We compared Trend Micro Deep Security and Cisco Secure Workload based on our users' reviews in six categories. After reading the collected data, you can find our conclusion below:
Comparison Results: Trend Micro Deep Security is praised for its extensive security features, virtual patching, stability, and scalability. However, it is criticized for its complexity, outdated design, high cost, and the need for better integration and technical support. On the other hand, Cisco Secure Workload is known for being user-friendly, with a well-designed UI and GUI, and provides a complete solution. It also receives praise for its stability and helpful technical support. However, it is criticized for its integration, complexity, and controversial changes in data storage.
"Generally speaking, Cisco support is considered one of the best in the networking products and stack."
"The most valuable feature of the solution is that we don't have to do packet captures on the network."
"The product provides multiple-device integration."
"Instead of proving that all the access control lists are in place and all the EPGs are correct, we can just point the auditor to a dashboard and point out that there aren't any escaped conversations. It saves an enormous, enormous amount of time."
"Scalability is its most valuable feature."
"The solution offers 100% telemetry coverage. The telemetry you collect is not sampled, it's not intermittent. It's complete. You see everything in it, including full visibility of all activities on your endpoints and in your network."
"The most valuable feature is micro-segmentation, which is the most important with respect to visibility."
"The product offers great visibility into the network so we can enforce security measures."
"The most valuable feature is the virtual patching."
"The initial setup was straightforward and we didn't have any problem with it."
"They release timely updates and have efficient prediction features for threat detection."
"Automated virtual patching is a good feature."
"It's easy to use and the interface is simple."
"We find that their technical support team is always accessible and willing to assist."
"You can scale the solution to different versions."
"The vulnerability scanning reduces false positives by quite a bit."
"They should scale down the hardware a bit. The initial hardware investment is two million dollars so it's a price point problem. The issue with the price comes from the fact that you have to have it with enormous storage and enormous computes."
"Secure Workload is a little complicated to use, and the dashboard isn't intuitive, so it takes a while to learn how to use it."
"There was a controversy when Cisco reduced the amount of data they kept, and the solution became quite cost-intensive, which made its adoption challenging….Although they have modified it now, I preferred the previous version, and I wish all the functionality were back under the same product."
"It is highly scalable, but there is a limitation that it is only available on Cisco devices."
"I'd like to see better documentation for advanced features. The documentation is fairly basic. I would also like to see better integration with other applications."
"It has an uninviting interface."
"The integration could be better, especially with different types of solutions."
"It is not so easy to use and configure. It needs a bunch of further resources to work, which is mainly the biggest downside of it. The deployment is huge."
"I've not worked with CrowdStrike Falcon, but one of our customers also had CrowdStrike Falcon on some of the devices. I was only supporting Trend Micro. They had a ransomware attack, but Trend Micro didn't detect that particular ransomware attack, whereas CrowdStrike did."
"It would be helpful if they could send emails notifying their users about the recommended upgraded versions to address the newly discovered vulnerabilities."
"I would rate tech support in the range of six to eight out of 10. Time to provide solution could be improved."
"What this product lacks at this stage is the ability to have automated workbooks to do the response. At this stage, the response is more manual, and it is not automated. If there is a response functionality in Deep Security, similar to what we have in EDR these days, to automatically respond to some of the threats, it would be cool. So, we'd like to have an automated response. There should be a response functionality."
"We have had some issues when it drains some of the resources of the server."
"A minor issue in Trend Micro Deep Security is that once the tool is upgraded, it shows some machines as offline or not reported while showing a recent update as outdated. The tool has some server connection issues."
"Installation and operations may have issues on some machines owing to their configuration of the network cards as the product is a DPI driver."
"Sometimes the patching is a bit slow."
Cisco Secure Workload is ranked 9th in Cloud and Data Center Security with 13 reviews while Trend Micro Deep Security is ranked 6th in Cloud and Data Center Security with 80 reviews. Cisco Secure Workload is rated 8.4, while Trend Micro Deep Security is rated 8.6. The top reviewer of Cisco Secure Workload writes "A solution that provides good technical support but its high cost makes it challenging for users to adopt it". On the other hand, the top reviewer of Trend Micro Deep Security writes "Offers excellent endpoint protection and great stability ". Cisco Secure Workload is most compared with Akamai Guardicore Segmentation, Illumio, VMware NSX, Prisma Cloud by Palo Alto Networks and Wiz, whereas Trend Micro Deep Security is most compared with Trend Micro Apex One, CrowdStrike Falcon, Microsoft Defender for Endpoint, Symantec Endpoint Security and Trellix Endpoint Security. See our Cisco Secure Workload vs. Trend Micro Deep Security report.
See our list of best Cloud and Data Center Security vendors.
We monitor all Cloud and Data Center Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.