We performed a comparison between Juniper vSRX and Trend Micro Deep Security based on real PeerSpot user reviews.
Find out in this report how the two Virtualization Security solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The solution has good features."
"The product's scalability is good, and my company has 150 users."
"The command feature is valuable."
"The initial setup was very straightforward. There was no problem. The initial deployment took about one hour."
"The technical support services are excellent."
"It's basic functionality is probably the most valuable feature."
"It's a very powerful solution and the firewalls offer high performance"
"The features we found most valuable are using the IDS and IPS during protection. The application filtering feature is great."
"Deep Security's most valuable features are antivirus and host intrusion detection."
"Easy to scale, stable solution for workload and server security and protection. It's easy to set up and has a good ransomware protection feature."
"The most valuable features of the solution we have enabled in our organization are its anti-malware capabilities, applications, web reputation, and integrity monitoring."
"It is stable and we have not faced any challenges during the rolled out"
"It's scalable."
"Trend Micro Deep Security is a complete solution and all the threat management has been taken care of."
"The vulnerability scanning reduces false positives by quite a bit."
"Very user-friendly interface, easy to understand."
"They could provide support for cloud deployments."
"There are too many types of licenses, which can be confusing."
"The solution can be improved by allowing automatic updates for the OS devices."
"The GUI interface needs improvement."
"The tool's basic license does not cover everything. It needs to improve visibility and availability."
"VPN access is an area that needs improvement."
"Some people complain that the solution tends to have a steep learning curve. It could be because most people have basic familiarity with Cisco or other similar products and maybe have never worked closely with Juniper products."
"They really need to improve the GUI."
"Some of the reporting and integrations could be more robust."
"Trend Micro is scalable if you have the budget for it."
"I would like to see XDR features and endpoint sensor become available."
"Post-implementation is time-consuming. You have to do monitoring, and that takes time. After you set up everything, it's not a full-fledged implementation. You have to keep on monitoring and configuring."
"Their automation needs improvement."
"The solution should focus on the EDR part and probably have an integrated data leak prevention module."
"The risk is very complex. We need our tools to be more intelligent, more automated, more detectable."
"The implementation can be inflexible and not easy, as it requires knowledge of things like virtualization and administration on Windows."
Juniper vSRX is ranked 3rd in Virtualization Security with 30 reviews while Trend Micro Deep Security is ranked 1st in Virtualization Security with 80 reviews. Juniper vSRX is rated 7.8, while Trend Micro Deep Security is rated 8.6. The top reviewer of Juniper vSRX writes "Fast with good usability and fairly scalable". On the other hand, the top reviewer of Trend Micro Deep Security writes "Offers excellent endpoint protection and great stability ". Juniper vSRX is most compared with Juniper SRX Series Firewall, Azure Firewall, Meraki MX, Cisco Secure Firewall and Zscaler Cloud Firewall, whereas Trend Micro Deep Security is most compared with Trend Micro Apex One, CrowdStrike Falcon, Microsoft Defender for Endpoint, Symantec Endpoint Security and VMware Carbon Black Endpoint. See our Juniper vSRX vs. Trend Micro Deep Security report.
See our list of best Virtualization Security vendors.
We monitor all Virtualization Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.