We just raised a $30M Series A: Read our story

Compare Cisco Secure Workload vs. Trend Micro Deep Security

Cancel
You must select at least 2 products to compare!
Featured Review
Find out what your peers are saying about Cisco Secure Workload vs. Trend Micro Deep Security and other solutions. Updated: November 2021.
552,695 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
"The most valuable feature is micro-segmentation, which is the most important with respect to visibility.""The solution offers 100% telemetry coverage. The telemetry you collect is not sampled, it's not intermittent. It's complete. You see everything in it, including full visibility of all activities on your endpoints and in your network."

More Cisco Secure Workload Pros »

"The solution is quite secure.""The most valuable feature of this solution is the virtual path function, which is the reason we chose to implement it.""It integrates well with the cloud; for example, AWS, and Google Cloud Provider.""Some of the main features of this solution are it is reliable and can be used in small to large size businesses.""We like the Smart protection and the Virtual patching.""It's easy to use and the interface is simple.""The customer service/technical support for this solution is very fast.""Deep Security's most valuable features are antivirus and host intrusion detection."

More Trend Micro Deep Security Pros »

Cons
"There is some overlap between Cisco Tetration and AppDynamics and I need to have a single pane of glass, rather than have to jump between different tools.""The multi-tenancy, redundancy, backup and restore functionalities, as well as the monitoring aspects of the solution, need improvement. The solution offers virtually no enterprise-grade possibility for monitoring."

More Cisco Secure Workload Cons »

"The problem with this solution is that if you go on large sites you have to have an external database, which would increase the cost.""I would like to see an EDR function for the servers, as that would be useful for us.""Requires simplification, a fair amount of trouble shooting required.""They need to build in a central console because central integration is not very good right now.""The product isn't very user-friendly.""I would like to see better pricing. The pricing could be lower.""Post-implementation is time-consuming. You have to do monitoring, and that takes time. After you set up everything, it's not a full-fledged implementation. You have to keep on monitoring and configuring.""The situation with the currency in Turkey makes this solution a little bit on the expensive side, and if it were lowered then it would be more competitive."

More Trend Micro Deep Security Cons »

Pricing and Cost Advice
"The price is based on how many computers you're going to install it on."

More Cisco Secure Workload Pricing and Cost Advice »

"We are paying approximately $50,000 each month, it's definitely expensive.""There is a license for this solution and there are extra features you can purchase.""The solution is considerably cheaper than other similar solutions.""It's more expensive than other solutions, such as Sophos and Kaspersky, as an endpoint solution.""It is a very expensive solution. It would be nice if they lower its price. Its license is based on the machines."

More Trend Micro Deep Security Pricing and Cost Advice »

report
Use our free recommendation engine to learn which Cloud and Data Center Security solutions are best for your needs.
552,695 professionals have used our research since 2012.
Questions from the Community
Top Answer: Other then providing micro segmentation capabilities the dashboard provides all required information in single windows for configured workload. With insight feature we even get… more »
Top Answer: Support for all OS as currently they do not support AIX which is normally base OS for any critical Banking Workload  Solution should be able to provide micro Segmentation policy based on process… more »
Top Answer: Micro Segmentation is 1 of the important use case which organization go with Cisco ACI for Agentless  They also got Cisco Tetration for Agent based approach 
Top Answer: I like that Crowdstrike allows me to easily correlate data between my firewalls. What’s most useful for my needs is the intelligence modules feature. I also find that Crowdstrike Falcon’s dashboard is… more »
Top Answer: The traceback feature in XDR is amazing. You can trace back an attack. You can playback where an attack actually occurred and see how the attacker moved. We can easily show this to management, and it… more »
Top Answer: There is a license required for this solution and there are extra features you can purchase.
Ranking
Views
9,145
Comparisons
5,467
Reviews
2
Average Words per Review
425
Rating
8.5
Views
23,046
Comparisons
18,768
Reviews
15
Average Words per Review
444
Rating
8.3
Comparisons
Also Known As
Cisco Tetration
Deep Security
Learn More
Overview

Achieve the security required for today's heterogeneous multicloud environment with Cisco Secure Workload (formerly Tetration). Protect workloads across any cloud, application, and workload--anywhere. Automate and implement a secure zero-trust model for micro-segmentation based on application behavior and telemetry. Proactively detect and remediate indicators of compromise to minimize the impact to your business.

The Trend Micro Cloud and Data Center Security solution protects applications and data and prevents business disruptions, while helping meet regulatory compliance. Whether you are focused on securing physical virtual, cloud, or hybrid environments, Trend Micro provides the advanced server security you need  with the Trend Micro™ Deep Security™ platform.

Offer
Learn more about Cisco Secure Workload
Learn more about Trend Micro Deep Security
Sample Customers
ADP, University of North Carolina Charlotte (UNCC)
Rush University Medical Center, Guess? Inc., Mazda Motor Logistics Europe, MEDHOST, KSC Commercial Internet Co., Ricoh Company Ltd., Square Enix, SoftBank Telecom, Telecom Italia, United Way of Greater Atlanta, A&W Food Services of Canada
Top Industries
VISITORS READING REVIEWS
Comms Service Provider39%
Computer Software Company20%
Financial Services Firm7%
Insurance Company4%
REVIEWERS
Financial Services Firm26%
Healthcare Company22%
Manufacturing Company13%
Computer Software Company9%
VISITORS READING REVIEWS
Computer Software Company28%
Comms Service Provider23%
Government7%
Financial Services Firm5%
Company Size
REVIEWERS
Small Business22%
Large Enterprise78%
VISITORS READING REVIEWS
Small Business3%
Midsize Enterprise15%
Large Enterprise83%
REVIEWERS
Small Business33%
Midsize Enterprise33%
Large Enterprise35%
VISITORS READING REVIEWS
Small Business30%
Midsize Enterprise30%
Large Enterprise39%
Find out what your peers are saying about Cisco Secure Workload vs. Trend Micro Deep Security and other solutions. Updated: November 2021.
552,695 professionals have used our research since 2012.

Cisco Secure Workload is ranked 5th in Cloud and Data Center Security with 2 reviews while Trend Micro Deep Security is ranked 1st in Cloud and Data Center Security with 16 reviews. Cisco Secure Workload is rated 8.6, while Trend Micro Deep Security is rated 8.4. The top reviewer of Cisco Secure Workload writes "Simple to deploy and provides good application visibility along with micro-segmentation feature". On the other hand, the top reviewer of Trend Micro Deep Security writes "Each and every IP connecting to the server gets scanned so we can block whichever IPs do not belong to us at the firewall". Cisco Secure Workload is most compared with VMware NSX, Guardicore Centra, Illumio Adaptive Security Platform, Prisma Cloud by Palo Alto Networks and Check Point Harmony Email & Office, whereas Trend Micro Deep Security is most compared with Trend Micro Apex One, CrowdStrike Falcon, Symantec End-User Endpoint Security, Carbon Black CB Defense and Microsoft Defender for Endpoint. See our Cisco Secure Workload vs. Trend Micro Deep Security report.

See our list of best Cloud and Data Center Security vendors.

We monitor all Cloud and Data Center Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.