Trend Micro Deep Security is a comprehensive solution for endpoint security and server protection, which prevents ransomware attacks and unauthorized access attempts. Its valuable features include tracing back attacks, antivirus protection, endpoint detection and response, firewall-based solution, threat detection, predictive machine learning and AI monitoring, VPM, virtualization, and sandboxing.
Some consider the cost to be high, while others find it to be reasonable and competitive. The cost is based on factors such as the number of licenses and the server's host. It is important to note that additional fees may apply for scaling or adding more licenses. Licensing fees are usually paid yearly, and there are different pricing models available, including subscription-based and perpetual options.
Users mentioned that the solution provided a significant increase in security measures, effectively protecting their systems from various threats. It was praised for its user-friendly interface and seamless integration into existing infrastructure. Users also noted the cost-effectiveness of the solution, as it helped reduce potential financial losses from security breaches.
The primary use case of Trend Micro Deep Security is server maintenance and protection. It is used to secure servers and endpoints, detect malicious threats, and disable the UFT.
Trend Micro Deep Security is also used for anti-malware support, file integrity monitoring, and threat prevention. One key feature that sets it apart is virtual patching, which provides a layer of security for servers even if they are not manually patched.
The solution is also used for web security, port encryption, and workload security. It helps prevent ransomware attacks and unauthorized access attempts and ensures compliance with industry standards.
The most valuable features of Trend Micro Deep Security, according to the reviews, are its anti-malware capabilities, applications, web reputation, integrity monitoring, virtual patching, agentless protection, information on server activities and hosts, endpoint protection, and roll-back feature.
Users appreciate its ransomware protection, threat detection, threat prevention, endpoint firewall, view of data center activity, performance, vulnerability protection, firewall, EDR (endpoint detection and response), patch management, Smart protection, and virtual patching.
Some improvements that can be made to Trend Micro Deep Security include:
1. Detection Capabilities: The tool needs to improve its ability to detect viruses and bugs, as it is currently lacking proper detection capabilities. It should also work well with other security solutions, such as Microsoft Defender, and improve on analyzing the latest threats.
2. Server Connection Issues: There are some server connection issues, including machines being shown as offline or not reported after upgrading the tool. The solution should improve its stability and ability to go online and offline without issues.
3. EDR Features and Integration: Users would like to see the tool add EDR features in the future and have an integrated data leak prevention module. It should also focus on providing one agent that takes care of EDR, end-point security, DLP, and application control. Integration with SIM functionality and better customer support are also desired.
4. Implementation and Deployment: The implementation process is considered hard and inflexible, requiring knowledge of virtualization and administration on Windows. It should be easier to deploy and more user-friendly.
5. Pricing and Subscription: Some users find the subscription and pricing of Trend Micro Deep Security to be expensive and suggest reducing the prices, especially to target SMBs and small enterprises. The solution should also improve its pricing in the cloud model.
6. Resource Drain and Performance: There have been instances where the tool drains server resources, causing slowdowns in processes and increased CPU usage. This needs to be addressed to ensure optimal performance.
7. Communication and Reporting: Users would like to receive distribution emails regarding vulnerabilities and recommended upgrades. They also suggest improving email relays and proxies, as well as enhancing reporting functionality for better analysis and integration.
8. Automation and Response Functionality: Users desire more automated response capabilities in Deep Security, similar to what is available in EDR solutions. It should have the ability to generate retroactive alerts and handle dynamic threat scenarios more effectively.
The initial setup for Trend Micro Deep Security is comfortable and straightforward. It can be deployed on-premises or through a SaaS model, with the latter taking only 20 to 30 minutes if the license is already activated.
For new users, it may take around a week to fully deploy the tool on the SaaS model. The setup phase involves coordinating with multiple teams and utilizing application control, web reputation, and integrity monitoring. Installation is not an issue and the solution offers good support for it.
The deployment process is generally easy and can be automated through scripts.
The tool does not require much maintenance as it has an auto-run feature for updates. However, some users mention challenges with Linux compatibility and the need for coordination during deployment.
Users have generally positive opinions about the scalability of Trend Micro Deep Security. They mention that the solution is scalable and can be expanded as needed. However, a few users mention that scalability may come with additional costs, such as purchasing licenses for each endpoint or server.
Customers have generally found the customer service and support of Trend Micro Deep Security to be good. The technical support team is responsive and helpful, although there are some instances where customers have experienced longer response times.
The support team provides the required information and troubleshooting steps, but there is a need for improvement in terms of responsiveness.
Some customers have mentioned that the support is mostly through email rather than phone calls. However, there are also positive experiences where customers have found the support to be fantastic and accessible. The support system includes a knowledge base, support portal, and on-call support for urgent issues.
The solution of Trend Micro Deep Security is highly stable and reliable. The solution does not have any bugs or glitches, and it does not crash or freeze. However, some users mention the need for monitoring and workarounds to ensure stability and occasional agent problems that require reinstallation.
Some consider the cost to be high, while others find it to be reasonable and competitive. The cost is based on factors such as the number of licenses and the server's host. It is important to note that additional fees may apply for scaling or adding more licenses. Licensing fees are usually paid yearly, and there are different pricing models available, including subscription-based and perpetual options.
Users mentioned that the solution provided a significant increase in security measures, effectively protecting their systems from various threats. It was praised for its user-friendly interface and seamless integration into existing infrastructure. Users also noted the cost-effectiveness of the solution, as it helped reduce potential financial losses from security breaches.
The primary use case of Trend Micro Deep Security is server maintenance and protection. It is used to secure servers and endpoints, detect malicious threats, and disable the UFT.
Trend Micro Deep Security is also used for anti-malware support, file integrity monitoring, and threat prevention. One key feature that sets it apart is virtual patching, which provides a layer of security for servers even if they are not manually patched.
The solution is also used for web security, port encryption, and workload security. It helps prevent ransomware attacks and unauthorized access attempts and ensures compliance with industry standards.
The most valuable features of Trend Micro Deep Security, according to the reviews, are its anti-malware capabilities, applications, web reputation, integrity monitoring, virtual patching, agentless protection, information on server activities and hosts, endpoint protection, and roll-back feature.
Users appreciate its ransomware protection, threat detection, threat prevention, endpoint firewall, view of data center activity, performance, vulnerability protection, firewall, EDR (endpoint detection and response), patch management, Smart protection, and virtual patching.
Some improvements that can be made to Trend Micro Deep Security include:
1. Detection Capabilities: The tool needs to improve its ability to detect viruses and bugs, as it is currently lacking proper detection capabilities. It should also work well with other security solutions, such as Microsoft Defender, and improve on analyzing the latest threats.
2. Server Connection Issues: There are some server connection issues, including machines being shown as offline or not reported after upgrading the tool. The solution should improve its stability and ability to go online and offline without issues.
3. EDR Features and Integration: Users would like to see the tool add EDR features in the future and have an integrated data leak prevention module. It should also focus on providing one agent that takes care of EDR, end-point security, DLP, and application control. Integration with SIM functionality and better customer support are also desired.
4. Implementation and Deployment: The implementation process is considered hard and inflexible, requiring knowledge of virtualization and administration on Windows. It should be easier to deploy and more user-friendly.
5. Pricing and Subscription: Some users find the subscription and pricing of Trend Micro Deep Security to be expensive and suggest reducing the prices, especially to target SMBs and small enterprises. The solution should also improve its pricing in the cloud model.
6. Resource Drain and Performance: There have been instances where the tool drains server resources, causing slowdowns in processes and increased CPU usage. This needs to be addressed to ensure optimal performance.
7. Communication and Reporting: Users would like to receive distribution emails regarding vulnerabilities and recommended upgrades. They also suggest improving email relays and proxies, as well as enhancing reporting functionality for better analysis and integration.
8. Automation and Response Functionality: Users desire more automated response capabilities in Deep Security, similar to what is available in EDR solutions. It should have the ability to generate retroactive alerts and handle dynamic threat scenarios more effectively.
The initial setup for Trend Micro Deep Security is comfortable and straightforward. It can be deployed on-premises or through a SaaS model, with the latter taking only 20 to 30 minutes if the license is already activated.
For new users, it may take around a week to fully deploy the tool on the SaaS model. The setup phase involves coordinating with multiple teams and utilizing application control, web reputation, and integrity monitoring. Installation is not an issue and the solution offers good support for it.
The deployment process is generally easy and can be automated through scripts.
The tool does not require much maintenance as it has an auto-run feature for updates. However, some users mention challenges with Linux compatibility and the need for coordination during deployment.
Users have generally positive opinions about the scalability of Trend Micro Deep Security. They mention that the solution is scalable and can be expanded as needed. However, a few users mention that scalability may come with additional costs, such as purchasing licenses for each endpoint or server.
Customers have generally found the customer service and support of Trend Micro Deep Security to be good. The technical support team is responsive and helpful, although there are some instances where customers have experienced longer response times.
The support team provides the required information and troubleshooting steps, but there is a need for improvement in terms of responsiveness.
Some customers have mentioned that the support is mostly through email rather than phone calls. However, there are also positive experiences where customers have found the support to be fantastic and accessible. The support system includes a knowledge base, support portal, and on-call support for urgent issues.
The solution of Trend Micro Deep Security is highly stable and reliable. The solution does not have any bugs or glitches, and it does not crash or freeze. However, some users mention the need for monitoring and workarounds to ensure stability and occasional agent problems that require reinstallation.
The solution is easy to use, scalable, stable, and reliable, with good technical support. It has helped organizations perform well against malware and vulnerabilities, provide patching from the Protection Cloud, and improve their security posture.
Trend Micro Deep Security Features
Trend Micro Deep Security has many valuable key features. Some of the most useful ones include:
Reviews from Real Users
Trend Micro Deep Security stands out among its competitors for a number of reasons. Two major ones are its robust data and loss prevention feature and its patch management, which saves users money. PeerSpot users take note of the advantages of these features in their reviews:
One PeerSpot reviewer, a Senior Security Advisor at a healthcare company, writes, “DLP, Data Loss Prevention, and the complexity of how we manage the console and how this client, or this tool, will notify us when there is something going wrong within the server and endpoint, is good.”
Nadeem S., CEO at Haniya Technologies, notes of the solution, “Patch management is most valuable. The major selling point of Deep Security is that it is based on the cloud. Deep Security is for the servers and databases of data centers, and generally, for patch management, you have to shut down the machines, and then you have to restart them. So, they need shutdown time, which is a cost.”
Trend Micro Deep Security was previously known as Deep Security.
Trend Micro Deep Security is the #1 ranked solution in top Virtualization Security tools and #3 ranked solution in best Cloud Security companies. PeerSpot users give Trend Micro Deep Security an average rating of 8.4 out of 10. Trend Micro Deep Security is most commonly compared to Trend Micro Apex One: Trend Micro Deep Security vs Trend Micro Apex One. Trend Micro Deep Security is popular among the large enterprise segment, accounting for 43% of users researching this solution on PeerSpot. The top industry researching this solution are professionals from a educational organization, accounting for 31% of all views.Rush University Medical Center, Guess? Inc., Mazda Motor Logistics Europe, MEDHOST, KSC Commercial Internet Co., Ricoh Company Ltd., Square Enix, SoftBank Telecom, Telecom Italia, United Way of Greater Atlanta, A&W Food Services of Canada