

Find out what your peers are saying about TrendAI, Juniper, Sophos and others in Virtualization Security.
The management console is very useful and easy to operate, allowing policy deployment in a minimal amount of time.
It adds value by providing centralized control over servers and endpoints.
If the customer is interested in technical capabilities, we demonstrate the tools, setup, implementation, and their working.
I can say that knowing you have a product like WatchGuard EPDR that's working 24/7 to help protect students in a school is good for ROI.
Whenever I raise a ticket, whether critical or high priority, their team responds immediately, often over calls, and works towards closing the request with the highest priority.
They have very professional engineers, and they often respond effectively.
About eighty percent of the time, we receive satisfactory responses.
They create a case, tell me to refer to articles, and if not resolved, they take a remote session to solve the issue.
Technical support for Panda Adaptive Defense 360 is provided by the reseller, and they also do preventive maintenance yearly.
The technical support from WatchGuard would rate at about an eight on a scale of 1 to 10, where one is the worst technical support and 10 is the best technical support.
Trend Micro also offers multiple solutions, now introducing Vision One and XDR, which allows integration with Deep Security for greater visibility from a security standpoint.
Trend Micro Deep Security is highly scalable.
In most organizations, they are using a mix of these security solutions.
WatchGuard EPDR is very competitive regarding its scalability.
It has been extremely stable throughout our usage, with no major disturbances.
Trend Micro Deep Security is very stable and provides protection at all times without issues.
We believe that software works fine until it is patched, managed, or monitored by the IT teams.
It is very stable with no hanging problems.
WatchGuard EPDR is a very stable solution and is not resource intensive.
The stability is approximately a seven to eight out of ten.
User experience improvement is most crucial, along with enhancements in policy management and the accuracy of the IPS, IDS features for real-time protection.
By seeing the dashboards, executives should understand whether our servers are secure or if there are vulnerabilities, which should be showcased immediately, indicating reasons for risk.
Additionally, the product is overpriced, which makes it difficult to sell to many customers.
Panda Adaptive Defense 360 is not compatible with certain network devices like access points, switches, or routers, which would be an area for improvement.
Other firewalls allow adding categories and in-app controls which WatchGuard currently lacks.
An area for improvement would be the software deployment to seamlessly deploy software packages across multiple machines simultaneously.
We give a fair comparison of all the products, and give them clear insights of the products, which makes it helpful for the customer to make a final decision to purchase the license or product.
Trend Micro Deep Security is considered overpriced, which poses a challenge in selling it to many customers.
The pricing is moderate, not expensive or very cheap.
It is worth the money and provides good return on investment.
The pricing is slightly high, but the product quality justifies it.
Regarding pricing, I am not sure because I did not compare it with other antivirus; maybe it is pricey.
It has multiple security layers, including anti-malware, intrusion prevention, integrity monitoring, web reputation, application control, firewall, and log inspection.
Patching allows us to virtually patch servers without downtime, which is critical given our limited patching windows, and helps prevent servers from being exploited.
The IPS module offers virtual patches to resolve issues immediately, making it an excellent product that I recommend for anyone with servers.
The cloud of WatchGuard lets me see all my devices, updating me to minute levels with detailed information, such as patch status and vulnerabilities.
The detection capabilities for malicious activities are effective.
The EDR has a high accuracy rate with only a few false positives.
| Product | Mindshare (%) |
|---|---|
| TrendAI Deep Security | 37.2% |
| Juniper vSRX | 19.6% |
| Sophos Virtualization Security | 18.5% |
| Other | 24.69999999999999% |
| Product | Mindshare (%) |
|---|---|
| WatchGuard EPDR | 2.0% |
| Microsoft Defender for Endpoint | 7.8% |
| CrowdStrike Falcon | 6.6% |
| Other | 83.6% |
| Company Size | Count |
|---|---|
| Small Business | 37 |
| Midsize Enterprise | 24 |
| Large Enterprise | 47 |
| Company Size | Count |
|---|---|
| Small Business | 26 |
| Midsize Enterprise | 8 |
| Large Enterprise | 2 |
TrendAI Deep Security offers advanced protection with anti-malware, virtual patching, and intrusion prevention. It supports hybrid and cloud environments, providing comprehensive security solutions for large organizations.
TrendAI Deep Security provides a robust suite of features tailored for defending systems against evolving threats. With centralized management, it seamlessly integrates with hybrid and cloud environments. Notable is its virtual patching, which reduces zero-day vulnerability risks and downtime, making it an optimal choice for large corporations seeking extensive protection. Despite challenges like less intuitive dashboards, compatibility, and performance issues during scanning, it excels in server and endpoint protection, intrusion detection, and application control. It's particularly effective in financial sectors and integrates with cloud platforms to automate security policy deployment.
What are TrendAI Deep Security's most significant features?Organizations in sectors like finance deploy TrendAI Deep Security for its virtual patching and hybrid environment support. The solution's adaptability across cloud platforms ensures secure workloads, making it essential for environments requiring robust threat detection and monitoring.
EDR for continuous monitoring that prevents the execution of unknown processes. Behavioral analysis and detection of IoAs (indicators of attack) scripts, macros, etc.
Automatic detection and response for targeted attacks and in-memory exploits. Endpoint protection capabilities such as URL filtering, device control and managed firewall.
Zero-Trust Application and Threat Hunting features delivered as managed services. Lightweight agent and easy-to-use Cloud-based console with detailed reporting.
We monitor all Virtualization Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.