We compared Trend Micro Deep Security and VMware Carbon Black Endpoint based on our users reviews in five parameters. After reading the collected data, you can find our conclusion below:
Comparison Results: When comparing Trend Micro Deep Security and VMware Carbon Black Endpoint, it is generally believed that Deep Security has a simpler and more straightforward initial setup. Deep Security also offers a wider variety of deployment options and provides helpful documentation and video tutorials. Conversely, Carbon Black Endpoint's setup can be more difficult, requiring complex configurations and customized policies. However, Carbon Black Endpoint has advantageous features like MDR capability and a whitelisting process for protection against zero-day threats. Deep Security has a smaller impact on system resources and efficient threat detection, whereas Carbon Black Endpoint offers superior log analysis and continuous monitoring. Some customers find Deep Security's pricing to be high, while Carbon Black Endpoint is generally described as expensive. The quality of customer service for both products has received mixed reviews and has room for improvement.
"The most valuable features of the solution we have enabled in our organization are its anti-malware capabilities, applications, web reputation, and integrity monitoring."
"It's easy to use and the interface is simple."
"Very straightforward and very easy to implement."
"Some of the main features of this solution are it is reliable and can be used in small to large size businesses."
"One of the most valuable features is that it's a firewall-based solution. We just open the required reports to the server—to server communication—and that's how we use Deep Security."
"Deep Security provides us with a lot of reassurance about security threats. You don't have to worry about a patch not being there in the software. You're confident that all the patches and vulnerabilities are taken care of."
"Aside from the basic antivirus features, there are additional features such as vulnerability protection, firewall, etc. which are helpful."
"The traceback feature in XDR is amazing. You can trace back an attack. You can playback where an attack actually occurred and see how the attacker moved. We can easily show this to management, and it makes it easy to make them understand and convince them, which is the best thing."
"The initial setup is very easy."
"The tool is pretty stable."
"Once the solution is installed and configured correctly it does not require a lot of hands-on attention until you need upgrading."
"The solution is very useful and easy to handle. You don't need much intervention with this product."
"It is a scalable solution...The initial setup was straightforward."
"We have another piece of that infrastructure that does what they call threat emulation. It's like sandboxing where it takes files that it doesn't know about, puts them in a VM-type environment, and it kicks them off to see if there's any malware or tendencies that might look like malware, that kind of thing."
"Carbon Black has very good market strategies."
"CB Defense is more powerful, and you can take more actions than others. Its security features and signatures are constantly updated, so it is more effective than other security solutions."
"The email relays and proxies could be improved."
"The solution could use more integration."
"I would like to see an EDR function for the servers, as that would be useful for us."
"The tool should integrate SIM functionality. It should also improve customer support."
"We'd like to have more application control."
"Their support should be improved. We need support in the UAE, but it is always going to some other country or region, and the time schedule is not suitable for us."
"There should be signature-based advanced and responsive features."
"When implementing this solution, sometimes we have challenges with SQL migration."
"In the next release, it would help if we can get better control over containers."
"This solution could have greater granular control on how certain applications work."
"Performing a malware scan usually takes a lot of time, more than 24 hours."
"What was rolled out to my company are mixed versions of Carbon Black CB Defense, so what I'd like to see in the next release is more synchronization, where it can detect the endpoint that's running an old version and suggest updates."
"The solution needs better overall compatibility with other products."
"Based on all the security roles and the release privilege, it could take time for an application to be whitelisted and approved for use."
"There are many different controls that are needed to be put into place for upgrading that makes it difficult. Having to re-engineer your IT infrastructure to match their software, as opposed to having it integrate and work independently causes difficulties. When there is an update to any software everyone has to be involved."
"It would be a better solution if Carbon Black Cb Defense had an on-promise solution and a virus auto delete or quarantine."
Trend Micro Deep Security is ranked 1st in Virtualization Security with 80 reviews while VMware Carbon Black Endpoint is ranked 17th in Endpoint Protection Platform (EPP) with 61 reviews. Trend Micro Deep Security is rated 8.6, while VMware Carbon Black Endpoint is rated 8.0. The top reviewer of Trend Micro Deep Security writes "Offers excellent endpoint protection and great stability ". On the other hand, the top reviewer of VMware Carbon Black Endpoint writes "Centralization via the cloud allows us to protect and control people working from home". Trend Micro Deep Security is most compared with Trend Micro Apex One, CrowdStrike Falcon, Microsoft Defender for Endpoint, Symantec Endpoint Security and Trellix Endpoint Security, whereas VMware Carbon Black Endpoint is most compared with CrowdStrike Falcon, Microsoft Defender for Endpoint, SentinelOne Singularity Complete, Symantec Endpoint Security and Trellix Endpoint Security.
We monitor all Virtualization Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.