Google Kubernetes Engine vs Trend Micro Deep Security comparison

Cancel
You must select at least 2 products to compare!
Google Logo
1,656 views|1,294 comparisons
93% willing to recommend
Trend Micro Logo
238 views|207 comparisons
94% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Google Kubernetes Engine and Trend Micro Deep Security based on real PeerSpot user reviews.

Find out in this report how the two Container Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Google Kubernetes Engine vs. Trend Micro Deep Security Report (Updated: May 2020).
772,679 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"We appreciate that it is quite easy to set up a Kubernetes cluster in Google Cloud, using the managed services within this solution.""It is easy to use and deploy.""The solution simplified deployment, making it more automated. Previously, Docker required manual configuration, often done by developers on their computers. However, with Google Kubernetes Engine, automation extends to configuration, deployment, scalability, and viability, primarily originating from Docker rather than Kubernetes. Its most valuable feature is the ease of configuration.""Before using this solution, it was a lot of manual tasks and a lot of people participated in the process.""I am satisfied with the stability offered by the solution.""Stability-wise, this solution is really good.""The main advantage of GKE is that it is a managed service. This means that Google is responsible for managing the master node in the Kubernetes cluster system. As a result, we can focus on deploying applications to the slaves, while Google handles any updates and security patches. The fact that GKE is fully integrated into the Google ecosystem, including solutions such as BigQuery and VertexAI. This makes it easier for us to integrate these tools into our process. This integration ultimately speeds up our time to market and reduces the time and effort spent on managing infrastructure. The managed aspect of GKE allows us to simply deploy and utilize it without having to worry about the technicalities of infrastructure management.""The scalability is the best feature."

More Google Kubernetes Engine Pros →

"The most valuable feature of the product is vulnerability detection.""The VPN is the most prized characteristic of Trend Micro Deep Security, which in addition addresses all zero-day vulnerabilities. This allows us to confidently transfer our system physically, as it presents to the external world, whether it be an intruder or a hacker, that our system is completely secure without any weak spots. Even if the latest security patches have not been installed or updated, the software virtually covers them for you.""DLP, Data Loss Prevention, and the complexity of how we manage the console and how this client, or this tool, will notify us when there is something going wrong within the server and endpoint, is good.""There's useful monitoring on offer.""The most valuable feature of this solution is the virtual path function, which is the reason we chose to implement it.""It integrates well with the cloud; for example, AWS, and Google Cloud Provider.""The agentless protection is very nice in Trend Micro.""We use the solution to detect malicious threats, secure the endpoints, and disable the UFT."

More Trend Micro Deep Security Pros →

Cons
"Their documentation is a little here and there. Sometimes, the information is not clear or updated. Their documentation should be a little bit better.""Google Kubernetes Engine's cost should be improved because it is high.""The solution does not have a visual interface.""The notifications are not informative.""The user interface could be improved.""The pricing could be more competitive. It should be cheaper.""I would rate the scalability a seven out of ten.""While the GKE cluster is secure, application-level security is an essential aspect that needs to be addressed. The security provided by GKE includes the security of communication between nodes within the cluster and the basic features of Kubernetes security. However, these features may not be sufficient for the security needs of an enterprise. Additional security measures must be added to ensure adequate protection. It has become a common practice to deploy security tools within a Kubernetes cluster. It would be ideal if these tools were included as part of the package, as this is a standard requirement in the industry. Thus, application-level security should be integrated into GKE for improved security measures."

More Google Kubernetes Engine Cons →

"I would like to see an EDR function for the servers, as that would be useful for us.""We are not very happy with Trend Micro Deep Security since it is not able to detect many viruses and bugs.""Pricing is on the expensive side and could be more affordable. The technical support for Trend Micro Deep Security also needs improvement.""The price could be reduced.""A minor issue in Trend Micro Deep Security is that once the tool is upgraded, it shows some machines as offline or not reported while showing a recent update as outdated. The tool has some server connection issues.""The licensing structure could improve.""They need to build in a central console because central integration is not very good right now.""Some of the reporting and integrations could be more robust."

More Trend Micro Deep Security Cons →

Pricing and Cost Advice
  • "We are planning to use external support, and hire a commercial partner for it."
  • "This is an open source solution, so there is no pricing or licensing."
  • "Currently, it costs around $1000 per month which sorted our deployment. So once we get more clients, having a huge suffix, costs can go up."
  • "I would rate Kubernetes' pricing four out of five."
  • "The price for Google Kubernetes Engine could be lower - I'd rate its pricing at three out of five."
  • "It is competitive, and it is not expensive. It is almost competitive with AWS and the rest of the cloud solutions. We are spending around 3K USD per month. There are four projects that are currently running, and each one is incurring a cost of around 3K USD."
  • "The pricing for GKE is dependent on the type of machine or virtual machine (VM) that is selected for the nodes in the cluster. There is a degree of flexibility in choosing the specifications of the machine, such as the number of CPUs, GPUs, and so on. Google provides a variety of options, allowing the user to create the desired cluster composition. However, the cost can be quite steep when it comes to regional clusters, which are necessary for high availability and failover. This redundancy is crucial for businesses and is required to handle an increase in requests in case of any issues in one region, such as jumping to a different region in case of a failure in the Toronto region. While it may be tempting to choose the cheapest type of machines, this may result in a limited capacity and user numbers, requiring over-provisioning to handle additional requests, such as those for a web application."
  • "Its pricing is good. They bill us only per user. That's nice."
  • More Google Kubernetes Engine Pricing and Cost Advice →

  • "On an AWS defined scope, it will cheaper than buying the on-premise service. We did a trial for the on-premise version, but we decided to go with the AWS version. We are downsizing our server room, and it didn't make sense to put more machines in there."
  • "Purchasing on the AWS Marketplace was easy. We decided to purchase this solution on the AWS Marketplace since we were already there."
  • "The pricing is fair."
  • "Our company chose to procure this product via AWS Marketplace due to regulatory requirements. We mostly use it in the AWS GovCloud."
  • "Purchasing on the AWS Marketplace is like shopping on Amazon Prime."
  • "We do pay-as-you-go pricing, which is good for us. We are working with Trend Micro's sales rep to see if we can have something similar for on-premise."
  • "We have saved a 50% ROI for the on-premise product. It gave us significant improvement overall in productivity, costs, and efficiency."
  • "We did not purchase it through the AWS Marketplace because we have used Trend Micro in the past."
  • More Trend Micro Deep Security Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Container Management solutions are best for your needs.
    772,679 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:Pricing is always a concern. We keep running the service, and we need to pay for it. I rate the pricing a seven or eight out of ten.
    Top Answer:The notifications are not informative. It's a little confusing at times.
    Top Answer:I like that Crowdstrike allows me to easily correlate data between my firewalls. What’s most useful for my needs is the intelligence modules feature. I also find that Crowdstrike Falcon’s dashboard is… more »
    Top Answer:Trend Micro Deep Security offers a lot of features. It guarantees security for your data center, cloud, and containers - all with a unified and comprehensive SaaS solution and without compromising… more »
    Ranking
    9th
    Views
    1,656
    Comparisons
    1,294
    Reviews
    25
    Average Words per Review
    487
    Rating
    8.1
    Views
    238
    Comparisons
    207
    Reviews
    26
    Average Words per Review
    434
    Rating
    8.6
    Comparisons
    Also Known As
    GKE
    Deep Security
    Learn More
    Overview

    Kubernetes Engine is a managed, production-ready environment for deploying containerized applications. It brings our latest innovations in developer productivity, resource efficiency, automated operations, and open source flexibility to accelerate your time to market.

    Trend Micro Deep Security is a comprehensive solution for endpoint security and server protection, which prevents ransomware attacks and unauthorized access attempts. Its valuable features include tracing back attacks, antivirus protection, endpoint detection and response, firewall-based solution, threat detection, predictive machine learning and AI monitoring, VPM, virtualization, and sandboxing. 

    The solution is easy to use, scalable, stable, and reliable, with good technical support. It has helped organizations perform well against malware and vulnerabilities, provide patching from the Protection Cloud, and improve their security posture.

    Trend Micro Deep Security Features

    Trend Micro Deep Security has many valuable key features. Some of the most useful ones include:

    • Server virtualization: Trend Micro Deep Security allows you to secure your virtual environment while gaining the benefits of virtualization, such as increased efficiencies and ROI. Security that is virtualization-aware preserves productivity and allows for higher VM densities.
    • Desktop virtualization: Trend Micro Deep Security provides the best security for a wide range of virtual desktop scenarios. Its anti-malware, intrusion prevention, web application protection, firewall, and other security features are optimized for VMware VDI environments. This ensures that the virtual desktops and underlying host are not impacted by a security agent.
    • VMware NSX integration: The integration of NSX within the Trend Micro Deep Security platform improves security deployment automation while also enhancing virtual environment protection. Trend Micro Deep Security enhances the advantages of micro-segmentation by adding security policies and capabilities that follow VMs everywhere they go.
    • Virtual patching: Virtual patching solutions from Trend Micro Deep Security provide immediate security while removing the challenges of emergency patching, repeated patch cycles, and costly system downtime. Virtual patching with Trend Micro Deep Security keeps your servers and endpoints secure while lowering the risk of breach disclosure costs.
    • Cloud protection: Agentless and agent-based deployments from Trend Micro Deep Security give various cloud implementation options with cross-cloud administration. This protects your servers, applications, and data.
    • Virtualization security: Trend Micro Deep Security protects virtual desktops and servers from zero-day malware and network-based threats. This can reduce the impact of resource inefficiencies and emergency patching.
    • Cloud security: Service providers and modern data center managers can use Trend Micro Deep Security to deliver a safe multi-tenant cloud environment with security policies that can be extended to cloud workloads and managed centrally with consistent, context-aware policies.

    Reviews from Real Users

    Trend Micro Deep Security stands out among its competitors for a number of reasons. Two major ones are its robust data and loss prevention feature and its patch management, which saves users money. PeerSpot users take note of the advantages of these features in their reviews:

    One PeerSpot reviewer, a Senior Security Advisor at a healthcare company, writes, “DLP, Data Loss Prevention, and the complexity of how we manage the console and how this client, or this tool, will notify us when there is something going wrong within the server and endpoint, is good.”

    Nadeem S., CEO at Haniya Technologies, notes of the solution, “Patch management is most valuable. The major selling point of Deep Security is that it is based on the cloud. Deep Security is for the servers and databases of data centers, and generally, for patch management, you have to shut down the machines, and then you have to restart them. So, they need shutdown time, which is a cost.”

    Sample Customers
    Philips Lighting, Alpha Vertex, GroupBy, BQ
    Rush University Medical Center, Guess? Inc., Mazda Motor Logistics Europe, MEDHOST, KSC Commercial Internet Co., Ricoh Company Ltd., Square Enix, SoftBank Telecom, Telecom Italia, United Way of Greater Atlanta, A&W Food Services of Canada
    Top Industries
    REVIEWERS
    Financial Services Firm25%
    Energy/Utilities Company13%
    Comms Service Provider13%
    Manufacturing Company13%
    VISITORS READING REVIEWS
    Financial Services Firm19%
    Computer Software Company12%
    Manufacturing Company9%
    Comms Service Provider8%
    REVIEWERS
    Financial Services Firm17%
    Healthcare Company15%
    Computer Software Company15%
    Comms Service Provider13%
    VISITORS READING REVIEWS
    Educational Organization33%
    Computer Software Company12%
    Financial Services Firm7%
    Government6%
    Company Size
    REVIEWERS
    Small Business46%
    Midsize Enterprise14%
    Large Enterprise40%
    VISITORS READING REVIEWS
    Small Business17%
    Midsize Enterprise12%
    Large Enterprise71%
    REVIEWERS
    Small Business34%
    Midsize Enterprise22%
    Large Enterprise44%
    VISITORS READING REVIEWS
    Small Business16%
    Midsize Enterprise43%
    Large Enterprise41%
    Buyer's Guide
    Google Kubernetes Engine vs. Trend Micro Deep Security
    May 2020
    Find out what your peers are saying about Google Kubernetes Engine vs. Trend Micro Deep Security and other solutions. Updated: May 2020.
    772,679 professionals have used our research since 2012.

    Google Kubernetes Engine is ranked 9th in Container Management with 32 reviews while Trend Micro Deep Security is ranked 1st in Virtualization Security with 81 reviews. Google Kubernetes Engine is rated 8.0, while Trend Micro Deep Security is rated 8.6. The top reviewer of Google Kubernetes Engine writes "The auto-scaling feature helps during peak hours, but the support is not great". On the other hand, the top reviewer of Trend Micro Deep Security writes "High availability, effective VPM, and responsive support". Google Kubernetes Engine is most compared with Linode, Kubernetes, Rancher Labs, Red Hat OpenShift Container Platform and Nutanix Kubernetes Engine NKE, whereas Trend Micro Deep Security is most compared with Trend Vision One Endpoint Security, CrowdStrike Falcon, Microsoft Defender for Endpoint, Symantec Endpoint Security and Trellix Endpoint Security. See our Google Kubernetes Engine vs. Trend Micro Deep Security report.

    We monitor all Container Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.