Over 258,953 professionals have used IT Central Station research.
Compare the best Virtualization Security vendors based on product reviews, ratings, and comparisons.
All reviews and ratings are from real users, validated by our triple authentication process.
The total ranking of a product, represented by the bar length, is based on a weighted aggregate score.
The score is calculated as follows: The product with the highest count in each area gets the highest available score.
(20 points for Reviews; 16 points for Views, Comparisons, and Followers.)
Every other product gets assigned points based on its total in proportion to the #1 product in
that area. For example, if a product has 80% of the number of reviews compared to the product
with the most reviews then the product's score for reviews would be 20% (weighting factor) *
80% = 16. For Average Rating, the maximum score is 32 points awarded linearly based on our
rating scale of 1-10. If a product has fewer than ten reviews, the point contribution
for Average Rating is reduced (one-third reduction in points for products with 5-9 reviews;
two-thirds reduction for products with fewer than five reviews). Reviews that are more than 24 months old,
as well as those written by resellers, are completely excluded from the ranking algorithm.
Currently we use Juniper products, SSG and SRX firewalls in about a 50/50 mix both standalone and in HA clusters. We also use their NSM for device management and logging. The SSG models are mostly EOL and are being replaced with new “Next... more»
I can’t really say a firewall improves anything other than security, but we have been able to solve a lot of extranet connectivity issues with these firewalls that the bigger name devices didn’t handle so well. It is bomb proof as seen by the... more»
While the OS supports a pretty full UTM option, we found in testing that the hardware was not powerful enough to run with all the bells and whistles turned on for the amount of traffic we process. So we use other hardware for those services... more»
Virtual Patching (part of Integrity Monitoring module) is the most valuable because it shields vulnerabilities in critical systems until an actual patch is available and deployed reducing the downtime, and protecting unpatchable systems... more»
In the past, we had to search for a window of time to patch the OS and some applications and it took a long time up a virtual machine and make it available for our needs because its update process was very slow. Now, we don’t have to wait for... more»
It needs real-time anti-malware support for Amazon Linux and an option that allows you to classify and mark reports using tags like Top Secret or Confidential which are missing in Deep Security 9.5 but are in v9.6, which was released in... more»
They should improve the interface of the main dashboard. It is difficult to find where templates define policies. Also, if you are not careful, your policy implementation can lead to management problems. It should have warnings before... more»
Manager, Enterprise Risk Consulting at a tech company with 1,001-5,000 employees
Jul 06 2017
What do you think of Trend Micro Deep Security?
It is lightweight and provides a multi-platform for the client. It combines host intrusion prevention and provides AV, file monitoring, log collection, etc. in a single agent. There are a good signature set and a high rate of detection. It is one of the best client protection available for cloud computing.
• Use of Solution:
I have used this product for three years.
• Stability Issues:
Installation and operations may have issues on some machines owing to their configuration of the network cards as the product is a DPI driver. The typical client-server issues exist as with any other product.
• Initial Setup:
The setup is simple as the agent provides a feature called as the Recommendation Scan. This scans the profiles of the host computer and...
Improvements to My Organization
There are compliance issues of legacy applications and after applying OS security patches. The product's HIPS (Host Intrusion Prevention System) modules do the job for you automatically, without any downtime.
• Valuable Features
Hassle-free implementation, no downtime required and no scaling issues at all. Very user-friendly interface, easy to understand.
• Room for Improvement
Reports. The default reports provided don't provide much insight.
• Use of Solution
One to three years.
• Stability Issues
No stability issues.
• Scalability Issues
No scalability issues.
• Customer Service and Technical Support
I would rate tech support in the range of six to eight out of 10. Time to provide solution could be improved.
It's enabled us to protect our enterprise applications and data from breaches and business disruptions without emergency patching. Not only do these benefits reduce both capital and operational expenditures, but they also provide resource... more»
Dynamic 9 years of IT career, reflecting progressive experience and performance in the computer and Internet industries. Specialized in providing cutting-edge solutions to traditional Security issues; establishing strategic ideas in various domains and demonstrating self-motivation, creativity,... more>>