Compare Cisco Tetration vs. Trend Micro Deep Security

Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about Cisco Tetration vs. Trend Micro Deep Security and other solutions. Updated: September 2020.
442,986 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
"By using Tetration insight, we are able to get the latency on our level accounts and we can determine whatever the issue is with the application latency itself.""Scalability is its most valuable feature.""Instead of proving that all the access control lists are in place and all the EPGs are correct, we can just point the auditor to a dashboard and point out that there aren't any escaped conversations. It saves an enormous, enormous amount of time.""A complete and powerful micro-segmentation solution.""The most valuable feature of the solution is that we don't have to do packet captures on the network.""The product offers great visibility into the network so we can enforce security measures.""The most valuable feature of this solution is security.""The solution offers 100% telemetry coverage. The telemetry you collect is not sampled, it's not intermittent. It's complete. You see everything in it, including full visibility of all activities on your endpoints and in your network."

More Cisco Tetration Pros »

"It is connected into an intelligence database and is quick to pick up new threats. It also reduces my workload with its speed and the protection that it provides.""Trend Micro gave our security teams a certain degree of comfort by just having it in the background, as they have familiarity with the product.""There is a degree of set it and forget it in regards to the actual endpoints and what you can do with the console, which is nice.""Their support is good. They are responsive, which is nice.""The integration and configuration of this product in our AWS environment was good. We haven't had any problems at all.""The file integrity and log inspection are game-changing features for us.""It provides the type of data and availability that we need to have. We don't have to worry about intrusions.""For day-to-day efficiency, it provides a good dashboard, so our team can be active 24/7 instead of doing a lot of manual stuff. We just look at the dashboard, and it's all done."

More Trend Micro Deep Security Pros »

Cons
"It is highly scalable, but there is a limitation that it is only available on Cisco devices.""It is not so easy to use and configure. It needs a bunch of further resources to work, which is mainly the biggest downside of it. The deployment is huge.""They should scale down the hardware a bit. The initial hardware investment is two million dollars so it's a price point problem. The issue with the price comes from the fact that you have to have it with enormous storage and enormous computes.""It has an uninviting interface.""I'd like to see better documentation for advanced features. The documentation is fairly basic. I would also like to see better integration with other applications.""The emailed notifications are either hard to find or they are not available. Search capabilities can be improved.""The interface is really helpful for technical people, but it is not user-friendly.""The multi-tenancy, redundancy, backup and restore functionalities, as well as the monitoring aspects of the solution, need improvement. The solution offers virtually no enterprise-grade possibility for monitoring."

More Cisco Tetration Cons »

"The working interface and the reports for non-technical people could use improvement. They are a bit scary.""AWS products could become more compatible with intrusion detection products leveraging help from Trend Micro.""If I had more reporting, the product would be an A plus.""Their automation needs improvement.""The initial setup needs improvement, as it was a bit challenging.""They are still working on the company integration from TippingPoint because this was a recent acquisition from a few years ago. So, a Tipping Point integration with Deep Security, having one single pane of glass dashboard, would provide us a simple use case.""Trend Micro is not government certified or federal complaint. If they could become compliant/certified, this would make it easier for us to use it for our government projects.""It needs to improve its integration with a lot of other products. This should be in the road map because we have a lot of SaaS-based appliances which are not connected with each other."

More Trend Micro Deep Security Cons »

Pricing and Cost Advice
"The pricing is a bit higher than we anticipated.""The price is outrageous. If you have money to throw at the product, then do it.""Pricing depends on the scope of the application and the features. Larger installations save more.""It is not cheap and pricing may limit scalability.""The price is based on how many computers you're going to install it on."

More Cisco Tetration Pricing and Cost Advice »

"On an AWS defined scope, it will cheaper than buying the on-premise service. We did a trial for the on-premise version, but we decided to go with the AWS version. We are downsizing our server room, and it didn't make sense to put more machines in there.""Purchasing on the AWS Marketplace was easy. We decided to purchase this solution on the AWS Marketplace since we were already there.""The pricing is fair.""Our company chose to procure this product via AWS Marketplace due to regulatory requirements. We mostly use it in the AWS GovCloud.""Purchasing on the AWS Marketplace is like shopping on Amazon Prime.""We do pay-as-you-go pricing, which is good for us. We are working with Trend Micro's sales rep to see if we can have something similar for on-premise.""We have saved a 50% ROI for the on-premise product. It gave us significant improvement overall in productivity, costs, and efficiency.""We did not purchase it through the AWS Marketplace because we have used Trend Micro in the past."

More Trend Micro Deep Security Pricing and Cost Advice »

report
Use our free recommendation engine to learn which Cloud and Data Center Security solutions are best for your needs.
442,986 professionals have used our research since 2012.
Questions from the Community
Top Answer: The most valuable feature is micro-segmentation, which is the most important with respect to visibility.
Top Answer: The price is based on how many installation of software sensors you're going to install it on.
Top Answer: There is some overlap between Cisco Tetration and AppDynamics and there are few DC tools, It would be great to have a single pane of glass, rather than have to jump between different tools.
Ask a question

Earn 20 points

Ranking
Views
9,228
Comparisons
5,426
Reviews
8
Average Words per Review
462
Avg. Rating
8.6
Views
20,078
Comparisons
15,080
Reviews
17
Average Words per Review
470
Avg. Rating
8.7
Popular Comparisons
Compared 30% of the time.
Compared 24% of the time.
Also Known As
Deep Security
Learn
Cisco
Trend Micro
Overview

Cisco Tetration offers holistic workload protection for multicloud data centers by enabling a zero-trust model using segmentation. This approach allows you to identify security incidents faster, contain lateral movement and reduce your attack surface. Its infrastructure-agnostic approach supports both on-premises and public cloud workloads.

The Trend Micro Cloud and Data Center Security solution protects applications and data and prevents business disruptions, while helping meet regulatory compliance. Whether you are focused on securing physical virtual, cloud, or hybrid environments, Trend Micro provides the advanced server security you need  with the Trend Micro™ Deep Security™ platform.

Offer
Learn more about Cisco Tetration
Learn more about Trend Micro Deep Security
Sample Customers
ADP, University of North Carolina Charlotte (UNCC)Rush University Medical Center, Guess? Inc., Mazda Motor Logistics Europe, MEDHOST, KSC Commercial Internet Co., Ricoh Company Ltd., Square Enix, SoftBank Telecom, Telecom Italia, United Way of Greater Atlanta, A&W Food Services of Canada
Top Industries
VISITORS READING REVIEWS
Comms Service Provider37%
Computer Software Company27%
Insurance Company4%
Retailer3%
REVIEWERS
Healthcare Company31%
Financial Services Firm31%
Manufacturing Company19%
Consumer Goods Company6%
VISITORS READING REVIEWS
Computer Software Company34%
Comms Service Provider17%
Media Company8%
Government6%
Company Size
REVIEWERS
Small Business22%
Large Enterprise78%
VISITORS READING REVIEWS
Small Business2%
Midsize Enterprise12%
Large Enterprise87%
REVIEWERS
Small Business27%
Midsize Enterprise24%
Large Enterprise49%
Find out what your peers are saying about Cisco Tetration vs. Trend Micro Deep Security and other solutions. Updated: September 2020.
442,986 professionals have used our research since 2012.
Cisco Tetration is ranked 3rd in Cloud and Data Center Security with 9 reviews while Trend Micro Deep Security is ranked 2nd in Cloud and Data Center Security with 20 reviews. Cisco Tetration is rated 8.6, while Trend Micro Deep Security is rated 8.8. The top reviewer of Cisco Tetration writes "Saves time, resists attacks, and allocates resources properly". On the other hand, the top reviewer of Trend Micro Deep Security writes "Each and every IP connecting to the server gets scanned so we can block whichever IPs do not belong to us at the firewall". Cisco Tetration is most compared with VMware NSX, Guardicore Centra, Illumio Adaptive Security Platform, vRealize Network Insight and Check Point CloudGuard SaaS, whereas Trend Micro Deep Security is most compared with Trend Micro Apex One, Symantec End-user Endpoint Security, CrowdStrike Falcon, Carbon Black CB Defense and Symantec Data Center Security. See our Cisco Tetration vs. Trend Micro Deep Security report.

See our list of best Cloud and Data Center Security vendors.

We monitor all Cloud and Data Center Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.