We performed a comparison between RedSeal and Trend Micro Deep Security based on real PeerSpot user reviews.
Find out what your peers are saying about Tenable, Qualys, Rapid7 and others in Risk-Based Vulnerability Management."RedSeal integrates the network and gives us a visual or graphical overview of our network. If an organization is geographically dispersed, for instance, with one office in Canada and one office in the Philippines, the whole network, including all devices, is integrated into RedSeal, and you can see from where the traffic is going in and out."
"This is the only solution in the world that gives you a digital resilience score."
"The most valuable features are network mapping and configuration."
"Technical support is good."
"The most valuable feature of this solution is the virtual path function, which is the reason we chose to implement it."
"The customer service/technical support for this solution is very fast."
"The tool provides information on server activities and hosts."
"The most valuable features of the solution we have enabled in our organization are its anti-malware capabilities, applications, web reputation, and integrity monitoring."
"Very straightforward and very easy to implement."
"It can scale well."
"Support and threat prevention are the most valuable features of this solution."
"Sometimes, it required us to refresh the configuration. When we integrated any of the configurations into the device, sometimes, it could not detect the exact picture of that device. So, we had to reset the device to see that if it was giving true-positive results or false-positive results. In some cases, we were not able to get true-positive results. There was some kind of bug in that version. Its interface is not user-friendly and needs to be improved. It takes time to understand the interface and various options. Skybox has quite a user-friendly interface. They could provide a feature for compliance audit policy if it is already not there. A compliance audit policy ensures that all configurations are based on the best practices standards, such as CIS benchmarks standard or other similar standards. It provides visibility about whether your device configuration is based on best practices or not. Usually, such a feature is provided by other solutions such as Meteor or Tenable Nessus."
"One of the areas of concern is the GUI. It is important to our customers that the GUI looks beautiful. It's a Java Client, so you have a Java dependency."
"The dashboard should be improved to make correlating data easier to do."
"We'd like to see extended capacity in the on-premises versions."
"Some of the reporting and integrations could be more robust."
"The support for email protection can be improved."
"We are not very happy with Trend Micro Deep Security since it is not able to detect many viruses and bugs."
"AWS products could become more compatible with intrusion detection products leveraging help from Trend Micro."
"The cost is very high."
"Their support should be improved. We need support in the UAE, but it is always going to some other country or region, and the time schedule is not suitable for us."
"There should be signature-based advanced and responsive features."
Earn 20 points
RedSeal is ranked 21st in Risk-Based Vulnerability Management while Trend Micro Deep Security is ranked 1st in Virtualization Security with 80 reviews. RedSeal is rated 8.2, while Trend Micro Deep Security is rated 8.6. The top reviewer of RedSeal writes "Provides a graphical overview of our network and is easy to deploy, but needs a user-friendly interface and a feature for compliance audit policy". On the other hand, the top reviewer of Trend Micro Deep Security writes "Offers excellent endpoint protection and great stability ". RedSeal is most compared with AlgoSec, Skybox Security Suite, FireMon Security Manager, Ekahau Site Survey and Darktrace, whereas Trend Micro Deep Security is most compared with Trend Micro Apex One, CrowdStrike Falcon, Microsoft Defender for Endpoint, Symantec Endpoint Security and Trellix Endpoint Security.
We monitor all Risk-Based Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.