

Trend Micro Deep Security and VMware Carbon Black Endpoint compete in the cybersecurity domain with distinct strengths. Trend Micro emphasizes data center and virtual environment security, whereas VMware Carbon Black focuses on endpoint protection and threat intelligence, showcasing advanced capabilities in threat detection and response.
Features: Trend Micro Deep Security offers a deep security framework for cloud and data center environments, providing agentless protection, virtual patching, and integration with cloud platforms. It includes modules for firewall, IDS/IPS, anti-malware, and integrity monitoring. VMware Carbon Black Endpoint excels in endpoint detection and response with its cloud-based analytics, threat hunting, and high detection ratios, offering detailed process insights, dynamic grouping, and simplified management for granular security control.
Room for Improvement: Trend Micro Deep Security could enhance its database management and platform compatibility, especially for Macs and comprehensive AWS support. Improvements in UI, real-time alerts, and integration with other security platforms are needed. VMware Carbon Black Endpoint could improve mobile device support, enhance EDR capabilities, and simplify its live incident response system, as well as improve container security and licensing models.
Ease of Deployment and Customer Service: Trend Micro Deep Security is flexible in on-premises and hybrid deployments with responsive support, despite some integration challenges. VMware Carbon Black provides versatile cloud and hybrid deployments, with improved service at the enterprise level, yet users seek more proactive and intuitive support interactions. Both provide scalable support, though VMware could streamline its approach.
Pricing and ROI: Trend Micro Deep Security, while higher priced, offers module-based licensing and good ROI through preventing costly incidents, especially via AWS Marketplace. VMware Carbon Black Endpoint, also recognized for high cost, justifies its price with an extensive feature set, providing a strong cost-benefit balance with negotiable discounts and scalable options, emphasizing security benefits that ensure significant ROI.
The management console is very useful and easy to operate, allowing policy deployment in a minimal amount of time.
It adds value by providing centralized control over servers and endpoints.
If the customer is interested in technical capabilities, we demonstrate the tools, setup, implementation, and their working.
Whenever I raise a ticket, whether critical or high priority, their team responds immediately, often over calls, and works towards closing the request with the highest priority.
They have very professional engineers, and they often respond effectively.
A dedicated support engineer will come in within three hours.
Trend Micro Deep Security is highly scalable.
In most organizations, they are using a mix of these security solutions.
You can install it on a script basis for Linux and Windows.
It has been extremely stable throughout our usage, with no major disturbances.
Trend Micro Deep Security is very stable and provides protection at all times without issues.
We believe that software works fine until it is patched, managed, or monitored by the IT teams.
User experience improvement is most crucial, along with enhancements in policy management and the accuracy of the IPS, IDS features for real-time protection.
Additionally, the product is overpriced, which makes it difficult to sell to many customers.
The user interface could be more user-friendly, as navigation sometimes requires familiarity with the console.
We give a fair comparison of all the products, and give them clear insights of the products, which makes it helpful for the customer to make a final decision to purchase the license or product.
Trend Micro Deep Security is considered overpriced, which poses a challenge in selling it to many customers.
The pricing is moderate, not expensive or very cheap.
It has multiple security layers, including anti-malware, intrusion prevention, integrity monitoring, web reputation, application control, firewall, and log inspection.
Patching allows us to virtually patch servers without downtime, which is critical given our limited patching windows, and helps prevent servers from being exploited.
It is well-suited for state government customers who require a complete sense of security.
| Product | Market Share (%) |
|---|---|
| Trend Micro Deep Security | 41.3% |
| Sophos Virtualization Security | 18.8% |
| Juniper vSRX | 15.2% |
| Other | 24.700000000000003% |
| Product | Market Share (%) |
|---|---|
| VMware Carbon Black Endpoint | 1.8% |
| Microsoft Defender for Endpoint | 9.5% |
| CrowdStrike Falcon | 7.8% |
| Other | 80.9% |


| Company Size | Count |
|---|---|
| Small Business | 36 |
| Midsize Enterprise | 24 |
| Large Enterprise | 44 |
| Company Size | Count |
|---|---|
| Small Business | 31 |
| Midsize Enterprise | 9 |
| Large Enterprise | 30 |
Trend Micro Deep Security is a comprehensive solution for endpoint security and server protection, which prevents ransomware attacks and unauthorized access attempts. Its valuable features include tracing back attacks, antivirus protection, endpoint detection and response, firewall-based solution, threat detection, predictive machine learning and AI monitoring, VPM, virtualization, and sandboxing.
The solution is easy to use, scalable, stable, and reliable, with good technical support. It has helped organizations perform well against malware and vulnerabilities, provide patching from the Protection Cloud, and improve their security posture.
Trend Micro Deep Security Features
Trend Micro Deep Security has many valuable key features. Some of the most useful ones include:
Reviews from Real Users
Trend Micro Deep Security stands out among its competitors for a number of reasons. Two major ones are its robust data and loss prevention feature and its patch management, which saves users money. PeerSpot users take note of the advantages of these features in their reviews:
One PeerSpot reviewer, a Senior Security Advisor at a healthcare company, writes, “DLP, Data Loss Prevention, and the complexity of how we manage the console and how this client, or this tool, will notify us when there is something going wrong within the server and endpoint, is good.”
Nadeem S., CEO at Haniya Technologies, notes of the solution, “Patch management is most valuable. The major selling point of Deep Security is that it is based on the cloud. Deep Security is for the servers and databases of data centers, and generally, for patch management, you have to shut down the machines, and then you have to restart them. So, they need shutdown time, which is a cost.”
VMware Carbon Black Endpoint enhances endpoint security with its robust EDR, threat detection, and live response features. The cloud-based architecture supports remote management and easy setup while behavioral monitoring and dynamic grouping minimize security risks.
VMware Carbon Black Endpoint is designed for those seeking comprehensive endpoint protection. With its cloud-based deployment, organizations experience streamlined remote control and simplified rollout processes. Its behavioral monitoring, incident response capabilities, and firewall integration deliver advanced security measures. Although it addresses many security challenges, areas like manual alert management, on-demand scanning, and integration with systems like AlienVault USM require refinement. Improved UI, EDR components, and flexible pricing models would enhance user satisfaction. On-premise deployment infrastructure and compatibility issues with some operating systems need attention. Enhanced reporting, container security, and multi-tenancy support are also essential for fulfilling industry needs. AI-driven analysis and threat isolation empower companies by fostering proactive management.
What are the key features of VMware Carbon Black Endpoint?
What benefits should users look for when evaluating VMware Carbon Black Endpoint?
VMware Carbon Black Endpoint finds extensive application in industries focused on stringent security requirements. Managed security service providers leverage its capabilities to deliver comprehensive protection to multiple clients worldwide. Organizations use it primarily for antivirus protection and incident management, integrating it with their existing security frameworks to strengthen endpoint visibility and real-time threat prevention. Its advanced detection and application control features make it a preferred choice in industries that prioritize robust security measures. However, it requires improvements in terms of system compatibility and customization flexibility to better serve diverse industry environments.
We monitor all Virtualization Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.