
![Trend Micro Deep Discovery [EOL] Logo](https://images.peerspot.com/image/upload/c_scale,dpr_3.0,f_auto,q_100,w_64/2wuq6mq8liciuy8jm6aqj4dp5bgm.jpg?_a=BACAGSGT)
Splunk User Behavior Analytics and Trend Micro Deep Discovery [EOL] compete in the fields of security analytics and threat detection. Splunk has the upper hand in usability and functionality with comprehensive features like real-time data aggregation and customizable dashboards.
Features: Splunk User Behavior Analytics provides powerful analytics, real-time data correlation, and scalable solutions for large enterprises. Customizable dashboards enhance user behavior analysis, while machine learning models automate threat detection. Trend Micro Deep Discovery offers advanced threat intelligence and sandboxing capabilities, protecting against zero-day threats with real-time network traffic visibility and integration with Trend Micro solutions.
Room for Improvement: Splunk faces challenges with high data ingestion costs and the need for improved integration with third-party tools. Its licensing model and complex dashboard configuration also require enhancements. Trend Micro needs improvement in pricing, scalability, and support for various operating systems and third-party integrations.
Ease of Deployment and Customer Service: Splunk offers various deployment options, including hybrid and public cloud, benefiting greatly from flexibility and a supportive community. Trend Micro primarily operates on-premises with limited cloud options, praised for straightforward integration but limited by scalability and traditional support mechanisms.
Pricing and ROI: Splunk's pricing model is often viewed as expensive, as costs are linked to data processed, affecting ROI. Nevertheless, it can save costs by enhancing productivity and reducing incident resolution times. Trend Micro's pricing varies by license type and is considered high compared to simpler antivirus solutions, but justified by its advanced capabilities. Both products deliver positive ROI through effective deployment and usage.
The solution can save costs by improving incident resolution times and reducing security incident costs.
Mission-critical offering a dedicated team, proactive monitoring, and fast resolution.
From the responsiveness perspective, Splunk is very responsive with SLA-bound support for premium tiers.
I would rate their technical support as 8.5 out of 10.
If I were to rate them from 0 to 10, I would give them a nine or a ten.
There is no dedicated team in India for giving support for Trend Micro Deep Discovery.
Splunk User Behavior Analytics is highly scalable, designed for enterprise scalability, allowing expansion of data ingestion, indexing, and search capabilities as log volumes grow.
If the appliance supports scalability, Trend Micro support will inform us, and we can implement it without replacing the hardware.
With built-in redundancy across zones and regions, 99.9% uptime is achievable.
Splunk User Behavior Analytics is a one hundred percent stable solution.
Splunk User Behavior Analytics is highly stable and reliable, even in large-scale enterprise environments with high log injection rates.
The product updates and security updates are kept current, allowing us seamless integration with Trend Micro and getting daily updates and signatures without problems.
Global reach allows deployment of apps and services closer to users worldwide, but data sovereignty concerns exist and region selection must align with compliance requirements.
I encountered several issues while trying to create solutions for this advanced version, which seem unrelated to query or data issues.
High data ingestion costs can be an issue, especially for large enterprises, as Splunk charges based on the amount of data processed.
We have multiple components such as Deep Discovery Email Inspector for mail gateways, Deep Discovery Analyzer for sandboxing, and Deep Discovery Inspector, which serves as an IDS detecting malicious network traffic.
The solution is not scalable as it is an agent product rather than a product designed for scalability.
There is no dedicated team in India for giving support for Trend Micro Deep Discovery.
Reserved instances with one or three-year commitments offer lower rates, providing up to 70% savings.
Compared to all other products in the market, it is the most expensive one in all aspects including professional service and licenses, even the cloud version.
Comparing with the competitors, it's a bit expensive.
I do not consider it an expensive tool; its price is justified based on the capabilities that we receive when compared to another mail gateway or other vendors.
The solution is very expensive.
Overall, the licensing cost of Trend Micro Deep Discovery was not on the higher side earlier, but now, since the competition has increased, we need to think about the prices.
I also utilize it for anomaly detection and behavior analysis, particularly using Splunk's machine learning environment.
The dashboards themselves are nice, very good, and very helpful, but the accuracy of the data or the information that will be presented on the dashboard is something that needs to be questioned.
Features like alerts and auto report generation are valuable.
The most valuable capabilities of Trend Micro Deep Discovery Email Inspector include its ability to perform mail detection and mail filtration against various email attacks such as phishing and spam, serving as an email gateway for both inbound and outbound traffic.
This solution allows us to see anomalies, network traffic in our network, and zero-day threats.
The impact of the Threat Intelligence Sharing feature on overall defense and security is positive.
| Product | Market Share (%) |
|---|---|
| Trend Micro Deep Discovery | 3.4% |
| Splunk User Behavior Analytics | 2.4% |
| Other | 94.2% |
| Company Size | Count |
|---|---|
| Small Business | 7 |
| Midsize Enterprise | 6 |
| Large Enterprise | 12 |
| Company Size | Count |
|---|---|
| Small Business | 16 |
| Midsize Enterprise | 6 |
| Large Enterprise | 9 |
Splunk User Behavior Analytics is a behavior-based threat detection is based on machine learning methodologies that require no signatures or human analysis, enabling multi-entity behavior profiling and peer group analytics for users, devices, service accounts and applications. It detects insider threats and external attacks using out-of-the-box purpose-built that helps organizations find known, unknown and hidden threats, but extensible unsupervised machine learning (ML) algorithms, provides context around the threat via ML driven anomaly correlation and visual mapping of stitched anomalies over various phases of the attack lifecycle (Kill-Chain View). It uses a data science driven approach that produces actionable results with risk ratings and supporting evidence that increases SOC efficiency and supports bi-directional integration with Splunk Enterprise for data ingestion and correlation and with Splunk Enterprise Security for incident scoping, workflow management and automated response. The result is automated, accurate threat and anomaly detection.
Trend Micro Deep Discovery [EOL] offers real-time network traffic visibility, advanced sandboxing, and threat intelligence sharing, improving threat management for organizations through seamless integration with security products and precise threat detection in simulated environments.
Recognized for its ability to detect advanced persistent threats and zero-day exploits, Trend Micro Deep Discovery [EOL] provides insights into malicious activities while maintaining compatibility with multiple platforms. Its custom sandboxing technology allows detailed environmental simulations to identify threats accurately. Despite the benefits, there are challenges such as the need for enhanced support in regions like India, better scalability, and easier usage for non-technical users. Integration with third-party tools could also improve alongside a simpler pricing model. Security features, stability, and flexibility are areas requiring enhancement to meet broader industry needs.
What are the key features of Trend Micro Deep Discovery [EOL]In industries focused on network security and compliance, Trend Micro Deep Discovery [EOL] finds use in intrusion detection and protection against malware, phishing, and ransomware. Companies deploy it for email filtration and network analysis, ensuring secure data management and virtual patching to address zero-day vulnerabilities. On-premises implementation includes role-based access and scanning of virtual environments, aiding in meeting security compliance standards and reducing server downtime.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.