No more typing reviews! Try our Samantha, our new voice AI agent.

Trellix Intrusion Prevention System vs Trend Micro Deep Discovery [EOL] comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Feb 26, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Trellix Intrusion Preventio...
Average Rating
8.4
Reviews Sentiment
6.6
Number of Reviews
16
Ranking in other categories
Intrusion Detection and Prevention Software (IDPS) (13th)
Trend Micro Deep Discovery ...
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
29
Ranking in other categories
No ranking in other categories
 

Featured Reviews

BS
Large account Manager at Softcell Technologies Limited
Has offered reliable threat protection and detailed network insights but could expand features beyond existing capabilities
The best features of Trellix Intrusion Prevention System include advanced ATP (Advanced Threat Protection), which uses signatures, behavior analysis, and machine learning to stop zero-day exploits and malware advanced persistent threats (APTs). They track and collect data from APTs, which allows them to track malicious files entering the environment. The system offers inline prevention and real-time automatic blocking of malicious packets before they reach the network. It integrates with the Trellix ecosystem and provides application visibility and control. The solution provides deep insight into network traffic, applications, and protocols for better information. All packets coming through the application are analyzed and reported. They share intelligence updates regularly to protect from different malicious files and sector-specific threats. It supports both on-premise and cloud environments.
reviewer2266119 - PeerSpot reviewer
Senior IT Security Engineer at a financial services firm with 5,001-10,000 employees
Has improved email security through advanced filtration and timely threat detection
I work with Trend Micro Apex One. I have used the Deep Discovery's Sandbox analysis feature, and we utilize another appliance known as Deep Discovery Analyzer, abbreviated as DDA. This tool makes analysis for URLs and attachments contained in inbound emails, so whenever we receive an email with a URL or attachment, it will be analyzed by Trend Micro Deep Discovery Analyzer. In evaluating Deep Discovery's real-time visibility on network traffic, it is important to note that we applied our Deep Discovery Analyzer for Trend Micro to conduct sandboxing specifically for email channels only, and we do not utilize it for network channels. For network channel sandboxing, we use a solution called FortiAnalyzer, which belongs to another team called network security. I assess Deep Discovery's effectiveness in identifying sophisticated attack patterns by looking at how it handles high traffic loads, and how effectively it can use its instances and images to analyze numerous URLs and attachments simultaneously. Additionally, I evaluate its ability to maintain round-robin or load balancing across different analyses without leaving samples queued for analysis. The performance is critical when the product updates for signatures are up-to-date, as this aids in the detection and classification of URLs and attachments without delay in the analysis process. On a scale of one to ten, I rate Trend Micro Deep Discovery a nine.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The feature I found most valuable is the network threat analyzer in the security platform. It also integrates with GTI, or Global Threat Intelligence. Otherwise, I just use the basic features."
"The product is worth the investment."
"We use a lot of the functions this solution provides such as the firewall and the ability to check aliases, and we can monitor and show the traffic that's moving in and out."
"We feel safer now."
"The most valuable features are the customization of the signature and the unlimited amount of signatures in IPS."
"It works very well overall, and is excellent for enterprise-level businesses."
"It improved my security by stopping an attack to the signature base, or the behavior base."
"The most valuable features of the solution stem from the fact that it is a good product for dealing with DDoS attacks and for the inspection of network traffic."
"The HTML file sandboxing is very good."
"The reporting is very good, providing detailed analysis in a short amount of time."
"The solution is extremely easy to install; it's not overly complex or difficult to set it up, and you can get it up and running pretty quickly."
"The real-time visibility on network traffic provided by Trend Micro Deep Discovery is good, and my customer is satisfied."
"We are trying this solution as a POC, it's a nice product and it has really helped limit the attacks."
"Fire Eye is incredibly expensive, and requires multiple appliances which together, scan far less protocols than DDi."
"The most valuable feature of Trend Micro Deep Discovery is its complete end-to-end visibility of threats."
"Initial setup is easy; it can be done by yourself."
 

Cons

"The management console needs to be less complex and easier to navigate."
"The pricing could be improved."
"Integration with Global Thereat Intelligence could be better. Also, I think management solutions are end of life now at McAfee. Network threat analyzer may be used for endpoint quarantines. Integration between these sides, as well as endpoint APO, will help you quarantine the risky endpoints."
"The deployment was a little difficult, I did it myself."
"We would like to have a simpler version. Some settings and functions on the McAfee console are complex and complicated."
"Trellix Intrusion Prevention System does not provide virtual patching."
"The technical support must be improved."
"There are limited resources for configuration guidance."
"Trend Micro Deep Discovery's technical support could be improved, and it could be made more active."
"The tool's configuration can be made easier."
"Scalability becomes an issue when managing a higher number of customers."
"The stability of the solution could be improved. It should be 100% stable, but it's not there right now."
"Some of the end users may not be technically proficient, so they occasionally face problems due to a lack of knowledge."
"The solution could be more secure."
"The solution needs to be able to integrate better with third-party infrastructure."
"The solution should support multiple platforms in Windows, Linux, and Mac. Customers can have different software types. The virtual environment should be able to install and analyze them. The tool also gives only a minimum level of extension support. It may not be able to extract files and give details about them. I would also like to see third-party product integration in the tool. The solution's current integration is only with Trend Micro products only."
 

Pricing and Cost Advice

"I rate the product’s pricing an eight out of ten."
"The tool is competitively priced."
"The licensing cost is a bit pricey. We pay a yearly subscription."
"Trend Micro Deep Discovery is quite expensive compared to other endpoint security products."
"The tool’s licensing costs depend on the customers."
"The pricing is okay for some, and sometimes, some people find it expensive."
"The tool's licensing costs are yearly. There are no additional costs associated with the product."
"Overall, the price is good."
"Its price is fine, but Trend Micro can improve the pricing in general. It is a hardware solution. It is based on the number of nodes, and according to the number of nodes, clients decide which box they should acquire. They have to renew their license every year. It is subscription-based."
"The price of the solution is lower compared to the competition."
report
Use our free recommendation engine to learn which Intrusion Detection and Prevention Software (IDPS) solutions are best for your needs.
886,576 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Manufacturing Company
12%
Comms Service Provider
11%
Financial Services Firm
10%
Computer Software Company
7%
Financial Services Firm
11%
Computer Software Company
8%
Manufacturing Company
8%
Healthcare Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise6
Large Enterprise6
By reviewers
Company SizeCount
Small Business16
Midsize Enterprise6
Large Enterprise9
 

Questions from the Community

What needs improvement with McAfee Network Security Platform?
Trellix Intrusion Prevention System does not provide virtual patching. Patching involves updates on the OS side to address vulnerabilities, which is a different functionality. Trellix Intrusion Pre...
What is your primary use case for McAfee Network Security Platform?
We do not use Trellix Intrusion Prevention System; rather, we sell the Trellix Intrusion Prevention System solution. The typical use case for our clients is to find out what vulnerable files exist....
What advice do you have for others considering McAfee Network Security Platform?
I have experience working with other tools, specifically Trellix solutions such as DLP, EDR, and MDR, as well as with other Imperva tools. My team has worked with Trellix Intrusion Prevention Syste...
What do you like most about Trend Micro Deep Discovery?
The tool's most valuable feature is its collaboration with other products. Integrating with other security products was simple and easy.
What needs improvement with Trend Micro Deep Discovery?
Server Protect is not commonly used. When considering the Sandbox feature, it only inspects small files, and not all types of files are supported. The solution is very expensive. The solution is no...
 

Also Known As

McAfee Network Security Platform, McAfee NSP, IntruShield Network Intrusion Prevention System, IntruShield Network IPS
Trend Micro Deep Discovery Inspector, Trend Micro Deep Discovery Analyzer
 

Overview

 

Sample Customers

Desjardins Group, HollyFrontier, Nubia, Agbar, WNS Global Services, INAIL, Universidad de Las Américas Puebla (UDLAP), Cook County, China Pacific Insurance, Bank Central Asia, California Department of Corrections and Rehabilitation, City of Chicago, Macquarie Telecom, Sutherland Global Services, Texas Tech University Health Sciences Center, United Automotive Electronic Systems
Allied Telesis, Atma Jaya Catholic University of Indonesia, Babou, Blekinge County Council, Delacour, Hiroshima Prefectural Government, Live Nation Entertainment Inc., Mazda Motor Logistics Europe, McGill University Health Centre, Mikuni Corporation, OKWAVE, Sinar Mas Land, SWICA, UTOC Corporation
Find out what your peers are saying about Fortinet, Darktrace, Check Point Software Technologies and others in Intrusion Detection and Prevention Software (IDPS). Updated: April 2026.
886,576 professionals have used our research since 2012.