Compare Blackberry Protect vs. Trend Micro Deep Security

Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about CrowdStrike, SentinelOne, Cisco and others in Endpoint Protection for Business (EPP). Updated: July 2021.
523,431 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
"The most valuable features of this solution are the IPS and the integration with ISE.""The simplicity of use is its most valuable feature. You can very clearly see things.""The stability of the solution is perfect. I believe it's the most stable solution on the market right now.""I am really satisfied with the technical support.""It is a very stable program.""The solution's integration capabilities are excellent. It's one of the best features.""It doesn't impact the devices. It is an agent-based solution, and we see no performance knock on cell phones. That was a big thing for us, especially in the mobile world. We don't see battery degradation like you do with other solutions which really drain the battery, as they're constantly doing things. That can shorten the useful life of a device.""Integration is a key selling factor for Cisco security products. We have a Cisco Enterprise Agreement with access to Cisco Email Security, Cisco Firepower, Cisco Stealthwatch, Cisco Talos, Cisco Threat Grid, Cisco Umbrella, and also third-party solutions. This is key to our security and maximizing operations. Because we do have the Email Security appliance and it is integrated with Threat Response, we have everything tied together. Additionally, we are using the Cisco SecureX platform, as we were a beta test for that new solution. With SecureX, we are able to pull all those applications into one pane for visibility and maintenance. This greatly maximizes our security operations."

More Cisco Secure Endpoint Pros »

"On the management side, we liked the way it displays things.""The solution is extremely scalable. It's got the hybrid functionality, it's got the system functionality and cloud functionality as well.""The Application Guard and ByteGuard are useful features.""Two or three years ago when the WannaCry virus struck, the people that were on Cylance were the ones that weren't affected.""Has good RAM capacity for the power I need""It secures different entry points into the network.""You can manage all the threats and everything from a centralized dashboard.""It provides good insight into the programs, applications, or websites that may need attention."

More Blackberry Protect Pros »

"The vulnerability scanning reduces false positives by quite a bit.""The most valuable feature is the virtual patching.""In terms of valuable features, I would say its intrusion prevention. Each and every IP connecting to the server gets scanned so we know everyone who is accessing our server and we can block whichever IP's do not belong to us at the firewall.""The initial setup was straightforward and we didn't have any problem with it.""This product offers good protection against many types of malware.""Automated virtual patching is a good feature.""It integrates well with the cloud; for example, AWS, and Google Cloud Provider.""The most valuable feature of this solution is the virtual path function, which is the reason we chose to implement it."

More Trend Micro Deep Security Pros »

Cons
"In the next version of this solution, I would like to see the addition of local authentication.""The initial setup is a bit complex because you need to execute existing antiviruses or security software that you have on your device.""In the next release, I would for it to have back up abilities. I would like the ability to go back to a point in time to when my PC was uninfected and to the moment of when the infection happened.""The reporting and analytics areas of the solution need to be improved.""I would like more seamless integration.""The technical support is very slow.""I would recommend that the solution offer more availability in terms of the product portfolio and integration with third-party products.""Maybe there is room for improvement in some of the automated remediation. We have other tools in place that AMP feeds into that allow for that to happen, so I look at it as one seamless solution. But if you're buying AMP all by itself, I don't know if it can remove malicious software after the fact or if it requires the other tools that we use to do some of that."

More Cisco Secure Endpoint Cons »

"It should provide more details about the events that they have detected.""I would say one thing that they might need to bring in is protection for mobile devices.""The OPTICS component could be made more user-friendly with respect to giving people more information.""I would like to see them fix the alerting system so that the endpoint reporting is a bit more streamlined.""It should have better support for Windows and Mac.""The user interface is outdated.""The product does not do a lot of reporting on what it is taking care of. Enhanced reporting would be a welcome improvement.""The process of whitelisting a script that you want to be able to run can be a little bit difficult, or awkward."

More Blackberry Protect Cons »

"The client can show as offline sometimes, and that becomes a bit difficult for troubleshooting. We end up basically redeploying the client. This is something that could be improved in the future.""When implementing this solution, sometimes we have challenges with SQL migration.""As for what could be improved, I think it should come with an XDR facility without any extra cost. They're always releasing new features, but we need to pay extra for them.""The situation with the currency in Turkey makes this solution a little bit on the expensive side, and if it were lowered then it would be more competitive.""They need to build in a central console because central integration is not very good right now.""Requires simplification, a fair amount of trouble shooting required.""The problem with this solution is that if you go on large sites you have to have an external database, which would increase the cost.""I would like to see an EDR function for the servers, as that would be useful for us."

More Trend Micro Deep Security Cons »

Pricing and Cost Advice
"The costs of 50 licenses of AMP for three years is around $9,360.""The price is very good.""The visibility that we have into the endpoint and the forensics that we're able to collect give us value for the price. This is not an overly expensive solution, considering all the things that are provided. You get great performance and value for the cost.""Whenever you are doing the licensing process, I would highly advise to look at what other Cisco solutions you have in your organization, then evaluate if an Enterprise Agreement is the best way to go. In our case, it was the best way to go. Since we had so many other Cisco products, we were able to tie those in. We were actually able to get several Cisco security solutions for less than if we had bought three or four Cisco security solutions independently or ad hoc.""In our case, it is a straightforward annual payment through our Enterprise Agreement.""Our company was very happy with the price of Cisco AMP. It was about a third of what we were paying for System Center Endpoint Protection.""There are a couple of different consumption models: Pay up front, or if you have an enterprise agreement, you can do a monthly thing. Check your licensing possibilities and see what's best for your organization.""The Enterprise Agreement is like an all-you-can-eat buffet of Cisco products. In that vein, it was very affordable."

More Cisco Secure Endpoint Pricing and Cost Advice »

"I think that the price we are paying is good for what it is.""The monthly fee is $55 USD per user.""The product cost is about $5, per user, per month.""This cost of the license is approximately $5 USD monthly per user.""It's not so heavily priced; rather, it's average and decent.""We pay our license on a yearly basis and have just renewed for two years."

More Blackberry Protect Pricing and Cost Advice »

"Some of our customers complain about the cost of this solution.""It's more expensive than other solutions, such as Sophos and Kaspersky, as an endpoint solution.""The solution is considerably cheaper than other similar solutions.""There is a license for this solution and there are extra features you can purchase."

More Trend Micro Deep Security Pricing and Cost Advice »

report
Use our free recommendation engine to learn which Endpoint Protection for Business (EPP) solutions are best for your needs.
523,431 professionals have used our research since 2012.
Questions from the Community
Top Answer: The most valuable feature is signature-based malware detection.
Top Answer: Licensing fees are on a yearly basis and I am happy with the pricing.
Top Answer: The GUI needs improvement, it's not good. There are false positives in emails. At times, the emails are blocked and… more »
Top Answer: A user can continue to add endpoints and the solution will continue to perform well.
Top Answer: I don't have any information in relation to the pricing or the licensing. it's not an aspect of the solution I deal… more »
Top Answer: Having worked with SentinelOne, Cylance is good, however, it probably needs to add a feature similar to SentinelOne's… more »
Top Answer: The traceback feature in XDR is amazing. You can trace back an attack. You can playback where an attack actually… more »
Top Answer: There is a license required for this solution and there are extra features you can purchase.
Top Answer: There should be more tools to trace back. Some sort of module needs to be included to attach all the things. It should… more »
Popular Comparisons
Also Known As
Cisco AMP for Endpoints
Deep Security
Learn More
Overview

Advanced Malware Protection (AMP) is subscription-based, managed through a web-based management console, and deployed on a variety of platforms that protects endpoints, network, email and web Traffic. AMP key features include the following: Global threat intelligence to proactively defend against known and emerging threats, Advanced sandboxing that performs automated static and dynamic analysis of files against more than 700 behavioral indicators, Point-in-time malware detection and blocking in real time and Continuous analysis and retrospective security regardless of the file's disposition and Continuous analysis and retrospective security.

BlackBerry® Protect is an artificial intelligence (AI) based endpoint protection platform (EPP) that prevents breaches and provides added controls for safeguarding against sophisticated cyberthreats—no human intervention, Internet connections, signature files, heuristics or sandboxes required.

The Trend Micro Cloud and Data Center Security solution protects applications and data and prevents business disruptions, while helping meet regulatory compliance. Whether you are focused on securing physical virtual, cloud, or hybrid environments, Trend Micro provides the advanced server security you need  with the Trend Micro™ Deep Security™ platform.

Offer
Learn more about Cisco Secure Endpoint
Learn more about Blackberry Protect
Learn more about Trend Micro Deep Security
Sample Customers
Heritage Bank, Mobile County Schools, NHL University, Thunder Bay Regional, Yokogawa Electric, Sam Houston State University, First Financial Bank
Panasonic, Noble Energy, Apria Healthcare Group Inc., Charles River Laboratories, Rovi Corporation, Toyota, Kiewit
Rush University Medical Center, Guess? Inc., Mazda Motor Logistics Europe, MEDHOST, KSC Commercial Internet Co., Ricoh Company Ltd., Square Enix, SoftBank Telecom, Telecom Italia, United Way of Greater Atlanta, A&W Food Services of Canada
Top Industries
REVIEWERS
Healthcare Company20%
Government13%
University7%
Comms Service Provider7%
VISITORS READING REVIEWS
Comms Service Provider26%
Computer Software Company22%
Government6%
Financial Services Firm5%
REVIEWERS
Manufacturing Company25%
Financial Services Firm19%
Energy/Utilities Company13%
Construction Company13%
VISITORS READING REVIEWS
Computer Software Company24%
Comms Service Provider17%
Government6%
Manufacturing Company6%
REVIEWERS
Healthcare Company26%
Financial Services Firm26%
Manufacturing Company16%
Media Company5%
VISITORS READING REVIEWS
Computer Software Company29%
Comms Service Provider21%
Government6%
Financial Services Firm5%
Company Size
REVIEWERS
Small Business37%
Midsize Enterprise15%
Large Enterprise48%
VISITORS READING REVIEWS
Small Business26%
Midsize Enterprise20%
Large Enterprise54%
REVIEWERS
Small Business63%
Midsize Enterprise13%
Large Enterprise23%
VISITORS READING REVIEWS
Small Business22%
Midsize Enterprise25%
Large Enterprise52%
REVIEWERS
Small Business33%
Midsize Enterprise28%
Large Enterprise40%
VISITORS READING REVIEWS
Small Business30%
Midsize Enterprise32%
Large Enterprise38%
Find out what your peers are saying about CrowdStrike, SentinelOne, Cisco and others in Endpoint Protection for Business (EPP). Updated: July 2021.
523,431 professionals have used our research since 2012.

Blackberry Protect is ranked 12th in Endpoint Protection for Business (EPP) with 18 reviews while Trend Micro Deep Security is ranked 1st in Virtualization Security with 12 reviews. Blackberry Protect is rated 8.0, while Trend Micro Deep Security is rated 8.6. The top reviewer of Blackberry Protect writes "An outstanding product that is pretty spot on and easy to deploy and use". On the other hand, the top reviewer of Trend Micro Deep Security writes "Each and every IP connecting to the server gets scanned so we can block whichever IPs do not belong to us at the firewall". Blackberry Protect is most compared with CrowdStrike Falcon, Microsoft Defender for Endpoint, SentinelOne and Carbon Black CB Defense, whereas Trend Micro Deep Security is most compared with Trend Micro Apex One, CrowdStrike Falcon, Symantec End-User Endpoint Security, Carbon Black CB Defense and McAfee Endpoint Security.

See our list of .

We monitor all Endpoint Protection for Business (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.