Try our new research platform with insights from 80,000+ expert users

Tanium vs Trend Vision One Endpoint Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Tanium
Ranking in Endpoint Protection Platform (EPP)
34th
Ranking in Endpoint Detection and Response (EDR)
27th
Average Rating
7.6
Reviews Sentiment
6.8
Number of Reviews
18
Ranking in other categories
Server Monitoring (5th), Vulnerability Management (21st)
Trend Vision One Endpoint S...
Ranking in Endpoint Protection Platform (EPP)
5th
Ranking in Endpoint Detection and Response (EDR)
6th
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
132
Ranking in other categories
Endpoint Compliance (1st)
 

Mindshare comparison

As of June 2025, in the Endpoint Protection Platform (EPP) category, the mindshare of Tanium is 2.5%, up from 2.1% compared to the previous year. The mindshare of Trend Vision One Endpoint Security is 1.8%, down from 2.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP)
 

Featured Reviews

Ed Jarecki - PeerSpot reviewer
A scalable solution that helps to understand how infrastructure works
We use the tool as an infrastructure operational management solution.  The solution is scalable and helps to understand how infrastructure works. It helps to improve the health of the organization.  Any movement into a SaaS solution has challenges since the processes and data flows are not well…
Ágoston DEIM - PeerSpot reviewer
Works wonderfully to defend endpoints against malware, ransomware, and malicious scripts
It would be much easier if the solution added the allowed USB for pen drives and USB drives. You can import an Excel CSV file with 500 devices, but it will be allowed globally. That would be helpful if you want to allow it only in one policy. If you want to enable these pen drives only for one group or an organization's security group, you have to add them manually one by one. That could be easier. It's a user experience, but you can add not just the serial but also the vendor. If you only have a Kingston pen drive, you can say that you want to allow all Kingston, or you can add the model number. If you know that you have a specific model of the Kingston pen drive, you can just allow Kingston and that model. The serial number is not important. You will not filter by serial number. However, if you want to filter by serial number and add only the given devices with the serial number, you have to add them one by one. You have to do this if you don't want to allow them globally. It's enough if you know that you bought a Kingston pen drive and you just put in that you want to allow the Kingston and the model number. Then, all pen drives of the given model will be allowed for a given security group on a given number of computers. In that case, you can attach only pen drives and no external hard drives from Kingston. That could be fast. If you want to add a given serial number, you add it one by one for a specific group. If you want to allow them globally, you say that everybody can use the pen drive on every computer. You can do it from a CSV. Let's say the CSV imports for security groups only and not company-wide. I think this is the more punctual way. If you want to allow it only for the security group or Active Directory group of users, you must manually edit it to limit the serial numbers. The solution's user experience regarding device control could be more friendly or straightforward.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I like the fact that you can create patching campaigns depending on the area of your network that you want to address first. I like the ability it has to make several campaigns that work in parallel."
"The security features are very valuable."
"I would say Tanium is the best tool for vulnerability management."
"Tanium's most valuable feature is its instant discovery aspect."
"Tanium is a very good product and I would rate it eight or nine out of ten."
"When I push a quick update, it's done right away, and I can rescan immediately to confirm completion within minutes."
"The solution is scalable and helps to understand how infrastructure works. It helps to improve the health of the organization."
"Tanium’s linear-chain architecture is valuable."
"The behavior analytics feature is very useful, and its threat detection based on AI is very strong."
"Along with the anti-malware, it has a built-in device control and DLP."
"I think this is the best solution in the category of endpoint protection, it's really excellent. It's better than McAfee."
"The initial setup was very straightforward."
"We really like the ability to have different policies to keep servers and endpoints unique to their own policy."
"The most valuable feature is the antivirus."
"One of the better features, in my opinion, is that it also makes use of a web reputation. For example, if someone accidentally clicks on a link in an email that leads to a malicious website, they will block it."
"The most valuable feature is the vulnerability attack and detection since it enables swift action."
 

Cons

"The solution needs to improve the reporting and tracking capabilities."
"The solution can give a lot of false positives."
"The solution lacks mobility."
"It is not really additional functions, or the features that are needed, rather the complexity would be reduced based on the number of modules required to put together a comprehensive operational security and risk compliance model."
"The most painful thing is the interface. It's a bit unclear sometimes."
"Tanium required local admin or root rights on Mac devices, which did not comply with our security policies. This made the solution less suitable for our restrictive environment."
"Any movement into a SaaS solution has challenges since the processes and data flows are not well defined. Hence, you need to build it at the same time."
"When working with Tanium, there are some older devices that haven't been patched for a long time, and certain patches are not included in Tanium."
"We have received many complaints about how slow the system is on the first day of implementation."
"The console can be better in terms of management and viewing the hierarchy of devices. Currently, setting up the hierarchy OU-wise is a bit cumbersome. It can be made a bit easier. If that can be more user-friendly and easier to manage, it would be great."
"Sometimes HTTPS sites are not blocked properly."
"It is weak in terms of intelligence. By implementing Trend Micro Apex One, I wanted to see real-life scenarios. I deployed it on 50 clients to check if I could do lateral moments and zero-day exploits. I wanted to check how the zero-day protection works with Trend Micro. It fails with most of them because it is signature-based. They are not looking at the MITRE ATT&CK framework, so with zero-day attacks, it mostly fails."
"The pricing is very high. Despite the magnificent capabilities, the cost is still a concern. Additionally, we need more training resources for my team and I, such as developing labs and sessions to implement it more easily."
"We had issues with our system integrator who didn't have enough experience with Trend Micro. There aren't many enterprise customers in our country who use Trend Micro on the level that we are using it, so it might be a little too complex for them. Trend Micro is typically used in small companies that do not need all the advanced features that we are looking for. The integrators don't have experience deploying these features. The scope is broad, but Microsoft Defender is simpler."
"The reports are not eye-catching from the customer's point of view, which is something that should be improved."
"The Apex One endpoint sensor has room for improvement."
 

Pricing and Cost Advice

"It is higher than some competitors in the market."
"There is an annual license required to use this solution."
"The solution is expensive but it's a good investment."
"The solution offers value for money."
"It's an expensive solution. It would be nice if the cost were lower."
"The product's pricing differs from region to region depending on negotiations and the number of endpoints."
"Tanium is a more expensive solution in Latin America than some of the competitors, such as BigFix."
"From a commercial aspect, it is a bit higher compared to other market products."
"The price of the solution is reasonable."
"It is okay. Compared to Sophos, it is a little bit expensive, but it is a good product and it is better than Sophos, for instance. It is equivalent to Trellix. Its cost depends on the country. I am in Turkey, and Trend Micro is not so affordable in Turkey. SMB companies are looking for cheaper products. In Turkey, enterprise customers tend to use Trend Micro, and if they have more money, then they use next-generation antivirus or EPP products such as SentinelOne, CrowdStrike, or Microsoft E5 package."
"Currently, the price for Trend Micro Apex One is good and there are no extra costs attached."
"Apex One is a bit expensive, but the additional AWS costs are limited. It's competitive compared to other solutions in the market. It's a good price for the functionality that it provides."
"The price of the solution is fair and there is a per-user license to use the solution. Our costs are approximately $2,000 a month, it can get costly if you have a lot of users."
"The cost of this solution is mid-level; not cheap nor expensive."
"If I compare Trend Micro Apex One with other solutions there are a few challenges for customers who have do not need more licenses. Sometimes the customers struggle because this product is totally an enterprise solution, and the price for the licenses can be expensive for individuals or small organizations."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
856,873 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
16%
Government
12%
Computer Software Company
9%
Manufacturing Company
8%
Educational Organization
38%
Computer Software Company
12%
Manufacturing Company
6%
Financial Services Firm
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Tanium?
Tanium’s linear-chain architecture is valuable.
What needs improvement with Tanium?
While there is always room for improvement, I am pleased with Tanium.
What is your primary use case for Tanium?
The primary use case for Tanium ( /products/tanium-reviews ) is compliance, patching, and inventory as part of the core functions.
What's the difference between Trend Micro Deep Security and Trend Micro Apex One?
Trend Micro Deep Security offers a lot of features. It guarantees security for your data center, cloud, and containers - all with a unified and comprehensive SaaS solution and without compromising ...
What do you like most about Trend Micro Apex One?
It is updated automatically without much intervention from our side. We can also get some reports easily.
What is your experience regarding pricing and costs for Trend Micro Apex One?
The pricing is very high, despite the solution’s capabilities.
 

Also Known As

No data available
Trend Micro Apex One, OfficeScan, Trend Micro OfficeScan
 

Overview

 

Sample Customers

JPMorgan Chase, eBay, Amazon, US Bank, MetLife, pwc, Cerner, Delphi, MGM Grand, New York Life
Atma Jaya Catholic University of Indonesia, A&W Food Services of Canada, Babou, Beth Israel Deaconess Care Organization (BO), DCI Donor Services, Evalueserve, Gulftainer, Hiroshima Prefectural Government, MEDHOST
Find out what your peers are saying about Tanium vs. Trend Vision One Endpoint Security and other solutions. Updated: May 2025.
856,873 professionals have used our research since 2012.