- End users
- Some servers
Systems Administrator at a media company with 51-200 employees
It is a reliable product, and we have one centralized place to look at threats.
Pros and Cons
- "There is a degree of set it and forget it in regards to the actual endpoints and what you can do with the console, which is nice."
- "If I had more reporting, the product would be an A plus."
What is our primary use case?
How has it helped my organization?
There is a degree of set it and forget it in regards to the actual endpoints and what you can do with the console, which is nice.
What is most valuable?
- Its reliability: We have one centralized place to look at threats.
- The ease of installing it for users.
What needs improvement?
If I had more reporting, the product would be an A plus. Reporting is the one thing that we are sort of missing, especially with more log information.
Buyer's Guide
Trend Micro Deep Security
December 2025
Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,310 professionals have used our research since 2012.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
I trust this product more than Symantec. Since we have installed the program, we have had no intrusions at all.
How are customer service and support?
They're tech support is on top of things. The few times when we had questions, they have gotten back to me quite rapidly.
Which solution did I use previously and why did I switch?
We have quite a bit of old servers that we are trying to migrate off of, and we had Symantec on them. Because of Symantec's logs, we were on the constant battle of always having to clean up the space, where when we put on Trend Micro on it, we didn't have to worry about that anymore. It has been easy to use. I can control it from the computer on my desk and not have to worry about it. I can push definitions, which has been easy to use as opposed to having to be on the actual user's computer.
How was the initial setup?
The integration and configuration of this product in our AWS environment was very easy.
What's my experience with pricing, setup cost, and licensing?
Purchasing on the AWS Marketplace was easy. We decided to purchase this solution on the AWS Marketplace since we were already there.
The pricing is fair.
Which other solutions did I evaluate?
There were three runners up when evaluating this product: Sophos, Symantec, and Trend Micro.
We chose Trend Micro for the following reasons:
- Its smaller footprint.
- It did not take up a lot of storage space.
- The agent was small enough to where you wouldn't even notice it.
- The ease for the user to install it themselves.
- The actual web portal.
- Cost: The price offered was decent compared to Sophos, which was extremely expensive.
What other advice do I have?
It integrates well with other products, e.g., we use it on user endpoints, servers, physical servers, VMware, and AWS. We use it on a lot of platforms.
Right now, we are using a cloud-based version, which I believe is the AWS version. We have the risk-free version which gives us a web format for us to push out programs to computer servers.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
VP of Enterprise Architecture at a tech services company with 10,001+ employees
IDS and IPS are its most valuable features
Pros and Cons
- "Trend Micro gave our security teams a certain degree of comfort by just having it in the background, as they have familiarity with the product."
- "AWS products could become more compatible with intrusion detection products leveraging help from Trend Micro."
What is our primary use case?
It's for security: IDS, IPS, intrusion detection, and securing our perimeter in general. E.g., OWASP rules.
How has it helped my organization?
Trend Micro gave our security teams a certain degree of comfort by just having it in the background, as they have familiarity with the product.
What is most valuable?
IDS and IPS are its most valuable features.
What needs improvement?
AWS products could become more compatible with intrusion detection products leveraging help from Trend Micro.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
We have had no stability issues.
What do I think about the scalability of the solution?
Scalability hasn't been an issue.
We have different workloads, so it depends on if we're talking about development, QA, or the testing environment. They are all separate accounts. We have a central account to try to manage all of them. A lot of these type products, like Trend Micro, fit into these shared environments.
Right now, we've got a few production workloads, but most of the workloads are still in development.
What about the implementation team?
Automation is a big part of everything that we do. The team setting it up would have had to set up Chef scripts and other things to make sure that we could automatically deploy. This would have been part of the configuration and management into the AWS environment.
Which other solutions did I evaluate?
We were looking for a tool to help secure our environment. There wasn't anything immediately available as an AWS native service, so we looked for a third-party tool which could do it.
We would like to see more from AWS natively on the intrusion detection side.
What other advice do I have?
Take a good look at all the different options. If there are things which I think teams are familiar with, that always gives a product a bit of a leg up. This is not just from the perspective of the people who support and deploy the product, but even the security teams who may be already familiar with the product and know how effective it is. It gives them a lot more comfort seeing something that they have some background with.
Our company uses the on-premise and AWS versions. I work with the AWS version, and have been happy with it. I am seeing more of the end result of it rather than the infrastructure and security perimeter.
We decided to use AWS because it was something the teams were familiar with. Our teams, who are currently using Trend Micro, were already familiar with the product and wanted to make use of it in the cloud as well. It was just a matter of continuity.
It is integrated with a SIEM, security incident and event management, platform. A lot of the output which comes from Trend Micro, we fed into the SIEM system so the security teams and the monitoring teams have a single pane of glass view into all the security features of our environment.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Trend Micro Deep Security
December 2025
Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,310 professionals have used our research since 2012.
HR Analyst Manager at a computer software company with 1,001-5,000 employees
It is connected into an intelligence database and is quick to pick up new threats
Pros and Cons
- "It is connected into an intelligence database and is quick to pick up new threats. It also reduces my workload with its speed and the protection that it provides."
- "The working interface and the reports for non-technical people could use improvement. They are a bit scary."
What is our primary use case?
We use it for security, specifically for old servers still in the company. It is doing its job.
How has it helped my organization?
I have heard of a lot of threats coming from Europe, but they have never touched our company.
The reports are very extensive. They give us information about things that we are not expecting, such as number of threats that failed due to compromised servers.
What is most valuable?
It is connected into an intelligence database and is quick to pick up new threats. It also reduces my workload with its speed and the protection that it provides.
What needs improvement?
The working interface and the reports for non-technical people could use improvement. They are a bit scary.
For how long have I used the solution?
Less than one year.
What do I think about the stability of the solution?
It is very stable. We are not putting too much stress on it since we are scaling down.
What do I think about the scalability of the solution?
We have not had any problems with scalability. We have very few servers for it to protect. Instead of scaling out, we are shrinking the number of servers (scaling down).
What about the implementation team?
We hired a third-party to do the AWS integration and configuration. The reseller appointed them, and everything was done for us.
What's my experience with pricing, setup cost, and licensing?
On an AWS defined scope, it will cheaper than buying the on-premise service. We did a trial for the on-premise version, but we decided to go with the AWS version. We are downsizing our server room, and it didn't make sense to put more machines in there, as we already have workloads in Indianapolis.
Which other solutions did I evaluate?
We already use Trend Micro for their endpoint protection. Therefore, we selected them for their server product because we liked their endpoint protection product. The process took a week to ten days.
What other advice do I have?
I would recommend it. I have been satisfied, as it is a good product.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Manager, Enterprise Risk Consulting at a tech company with 1,001-5,000 employees
Provides AV, file monitoring and log collection in a single agent.
Pros and Cons
- "There are a good signature set and a high rate of detection."
- "Installation and operations may have issues on some machines owing to their configuration of the network cards as the product is a DPI driver."
What is most valuable?
It is lightweight and provides a multi-platform for the client. It combines host intrusion prevention and provides AV, file monitoring, log collection, etc. in a single agent.
There are a good signature set and a high rate of detection.
It is one of the best client protection available for cloud computing.
For how long have I used the solution?
I have used this product for three years.
What do I think about the stability of the solution?
Installation and operations may have issues on some machines owing to their configuration of the network cards as the product is a DPI driver. The typical client-server issues exist as with any other product.
How was the initial setup?
The setup is simple as the agent provides a feature called as the Recommendation Scan. This scans the profiles of the host computer and provides recommendations on the appropriate signature and the policies to apply.
The installation of the agents, subsequent patching of the agents, etc. can be automated, thereby reducing the management overhead.
Which other solutions did I evaluate?
What other advice do I have?
If you are looking for an all-rounder for endpoint protection, then don't look any further than TM Deep Security.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Co-Founder at a tech services company with 51-200 employees
It's enabled us to protect our enterprise applications and data from breaches and business disruptions without emergency patching.
What is most valuable?
Working mostly with the virtual security data center (the server security platform) feature has been crucial in day-to-day businesses of the company because we're in data center services.
How has it helped my organization?
It's enabled us to protect our enterprise applications and data from breaches and business disruptions without emergency patching.
Not only do these benefits reduce both capital and operational expenditures, but they also provide resource agility that promotes business innovation and growth.
What needs improvement?
They need to improve their perimeter detection and tenancy.
What was my experience with deployment of the solution?
We haven't had any issues with deployment.
What do I think about the stability of the solution?
We've had no issues with stability.
What do I think about the scalability of the solution?
We've had no issues with scalability.
How was the initial setup?
The setup is easy, as is the configuration.
What other advice do I have?
With the changing tech world, with competitors not sleeping as time is money, simplified management is very crucial to my business.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Administrator at a financial services firm with 1,001-5,000 employees
Having centralized malware is practical. There should be a way to migrate without having to uninstall prior antivirus products.
What is most valuable?
Having centralized malware is very practical, but there should be a way to migrate without having to uninstall prior antivirus products.
How has it helped my organization?
Centralizing rules is practical and greatly accelerates the administration.
What needs improvement?
They should improve the interface of the main dashboard. It is difficult to find where templates define policies. Also, if you are not careful, your policy implementation can lead to management problems. It should have warnings before applying policies. They also need to improve its dashboard to help monitor the rules that are incorrect or are duplicated.
For how long have I used the solution?
We’ve been using it for one-and-a-half years.
What was my experience with deployment of the solution?
The product should have a strategy for installation. Prior to installation, the vendor should advise on a logical design of installation depending on the customer’s needs. In my case, it was not successful and produced serious inconveniences in our virtual infrastructure.
What do I think about the stability of the solution?
There were some stability issues in the virtual infrastructure due to issues with the deployment.
What do I think about the scalability of the solution?
We have had no issues scaling it for our needs.
How are customer service and technical support?
The level of technical support is just regular. They failed to advise how to carry out the setup and this caused serious drawbacks with interoperability between virtual machines. The consultant was not certified enough for installation to the point that after the installation, we lost money fixing the issues.
Which solution did I use previously and why did I switch?
I was the one who installed the solution, as well as charged with maintaining it. Also, I'm the ESL tester who creates policies and installs them.
How was the initial setup?
It is complex to install. As I said, we were not well-guided, we did not get certified support, and we weren't trained according to best practices.
Which other solutions did I evaluate?
We did not evaluate anything else.
What other advice do I have?
Prior evaluations of possible scenarios have resulted in determining problem areas as well as good practices. Also, it should be clear the level of integration with VMware and its different versions. My advice would be to have the most updated versions of ESXi, vCenter, vShield, etc. It's fundamental to have a network or network segment for the administration and management of all infrastructure.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Tech Evangelist at a tech services company with 501-1,000 employees
We can extend the security of the datacenter to cloud using API integration in a single management console.
What is most valuable?
Virtual Patching (part of Integrity Monitoring module) is the most valuable because it shields vulnerabilities in critical systems until an actual patch is available and deployed reducing the downtime, and protecting unpatchable systems extending the life of legacy systems and applications. Also, the possibility to know which files have been changed in the host machine.
The possibility to extend the security of the datacenter to cloud using API integration to AWS, vCloud, Azure and others in a single management console is also valuable.
How has it helped my organization?
In the past, we had to search for a window of time to patch the OS and some applications and it took a long time up a virtual machine and make it available for our needs because its update process was very slow. Now, we don’t have to wait for this process because when we need a VM we can just boot one up and run and patch the VM at an opportune time.
We use it to help a large payment company in Brazil to process millions of credit card transactions a day, and others company with similar challenges.
What needs improvement?
It needs real-time anti-malware support for Amazon Linux and an option that allows you to classify and mark reports using tags like Top Secret or Confidential which are missing in Deep Security 9.5 but are in v9.6, which was released in January. We're still homologating 9.6 version with this new feature.
An improvement on its Control Manager integration is also needed because it's insufficient for individual and granular management. Control Manager is a console that integrates all Trend Micro products.
For how long have I used the solution?
I've been using it since it was first released in 2010 and have used it in two different ways. At my own company, it's used to protect about 40 VMs on two hosts using VMware. It's also used for installing and supporting 36 clients over 250 servers and millions of transactions per day.
I'm one of the founders of company and I've been working as a technician from the beginning, my role was design, deployment planning and pre-sales support until the end of the last year with our support team. Now, I'm dedicating my time to executing our vision as CEO.
What was my experience with deployment of the solution?
We have had no issues deploying it, especially when following the guides.
What do I think about the stability of the solution?
It has been stable in our deployments.
What do I think about the scalability of the solution?
We have no issues scaling it when we need to.
How are customer service and technical support?
Trend Micro has a Channel Partner ecosystem highly prepared to solve any questions and they work very closely with Trend Micro support services to deliver the best experience to their customers.
Which solution did I use previously and why did I switch?
We did not have anything in place previously.
How was the initial setup?
The deployment depends on how you set up your VMware environment and what features you’re using. Following the steps described in the Administrator and Deployment guides helps you to avoid any complications.
What about the implementation team?
The implementation team was formed with inside analysts and vendor specialists. It's strongly recommended to use someone with the necessary skills to work with VMware and have someone familiar with infrastructure and security analysis.
What's my experience with pricing, setup cost, and licensing?
Start with a small group of servers and the most important modules for your company. Depending on the way you buy the product, you have the benefit of renewing discounts up to 50% in the next year.
What other advice do I have?
It's a hybrid platform with about five modules that will help you to manage and secure your datacenter and cloud initiative with multi-platform support. To get the same solution, you may have to contract at least four different vendors.
Disclosure: My company has a business relationship with this vendor other than being a customer. We are a Trend Micro Gold Partner from Brazil. We were the first company to sell this product in Latin America six years ago.
Server Manager at a healthcare company with 1,001-5,000 employees
The modules that are included with it will help us displace the local anti-virus that we're currently using.
Valuable Features:
The modules that are included with it will help us displace the local anti-virus that we're currently using today.
Room for Improvement:
There are a couple of areas for improvement. It needs better support for Mac, and there are some challenges in its implementation.
Unfortunately, the relationship with VMware that Trend Micro has, prohibits us from continuing our use of the non agent-based solution as NSX is now required to go forward from version 5.5 to version 6. NSX has now become a necessity to go with agent-based, so we're moving to an agent-based solution on the VDI's and our server-based as well.
Use of Solution:
We've used it for four years.
Deployment Issues:
There's an ongoing, continuing education process that needs to be in-sync with your Trend Micro staff. It's not a total set-it-and-forget-it type of solution. You need to continually manage and maintain it.
Stability Issues:
We're experiencing some instability, but my understanding from VMware and Trend Micro is that there's a relationship being built. They're pursuing a strategy to come up with perhaps a light version of NSX.
Scalability Issues:
We've had no issues with scalability.
Implementation Team:
I was involved in the setup from a managerial perspective. I contracted with Trend Micro support to provide us with implementation support.
Other Solutions Considered:
We've looked at McAfee, Kaspersky, and Symantec.
My team specifically looks at what's there on a regular basis. We work closely with the security team to be sure that we are making a good, conscious choice on an annual basis.
Other Advice:
It's important that you get a baseline of training, then partner with Trend Micro, whether it's an engineer pre-sales or an engineer that's implemented the product before. Be certain that your staff have the steering wheel and Trend Micro are the ones helping you navigate through the solution.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Thanks for that. Why it's so hard to find catch rates is a mystery.
Buyer's Guide
Download our free Trend Micro Deep Security Report and get advice and tips from experienced pros
sharing their opinions.
Updated: December 2025
Popular Comparisons
Akamai Guardicore Segmentation
VMware NSX
Aqua Cloud Security Platform
Cisco Secure Workload
Check Point CloudGuard Network Security
Trend Micro TippingPoint Threat Protection System
Juniper vSRX
Symantec Data Center Security
vArmour DSS
Entrust CloudControl
Sophos Virtualization Security
Buyer's Guide
Download our free Trend Micro Deep Security Report and get advice and tips from experienced pros
sharing their opinions.














especially automation saves time costs incured on operations