Jr Cybersecurity Engineer at a tech services company with 51-200 employees
Real User
Top 20
2024-03-18T09:32:00Z
Mar 18, 2024
We use Trend Vision One for real-time analysis and monitoring to identify the root cause of security incidents. This includes finding details like how the attack unfolded, user names involved, IP addresses associated with the attack, and the affected systems and devices. By analyzing this information, we can map out the entire attack flow chart.
Cloud Security Engineer at a healthcare company with 5,001-10,000 employees
Real User
Top 10
2024-02-15T08:35:00Z
Feb 15, 2024
We were using Symantec before, and with the coming of EDRs in the market, we were looking for a solution. We wanted a defense system so that if there is an attack on the system, such as an endpoint is infected or the attacker or a known technique for ransomware is moving laterally, I do not need to go to the firewall team. I do not need to go to other teams to find out. I should have enough intel at that very stage to contain it if possible.
Chief Technology Officer at a healthcare company with 10,001+ employees
Real User
Top 20
2024-01-03T08:24:00Z
Jan 3, 2024
We use Trend Vision One for our endpoint detection and antivirus solution. The endpoint agents are deployed locally on our computers and the centralized controller is in the cloud.
System Administrator at a financial services firm with 10,001+ employees
Real User
Top 10
2024-01-02T11:35:00Z
Jan 2, 2024
We use FireEye, Microsoft Defender, and Trend Micro for our endpoint solutions. Trend Micro. We implemented Trend Vision One because we have many production servers and wanted to secure all endpoints. We are planning to move our XDR to the cloud, but all of our production servers are currently on-premises.
Analista de Segurança da Informação at a tech services company with 1-10 employees
Real User
Top 10
2023-10-31T19:39:00Z
Oct 31, 2023
I work with it as a third party in other companies. I installed XDR in other companies. And then, I help them understand the tool, help them with developing the necessary use cases, and understand, for example, how to do a threat intel, how to do a threat investigation, and stuff like that. Sometimes, I work with it as well by implementing it and actively using it in the customer's environment.
Operations Manager, Global Information Security at a hospitality company with 10,001+ employees
Real User
Top 20
2023-10-30T15:49:00Z
Oct 30, 2023
We have deployed Trend Micro XDR on all our endpoints. It is deployed as an agent because we are using Trend Micro Apex, the antivirus agent, and the SaaS agent. This means that we receive notifications from XDR for any suspicious activity related to endpoints. For example, if a user connects to a suspicious website, XDR should alert us based on our rules. It can also generate alerts for malicious Windows activities. In addition to deploying XDR on our endpoints, we have connected Vision One XDR to our Office 365 email platform. This allows XDR to read incoming emails. We can then configure rules to remove emails from mailboxes if they have certain properties or are particularly suspicious. We have also connected XDR to our Azure platform, which is our user authentication platform. XDR can monitor for risky user sign-ins, such as sign-ins from unusual locations. If it detects any risk, it will notify us. Finally, we have integrated XDR with a third-party tool to receive indicators of compromise. When we receive an IOC, Vision One will automatically run a check in our environment to see if any endpoints have been compromised. It will also check to see if any emails have been sent from any of the senders in the IOC listing. If it finds any matches, it will notify us. We can also configure playbooks to automatically take action when XDR detects a threat. For example, we could configure a playbook to force a user to reset their password or isolate an endpoint from the network. We are using the Trend Micro Vision One XDR agent. This agent component is installed on all of our endpoints, including servers, workstations, desktops, and any other computer elements. Vision One also has an API-based element, which we have connected to our email system, such as Azure.
Security Consultant at a tech services company with 10,001+ employees
Consultant
Top 20
2023-10-17T17:20:00Z
Oct 17, 2023
We had a SIEM in place, but we wanted to do some behavioral analysis of the files that are getting deployed. We wanted to check to ensure that it was nothing with the external registration side. We needed an EDR solution for checking and monitoring everything deployed on this target machine or our host machine site. It will check and detect if any malicious files are there or not. We are getting alerts related to that kind of thing. So we used to check those alerts on the XDR, and we used to, like, do the incident and response to that kind of thing there.
Chief Technology Officer at a hospitality company with 5,001-10,000 employees
Real User
Top 10
2023-09-29T12:02:00Z
Sep 29, 2023
We use Trend Micro XDR for rapid response to end-user computing and security concerns. As a health system, one of our core challenges is ensuring full visibility into our attack surface. We have many thousands of endpoints and end users that must be properly secured and protected. Our primary use case was to improve visibility, and response time, and reduce complexity. That is why we chose Trend Micro XDR. Trend Micro XDR is deployed on Trend Micro's private cloud.
Senior IT Security Analyst at a manufacturing company with 10,001+ employees
Real User
Top 20
2023-09-28T16:48:00Z
Sep 28, 2023
Normally, we use the solution for day-to-day investigations. We get alerts when something is going on in the environment. Right now, we are using that tool for the asset management team to identify services or applications that are not allowed for governance and all of these purposes. In addition to that, we use it for isolating devices. We also have a service with them, an MDR service. They analyze information, and they do investigations for us as well.
Trend Micro XDR is utilized for security management, and we apply it to our email, network, and endpoints. Trend Micro XDR is based on its proprietary cloud.
I use Trend Micro XDR to centrally visualize threats and have a single-pane-of-glass view of my security posture. In a single console, I can have visibility of all the security threats that occur in each of my Trend Micro Security consoles.
Cybersecurity Risk and Compliance Specialist at a government with 51-200 employees
Real User
Top 20
2023-04-06T12:46:05Z
Apr 6, 2023
The solution is used to secure our servers and server endpoints and acts as cloud security. It protects us and acts as an antivirus, antimalware, and web protector.
Network Engineer at a tech services company with 51-200 employees
Real User
Top 20
2023-03-11T12:46:39Z
Mar 11, 2023
We're primarily using the solution for endpoints, for EDR. It's for server protection. Weve created a customer license portal and create policies around data loss and antivirus.
Senior Security Engineer at a tech services company with 11-50 employees
Real User
Top 10
2022-12-07T11:35:30Z
Dec 7, 2022
Basically, you use it to check the complete telemetry for the endpoints, cloud network, and email solutions. If you integrate this product with your endpoints and on a third product that is available. It can completely share the telemetry of that. Trend Micro will apply the AI and ML of that. On that, we will get the Workbench. Therefore, it is just helping us to check the attack factor, et cetera, in detail, in a complete view in one single platform.
Cyber Security Analyst at a consultancy with 10,001+ employees
Real User
Top 20
2022-11-09T11:51:21Z
Nov 9, 2022
We primarily use the solution for the XDR. We have integrated this with all of our endpoints. Basically, we are using it for incident response. We have a SOC team here, so we are using it in a SOC and the Workload solution. For two or three months, we have been migrating to Workload Security. It is mainly for incident response.
Consultant at a computer software company with 51-200 employees
MSP
2022-03-02T12:01:27Z
Mar 2, 2022
We have about three clients who are running Trend Micro XDR. It can be deployed on-premises, in the cloud, or wherever you want. As an endpoint detection and response solution, it is used to identify attack points that reach even beyond the individual endpoints, such as the network environment itself.
CISO at a computer software company with 5,001-10,000 employees
Real User
2021-11-03T13:54:00Z
Nov 3, 2021
Everybody is working from home, so we wanted to ensure that there was an additional layer of security put into every end product. Since we were using the Trend Micro antivirus and antimalware, we wanted to upgrade it with the XDR as well. We did that about nine months ago.
It is for endpoint protection. It is essentially a modern updated version of antivirus that has more heuristic and behavioral detection components. We are using its latest version. In terms of deployment, it is a combination of cloud and on-premises. There is a local install on the endpoints, but it is controlled through a cloud interface.
Trend Vision One is a cloud-native security operations platform, serving cloud, hybrid, and on-premises environments. It combines ASM and XDR in a single console to effectively manage cyber risk across your organization. The platform provides powerful risk insights, earlier threat detection, and automated risk and threat response options. Utilize the platform’s predictive machine learning and advanced security analytics for a broader perspective and advanced context. Trend Vision One...
We use Trend Vision One for real-time analysis and monitoring to identify the root cause of security incidents. This includes finding details like how the attack unfolded, user names involved, IP addresses associated with the attack, and the affected systems and devices. By analyzing this information, we can map out the entire attack flow chart.
We were using Symantec before, and with the coming of EDRs in the market, we were looking for a solution. We wanted a defense system so that if there is an attack on the system, such as an endpoint is infected or the attacker or a known technique for ransomware is moving laterally, I do not need to go to the firewall team. I do not need to go to other teams to find out. I should have enough intel at that very stage to contain it if possible.
We use Trend Vision One for our endpoint detection and antivirus solution. The endpoint agents are deployed locally on our computers and the centralized controller is in the cloud.
We use FireEye, Microsoft Defender, and Trend Micro for our endpoint solutions. Trend Micro. We implemented Trend Vision One because we have many production servers and wanted to secure all endpoints. We are planning to move our XDR to the cloud, but all of our production servers are currently on-premises.
It offers very good ransomware protection. You have more visibility on the network.
We use the solution for event correlation.
I work with it as a third party in other companies. I installed XDR in other companies. And then, I help them understand the tool, help them with developing the necessary use cases, and understand, for example, how to do a threat intel, how to do a threat investigation, and stuff like that. Sometimes, I work with it as well by implementing it and actively using it in the customer's environment.
We have deployed Trend Micro XDR on all our endpoints. It is deployed as an agent because we are using Trend Micro Apex, the antivirus agent, and the SaaS agent. This means that we receive notifications from XDR for any suspicious activity related to endpoints. For example, if a user connects to a suspicious website, XDR should alert us based on our rules. It can also generate alerts for malicious Windows activities. In addition to deploying XDR on our endpoints, we have connected Vision One XDR to our Office 365 email platform. This allows XDR to read incoming emails. We can then configure rules to remove emails from mailboxes if they have certain properties or are particularly suspicious. We have also connected XDR to our Azure platform, which is our user authentication platform. XDR can monitor for risky user sign-ins, such as sign-ins from unusual locations. If it detects any risk, it will notify us. Finally, we have integrated XDR with a third-party tool to receive indicators of compromise. When we receive an IOC, Vision One will automatically run a check in our environment to see if any endpoints have been compromised. It will also check to see if any emails have been sent from any of the senders in the IOC listing. If it finds any matches, it will notify us. We can also configure playbooks to automatically take action when XDR detects a threat. For example, we could configure a playbook to force a user to reset their password or isolate an endpoint from the network. We are using the Trend Micro Vision One XDR agent. This agent component is installed on all of our endpoints, including servers, workstations, desktops, and any other computer elements. Vision One also has an API-based element, which we have connected to our email system, such as Azure.
We had a SIEM in place, but we wanted to do some behavioral analysis of the files that are getting deployed. We wanted to check to ensure that it was nothing with the external registration side. We needed an EDR solution for checking and monitoring everything deployed on this target machine or our host machine site. It will check and detect if any malicious files are there or not. We are getting alerts related to that kind of thing. So we used to check those alerts on the XDR, and we used to, like, do the incident and response to that kind of thing there.
We use Trend Micro XDR for endpoint detection, endpoint user protection, and virtual security.
We use Trend Micro XDR for rapid response to end-user computing and security concerns. As a health system, one of our core challenges is ensuring full visibility into our attack surface. We have many thousands of endpoints and end users that must be properly secured and protected. Our primary use case was to improve visibility, and response time, and reduce complexity. That is why we chose Trend Micro XDR. Trend Micro XDR is deployed on Trend Micro's private cloud.
Normally, we use the solution for day-to-day investigations. We get alerts when something is going on in the environment. Right now, we are using that tool for the asset management team to identify services or applications that are not allowed for governance and all of these purposes. In addition to that, we use it for isolating devices. We also have a service with them, an MDR service. They analyze information, and they do investigations for us as well.
Trend Micro XDR is utilized for security management, and we apply it to our email, network, and endpoints. Trend Micro XDR is based on its proprietary cloud.
I use Trend Micro XDR to centrally visualize threats and have a single-pane-of-glass view of my security posture. In a single console, I can have visibility of all the security threats that occur in each of my Trend Micro Security consoles.
The solution is used to secure our servers and server endpoints and acts as cloud security. It protects us and acts as an antivirus, antimalware, and web protector.
We're primarily using the solution for endpoints, for EDR. It's for server protection. Weve created a customer license portal and create policies around data loss and antivirus.
I can use it for security. I can check for malicious mail. I can check the logs and working sessions.
Basically, you use it to check the complete telemetry for the endpoints, cloud network, and email solutions. If you integrate this product with your endpoints and on a third product that is available. It can completely share the telemetry of that. Trend Micro will apply the AI and ML of that. On that, we will get the Workbench. Therefore, it is just helping us to check the attack factor, et cetera, in detail, in a complete view in one single platform.
We primarily use the solution for the XDR. We have integrated this with all of our endpoints. Basically, we are using it for incident response. We have a SOC team here, so we are using it in a SOC and the Workload solution. For two or three months, we have been migrating to Workload Security. It is mainly for incident response.
We primarily use the solution as security against ransomware as ransomware now has become the biggest threat for our customers.
I was team lead with incident responses and incident management. We used the solution for that.
We are currently still in the implementation phase. However, we do look forward to the telemetric report provided by Trend Micro XDR.
Trend Micro XDR is useful for more extensive networks, and it's cost-effective for networks with over 500 or 1000 users.
We have about three clients who are running Trend Micro XDR. It can be deployed on-premises, in the cloud, or wherever you want. As an endpoint detection and response solution, it is used to identify attack points that reach even beyond the individual endpoints, such as the network environment itself.
Everybody is working from home, so we wanted to ensure that there was an additional layer of security put into every end product. Since we were using the Trend Micro antivirus and antimalware, we wanted to upgrade it with the XDR as well. We did that about nine months ago.
It is for endpoint protection. It is essentially a modern updated version of antivirus that has more heuristic and behavioral detection components. We are using its latest version. In terms of deployment, it is a combination of cloud and on-premises. There is a local install on the endpoints, but it is controlled through a cloud interface.
It is used for protection and tracking back an attack. It can be deployed on-prem or on the cloud.