We performed a comparison between Trellix Network Detection and Response and Trend Micro Deep Discovery based on real PeerSpot user reviews.
Find out in this report how the two Advanced Threat Protection (ATP) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Support is very helpful and responsive."
"I also like its logging method. Its logging is very powerful and useful for forensic purposes. You can see the traffic or a specific activity or how something entered your network and where it went."
"The sandbox feature of FireEye Network Security is very good. The operating system itself has many features and it supports our design."
"We wanted to cross-reference that activity with the network traffic just to be sure there was no lateral movement. With Trellix, we easily confirmed that there was no lateral network involvement and that nothing else was infected. It helped us correlate the events and feel confident in our containment."
"The most valuable feature of the solution stems from how it allows users to do the investigation part. Another important part of the product that is valuable is associated with how it gives information to users in the form of a storyline."
"We see ROI in the sense that we don't have to react because it stops anything from hurting the network. We can stop it before we have a bigger mess to clean up."
"The most valuable feature is the network security module."
"Over the thirteen years of using the product, we have not experienced a single compromise in our environment. During the COVID period, we faced numerous DDoS attacks, and the tool proved highly effective in mitigating these threats."
"The tool's most valuable feature is its collaboration with other products. Integrating with other security products was simple and easy."
"As a security product, managing threats is crucial for my clients."
"The HTML file sandboxing is very good."
"Initial setup is easy. It can be done by yourself."
"The most valuable feature of Trend Micro Deep Discovery is its complete end-to-end visibility of threats."
"Generally speaking, it just gives us a broad understanding of exactly what kind of threats occur. The submission point, analyzing point, and virtualization are within the environment that it supports. It helped us to improve our security levels and protect our internal network from any threats outside."
"The product's initial setup phase was not difficult."
"The product is very easy to install."
"The product's integration capabilities are an area of concern where improvements are required."
"It is an expensive solution."
"As far as future inclusions, it would be useful to display more threat intelligence, such as the actual area of the threat and the origin of the web crawling (Tor and Dark Web)."
"Its documentation can be improved. The main problem that I see with FireEye is the documentation. We are an official distributor and partner of FireEye, and we have access to complete documentation about how to configure or implement this technology, but for customers, very limited documentation is available openly. This is the area in which FireEye should evolve. All documents should be easily available for everyone."
"FireEye Network Security should have better integration with other vendors' firewalls or proxies, such as Palo Alto and Fortinet. Files that are being submitted should happen through the API or automatically."
"The analytics could be better. It seems heavily influenced by the McAfee and FireEye integration, and that integration still isn't seamless."
"It is very expensive, the price could be better."
"The initial setup was complex because of the nature of our environment. When it comes to the type of applications and functions which we were looking at in terms of identifying malicious threats, there would be some level of complexity, if we were doing it right."
"Deep Discovery is easy to manage, but there is still room for improvement on the administration and operations side. Competing products have a cleaner interface that makes it easier to manage their products. Trend Micro offers a lot of features in one product suite, but it can be unwieldy for the customer to manage all that with a single interface."
"The product's security features need enhancement."
"The scalability is sometimes limited."
"The solution needs to be able to integrate better with third-party infrastructure."
"The stability of the solution could be improved. It should be 100% stable, but it's not there right now."
"I would like to see integration with third-party tools to improve the visibility of the dashboards."
"The solution needs improvement in terms of pricing."
"Trend Micro Deep Discovery's technical support could be improved, and it could be made more active."
More Trellix Network Detection and Response Pricing and Cost Advice →
Trellix Network Detection and Response is ranked 9th in Advanced Threat Protection (ATP) with 37 reviews while Trend Micro Deep Discovery is ranked 17th in Advanced Threat Protection (ATP) with 24 reviews. Trellix Network Detection and Response is rated 8.4, while Trend Micro Deep Discovery is rated 8.2. The top reviewer of Trellix Network Detection and Response writes "Offers in-depth investigation capabilities, integrates well and smoothly transitioned from a lower-capacity appliance to a higher one". On the other hand, the top reviewer of Trend Micro Deep Discovery writes "Good threat detection capabilities and offers flexibility for hosting options". Trellix Network Detection and Response is most compared with Fortinet FortiSandbox, Palo Alto Networks WildFire, Fortinet FortiGate, Zscaler Internet Access and Netgate pfSense, whereas Trend Micro Deep Discovery is most compared with Darktrace, Trend Micro TippingPoint Threat Protection System, Arista NDR, Vectra AI and Palo Alto Networks Advanced Threat Prevention. See our Trellix Network Detection and Response vs. Trend Micro Deep Discovery report.
See our list of best Advanced Threat Protection (ATP) vendors.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.