It is being used for our servers. It has many features such as firewall, IPS, anti-malware, and antivirus.
Senior Technical Consultant at a tech services company with 11-50 employees
Protects our servers, has many features, and is easy to set up
Pros and Cons
- "It provides security and protection. The endpoint firewall is valuable."
- "Their support should be improved. We need support in the UAE, but it is always going to some other country or region, and the time schedule is not suitable for us."
What is our primary use case?
What is most valuable?
It provides security and protection. The endpoint firewall is valuable.
What needs improvement?
Their support should be improved. We need support in the UAE, but it is always going to some other country or region, and the time schedule is not suitable for us.
For how long have I used the solution?
I have been using Trend Micro Deep Security for six years, but I have started to use Trend Micro Apex One recently.
Buyer's Guide
Trend Micro Deep Security
December 2025
Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,310 professionals have used our research since 2012.
What do I think about the stability of the solution?
Its stability is good.
What do I think about the scalability of the solution?
Scaling is possible. We're scaling up. We have about 40 servers.
Which solution did I use previously and why did I switch?
I have used SentinelOne.
How was the initial setup?
It is easy. It takes about two hours.
What about the implementation team?
It was implemented in our company. Our security team manages it. We have two people on the team.
What other advice do I have?
I would rate it a 10 out of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Solutions Architect at a comms service provider with 11-50 employees
Suitable for large organizations, is simple to install, and is reasonably priced
Pros and Cons
- "Technical support is good."
- "Trend Micro Deep Security security and scalability could be improved."
What is our primary use case?
We provide solutions for our clients.
Trend Micro Deep Security is used to secure their important data and important files.
What is most valuable?
Trend Micro Deep Security is suited for large organizations.
Our clients are satisfied with Trend Micro Deep Security.
What needs improvement?
Trend Micro Deep Security security and scalability could be improved.
For how long have I used the solution?
I have been dealing with Trend Micro Deep Security for three months.
What do I think about the stability of the solution?
Trend Micro Deep Security is a stable solution.
What do I think about the scalability of the solution?
Trend Micro Deep Security is a scalable product.
Currently, we have provided this solution to two clients.
How are customer service and support?
Technical support is good.
How was the initial setup?
The initial setup is straightforward.
It can be installed in 30 minutes.
We have a team of five to maintain this solution.
What's my experience with pricing, setup cost, and licensing?
Licensing fees are paid yearly.
Fees are neither high nor low; they are in the middle, it's average.
What other advice do I have?
I would rate Trend Micro Deep Security a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Buyer's Guide
Trend Micro Deep Security
December 2025
Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,310 professionals have used our research since 2012.
Consultant at a computer software company with 51-200 employees
Provides a view of what's happening and enhances security, but we should be able to have an automated response for some of the threats
Pros and Cons
- "In addition to providing our clients a view of what's happening in their data centers, it also does virtual patching in the data center. It enhances the security in the data center big time."
- "What this product lacks at this stage is the ability to have automated workbooks to do the response. At this stage, the response is more manual, and it is not automated. If there is a response functionality in Deep Security, similar to what we have in EDR these days, to automatically respond to some of the threats, it would be cool. So, we'd like to have an automated response. There should be a response functionality."
What is our primary use case?
It gives clients an additional view of what's happening in their data centers.
Deep Security is on-prem at this stage, but it has got cloud workload protection that has similar functionality in the cloud.
What is most valuable?
In addition to providing our clients a view of what's happening in their data centers, it also does virtual patching in the data center. It enhances the security in the data center big time.
What needs improvement?
What this product lacks at this stage is the ability to have automated workbooks to do the response. At this stage, the response is more manual, and it is not automated. If there is a response functionality in Deep Security, similar to what we have in EDR these days, to automatically respond to some of the threats, it would be cool. So, we'd like to have an automated response. There should be a response functionality.
For how long have I used the solution?
We have been providing this solution for a few years.
What do I think about the stability of the solution?
It is stable.
What do I think about the scalability of the solution?
It is scalable, but it is fairly expensive.
In terms of its usage, we're not using it internally. We have three clients at the moment. They are fairly big clients.
How are customer service and support?
Their technical support is good.
How was the initial setup?
It is a bit more difficult because it needs a bit of hardware, etc. Deep Security is more complex to set up than web security. Implementing Deep Security properly is usually about a week's worth of work because of the change control in the company. It is the change control that's an issue.
In terms of people required for its deployment, one engineer is usually enough.
What's my experience with pricing, setup cost, and licensing?
Most of it is annual at this stage.
What other advice do I have?
I would definitely recommend it for medium enterprises.
I would rate it a seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Risk info security at a financial services firm with 501-1,000 employees
Good for managing a few servers but it requires a lot of manual configuration after deployment
Pros and Cons
- "Deep Security is a good product for managing a few servers."
- "Post-implementation is time-consuming. You have to do monitoring, and that takes time. After you set up everything, it's not a full-fledged implementation. You have to keep on monitoring and configuring."
What is our primary use case?
Deep Security is a server protection product. We use it for virtual patching and file integration. You can use this with your cloud or an NX environment, virtual services, VMware, etc.
What is most valuable?
Deep Security is a good product for managing a few servers.
For how long have I used the solution?
I've been using Deep Security for more than five years.
What do I think about the stability of the solution?
Performance is fine. You need to keep an eye on the new files getting detected, or so you have to keep on applying those file folders. So you have to keep monitoring, or else it is not going to help. So especially for the file integrity model and all.
What do I think about the scalability of the solution?
I don't know about the scalability, but it's good for few servers where you can manage.
How are customer service and support?
There is a local Trend Micro team in Mumbai that we call for support or to log a ticket.
How was the initial setup?
Deployment and post-deployment implementation are a little complicated. We can't touch servers, and we can't modify the settings. It should be automated, and Trend Micro should make the process more intelligent. The scope is broad, and you have to manually monitor the file scans and respond whenever there is a detection.
The deployment itself is not that difficult because it's client based. So you want to install clients on each of those servers, and then you have to keep monitoring and adding features. You check the server's performance, and if everything is fine, you can keep adding servers. But post-implementation is time-consuming. You have to do monitoring, and that takes time. After you set up everything, it's not a full-fledged implementation. You have to keep on monitoring and configuring.
And there are times when the malware protection or some other virtual patching is working fine, but you need a technician to get all the more advanced features to work. It takes around two or three technicians to implement. Our team is responsible for security while a different team handles server management. Then there are one or two people who manage the security console. And then, there are OEM support and SI support.
What's my experience with pricing, setup cost, and licensing?
We have a subscription. It's not a surface subscription. It's only the AMC part.
What other advice do I have?
I rate Trend Micro Deep Security six out of 10. I would recommend it. It depends on the other security controls you have in place. If you're using the entire Trend Micro suite, then you have a PT web gateway. So if you have the whole suite, you have tight integration with your APT and firewall story. In that case, Trend Micro Control Manager is there. So you have everything tied to a single console, so security and everything play as a complete story.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
TitleGeneral Manager at a tech services company with 501-1,000 employees
Stable and scalable but needs vulnerability scanning at endpoints
Pros and Cons
- "It serves its purpose and works well."
- "The cost is very high."
What is our primary use case?
We primarily use the solution for security purposes.
What is most valuable?
I cannot speak to any specific feature that has wowed me.
It serves its purpose and works well.
The initial setup is easy.
The stability of the product has been good over the last 12 months.
We have found that the solution scales well.
What needs improvement?
The cost is very high. it would be ideal if they would work on the pricing.
Technical support could be much better.
The product should be able to host a vulnerability scanner. Right now, we need to pay extra. It would be ideal if they could do a vulnerability scan of my endpoints.
For how long have I used the solution?
I've been using the solution for 12 months or so. It's been about a year.
What do I think about the stability of the solution?
The stability has been very good in the year that we have used it. I haven't found any issues. There are no bugs or glitches. It doesn't crash or freeze. It's reliable.
What do I think about the scalability of the solution?
The scalability is very good. If a company needs to expand its usage, it can do so.
How are customer service and technical support?
Technical support has been below expectations. They don't seem to be as helpful or responsive as we need them to be.
What's my experience with pricing, setup cost, and licensing?
The price of the product is high. It's expensive.
What other advice do I have?
I'd rate the solution at a seven out of ten. It's been an okay solution, however, there still needs to be more done in certain areas.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Sr.Customer Engineer- Projects at a tech services company with 201-500 employees
Easy to deploy with the traceback feature that lets you trace back an attack
Pros and Cons
- "The traceback feature in XDR is amazing. You can trace back an attack. You can playback where an attack actually occurred and see how the attacker moved. We can easily show this to management, and it makes it easy to make them understand and convince them, which is the best thing."
- "There should be more tools to trace back. Some sort of module needs to be included to attach all the things. It should be more stable, and the traceback feature should be improved. There were cases when we got virtual analyzer or CMC errors. We got false-positive malware notifications, but we couldn't trace them. I raised a case with Trend Micro two or three times, but they couldn't resolve it. Their support should be improved in terms of technical abilities to troubleshoot complex issues. They should be more knowledgeable."
What is our primary use case?
I used it in my previous company, and it was basically used for security levels. My company was into the implementation of projects, and we used to implement security solutions. Along with Trend Micro, we used to implement these devices. We had several customers of this solution.
What is most valuable?
The traceback feature in XDR is amazing. You can trace back an attack. You can playback where an attack actually occurred and see how the attacker moved. We can easily show this to management, and it makes it easy to make them understand and convince them, which is the best thing.
What needs improvement?
There should be more tools to trace back. Some sort of module needs to be included to attach all the things.
It should be more stable, and the traceback feature should be improved. There were cases when we got virtual analyzer or CMC errors. We got false-positive malware notifications, but we couldn't trace them. I raised a case with Trend Micro two or three times, but they couldn't resolve it. Their support should be improved in terms of technical abilities to troubleshoot complex issues. They should be more knowledgeable.
For how long have I used the solution?
I have been using this solution for the past three years.
What do I think about the stability of the solution?
It is stable in a way, but you get false-positive malware notifications.
How are customer service and technical support?
Their support can be improved. For our case related to the virtual analyzer or CMC error, they couldn't trace back the issue. We were frequently getting notifications on that server, which were false-positive. They couldn't say why this is happening, and what is making this client trigger these errors. They couldn't advise on that. They should be more knowledgeable.
How was the initial setup?
Its initial setup is straightforward. Deployment duration depends on the environment. Sometimes, we needed to deploy two or three devices, and we had to consult Trend Micro. Their best practices are also there.
What about the implementation team?
We had a technical team of four engineers, including me.
What other advice do I have?
I would recommend this solution, but it has scope for improvement.
I would rate Trend Micro Deep Security an eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Cyber Security Technical Engineer at a consultancy with 10,001+ employees
Fits any size business, reliable, and good technical support
Pros and Cons
- "Some of the main features of this solution are it is reliable and can be used in small to large size businesses."
- "The licensing structure could improve."
What is most valuable?
Some of the main features of this solution are it is reliable and can be used in small to large size businesses.
What needs improvement?
The licensing structure could improve.
For how long have I used the solution?
I have been using the solution for a couple of weeks.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
I have found the solution scalable even for large enterprises.
How are customer service and technical support?
I have had good experiences with technical support.
How was the initial setup?
The installation is straightforward.
What's my experience with pricing, setup cost, and licensing?
There is a license required for this solution and there are extra features you can purchase.
What other advice do I have?
I would recommend this solution to others.
I rate Trend Micro Deep Security an eight out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Implementer
Technology Support Engineer at a energy/utilities company with 501-1,000 employees
A stable, yet affordable solution for deep security protection with fast customer support response times
Pros and Cons
- "The customer service/technical support for this solution is very fast."
- "The setup is fairly complex. The deployment took around two months."
What is our primary use case?
The primary use case of this solution is for deep security protection when accessing the internet and when performing online accounting.
What needs improvement?
An additional feature that should be included in the next release is the ability to scan more document types.
For how long have I used the solution?
I have been using this solution for five months.
What do I think about the stability of the solution?
The solution is stable.
How are customer service and technical support?
The customer service/technical support for this solution is very fast.
How was the initial setup?
The setup is fairly complex. The deployment took around two months.
What's my experience with pricing, setup cost, and licensing?
The solution is considerably cheaper than other similar solutions.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Trend Micro Deep Security Report and get advice and tips from experienced pros
sharing their opinions.
Updated: December 2025
Popular Comparisons
Akamai Guardicore Segmentation
VMware NSX
Aqua Cloud Security Platform
Cisco Secure Workload
Check Point CloudGuard Network Security
Trend Micro TippingPoint Threat Protection System
Juniper vSRX
Symantec Data Center Security
vArmour DSS
Entrust CloudControl
Sophos Virtualization Security
Buyer's Guide
Download our free Trend Micro Deep Security Report and get advice and tips from experienced pros
sharing their opinions.














