Most Helpful Review
Handles the important task of virtual patching, although the agent-based version has performance issues
Find out what your peers are saying about Cisco Tetration vs. Trend Micro Deep Security and other solutions. Updated: November 2019.
382,547 professionals have used our research since 2012.
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
The solution offers 100% telemetry coverage. The telemetry you collect is not sampled, it's not intermittent. It's complete. You see everything in it, including full visibility of all activities on your endpoints and in your network.
The most valuable feature of this solution is security.
The product offers great visibility into the network so we can enforce security measures.
The most valuable feature of the solution is that we don't have to do packet captures on the network.
A complete and powerful micro-segmentation solution.
Instead of proving that all the access control lists are in place and all the EPGs are correct, we can just point the auditor to a dashboard and point out that there aren't any escaped conversations. It saves an enormous, enormous amount of time.
Scalability is its most valuable feature.
By using Tetration insight, we are able to get the latency on our level accounts and we can determine whatever the issue is with the application latency itself.
The most valuable feature is the virtual patching.
The vulnerability scanning reduces false positives by quite a bit.
The most valuable features are web security, email filtering, and content filtering.
It has improved functions by bringing us complete security on our clients' virtual environment.
It has a perfect SaaS which integrates with AWS, offering flexibility to deploy quickly and easily in the cloud.
Deep Security enables us to bridge the gap between patching windows using the Virtual Patching feature. This allows us to make sure full patching is tested properly in our testing environments before rollout.
It provides a comprehensive feature set and a strong security baseline for us with integrations into other security tools.
There are compliance issues for legacy applications and after applying OS security patches. The product's HIPS (Host Intrusion Prevention System) modules do the job for you automatically, without any downtime.
The multi-tenancy, redundancy, backup and restore functionalities, as well as the monitoring aspects of the solution, need improvement. The solution offers virtually no enterprise-grade possibility for monitoring.
The interface is really helpful for technical people, but it is not user-friendly.
The emailed notifications are either hard to find or they are not available. Search capabilities can be improved.
I'd like to see better documentation for advanced features. The documentation is fairly basic. I would also like to see better integration with other applications.
It has an uninviting interface.
They should scale down the hardware a bit. The initial hardware investment is two million dollars so it's a price point problem. The issue with the price comes from the fact that you have to have it with enormous storage and enormous computes.
It is not so easy to use and configure. It needs a bunch of further resources to work, which is mainly the biggest downside of it. The deployment is huge.
It is highly scalable, but there is a limitation that it is only available on Cisco devices.
When implementing this solution, sometimes we have challenges with SQL migration.
The client can show as offline sometimes, and that becomes a bit difficult for troubleshooting. We end up basically redeploying the client. This is something that could be improved in the future.
The support for email protection can be improved.
It needs better global visibility of the virtual environment.
I would like them to add EDR features, moving away from traditional signature-based anti-malware.
The default reports provided don't provide much insight.
I would rate tech support in the range of six to eight out of 10. Time to provide solution could be improved.
It needs to improve its integration with a lot of other products. This should be in the road map because we have a lot of SaaS-based appliances which are not connected with each other.
Pricing and Cost Advice
It is not cheap and pricing may limit scalability.
Pricing depends on the scope of the application and the features. Larger installations save more.
The price is outrageous. If you have money to throw at the product, then do it.
The pricing is a bit higher than we anticipated.
Some of our customers complain about the cost of this solution.
The cost is approximately six thousand Qatari Riyal ($1650 USD) per user.
Purchasing this solution through the AWS Marketplace was secure and quick. AWS has good prices for a good product.
The training needs improvement. It is expensive (classroom training), and it is often hard to find answers by yourself using the documentation.
The AWS licensing model is scalable and easy to use, but could do with tiered discounts. I am not sure how well this model will scale when we start to use Auto Scaling with AWS resources.
We are an original partner with AWS, so a couple of customers chose to directly take it from AWS Marketplace. A couple of customers will want us to take care of the billing. So, it's a mixed type of reaction that we receive from the customer.
The price is reasonably good as compared to other products into the market.
Purchasing on the AWS Marketplace is like shopping on Amazon Prime.
out of 14 in Cloud and Data Center Security
Average Words per Review
out of 14 in Cloud and Data Center Security
Average Words per Review
Compared 34% of the time.
Compared 25% of the time.
Compared 24% of the time.
Compared 20% of the time.
Compared 15% of the time.
Compared 9% of the time.
Also Known As
Cisco Tetration offers holistic workload protection for multicloud data centers by enabling a zero-trust model using segmentation. This approach allows you to identify security incidents faster, contain lateral movement and reduce your attack surface. Its infrastructure-agnostic approach supports both on-premises and public cloud workloads.
The Trend Micro Cloud and Data Center Security solution protects applications and data and prevents business disruptions, while helping meet regulatory compliance. Whether you are focused on securing physical virtual, cloud, or hybrid environments, Trend Micro provides the advanced server security you need with the Trend Micro™ Deep Security™ platform.
Learn more about Cisco Tetration
Learn more about Trend Micro Deep Security
|ADP, University of North Carolina Charlotte (UNCC)||Rush University Medical Center, Guess? Inc., Mazda Motor Logistics Europe, MEDHOST, KSC Commercial Internet Co., Ricoh Company Ltd., Square Enix, SoftBank Telecom, Telecom Italia, United Way of Greater Atlanta, A&W Food Services of Canada|
Software R&D Company28%
Comms Service Provider23%
Financial Services Firm33%
Software R&D Company36%
Comms Service Provider9%