Deep Security has given us strong protection and configuration of our endpoint security and enables us to bridge the gap between patching windows using the Virtual Patching feature. This allows us to make sure full patching is tested properly in our testing environments before roll out. This especially helps when, like this month, a patch is released which can’t be used, due to stability/performance issues.
I am also currently looking into the newer integrations with our various other security tools.
The training needs improvement. It is expensive (classroom training), and it is often hard to find answers by yourself using the documentation.
I would like them to add EDR features, moving away from traditional signature-based anti-malware.
The product seems very stable. We have only ever had one incident which caused us concern, and Trend Micro identified a way to mitigate it for future occurrences. They also ensured the issue was patched.
It seems to work at the scale that we are currently using it at: Approximately 65 EC2 instances.
Customer service team are fantastic and help provide timely resolution to issues and questions
Configuration in our AWS environment is straightforward and policy-based with inheritance, e.g., making it easy to align with Active Directory. Event-based triggers can automate the correct policy implementation.
It is simple and cost-effective to purchase through the AWS Marketplace, which provides an easy understanding of the scale of the costs. Our organization purchased it through the AWS Marketplace because it is easier to track when added to our AWS bill and convenient purchasing model.
The AWS licensing model is scalable and easy to use, but could do with tiered discounts. I am not sure how well this model will scale when we start to use Auto Scaling with AWS resources.
It provides a comprehensive feature set and a strong security baseline for us with integrations into other security tools.
It integrates with AlienVault USM Anywhere and AWS GuardDuty in our environment.