Trellix Network Detection and Response and Trend Micro Deep Discovery are major contenders in the network security market. Trend Micro is favored for its competitive pricing and global presence, whereas Trellix is recognized for its extensive visibility and responsive support.
Features: Trellix Network Detection and Response offers deep analysis with signature-less threat detection using advanced sandboxing and comprehensive lifecycle threat management, providing rapid real-time responses to intrusions. Trend Micro Deep Discovery provides complete end-to-end visibility of threats with effective zero-day exploits management, custom sandboxing, and collaborates with other products for enhanced security insights.
Room for Improvement: Trellix users seek better analytics and third-party tool integration, along with improved support for complex configurations and customization options. For Trend Micro Deep Discovery, users suggest strengthening integration with various platforms, improving scalability, and enhancing cost management.
Ease of Deployment and Customer Service: Trellix supports flexible deployment options including on-premises and hybrid cloud solutions with well-regarded responsive customer support. Trend Micro offers extensive deployment compatibility for diverse IT environments, though users note the need for improved proactive technical support.
Pricing and ROI: Trellix is considered expensive but its superior detection capabilities justify its cost, offering tangible ROI through reduced response times. Trend Micro, also viewed as pricey yet competitive, provides an ROI highlighted by its effectiveness in mitigating breaches and extreme threats.
Technical support needs improvement as sometimes engineers are not available promptly, especially during high-severity incidents.
There should be improvements in AI intelligence, faster decision-making, and a more responsive technical support team.
Trellix NDR provides an essential defense by automatically responding to network incidents that firewalls may not catch.
Product | Market Share (%) |
---|---|
Trellix Network Detection and Response | 5.1% |
Trend Micro Deep Discovery | 2.3% |
Other | 92.6% |
Company Size | Count |
---|---|
Small Business | 19 |
Midsize Enterprise | 8 |
Large Enterprise | 19 |
Company Size | Count |
---|---|
Small Business | 14 |
Midsize Enterprise | 6 |
Large Enterprise | 8 |
Detect the undetectable and stop evasive attacks. Trellix Network Detection and Response (NDR) helps your team focus on real attacks, contain intrusions with speed and intelligence, and eliminate your cybersecurity weak points.
Trend Micro Deep Discovery provides an intuitive interface and extensive threat visibility. It enhances detection with sandboxing and custom virtual machine images. Integration with Trend Micro Office Scan and Vision One ensures robust defense and detailed threat analysis.
Trend Micro Deep Discovery is a comprehensive network security tool used for intrusion detection, malware analysis, and zero-day vulnerability sandboxing. It supports various platforms and can be integrated with email and server protection. It's particularly useful for compliance with regulatory requirements through signature-based behavior analysis and virtual patching. Users benefit from easy installation, management, and responsive technical support.
What are the key features of Trend Micro Deep Discovery?Trend Micro Deep Discovery is implemented across sectors requiring stringent security measures, such as finance, healthcare, and government. It's favored for its ability to analyze diverse network traffic and provide exceptional protection against sophisticated threats while ensuring compliance with strict data regulations. Industry reviews highlight its role in safeguarding sensitive information through robust security frameworks and adaptable deployment options.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.