility, and reduce initial deployment complexity. Microsoft Defender might enhance interface intuitiveness for new users, expand third-party integration support, and offer better customization options for diverse enterprise needs.
Ease of Deployment and Customer Service: Trend Micro Deep Discovery requires more extensive setup due to its broad integration capabilities, needing significant resources. Microsoft Defender Vulnerability Management enjoys streamlined deployment in Microsoft environments, providing cohesive customer support channels.
Pricing and ROI: Trend Micro Deep Discovery has higher initial costs, yielding significant ROI through advanced threat detection. Microsoft Defender offers competitive pricing, appealing to organizations using Microsoft products, ensuring cost-effectiveness and comprehensive protection.
Organizations typically do not rely solely on Microsoft products to avoid putting all eggs in one basket, which presents a challenge for maximizing ROI.
As a Microsoft partner, we receive significant discounts, making the solution affordable for us.
They are sometimes responsive, however, often issues cannot be reproduced on their end, making it challenging.
The support we receive from Microsoft is declining, and for example, after taking advanced support, we have not received satisfactory answers.
They are familiar with Microsoft products but are not direct Microsoft staff, which is an area needing improvement.
If I were to rate them from 0 to 10, I would give them a nine or a ten.
The integration is straightforward for those who understand it, though documentation needs improvement.
It is scalable; I evaluated the product and decided to use Defender on over 700 of our company servers.
If the appliance supports scalability, Trend Micro support will inform us, and we can implement it without replacing the hardware.
There are compatibility issues occasionally arising with false positives when other security tools are not whitelisted in Microsoft Defender.
It is very resource-intensive, consuming a lot of memory and CPU.
If Microsoft experiences downtime, this solution goes down as it is a SaaS-based solution where we have no control.
The product updates and security updates are kept current, allowing us seamless integration with Trend Micro and getting daily updates and signatures without problems.
This scoring should be for specific industries as well. If I belong to the healthcare industry using Microsoft Defender Vulnerability Management, it should provide me with a risk score and show how I fare against the risk score of my industry.
A vulnerability I patch within 15 minutes takes 24 additional hours for an update.
The product is not stable; it often uses excessive memory and CPU, which makes it slow.
We have multiple components such as Deep Discovery Email Inspector for mail gateways, Deep Discovery Analyzer for sandboxing, and Deep Discovery Inspector, which serves as an IDS detecting malicious network traffic.
The solution is not scalable as it is an agent product rather than a product designed for scalability.
Overall, every organization wishes for cheaper options, but we look at the security side as well, so we are good for now.
For non-partners, however, the cost could be seen as higher, between seven to ten.
The pricing is reasonable, and it's included in the whole Microsoft E5 bundle, so it's all-inclusive.
I do not consider it an expensive tool; its price is justified based on the capabilities that we receive when compared to another mail gateway or other vendors.
The solution is very expensive.
The main advantage of Microsoft Defender Vulnerability Management is that it can locate and prevent most threats even when the endpoints are not connected to the corporate network, as long as the internet is available.
The feature for customizing to region-specific and domain-specific requirements in healthcare is particularly beneficial.
The most valuable aspect is the kind of assessment results I get, and the recommendations provided in Microsoft products really help in taking care of the resources.
The most valuable capabilities of Trend Micro Deep Discovery Email Inspector include its ability to perform mail detection and mail filtration against various email attacks such as phishing and spam, serving as an email gateway for both inbound and outbound traffic.
This solution allows us to see anomalies, network traffic in our network, and zero-day threats.
| Product | Market Share (%) |
|---|---|
| Trend Micro Deep Discovery | 2.0% |
| Microsoft Defender Vulnerability Management | 1.8% |
| Other | 96.2% |
| Company Size | Count |
|---|---|
| Small Business | 9 |
| Midsize Enterprise | 2 |
| Large Enterprise | 5 |
| Company Size | Count |
|---|---|
| Small Business | 15 |
| Midsize Enterprise | 6 |
| Large Enterprise | 9 |
Microsoft Defender Vulnerability Management enables organizations to identify vulnerabilities, manage patches, and fortify threat detection. It offers endpoint assessments, cloud incident management, and dynamic security through Microsoft's Security Scorecard integration.
Organizations leverage Microsoft Defender Vulnerability Management for advanced threat detection and response. It provides robust tools for vulnerability assessment and cloud incident management, integrated with Microsoft's Security Scorecard to enhance dynamic security profiling. Key features include automatic patch deployment, security configuration management, and seamless integration with Microsoft platforms, benefiting both on-prem and cloud environments. Organizations can track vulnerabilities with severity-based reports, helping manage outdated software and minimizing threat exposure.
What are the key features of Microsoft Defender Vulnerability Management?In healthcare, Microsoft Defender Vulnerability Management helps manage compliance with health regulations, while in finance, it aids in securing sensitive data from cyber threats. Manufacturing sectors benefit from its patch management, keeping operational technology systems less vulnerable to disruptions.
Trend Micro Deep Discovery provides an intuitive interface and extensive threat visibility. It enhances detection with sandboxing and custom virtual machine images. Integration with Trend Micro Office Scan and Vision One ensures robust defense and detailed threat analysis.
Trend Micro Deep Discovery is a comprehensive network security tool used for intrusion detection, malware analysis, and zero-day vulnerability sandboxing. It supports various platforms and can be integrated with email and server protection. It's particularly useful for compliance with regulatory requirements through signature-based behavior analysis and virtual patching. Users benefit from easy installation, management, and responsive technical support.
What are the key features of Trend Micro Deep Discovery?Trend Micro Deep Discovery is implemented across sectors requiring stringent security measures, such as finance, healthcare, and government. It's favored for its ability to analyze diverse network traffic and provide exceptional protection against sophisticated threats while ensuring compliance with strict data regulations. Industry reviews highlight its role in safeguarding sensitive information through robust security frameworks and adaptable deployment options.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.