Risk info security at a financial services firm with 501-1,000 employees
Real User
Good for managing a few servers but it requires a lot of manual configuration after deployment
Pros and Cons
  • "Deep Security is a good product for managing a few servers."
  • "Post-implementation is time-consuming. You have to do monitoring, and that takes time. After you set up everything, it's not a full-fledged implementation. You have to keep on monitoring and configuring."

What is our primary use case?

Deep Security is a server protection product. We use it for virtual patching and file integration. You can use this with your cloud or an NX environment, virtual services, VMware, etc. 

What is most valuable?

Deep Security is a good product for managing a few servers.

For how long have I used the solution?

I've been using Deep Security for more than five years.

What do I think about the stability of the solution?

Performance is fine. You need to keep an eye on the new files getting detected, or so you have to keep on applying those file folders. So you have to keep monitoring, or else it is not going to help. So especially for the file integrity model and all. 

Buyer's Guide
Trend Micro Deep Security
March 2024
Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
768,886 professionals have used our research since 2012.

What do I think about the scalability of the solution?

I don't know about the scalability, but it's good for few servers where you can manage. 

How are customer service and support?

There is a local Trend Micro team in Mumbai that we call for support or to log a ticket.

How was the initial setup?

Deployment and post-deployment implementation are a little complicated. We can't touch servers, and we can't modify the settings. It should be automated, and Trend Micro should make the process more intelligent. The scope is broad, and you have to manually monitor the file scans and respond whenever there is a detection. 

The deployment itself is not that difficult because it's client based. So you want to install clients on each of those servers, and then you have to keep monitoring and adding features. You check the server's performance, and if everything is fine, you can keep adding servers. But post-implementation is time-consuming. You have to do monitoring, and that takes time. After you set up everything, it's not a full-fledged implementation. You have to keep on monitoring and configuring. 

And there are times when the malware protection or some other virtual patching is working fine, but you need a technician to get all the more advanced features to work. It takes around two or three technicians to implement. Our team is responsible for security while a different team handles server management. Then there are one or two people who manage the security console. And then, there are OEM support and SI support.

What's my experience with pricing, setup cost, and licensing?

We have a subscription. It's not a surface subscription. It's only the AMC part.

What other advice do I have?

I rate Trend Micro Deep Security six out of 10. I would recommend it. It depends on the other security controls you have in place. If you're using the entire Trend Micro suite, then you have a PT web gateway. So if you have the whole suite, you have tight integration with your APT and firewall story. In that case, Trend Micro Control Manager is there. So you have everything tied to a single console, so security and everything play as a complete story.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Sr.Customer Engineer- Projects at a tech services company with 201-500 employees
Real User
Easy to deploy with the traceback feature that lets you trace back an attack
Pros and Cons
  • "The traceback feature in XDR is amazing. You can trace back an attack. You can playback where an attack actually occurred and see how the attacker moved. We can easily show this to management, and it makes it easy to make them understand and convince them, which is the best thing."
  • "There should be more tools to trace back. Some sort of module needs to be included to attach all the things. It should be more stable, and the traceback feature should be improved. There were cases when we got virtual analyzer or CMC errors. We got false-positive malware notifications, but we couldn't trace them. I raised a case with Trend Micro two or three times, but they couldn't resolve it. Their support should be improved in terms of technical abilities to troubleshoot complex issues. They should be more knowledgeable."

What is our primary use case?

I used it in my previous company, and it was basically used for security levels. My company was into the implementation of projects, and we used to implement security solutions. Along with Trend Micro, we used to implement these devices. We had several customers of this solution.

What is most valuable?

The traceback feature in XDR is amazing. You can trace back an attack. You can playback where an attack actually occurred and see how the attacker moved. We can easily show this to management, and it makes it easy to make them understand and convince them, which is the best thing.

What needs improvement?

There should be more tools to trace back. Some sort of module needs to be included to attach all the things. 

It should be more stable, and the traceback feature should be improved. There were cases when we got virtual analyzer or CMC errors. We got false-positive malware notifications, but we couldn't trace them. I raised a case with Trend Micro two or three times, but they couldn't resolve it. Their support should be improved in terms of technical abilities to troubleshoot complex issues. They should be more knowledgeable.

For how long have I used the solution?

I have been using this solution for the past three years.

What do I think about the stability of the solution?

It is stable in a way, but you get false-positive malware notifications.

How are customer service and technical support?

Their support can be improved. For our case related to the virtual analyzer or CMC error, they couldn't trace back the issue. We were frequently getting notifications on that server, which were false-positive. They couldn't say why this is happening, and what is making this client trigger these errors. They couldn't advise on that. They should be more knowledgeable.

How was the initial setup?

Its initial setup is straightforward. Deployment duration depends on the environment. Sometimes, we needed to deploy two or three devices, and we had to consult Trend Micro. Their best practices are also there.

What about the implementation team?

We had a technical team of four engineers, including me.

What other advice do I have?

I would recommend this solution, but it has scope for improvement. 

I would rate Trend Micro Deep Security an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Buyer's Guide
Trend Micro Deep Security
March 2024
Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
768,886 professionals have used our research since 2012.
Founder at a financial services firm with 1-10 employees
Real User
Protects vulnerabilities; automated virtual patching is a very good feature
Pros and Cons
  • "Automated virtual patching is a good feature."
  • "Requires simplification, a fair amount of trouble shooting required."

What is our primary use case?

Our primary use case is for endpoint protection and email as well as web protection. We are stacking our servers once a month and vulnerabilities are checked every day. I'm a senior director in the company and we're a customer of Trend.  

What is most valuable?

Automated virtual patching would be the most valuable feature. Deep Security has an option called recommendation scans. Once that feature is enabled, it scans the endpoints for these vulnerability questions and the tool can implement the rules to prevent the vulnerability found in this batch.

What needs improvement?

This is a very good tool but I don't find it to be a particularly user friendly solution, a lot of trouble shooting is required. I believe it needs simplification, without that they will run into continual problems. For now the solution requires spending a lot of time on module issues and anti-malware modules. We also have issues with scaling and this area could be improved. Adding one additional end point means you need to re-input all the other end points. If you have 1,000 users, that is not possible in real time. Each time we deploy new managers we need to connect with all endpoints and they need to be re-entered. 

For how long have I used the solution?

I've been using this solution for three years. 

What do I think about the stability of the solution?

This solution is stable. 

What do I think about the scalability of the solution?

The scalability is very good and as we grow we are expanding our tool networks.

How was the initial setup?

The setup is straightforward. We initially procured the tool for 50 people and we've now implemented it for 200. There are many new customers coming in so we're looking to scale it to 1000 plus endpoints.

What other advice do I have?

I am completely satisfied with this tool but we still plan to implement with the Symantec Endpoint Protection for the upgrade segment. We want to use a different tool for endpoint security because if there are any bugs in Trend Micro or any other tool we use then we're in trouble so we've decided not to have multiple tools from the same vendor. 

I would rate this solution an eight out of 10. 

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Ahmet Burak Aydin - PeerSpot reviewer
Security Engineer at Intertech Information Technology and Marketing Inc.
Real User
Provides adequate security and technical assistance
Pros and Cons
  • "The performance is good."
  • "f it had the capability of generating retroactive alerts it would be helpful."

What is our primary use case?

We use Trend Micro Deep Security for security protection.

What is most valuable?

The performance is good. It is better than FireEye Email Security.

What needs improvement?

I would like to see a retroactive alert. If it had the capability of generating retroactive alerts it would be helpful.

While it is stable, it has room to improve.

For how long have I used the solution?

I have been working with Trend Micro Deep Security for six months.

What do I think about the stability of the solution?

Trend Micro Deep Security is a stable solution.

What do I think about the scalability of the solution?

Trend Micro Deep Security is scalable.

In our company, we have approximately 1,000 users.

How are customer service and support?

I am satisfied with the technical support that we have.

Which solution did I use previously and why did I switch?

We are also working with FireEye Email Security.

How was the initial setup?

I was not a part of the installation. It was installed by our technical team.

This solution is maintained and deployed by a team of ten managers and engineers.

What's my experience with pricing, setup cost, and licensing?

We don't pay any licensing fees.

What other advice do I have?

I would recommend this solution to others who are considering using it.

I would rate Trend Micro Deep Security a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user400725 - PeerSpot reviewer
Enterprise System Administrator at a healthcare company with 1,001-5,000 employees
Vendor
It's agile, flexible, and performs multiple tasks simultaneously. We're able to do firewalls, IPS, and log inspections with it.

Valuable Features

The comprehensive agility is the most valuable feature. It's very agile and flexible, and performs multiple tasks simultaneously very effectively. We're able to do firewalls, IPS, and log inspections with it.

Improvements to My Organization

It's very difficult for an enterprise, especially one of our size, to patch effectively at all times. The IPS helped us with this. Oftentimes, there's a delay between discovery of malicious threats and production of patches. The IPS allows us to virtually protect against those threats before true patches can be applied to our inputs.

Room for Improvement

Deep Security is a fantastic product but there are certain little details that could be tweaked or improved to make it a ten.

VMware and Trend Micro are pursuing a strategy to develop a light version of NSX that will allow us to run it agentlessly.

They also need to offer support for Apple machines. Almost every vendor I've seen, they're all junk. For Trend Micro to take a step either with their office-end product or with Deep Security to actually protect Macs, that would be a huge game-changer for iOS.

Use of Solution

We've been using it for three years.

Deployment Issues

We've had no issues with deployment.

Stability Issues

Overall, I'd say the product is very stable, both agentless and agent-based. Agentless is less stable due to the nature of how many moving parts have to be working and in place for the whole system to work effectively. However, moving forward with the relationship with VMware, agentless protection is not going to be possible without VMware NSX setup with the environment.

Scalability Issues

Our organization has 1,500 servers and 18,000 endpoints -- and it's growing.

Customer Service and Technical Support

Trend Micro has excellent technical support.

Initial Setup

Starting off with agentless, it was complex. With agentless, you have a lot of moving parts and they all have to be in-sync and working together for the whole system to work. It adds a level of complexity with vShield, the DSVA's, and all the different moving parts.

Other Advice

Come up with a solid working plan before you even think about actually implementing anything. The foundation is all in the preparation, the education and the project management.

No product is perfect. Deep Security is a fantastic product but there are certain little details, I think, that could be tweaked or improved. Do your homework, engage Trend Micro, get trained, get all the knowledge you can and come up with a solid working plan before you even think about actually implementing anything.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user378123 - PeerSpot reviewer
IT Security Analyst - Systems Administrator at a consumer goods company with 1,001-5,000 employees
Vendor
The anti-virus module, the firewall module, and integrity monitoring are the most valuable features for us that we use daily.

What is most valuable?

Of course, the anti-virus module, the firewall module, and integrity monitoring are the big ones for us. They're the most valuable features that we use daily.

How has it helped my organization?

It’s protected our network from viruses, and it’s done a really good job with that. It’s allowed us to set up business rules and notifications on changes to our operating systems and our firewall rules, which is a big piece of our business right now. It’s working really well.

What needs improvement?

I would like to see a little bit of better means of agent distribution. The ability to deploy agents maybe from the solution itself that would be a good one.

I’d like to see more of a database involved with integrity monitoring, a database that would be developed to identify some of the more well-known processes and files, trends, etc. Anything that would help me do less research would be an improvement.

For how long have I used the solution?

I've used it for one year.

What was my experience with deployment of the solution?

There were no issues with the deployment.

What do I think about the stability of the solution?

I would say it’s probably 8 or 9/10. The server operating systems are probably a 9/10, the agent installations on our work stations and servers are an 8 or 9/10, and finally on our laptop computers/remote users the number goes down a little to a 7/10 for stability.

What do I think about the scalability of the solution?

Scaling it has been fine as we haven’t done a whole lot but it seems to handle everything we need it to do. If we doubled in size tomorrow, I’d say it could handle it because the product has the availability to have more than one server with the cost remaining the same. I’d say scalability is very good.

How are customer service and technical support?

I’d say they are very good, very knowledgeable, and very proactive. It's all good.

Which solution did I use previously and why did I switch?

I would say it was pretty straightforward. We have a complex network, so if it was complex, it was because of us.

How was the initial setup?

We had an engineer come out and spend a week with us to help everything run smoothly.

Which other solutions did I evaluate?

I wasn't involved with the process, but I know we looked at a number of other solutions. I know, however, the reasons they went with this solution is because of its compatibility with VMware, which was one of the big factors. Also, the cost was a deciding factor.

What other advice do I have?

I would say that before Trend Micro comes out to install the product, you need to come up with a plan with the product. That could be anti-virus and a good plan of how you want anti-virus to work on your work stations, computers, and servers. I shouldn't just say anti-virus, but also firewall protection, integrity, what exclusions do you want. You want a good plan for each system and that will make the installation much faster. If you have to go back when the person is with you and try to figure it out as you go along, it will slow you down. Get a good plan.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
IT Infrastructure Manager at a computer software company with 51-200 employees
Real User
Good Virtual path function for anti-malware and good support
Pros and Cons
  • "The most valuable feature of this solution is the virtual path function, which is the reason we chose to implement it."
  • "I would like to see an EDR function for the servers, as that would be useful for us."

What is our primary use case?

The primary use case of this solution is for anti-malware and virtual paths.

What is most valuable?

The most valuable feature of this solution is the virtual path function, which is the reason we chose to implement it.

What needs improvement?

I would like to see an EDR function for the servers, as that would be useful for us.

Detection and Response directly to the servers.

For how long have I used the solution?

I have been using Trend Micro Deep Security since last year.

What do I think about the stability of the solution?

It's a stable product. We have not had issues.

We have a team of 40 to support and maintain this solution.

What do I think about the scalability of the solution?

This is a scalable solution. We have 2,000 users and a total of 20,000 staff members in our organization. We have more than 40 hospitals in Thailand.

How are customer service and technical support?

We are satisfied with the support that we have received.

Which solution did I use previously and why did I switch?

We are also using CrowdStrike.

Also, we were using Kasperky for anti-malware for the servers.

How was the initial setup?

The initial setup was not easy because when we deployed it, we had to restart our server, and needed permissions from our client.

It took approximately six months to deploy.

What other advice do I have?

I recommend this solution to others who are interested in using it.

I would rate this solution a ten out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Solutions Architect at a comms service provider with 11-50 employees
Real User
Suitable for large organizations, is simple to install, and is reasonably priced
Pros and Cons
  • "Technical support is good."
  • "Trend Micro Deep Security security and scalability could be improved."

What is our primary use case?

We provide solutions for our clients.

Trend Micro Deep Security is used to secure their important data and important files.

What is most valuable?

Trend Micro Deep Security is suited for large organizations.

Our clients are satisfied with Trend Micro Deep Security.

What needs improvement?

Trend Micro Deep Security security and scalability could be improved.

For how long have I used the solution?

I have been dealing with Trend Micro Deep Security for three months.

What do I think about the stability of the solution?

Trend Micro Deep Security is a stable solution.

What do I think about the scalability of the solution?

Trend Micro Deep Security is a scalable product.

Currently, we have provided this solution to two clients.

How are customer service and support?

Technical support is good.

How was the initial setup?

The initial setup is straightforward.

It can be installed in 30 minutes.

We have a team of five to maintain this solution.

What's my experience with pricing, setup cost, and licensing?

Licensing fees are paid yearly.

Fees are neither high nor low; they are in the middle, it's average.

What other advice do I have?

I would rate Trend Micro Deep Security a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Buyer's Guide
Download our free Trend Micro Deep Security Report and get advice and tips from experienced pros sharing their opinions.
Updated: March 2024
Buyer's Guide
Download our free Trend Micro Deep Security Report and get advice and tips from experienced pros sharing their opinions.