We performed a comparison between ExtraHop Reveal(x) 360 and Trend Micro Deep Discovery based on real PeerSpot user reviews.
Find out in this report how the two Intrusion Detection and Prevention Software (IDPS) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It is scalable."
"It stands out for its intuitive and efficient user interface, robust detection capabilities with minimal false positives, and the ability to handle encrypted traffic, making it a valuable asset for network security and management."
"It is very easy to collect and handle data in ExtraHop Reveal(X) Cloud. Integration with Big Data is also easy. Many of our customers integrate it with Big Data platforms like Splunk or Elastic. It is also easy to handle and easy to understand."
"The platform provides all essential features for discovery and administration."
"The most valuable features are the protection and that it is fast."
"The most valuable feature of Trend Micro Deep Discovery is its complete end-to-end visibility of threats."
"There is no downtime or server vulnerability with this solution."
"Generally speaking, it just gives us a broad understanding of exactly what kind of threats occur. The submission point, analyzing point, and virtualization are within the environment that it supports. It helped us to improve our security levels and protect our internal network from any threats outside."
"It is a very good solution. It is very light, and it is quite quick to figure out the problem in your network."
"One of the most valuable features is the performance, since, so far, we have not faced any issues with Deep Discovery."
"Deep Discovery is scalable and compatible with other products. It's crucial to have that compatibility because it's an integral part of our security solution. It integrates smoothly. The interface is user-friendly, so administration is simple."
"They can include integration with SAP. Currently, no vendor provides network performance monitoring in the SAP market. It is a very big market. We have around 400 customers for SAP in Korea. In the USA, there are more than 10,000 customers."
"There needs to be more support."
"A drawback includes bucket storage limitations for payload data, necessitating timely extraction for thorough investigations."
"The scalability is sometimes limited."
"I would like to see integration with third-party tools to improve the visibility of the dashboards."
"Trend Micro Deep Discovery's technical support could be improved, and it could be made more active."
"I would like to see them create a rule where It could integrate with the network and start mitigating with auto-detection."
"Trend Micro Deep Discovery is a very expensive solution, making it very hard to sell."
"The solution needs improvement in terms of pricing."
"Some of the end users may not be technically proficient, so they occasionally face problems due to a lack of knowledge."
"The solution needs to be able to integrate better with third-party infrastructure."
ExtraHop Reveal(x) 360 is ranked 22nd in Intrusion Detection and Prevention Software (IDPS) with 3 reviews while Trend Micro Deep Discovery is ranked 8th in Intrusion Detection and Prevention Software (IDPS) with 22 reviews. ExtraHop Reveal(x) 360 is rated 8.6, while Trend Micro Deep Discovery is rated 8.4. The top reviewer of ExtraHop Reveal(x) 360 writes "A competitive choice for network detection and response with exceptional user interface, ease of implementation and minimal false positives". On the other hand, the top reviewer of Trend Micro Deep Discovery writes "Good threat detection capabilities and offers flexibility for hosting options". ExtraHop Reveal(x) 360 is most compared with ExtraHop Reveal(x), Corelight, Forescout Platform and Fortinet FortiGate IPS, whereas Trend Micro Deep Discovery is most compared with Darktrace, Trend Micro TippingPoint Threat Protection System, Arista NDR, Vectra AI and Palo Alto Networks Advanced Threat Prevention. See our ExtraHop Reveal(x) 360 vs. Trend Micro Deep Discovery report.
See our list of best Intrusion Detection and Prevention Software (IDPS) vendors.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.