Ahmed Elmenshawy - PeerSpot reviewer
PS IT Security Engineer at Alex Bank
Real User
Top 5Leaderboard
Helps us with user behavior analysis and has an easy setup process
Pros and Cons
  • "The platform provides all essential features for discovery and administration."
  • "The product's security features need enhancement."

What is our primary use case?

We use the product for signature-based user behavior analysis. It helps us detect threats in virtual environments as well.

What is most valuable?

The platform provides all essential features for discovery and administration. There is no need for customization options as the features are designed with a user-centered approach. We can identify the root cause of the problem and share the results with the users.

What needs improvement?

The product's security features need enhancement.

For how long have I used the solution?

We have been using Trend Micro Deep Discovery for ten months.

Buyer's Guide
Trend Micro Deep Discovery
April 2024
Learn what your peers think about Trend Micro Deep Discovery. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
771,740 professionals have used our research since 2012.

What do I think about the stability of the solution?

I rate the product's stability an eight out of ten.

What do I think about the scalability of the solution?

I rate Trend Micro Deep Discovery's scalability an eight out of ten. We use it 24/7.

How are customer service and support?

The technical support team replies on time in case of any issues.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup process is easy. It doesn't require a lot of experience for implementation. It needs five executes for deployment and maintenance.

What other advice do I have?

I recommend Trend Micro Deep Discovery to others and rate it an eight out of ten. I advise others to implement it in a test environment if they use it for IPS and IDS purposes.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
DGM-IT at a construction company with 10,001+ employees
Real User
Useful for zero-day vulnerability protection
Pros and Cons
  • "One of the most valuable features is the performance, since, so far, we have not faced any issues with Deep Discovery."
  • "This solution could be improved with faster technical support and cheaper licensing prices."

What is our primary use case?

Our primary use case of Deep Discovery is as a sandbox. It sorts the DDAN, our on-premise Deep Discovery Analyzer solution, so if Deep Security or Trend Micro isn't able to find out whether a particular file or memory is a threat or not, they will send that file signature or file to the DDAN. The DDAN will then deploy that file inside their virtual sandbox, analyze the implications, and return the result to the concerned agent. We mainly use it for zero-day vulnerability protection. 

Deep Discovery is deployed on-premise. 

What is most valuable?

One of the most valuable features is the performance, since, so far, we have not faced any issues with Deep Discovery. 

What needs improvement?

This solution could be improved with faster technical support and cheaper licensing prices. 

For how long have I used the solution?

We have been using Deep Discovery for a couple of years. 

What do I think about the stability of the solution?

I'm satisfied with the stability and performance of Deep Discovery. So far, we have not faced any issues. 

What do I think about the scalability of the solution?

In our organization, we have around one thousand licenses for Trend Micro. Whether or not we increase our usage will depend on business requirements. 

How are customer service and support?

Trend Micro's technical support could be better and faster. 

How was the initial setup?

The installation was done by a Trend Micro implementation partner. It took about one or two weeks. 

For deployment and maintenance, we have a team of two engineers and a few managers. 

What about the implementation team?

We implemented Deep Discovery through a Trend Micro partner. 

What's my experience with pricing, setup cost, and licensing?

The licensing cost is a bit pricey. We pay a yearly subscription. 

What other advice do I have?

I rate Deep Discovery an eight out of ten. I would recommend Deep Discovery to others. If people are ready to invest as a capital, then I can recommend a Deep Discovery license. Otherwise, they can go with their cloud-based solution. 

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Trend Micro Deep Discovery
April 2024
Learn what your peers think about Trend Micro Deep Discovery. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
771,740 professionals have used our research since 2012.
OzgurEkinci3 - PeerSpot reviewer
Solutions Architect at NGN
Real User
Top 5
Ahead of its competitors in providing MSP services to customers

What is our primary use case?

We use the solution for its security features. Trend Micro has an MSP portal where you can create customer accounts, assign some licenses, and make your customers use those licenses from a portal. Trend Micro is ahead of its competitors in providing MSP services to customers.

What is most valuable?

Trend Micro Endpoint Encryption is stable and easy to use. It's very useful for an MSP company, making it easy and efficient to work with.

What needs improvement?

Security features could be improved.

For how long have I used the solution?

I have been using Trend Micro Endpoint Encryption for one year.

What do I think about the stability of the solution?

The product is very stable.

What do I think about the scalability of the solution?

The solution is scalable because it doesn't require an on-premise server installed. Everything is being monitored and managed from the cloud portal, irrespective of the number of agents. You can manage all from one portal.

How are customer service and support?

Vendors are locally present in our country. We contact them via email, etc. We are very flexible with vendor support.

How was the initial setup?

The initial setup is straightforward. One person is enough for it.

An MSP company creates customer accounts from Trend Micro's MSP portal. Then, the customer gets the key. After that, they can log in to the Trend Micro portal. They will see the agent to be downloaded for Windows and Linux. It takes about two or three minutes to deploy.

What about the implementation team?

Deployment can be done by yourself.

What's my experience with pricing, setup cost, and licensing?

The MSP's model and licensing is global and has very reasonable prices. Also, the perpetual license model is reasonable. It's cheap for the assembly companies. Licensing is very straightforward.

What other advice do I have?

Around five to ten technical persons are using the support. We will be able to sell those agents to more than 20 companies.

Only one technical person is enough for a large company for the installation and the management. In terms of management, many logs, alarms, and entries are happening in the portal.

Trend Micro can be a viable option for SMBs looking for a basic EDR or PRT solution. However, for larger organizations or those with highly complex security needs demanding advanced services and sophisticated department knowledge, Trend Micro's capabilities might not be sufficient.

Overall, I rate the solution a seven out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Kulwinder Singh - PeerSpot reviewer
Network Security Associate Manager at Eir evo
Real User
Top 5
Provides complete end-to-end visibility of threats
Pros and Cons
  • "The most valuable feature of Trend Micro Deep Discovery is its complete end-to-end visibility of threats."
  • "Trend Micro Deep Discovery's technical support could be improved, and it could be made more active."

What is our primary use case?

We use Trend Micro Deep Discovery to identify ransomware attacks.

What is most valuable?

The most valuable feature of Trend Micro Deep Discovery is its complete end-to-end visibility of threats.

What needs improvement?

Trend Micro Deep Discovery's technical support could be improved, and it could be made more active.

For how long have I used the solution?

I have been using Trend Micro Deep Discovery for four to five months.

How was the initial setup?

Trend Micro Deep Discovery's initial setup is easy.

What other advice do I have?

Trend Micro Deep Discovery's interface and threat mechanism are very proactive.

Overall, I rate Trend Micro Deep Discovery a nine out of ten.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Ahmet Burak Aydin - PeerSpot reviewer
Security Engineer at Intertech Information Technology and Marketing Inc.
Real User
Useful for threat protection and to block phishing emails
Pros and Cons
  • "Initial setup is easy. It can be done by yourself."
  • "The solution could be more secure."

What is our primary use case?

This solution can be used as threat protection and to block phishing emails.

We are using version 6.0.

There are 15 people using this solution in my organization.

What needs improvement?

The solution could be more secure.

What do I think about the stability of the solution?

It's stable.

What do I think about the scalability of the solution?

It's scalable.

How are customer service and support?

We are using local technical support. We haven't had any problems with it.

How was the initial setup?

Initial setup is easy. It can be done by yourself.

What other advice do I have?

I would rate this solution 9 out of 10.

I would recommend this solution to anyone who wants to start using it.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Nadeem Syed - PeerSpot reviewer
CEO at Haniya Technologies
Real User
Top 5Leaderboard
Easy to use, easy to deploy, and helpful for quickly figuring out the problems in the network
Pros and Cons
  • "It is a very good solution. It is very light, and it is quite quick to figure out the problem in your network."
  • "Trend Micro can improve the pricing in general. There is nothing else they can add or improve in the solution."

What is our primary use case?

Deep Discovery is good for network protection. There is also an Email Inspector.

What is most valuable?

It is a very good solution. It is very light, and it is quite quick to figure out the problem in your network.

It is very easy to use. It is also very easy to install and deploy.

What needs improvement?

Trend Micro can improve the pricing in general. There is nothing else they can add or improve in the solution.

What do I think about the stability of the solution?

It is very stable.

What do I think about the scalability of the solution?

There are quite a lot of clients who use this solution. It is an enterprise solution, and 80% of the enterprise-level companies are using it over here.

How are customer service and support?

We do hear of issues from our clients. We go over there for technical support, but there is nothing major for which they require support from Trend Micro itself.

How was the initial setup?

It is straightforward. It doesn't take much time. It usually takes an hour or two. It requires a maximum of a day.

What's my experience with pricing, setup cost, and licensing?

Its price is fine, but Trend Micro can improve the pricing in general. 

It is a hardware solution. It is based on the number of nodes, and according to the number of nodes, clients decide which box they should acquire. They have to renew their license every year. It is subscription-based.

What other advice do I have?

Trend Micro has divided most of the solutions into different sectors. If you want to go for the end-to-end solution, they are very much in a position to provide that. You do not have to add different kinds of products or vendors. Trend Micro covers almost everything.

I would definitely recommend this solution. It is a very good solution. I would rate it a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer:
PeerSpot user
PeerSpot user
Pre-Sales Engineer at Elcore Distribution AG
Real User
Intuitive, user-friendly, and easy to use solution that helps to detect advanced threats and attacks
Pros and Cons
  • "The most valuable feature is that the user can customize images of virtual machines in the sandbox functionality. The other vendors only use images that were created by the vendor but not the customer, end-user or partner. This helps to detect advanced threats and attacks."
  • "I would like the ability to analyze all files in our internal network, at the same time on different operating systems. Not just three of them, but as many as possible."

What is our primary use case?

I work for a distribution partner company. We use the on-prem, physical model of this solution.

What is most valuable?

It's intuitive and has a user-friendly interface. It's also flexible. We can put files, web links in this solution through other Windows.

The most valuable feature is that the user can customize images of virtual machines in the sandbox functionality. The other vendors only use images that were created by the vendor but not the customer, end-user or partner. This helps to detect advanced threats and attacks. It helps to clone the internal structure, IT structure of some companies. So you could clone the computer of the director or the financial department and place it to the sandbox. The bad guys who are looking for a way to get into your organization when they get to a computer, they think that it's a real computer. They see software or something connected with finance and they think that this is a real computer and not a laboratory or a sandbox so they run the bad script and think that they're stealing some important information or encrypting some important information. Antivirus solutions can stop attacks when they know how these attacks play out. If we don't know how the attack is going to go, we can't identify it. It customizes the images and Trend Micro helps to identify these unknown attacks.

Different parts of the organization can quickly receive information about the bad scripts. It helps to protect the organization's infrastructure from these attacks. 

What needs improvement?

We'd like to see more video guides. I'd also like for them to increase the numbers of different virtual images. Now the solution can use only three different images. For example, it's Windows 7, Windows 10, and the Windows servers are 2016. Only three of them at the same time. It would be more useful if the solution can operate with around five or six different images like Windows 7 2019, Windows 8.1. I would like the ability to analyze all files in our internal network, at the same time on different operating systems. Not just three of them, but as many as possible.

For how long have I used the solution?

I have been using this solution for a year and a half.

What do I think about the stability of the solution?

It's very stable.

What do I think about the scalability of the solution?

It's a solution for enterprise antivirus protection. It's not for small companies. The price of this solution corresponds to its class.

In my company only I use this solution. It's a stand-alone laboratory. It's a stand-alone server that analyzes files, URLs, and messages from all IT infrastructure in an organization. It's not a solution for one person or 10 people. It's a solution for all employees inside an organization.

How are customer service and technical support?

We haven't had the need to contact technical support. It's very easy to use. 

Which solution did I use previously and why did I switch?

The main difference from other solutions is that it uses customized images inside sandboxes. They're similar in functionality. All of them run, scan, and notice every change that some files, some scripts, some links do inside the system. The environment is imported inside the sandbox and in this way, Trend Micro is the leader in the world's markets of sandbox solutions.

How was the initial setup?

The initial setup was straightforward and very easy. You don't need special knowledge or courses to complete an installation of this solution. It's very easy.

What about the implementation team?

We implemented it ourselves. 

What other advice do I have?

I would rate it a ten out of ten. 

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Abdulahad Kawaf - PeerSpot reviewer
Network security engineer at Safe Decision Co. LLC
Real User
Top 10
Integration with other products is easy and simple
Pros and Cons
  • "The tool's most valuable feature is its collaboration with other products. Integrating with other security products was simple and easy."
  • "The tool's configuration can be made easier."

What is most valuable?

The tool's most valuable feature is its collaboration with other products. Integrating with other security products was simple and easy. 

What needs improvement?

The tool's configuration can be made easier.

For how long have I used the solution?

I have been using the product for a year. 

What do I think about the stability of the solution?

I rate the tool's stability a ten out of ten. 

What do I think about the scalability of the solution?

Trend Micro Deep Discovery is scalable. My company has more than 1000 users. 

How are customer service and support?

I haven't contacted technical support yet. I use the tool's documentation. 

Which solution did I use previously and why did I switch?

I've also had experience using Cisco products. However, I found that Cisco's solutions can be quite expensive. Additionally, the integration between their various products tends to be more complex than Trend Micro Deep Discovery. One significant advantage of Trend Micro Deep Discovery is its centralized console, which allows us to manage almost all their products from a single location.

How was the initial setup?

My company has ten technical staff for Trend Micro Deep Discovery. 

What other advice do I have?

Trend Micro Deep Discovery can cover all security requirements. I rate it a seven out of ten. 

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Buyer's Guide
Download our free Trend Micro Deep Discovery Report and get advice and tips from experienced pros sharing their opinions.
Updated: April 2024
Buyer's Guide
Download our free Trend Micro Deep Discovery Report and get advice and tips from experienced pros sharing their opinions.