We performed a comparison between CrowdStrike Falcon and Trend Micro Deep Security based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Comparison Results: CrowdStrike Falcon is the clear winner in this comparison. It is stable, easy to use, and high performing. In addition, it is easier to deploy and less expensive than Trend Micro Deep Security.
"Fortinet is very user-friendly for customers."
"Having all monitoring, response, tracking, and mitigation tools in one dashboard provides our analysts and SOC team with a comprehensive view at a glance."
"The main thing is that I feel safe. Because the processes that have been used to get a handle on the attackers are much better than other competitors"
"It notifies us if there's any suspicious file on any PC. If any execution or similar kind of thing is happening, it just alerts us. It doesn't only alert. It also blocks the execution until we allow it. We check whether the execution is legitimate or not, and then approve it or keep it blocked. This gives us a little bit of control over this mechanism. Fortinet FortiEDR is also very straightforward and easy to maintain."
"The features that I have found most valuable are the ability to customize it and to reduce its size. It lets you run in a very small window in terms of memory and resources on legacy cash registers."
"Exceptions are easy to create and the interface is easy to follow with a nice appearance."
"Forensics is a valuable feature of Fortinet FortiEDR."
"We have FortiEDR installed on all our systems. This protects them from any threats."
"The solution has improved my organization by automating the detection and reporting of unwanted applications so we're aware of them and can respond appropriately."
"One of the most valuable features of CrowdStrike Falcon is when there are upgrades there are no additional fees."
"The most valuable features of CrowdStrike Falcon include Falcon Fusion workflows and endpoint detection capabilities."
"It is an easy product to deploy."
"Cyberattack detection is very good. We use it for detecting different vulnerabilities, such as ransomware, virus, and malware. It is a good product today when compared to Symantec that we used previously."
"We have seen a reduction to the performance hit to our operating systems."
"The feature that I find to be the most valuable, is being able to look at the system analysis and being able to baseline what is installed on the system."
"We haven't had any infections or down time."
"The solution's endpoint protection is the most valuable feature."
"It helps with virtual patching and IDS fetching."
"Patch management is most valuable. The major selling point of Deep Security is that it is based on the cloud. Deep Security is for the servers and databases of data centers, and generally, for patch management, you have to shut down the machines, and then you have to restart them. So, they need shutdown time, which is a cost. Big enterprises don't want to shut down their database or their data center for any kind of patch. Deep Security creates a wall and downloads all patches. You install it on the cloud. So, it saves your server from any kind of intrusion or any kind of penetration, and whenever you get a chance or time, in six, eight, or nine months, you can physically download or install all those patches in one go. So, it saves you time. It also saves your shutdown time and keeps your data center safe."
"For server security purposes, I like the product's firewall."
"Signatures are frequently updated."
"The integration and configuration of this product in our AWS environment was good. We haven't had any problems at all."
"You can scale the solution to different versions."
"In addition to providing our clients a view of what's happening in their data centers, it also does virtual patching in the data center. It enhances the security in the data center big time."
"Cannot be used on mobile devices with a secure connection."
"The EDR console should have more extensive reporting. You shouldn't need to purchase FortiAnalyzer. It should be included in the EDR part. The security adviser cloud platform could be improved with more options for exclusive or intensive rules for devices."
"FortiEDR could add a separate scanning dashboard. In incident management, we prefer to remove the endpoint system from the environment and scan the system. We typically use Symantec for that, but if we want to use FortiEDR for that, then we need a scanning tab to clarify things."
"The support needs improvement."
"Once, we had an event that was locked and blocked, but information about it came to us two or three days later."
"Making the portal mobile friendly would be helpful when I am out of office."
"It takes about two business days for initial support, which is too slow in urgent situations."
"I haven't seen the use of AI in the solution."
"They need to strengthen the forensic capabilities of this product, for e-discovery."
"This solution is relatively expensive."
"The malware analysis could be improved, as that's what we use the solution for the most and that change would make it a better EDR tool."
"I would also like to see the endpoint firewall component produce some level of logging and feedback."
"The management of the solution could improve."
"Technical support could be better than what is currently offered."
"The console is not user-friendly or visually appealing and has room for improvement."
"I would like to see a little bit more in the offline scanning ability. This just comes from my background in what I have done in other positions. They only scan on demand, so I always have this fear that we sometimes maybe email out a dormant virus and can be held liable for that. That is something where I would like to see a little bit more robustness to the tool."
"The updates for legacy systems are not rolled out frequently."
"I would like them to add EDR features, moving away from traditional signature-based anti-malware."
"The support for email protection can be improved."
"Their support should be improved. We need support in the UAE, but it is always going to some other country or region, and the time schedule is not suitable for us."
"Sometimes the patching is a bit slow."
"Post-implementation is time-consuming. You have to do monitoring, and that takes time. After you set up everything, it's not a full-fledged implementation. You have to keep on monitoring and configuring."
"Requires simplification, a fair amount of trouble shooting required."
"We want to see improved authentication."
CrowdStrike Falcon is ranked 3rd in Endpoint Detection and Response (EDR) with 107 reviews while Trend Micro Deep Security is ranked 1st in Virtualization Security with 81 reviews. CrowdStrike Falcon is rated 8.8, while Trend Micro Deep Security is rated 8.6. The top reviewer of CrowdStrike Falcon writes "Easy to set up with good behavior-based analysis but needs a single-click recovery option". On the other hand, the top reviewer of Trend Micro Deep Security writes "High availability, effective VPM, and responsive support". CrowdStrike Falcon is most compared with Microsoft Defender XDR, Darktrace, Microsoft Defender for Endpoint, Trend Vision One and VMware Carbon Black Endpoint, whereas Trend Micro Deep Security is most compared with Trend Micro Apex One, Microsoft Defender for Endpoint, Symantec Endpoint Security, Trellix Endpoint Security and Kaspersky Endpoint Security for Business.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.
I like that Crowdstrike allows me to easily correlate data between my firewalls. What’s most useful for my needs is the intelligence modules feature. I also find that Crowdstrike Falcon’s dashboard is very user-friendly; Information is easy to find because of how it is presented and everything is linkable, which is a big win for me. Stability is fantastic and so is the scalability. I was able to do so many endpoints so easily, and without any issues. In terms of pricing, Crowdstrike Falcon is reasonable for all that it has to offer. As far as technical support, that has been great too.
Trend Micro Deep Security offers a lot of features. It guarantees security for your data center, cloud, and containers - all with a unified and comprehensive SaaS solution and without compromising performance. Although that might make it sound appealing, every time there are new features released, they have to be paid for separately, which I am not thrilled about.
Trend Micro Deep Security offers powerful protection, an all-in-one workload security option (which may help with eliminating the cost of deploying multiple point solutions), and flexible integration. They also offer a “pay-for-what-you-use” pricing model which is hard to come by. While their pricing model seems enticing, a big downside for me is that it does not support versions prior to Windows 7. It has a good intrusion prevention feature that I like. However, that is not enough for me to settle for Trend Micro Deep instead of Crowdstrike.
Conclusion:
I much prefer Crowdstrike Falcon over Trend Micro Deep Security because I feel that it is much more reliable. While Trend Micro Deep Security may be represented as a classic antivirus solution, I am satisfied with the overall performance of Crowdstrike Falcon and happy with my purchase of the product.
Having previously run a penetration testing company, I can tell you that the general feedback I have from professional hackers is that CrowdStrike Falcon does make their job a lot more difficult.
The "traditional" players in the endpoint protection market e.g. Trend Micro, Symantec and McAfee they generally view as trivial to bypass.