
![Trend Micro Deep Discovery [EOL] Logo](https://images.peerspot.com/image/upload/c_scale,dpr_3.0,f_auto,q_100,w_64/2wuq6mq8liciuy8jm6aqj4dp5bgm.jpg?_a=BACAGSGT)
Trellix Network Detection and Response and Trend Micro Deep Discovery are competitors in network security and threat detection. While Trellix offers strong detection capabilities and platform integration, Trend Micro excels in comprehensive threat visibility and infrastructure impact.
Features: Trellix Network Detection and Response is noted for zero-day attack detection, application filtering, and its MVX engine that uses virtual execution to identify threats. Other features include strong AI analysis for response processes. Trend Micro Deep Discovery offers comprehensive threat visibility, easy deployment, and powerful sandboxing capabilities that allow custom virtual machine images for threat analysis.
Room for Improvement: Trellix could enhance its dashboard, search capabilities for IOCs, and technical support responsiveness. Improvements in analytics integration are also suggested due to legacy mergers. Trend Micro Deep Discovery would benefit from expanded support and improved scalability and pricing management. Enhanced technical support and better multi-platform integration are also needed.
Ease of Deployment and Customer Service: Trellix provides flexibility with on-premises, hybrid, and cloud deployment options, supported by strong customer service and a global support presence. Trend Micro operates mainly on-premises with similar support levels but lacks the hybrid cloud flexibility Trellix offers.
Pricing and ROI: Trellix is considered high-priced but provides significant ROI through reduced response times and breach prevention. Trend Micro’s pricing is competitive due to its advanced security features, offering good ROI although higher than standard antivirus solutions. Both products show notable ROI, with Trellix benefiting from broader integration options.
Technical support needs improvement as sometimes engineers are not available promptly, especially during high-severity incidents.
The customer support for Trellix Network Detection and Response is great.
If I were to rate them from 0 to 10, I would give them a nine or a ten.
There is no dedicated team in India for giving support for Trend Micro Deep Discovery.
If it doesn't support scalability, Trend Micro will recommend an upgraded hardware version, requiring only a simple payment for the new appliance.
The product updates and security updates are kept current, allowing us seamless integration with Trend Micro and getting daily updates and signatures without problems.
There should be improvements in AI intelligence, faster decision-making, and a more responsive technical support team.
I would like to see in Trellix Network Detection and Response more explanation about some details of the threat.
There is no dedicated team in India for giving support for Trend Micro Deep Discovery.
The solution is not scalable as it is an agent product rather than a product designed for scalability.
We have multiple components such as Deep Discovery Email Inspector for mail gateways, Deep Discovery Analyzer for sandboxing, and Deep Discovery Inspector, which serves as an IDS detecting malicious network traffic.
It is reasonably priced, not very expensive like Proofpoint or other vendors.
The solution is very expensive.
Overall, the licensing cost of Trend Micro Deep Discovery was not on the higher side earlier, but now, since the competition has increased, we need to think about the prices.
What makes Trellix Network Detection and Response stand out for me compared to other tools is the way you can detect threats. It is very easy and comfortable to use, and the detection shows clearly on the screen, which is very easy to understand.
Trellix NDR provides an essential defense by automatically responding to network incidents that firewalls may not catch.
The most valuable capabilities of Trend Micro Deep Discovery Email Inspector include its ability to perform mail detection and mail filtration against various email attacks such as phishing and spam, serving as an email gateway for both inbound and outbound traffic.
The impact of the Threat Intelligence Sharing feature on overall defense and security is positive.
This solution allows us to see anomalies, network traffic in our network, and zero-day threats.
| Product | Market Share (%) |
|---|---|
| Trellix Network Detection and Response | 3.6% |
| Trend Micro Deep Discovery | 2.2% |
| Other | 94.2% |

| Company Size | Count |
|---|---|
| Small Business | 20 |
| Midsize Enterprise | 8 |
| Large Enterprise | 19 |
| Company Size | Count |
|---|---|
| Small Business | 16 |
| Midsize Enterprise | 6 |
| Large Enterprise | 9 |
Detect the undetectable and stop evasive attacks. Trellix Network Detection and Response (NDR) helps your team focus on real attacks, contain intrusions with speed and intelligence, and eliminate your cybersecurity weak points.
Trend Micro Deep Discovery [EOL] offers real-time network traffic visibility, advanced sandboxing, and threat intelligence sharing, improving threat management for organizations through seamless integration with security products and precise threat detection in simulated environments.
Recognized for its ability to detect advanced persistent threats and zero-day exploits, Trend Micro Deep Discovery [EOL] provides insights into malicious activities while maintaining compatibility with multiple platforms. Its custom sandboxing technology allows detailed environmental simulations to identify threats accurately. Despite the benefits, there are challenges such as the need for enhanced support in regions like India, better scalability, and easier usage for non-technical users. Integration with third-party tools could also improve alongside a simpler pricing model. Security features, stability, and flexibility are areas requiring enhancement to meet broader industry needs.
What are the key features of Trend Micro Deep Discovery [EOL]In industries focused on network security and compliance, Trend Micro Deep Discovery [EOL] finds use in intrusion detection and protection against malware, phishing, and ransomware. Companies deploy it for email filtration and network analysis, ensuring secure data management and virtual patching to address zero-day vulnerabilities. On-premises implementation includes role-based access and scanning of virtual environments, aiding in meeting security compliance standards and reducing server downtime.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.