Try our new research platform with insights from 80,000+ expert users
Principal Infrastructure Security Architect at OSI
Real User
We use it for managing application whitelisting, and intrusion detection and prevention for the CLOUD Act
Pros and Cons
  • "The integration and configuration of this product in our AWS environment was good. We haven't had any problems at all."
  • "The initial setup needs improvement, as it was a bit challenging."

What is our primary use case?

It is for managing application whitelisting, and intrusion detection and prevention for the CLOUD Act.

What is most valuable?

  • It is flexible.
  • The configuration is quite easy.

What needs improvement?

The initial setup needs improvement. Once it is set up, the configuration is relatively simple. However, the initial setup was a bit of a challenge.

What do I think about the stability of the solution?

We haven't had any issues with stability. It has been rock solid for us.

In the past year, it is still a fairly lightweight environment, so there has not been a lot of stress.

Buyer's Guide
Trend Micro Deep Security
May 2025
Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
856,873 professionals have used our research since 2012.

What do I think about the scalability of the solution?

Size of our particular environment is about 200 systems. The scalability has worked very well for us.

How are customer service and support?

We used the technical support for setting up profiles. Working with them was pretty good, they are extremely responsive and helpful.

How was the initial setup?

The integration and configuration of this product in our AWS environment was good. We haven't had any problems at all.

What was our ROI?

We haven't really seen ROI so far. Since it is a light traffic environment right now, the product hasn't had that many incidents to deal with yet.

What's my experience with pricing, setup cost, and licensing?

Our company chose to procure this product via AWS Marketplace due to regulatory requirements. We mostly use it in the AWS GovCloud.

Which other solutions did I evaluate?

I was not at the company when they evaluated the other products. I do know that they evaluated Symantec.

Trend Micro was selected because it has better whitelisting of applications, its intrusion detection was far superior, and it has configurability.

What other advice do I have?

The best approach is to start off with a node where it is sort of monitoring and looking at stuff, then work your way into the actual prevention and blocking. Because it can turn off a bunch of services without too much effort which can be good, but it can also shut things down.

We haven't really gone into the integration aspect yet.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
DevOpsEnb3ed - PeerSpot reviewer
DevOps Engineer at a financial services firm with 501-1,000 employees
Real User
Their support is good. They are responsive.
Pros and Cons
  • "Their support is good. They are responsive, which is nice."
  • "Their automation needs improvement."

What is our primary use case?

The primary use case is its antivirus and anti-malware capabilities.

We mostly integrate it with the EC2 instances.

What is most valuable?

Their support is good. They are responsive, which is nice.

What needs improvement?

I know that they are working on it, but their automation needs improvement.

I would also like to see more containerization stuff, specifically Docker.

For how long have I used the solution?

One to three years.

What do I think about the stability of the solution?

It has been stable so far. We don't put a lot stress on it.

What do I think about the scalability of the solution?

It scales very well. We have around 2,000 instances running.

How is customer service and technical support?

Their technical support is great.

How was the initial setup?

The integration and configuration of Trend Micro in our AWS environment seemed pretty seamless.

What other advice do I have?

Take it for a spin. Ask their support for a demo. The product is really solid.

We previously used the on-premise version. Now, we are using it on a SaaS environment (AWS). 

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Trend Micro Deep Security
May 2025
Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
856,873 professionals have used our research since 2012.
Systems Administrator at Alfred Publishing
Real User
It is a reliable product, and we have one centralized place to look at threats.
Pros and Cons
  • "There is a degree of set it and forget it in regards to the actual endpoints and what you can do with the console, which is nice."
  • "If I had more reporting, the product would be an A plus."

What is our primary use case?

  • End users
  • Some servers

How has it helped my organization?

There is a degree of set it and forget it in regards to the actual endpoints and what you can do with the console, which is nice.

What is most valuable?

  • Its reliability: We have one centralized place to look at threats. 
  • The ease of installing it for users.

What needs improvement?

If I had more reporting, the product would be an A plus. Reporting is the one thing that we are sort of missing, especially with more log information. 

For how long have I used the solution?

One to three years.

What do I think about the stability of the solution?

I trust this product more than Symantec. Since we have installed the program, we have had no intrusions at all.

How are customer service and technical support?

They're tech support is on top of things. The few times when we had questions, they have gotten back to me quite rapidly.

Which solution did I use previously and why did I switch?

We have quite a bit of old servers that we are trying to migrate off of, and we had Symantec on them. Because of Symantec's logs, we were on the constant battle of always having to clean up the space, where when we put on Trend Micro on it, we didn't have to worry about that anymore. It has been easy to use. I can control it from the computer on my desk and not have to worry about it. I can push definitions, which has been easy to use as opposed to having to be on the actual user's computer.

How was the initial setup?

The integration and configuration of this product in our AWS environment was very easy.

What's my experience with pricing, setup cost, and licensing?

Purchasing on the AWS Marketplace was easy. We decided to purchase this solution on the AWS Marketplace since we were already there.

The pricing is fair.

Which other solutions did I evaluate?

There were three runners up when evaluating this product: Sophos, Symantec, and Trend Micro.

We chose Trend Micro for the following reasons:

  • Its smaller footprint.
  • It did not take up a lot of storage space. 
  • The agent was small enough to where you wouldn't even notice it.
  • The ease for the user to install it themselves. 
  • The actual web portal.
  • Cost: The price offered was decent compared to Sophos, which was extremely expensive.

What other advice do I have?

It integrates well with other products, e.g., we use it on user endpoints, servers, physical servers, VMware, and AWS. We use it on a lot of platforms.

Right now, we are using a cloud-based version, which I believe is the AWS version. We have the risk-free version which gives us a web format for us to push out programs to computer servers.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
VP of Enterprise Architecture at Broadridge
Real User
IDS and IPS are its most valuable features
Pros and Cons
  • "Trend Micro gave our security teams a certain degree of comfort by just having it in the background, as they have familiarity with the product."
  • "AWS products could become more compatible with intrusion detection products leveraging help from Trend Micro."

What is our primary use case?

It's for security: IDS, IPS, intrusion detection, and securing our perimeter in general. E.g., OWASP rules.

How has it helped my organization?

Trend Micro gave our security teams a certain degree of comfort by just having it in the background, as they have familiarity with the product.

What is most valuable?

IDS and IPS are its most valuable features.

What needs improvement?

AWS products could become more compatible with intrusion detection products leveraging help from Trend Micro.  

For how long have I used the solution?

One to three years.

What do I think about the stability of the solution?

We have had no stability issues.

What do I think about the scalability of the solution?

Scalability hasn't been an issue.

We have different workloads, so it depends on if we're talking about development, QA, or the testing environment. They are all separate accounts. We have a central account to try to manage all of them. A lot of these type products, like Trend Micro, fit into these shared environments. 

Right now, we've got a few production workloads, but most of the workloads are still in development.

What about the implementation team?

Automation is a big part of everything that we do. The team setting it up would have had to set up Chef scripts and other things to make sure that we could automatically deploy. This would have been part of the configuration and management into the AWS environment.

Which other solutions did I evaluate?

We were looking for a tool to help secure our environment. There wasn't anything immediately available as an AWS native service, so we looked for a third-party tool which could do it. 

We would like to see more from AWS natively on the intrusion detection side.

What other advice do I have?

Take a good look at all the different options. If there are things which I think teams are familiar with, that always gives a product a bit of a leg up. This is not just from the perspective of the people who support and deploy the product, but even the security teams who may be already familiar with the product and know how effective it is. It gives them a lot more comfort seeing something that they have some background with.

Our company uses the on-premise and AWS versions. I work with the AWS version, and have been happy with it. I am seeing more of the end result of it rather than the infrastructure and security perimeter.

We decided to use AWS because it was something the teams were familiar with. Our teams, who are currently using Trend Micro, were already familiar with the product and wanted to make use of it in the cloud as well. It was just a matter of continuity.

It is integrated with a SIEM, security incident and event management, platform. A lot of the output which comes from Trend Micro, we fed into the SIEM system so the security teams and the monitoring teams have a single pane of glass view into all the security features of our environment.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
HR Analyst Manager at C.E.S.A.R
Real User
It is connected into an intelligence database and is quick to pick up new threats
Pros and Cons
  • "It is connected into an intelligence database and is quick to pick up new threats. It also reduces my workload with its speed and the protection that it provides."
  • "The working interface and the reports for non-technical people could use improvement. They are a bit scary."

What is our primary use case?

We use it for security, specifically for old servers still in the company. It is doing its job.

How has it helped my organization?

I have heard of a lot of threats coming from Europe, but they have never touched our company.

The reports are very extensive. They give us information about things that we are not expecting, such as number of threats that failed due to compromised servers.

What is most valuable?

It is connected into an intelligence database and is quick to pick up new threats. It also reduces my workload with its speed and the protection that it provides.

What needs improvement?

The working interface and the reports for non-technical people could use improvement. They are a bit scary.

For how long have I used the solution?

Less than one year.

What do I think about the stability of the solution?

It is very stable. We are not putting too much stress on it since we are scaling down.

What do I think about the scalability of the solution?

We have not had any problems with scalability. We have very few servers for it to protect. Instead of scaling out, we are shrinking the number of servers (scaling down).

What about the implementation team?

We hired a third-party to do the AWS integration and configuration. The reseller appointed them, and everything was done for us.

What's my experience with pricing, setup cost, and licensing?

On an AWS defined scope, it will cheaper than buying the on-premise service. We did a trial for the on-premise version, but we decided to go with the AWS version. We are downsizing our server room, and it didn't make sense to put more machines in there, as we already have workloads in Indianapolis. 

Which other solutions did I evaluate?

We already use Trend Micro for their endpoint protection. Therefore, we selected them for their server product because we liked their endpoint protection product. The process took a week to ten days. 

What other advice do I have?

I would recommend it. I have been satisfied, as it is a good product.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Manager, Enterprise Risk Consulting at a tech company with 1,001-5,000 employees
Real User
Provides AV, file monitoring and log collection in a single agent.
Pros and Cons
  • "There are a good signature set and a high rate of detection."
  • "Installation and operations may have issues on some machines owing to their configuration of the network cards as the product is a DPI driver."

What is most valuable?

It is lightweight and provides a multi-platform for the client. It combines host intrusion prevention and provides AV, file monitoring, log collection, etc. in a single agent.

There are a good signature set and a high rate of detection.

It is one of the best client protection available for cloud computing.

For how long have I used the solution?

I have used this product for three years.

What do I think about the stability of the solution?

Installation and operations may have issues on some machines owing to their configuration of the network cards as the product is a DPI driver. The typical client-server issues exist as with any other product.

How was the initial setup?

The setup is simple as the agent provides a feature called as the Recommendation Scan. This scans the profiles of the host computer and provides recommendations on the appropriate signature and the policies to apply.

The installation of the agents, subsequent patching of the agents, etc. can be automated, thereby reducing the management overhead.

Which other solutions did I evaluate?

We evaluated McAfee and Symantec.

What other advice do I have?

If you are looking for an all-rounder for endpoint protection, then don't look any further than TM Deep Security.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Co-Founder at a tech services company with 51-200 employees
Real User
It's enabled us to protect our enterprise applications and data from breaches and business disruptions without emergency patching.

What is most valuable?

Working mostly with the virtual security data center (the server security platform) feature has been crucial in day-to-day businesses of the company because we're in data center services.

How has it helped my organization?

It's enabled us to protect our enterprise applications and data from breaches and business disruptions without emergency patching.

Not only do these benefits reduce both capital and operational expenditures, but they also provide resource agility that promotes business innovation and growth.

What needs improvement?

They need to improve their perimeter detection and tenancy.

What was my experience with deployment of the solution?

We haven't had any issues with deployment.

What do I think about the stability of the solution?

We've had no issues with stability.

What do I think about the scalability of the solution?

We've had no issues with scalability.

How was the initial setup?

The setup is easy, as is the configuration.

What other advice do I have?

With the changing tech world, with competitors not sleeping as time is money, simplified management is very crucial to my business.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user339417 - PeerSpot reviewer
Network Administrator at a financial services firm with 1,001-5,000 employees
Vendor
Having centralized malware is practical. There should be a way to migrate without having to uninstall prior antivirus products.

What is most valuable?

Having centralized malware is very practical, but there should be a way to migrate without having to uninstall prior antivirus products.

How has it helped my organization?

Centralizing rules is practical and greatly accelerates the administration.

What needs improvement?

They should improve the interface of the main dashboard. It is difficult to find where templates define policies. Also, if you are not careful, your policy implementation can lead to management problems. It should have warnings before applying policies. They also need to improve its dashboard to help monitor the rules that are incorrect or are duplicated.

For how long have I used the solution?

We’ve been using it for one-and-a-half years.

What was my experience with deployment of the solution?

The product should have a strategy for installation. Prior to installation, the vendor should advise on a logical design of installation depending on the customer’s needs. In my case, it was not successful and produced serious inconveniences in our virtual infrastructure.

What do I think about the stability of the solution?

There were some stability issues in the virtual infrastructure due to issues with the deployment.

What do I think about the scalability of the solution?

We have had no issues scaling it for our needs.

How are customer service and technical support?

The level of technical support is just regular. They failed to advise how to carry out the setup and this caused serious drawbacks with interoperability between virtual machines. The consultant was not certified enough for installation to the point that after the installation, we lost money fixing the issues.

Which solution did I use previously and why did I switch?

I was the one who installed the solution, as well as charged with maintaining it. Also, I'm the ESL tester who creates policies and installs them.

How was the initial setup?

It is complex to install. As I said, we were not well-guided, we did not get certified support, and we weren't trained according to best practices.

Which other solutions did I evaluate?

We did not evaluate anything else.

What other advice do I have?

Prior evaluations of possible scenarios have resulted in determining problem areas as well as good practices. Also, it should be clear the level of integration with VMware and its different versions. My advice would be to have the most updated versions of ESXi, vCenter, vShield, etc. It's fundamental to have a network or network segment for the administration and management of all infrastructure.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Trend Micro Deep Security Report and get advice and tips from experienced pros sharing their opinions.
Updated: May 2025
Buyer's Guide
Download our free Trend Micro Deep Security Report and get advice and tips from experienced pros sharing their opinions.