Cisco Secure Workload vs Trend Micro Deep Security comparison

Cancel
You must select at least 2 products to compare!
Cisco Logo
3,396 views|2,251 comparisons
100% willing to recommend
Trend Micro Logo
1,992 views|1,434 comparisons
94% willing to recommend
Comparison Buyer's Guide
Executive Summary
Updated on Jul 26, 2023

We compared Trend Micro Deep Security and Cisco Secure Workload based on our users' reviews in six categories. After reading the collected data, you can find our conclusion below:

  • Ease of Deployment: Trend Micro Deep Security's setup process can be more intricate, depending on the desired functionalities, and it typically takes around four to five days to complete the installation. On the other hand, Cisco Secure Workload has a relatively simpler setup, usually taking one to two days.
  • Features: Trend Micro Deep Security is notable for its extensive security offerings, including virtual patching and advanced endpoint security choices. Meanwhile, Cisco Secure Workload receives praise for its intuitive interface and all-encompassing solution, although it has undergone substantial alterations.
  • Room for Improvement: Trend Micro Deep Security could be enhanced in several areas such as its complexity, design, communication with other security products, and communication. Meanwhile, the reviewers also noted that Cisco Secure Workload requires improvement in integration, usability, dashboard intuitiveness, and integration with Cisco SD-Access.
  • Pricing: Trend Micro Deep Security, setup cost depends on the number of licenses bought and is regarded as standard. Some users believe the pricing could be reduced, particularly for the cloud version. Conversely, it is reported that Cisco Secure Workload can incur a hardware expense of around 300k.
  • ROI: The effectiveness and cost savings of Trend Micro Deep Security can influence its ROI, while Cisco Secure Workload does not prioritize ROI.
  • Service and Support: The opinions on customer service for Trend Micro Deep Security vary, with some users praising its efficiency and responsiveness, while others have complained about lengthy waiting periods. In contrast, customers have expressed contentment with the promptness and excellence of support offered by Cisco Secure Workload.

Comparison Results: Trend Micro Deep Security is praised for its extensive security features, virtual patching, stability, and scalability. However, it is criticized for its complexity, outdated design, high cost, and the need for better integration and technical support. On the other hand, Cisco Secure Workload is known for being user-friendly, with a well-designed UI and GUI, and provides a complete solution. It also receives praise for its stability and helpful technical support. However, it is criticized for its integration, complexity, and controversial changes in data storage.

To learn more, read our detailed Cisco Secure Workload vs. Trend Micro Deep Security Report (Updated: March 2024).
768,415 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The most valuable feature of this solution is security.""It's stable.""Scalability is its most valuable feature.""The solution offers 100% telemetry coverage. The telemetry you collect is not sampled, it's not intermittent. It's complete. You see everything in it, including full visibility of all activities on your endpoints and in your network.""The product offers great visibility into the network so we can enforce security measures.""Instead of proving that all the access control lists are in place and all the EPGs are correct, we can just point the auditor to a dashboard and point out that there aren't any escaped conversations. It saves an enormous, enormous amount of time.""The most valuable feature of the solution is that we don't have to do packet captures on the network.""The product provides multiple-device integration."

More Cisco Secure Workload Pros →

"We find that their technical support team is always accessible and willing to assist.""The solution is quite secure.""The file integrity and log inspection are game-changing features for us.""There are a good signature set and a high rate of detection.""Signatures are frequently updated.""In terms of valuable features, I would say its intrusion prevention. Each and every IP connecting to the server gets scanned so we know everyone who is accessing our server and we can block whichever IP's do not belong to us at the firewall.""I switched to Trend Micro because of its good marketing techniques.""Technical support is good."

More Trend Micro Deep Security Pros →

Cons
"It is highly scalable, but there is a limitation that it is only available on Cisco devices.""I'd like to see better documentation for advanced features. The documentation is fairly basic. I would also like to see better integration with other applications.""Secure Workload is a little complicated to use, and the dashboard isn't intuitive, so it takes a while to learn how to use it.""There is some overlap between Cisco Tetration and AppDynamics and I need to have a single pane of glass, rather than have to jump between different tools.""The interface is really helpful for technical people, but it is not user-friendly.""The product must be integrated with the cloud.""They should scale down the hardware a bit. The initial hardware investment is two million dollars so it's a price point problem. The issue with the price comes from the fact that you have to have it with enormous storage and enormous computes.""It is not so easy to use and configure. It needs a bunch of further resources to work, which is mainly the biggest downside of it. The deployment is huge."

More Cisco Secure Workload Cons →

"I would rate tech support in the range of six to eight out of 10. Time to provide solution could be improved.""I would like to see an EDR function for the servers, as that would be useful for us.""The solution should focus on the EDR part and probably have an integrated data leak prevention module.""Trend Micro is scalable if you have the budget for it.""The setup is fairly complex. The deployment took around two months.""Trend Micro Deep Security security and scalability could be improved.""The email relays and proxies could be improved.""We are not very happy with Trend Micro Deep Security since it is not able to detect many viruses and bugs."

More Trend Micro Deep Security Cons →

Pricing and Cost Advice
  • "The pricing is a bit higher than we anticipated."
  • "The price is outrageous. If you have money to throw at the product, then do it."
  • "Pricing depends on the scope of the application and the features. Larger installations save more."
  • "It is not cheap and pricing may limit scalability."
  • "The price is based on how many computers you're going to install it on."
  • "The cost for the hardware is around 300k."
  • More Cisco Secure Workload Pricing and Cost Advice →

  • "On an AWS defined scope, it will cheaper than buying the on-premise service. We did a trial for the on-premise version, but we decided to go with the AWS version. We are downsizing our server room, and it didn't make sense to put more machines in there."
  • "Purchasing on the AWS Marketplace was easy. We decided to purchase this solution on the AWS Marketplace since we were already there."
  • "The pricing is fair."
  • "Our company chose to procure this product via AWS Marketplace due to regulatory requirements. We mostly use it in the AWS GovCloud."
  • "Purchasing on the AWS Marketplace is like shopping on Amazon Prime."
  • "We do pay-as-you-go pricing, which is good for us. We are working with Trend Micro's sales rep to see if we can have something similar for on-premise."
  • "We have saved a 50% ROI for the on-premise product. It gave us significant improvement overall in productivity, costs, and efficiency."
  • "We did not purchase it through the AWS Marketplace because we have used Trend Micro in the past."
  • More Trend Micro Deep Security Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Cloud and Data Center Security solutions are best for your needs.
    768,415 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The product provides multiple-device integration.
    Top Answer:The product must be integrated with the cloud.
    Top Answer:I like that Crowdstrike allows me to easily correlate data between my firewalls. What’s most useful for my needs is the intelligence modules feature. I also find that Crowdstrike Falcon’s dashboard is… more »
    Top Answer:Trend Micro Deep Security offers a lot of features. It guarantees security for your data center, cloud, and containers - all with a unified and comprehensive SaaS solution and without compromising… more »
    Ranking
    Views
    3,396
    Comparisons
    2,251
    Reviews
    1
    Average Words per Review
    235
    Rating
    7.0
    Views
    1,992
    Comparisons
    1,434
    Reviews
    27
    Average Words per Review
    417
    Rating
    8.6
    Comparisons
    Also Known As
    Cisco Tetration
    Deep Security
    Learn More
    Overview

    Cisco Secure Workload is a cloud and data security solution that offers a zero-trust policy of keeping an organization’s application workloads safe and secure throughout the entire on-premise and cloud data center ecosystems.

    Cisco Secure Workload will consistently provide protection by discovering workload process anomalies, stopping threats immediately, minimizing the risk threat surface, and aborting any lateral movement.

    Today’s ecosystems are very elastic, and in the application-focused dynamic of today’s aggressive marketplace, Cisco Secure Workload delivers a robust security solution that works effectively with today’s most popular applications. The solution uniquely surrounds each and every workload to ensure organizations are able to keep their data, network, and applications safe and secure at all times. Cisco Secure Workload ensures that enterprise organizations can maintain secure applications by consistently building firewalls around every workload level throughout the entire ecosystem. The solution can manage applications that are deployed on containers, virtual machines, or bare-metal servers.

    Cisco Secure workload is able to meet an organization's busy needs and offers flexible options such as Software-as-a-Service (SaaS) and on-premises options. Using the Secure Workload SaaS options, users receive all the benefits of Cisco Secure Workload protection without the hassle of having to deploy and maintain the platform on premises. Users are responsible for acquiring the necessary software licensing and deploying software agents. Using SaaS, Secure Workload runs in the cloud and is operated and maintained by Cisco. This option offers the ability to scale easily and is a popular choice for SaaS-first and SaaS-only clients. Many organizations find they get the best TCO and achieve the best productivity and profitability using the SaaS options.

    When choosing on-premises options, organizations choose between hardware-based appliance models (large or small form factors). Platform selection is dependent on scalability goals, the desired fidelity level of flow telemetry, and the actual number of workloads. When a user chooses to configure Cisco Secure Workload for a conversation-only flow telemetry for all workloads, each platform has the capability to scale up vertically twice the default platform scale. Additionally, with Secure Workload, it is possible for the platform to be scaled horizontally in order to satisfy the demands of extra large widely distributed enterprise environments using federation capabilities.

    Cisco Secure Workload also provides a robust disaster recovery (DR) tool, which helps to make it a complete, comprehensive solution. The DR allows for continuous restore and backup capabilities that enable users to quickly remediate operations and data to a standby cluster in the event of a drastic failure or disaster.

    Reviews from Real Users

    The solution offers 100% telemetry coverage. The telemetry you collect is not sampled, it's not intermittent. It's complete. You see everything in it, including full visibility of all activities on your endpoints and in your network. Other valuable features include vast support for annotations, flexible user applications, machine learning, automatic classification, and hierarchical policies.” - CTO at a tech vendor

    Trend Micro Deep Security is a comprehensive solution for endpoint security and server protection, which prevents ransomware attacks and unauthorized access attempts. Its valuable features include tracing back attacks, antivirus protection, endpoint detection and response, firewall-based solution, threat detection, predictive machine learning and AI monitoring, VPM, virtualization, and sandboxing. 

    The solution is easy to use, scalable, stable, and reliable, with good technical support. It has helped organizations perform well against malware and vulnerabilities, provide patching from the Protection Cloud, and improve their security posture.

    Trend Micro Deep Security Features

    Trend Micro Deep Security has many valuable key features. Some of the most useful ones include:

    • Server virtualization: Trend Micro Deep Security allows you to secure your virtual environment while gaining the benefits of virtualization, such as increased efficiencies and ROI. Security that is virtualization-aware preserves productivity and allows for higher VM densities.
    • Desktop virtualization: Trend Micro Deep Security provides the best security for a wide range of virtual desktop scenarios. Its anti-malware, intrusion prevention, web application protection, firewall, and other security features are optimized for VMware VDI environments. This ensures that the virtual desktops and underlying host are not impacted by a security agent.
    • VMware NSX integration: The integration of NSX within the Trend Micro Deep Security platform improves security deployment automation while also enhancing virtual environment protection. Trend Micro Deep Security enhances the advantages of micro-segmentation by adding security policies and capabilities that follow VMs everywhere they go.
    • Virtual patching: Virtual patching solutions from Trend Micro Deep Security provide immediate security while removing the challenges of emergency patching, repeated patch cycles, and costly system downtime. Virtual patching with Trend Micro Deep Security keeps your servers and endpoints secure while lowering the risk of breach disclosure costs.
    • Cloud protection: Agentless and agent-based deployments from Trend Micro Deep Security give various cloud implementation options with cross-cloud administration. This protects your servers, applications, and data.
    • Virtualization security: Trend Micro Deep Security protects virtual desktops and servers from zero-day malware and network-based threats. This can reduce the impact of resource inefficiencies and emergency patching.
    • Cloud security: Service providers and modern data center managers can use Trend Micro Deep Security to deliver a safe multi-tenant cloud environment with security policies that can be extended to cloud workloads and managed centrally with consistent, context-aware policies.

    Reviews from Real Users

    Trend Micro Deep Security stands out among its competitors for a number of reasons. Two major ones are its robust data and loss prevention feature and its patch management, which saves users money. PeerSpot users take note of the advantages of these features in their reviews:

    One PeerSpot reviewer, a Senior Security Advisor at a healthcare company, writes, “DLP, Data Loss Prevention, and the complexity of how we manage the console and how this client, or this tool, will notify us when there is something going wrong within the server and endpoint, is good.”

    Nadeem S., CEO at Haniya Technologies, notes of the solution, “Patch management is most valuable. The major selling point of Deep Security is that it is based on the cloud. Deep Security is for the servers and databases of data centers, and generally, for patch management, you have to shut down the machines, and then you have to restart them. So, they need shutdown time, which is a cost.”

    Sample Customers
    ADP, University of North Carolina Charlotte (UNCC)
    Rush University Medical Center, Guess? Inc., Mazda Motor Logistics Europe, MEDHOST, KSC Commercial Internet Co., Ricoh Company Ltd., Square Enix, SoftBank Telecom, Telecom Italia, United Way of Greater Atlanta, A&W Food Services of Canada
    Top Industries
    REVIEWERS
    Comms Service Provider44%
    Media Company11%
    Energy/Utilities Company11%
    Computer Software Company11%
    VISITORS READING REVIEWS
    Computer Software Company29%
    Financial Services Firm13%
    Government6%
    Insurance Company5%
    REVIEWERS
    Financial Services Firm18%
    Healthcare Company16%
    Computer Software Company16%
    Comms Service Provider10%
    VISITORS READING REVIEWS
    Educational Organization32%
    Computer Software Company12%
    Financial Services Firm7%
    Government6%
    Company Size
    REVIEWERS
    Small Business29%
    Midsize Enterprise21%
    Large Enterprise50%
    VISITORS READING REVIEWS
    Small Business17%
    Midsize Enterprise13%
    Large Enterprise69%
    REVIEWERS
    Small Business33%
    Midsize Enterprise22%
    Large Enterprise45%
    VISITORS READING REVIEWS
    Small Business16%
    Midsize Enterprise42%
    Large Enterprise42%
    Buyer's Guide
    Cisco Secure Workload vs. Trend Micro Deep Security
    March 2024
    Find out what your peers are saying about Cisco Secure Workload vs. Trend Micro Deep Security and other solutions. Updated: March 2024.
    768,415 professionals have used our research since 2012.

    Cisco Secure Workload is ranked 9th in Cloud and Data Center Security with 13 reviews while Trend Micro Deep Security is ranked 6th in Cloud and Data Center Security with 80 reviews. Cisco Secure Workload is rated 8.4, while Trend Micro Deep Security is rated 8.6. The top reviewer of Cisco Secure Workload writes "A solution that provides good technical support but its high cost makes it challenging for users to adopt it". On the other hand, the top reviewer of Trend Micro Deep Security writes "Offers excellent endpoint protection and great stability ". Cisco Secure Workload is most compared with Illumio, Akamai Guardicore Segmentation, VMware NSX, Prisma Cloud by Palo Alto Networks and Wiz, whereas Trend Micro Deep Security is most compared with Trend Micro Apex One, CrowdStrike Falcon, Microsoft Defender for Endpoint, Symantec Endpoint Security and VMware Carbon Black Endpoint. See our Cisco Secure Workload vs. Trend Micro Deep Security report.

    See our list of best Cloud and Data Center Security vendors.

    We monitor all Cloud and Data Center Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.