Maurizio TestaSecurity Engineer/Architect at Telecom Italia
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The SVM deployment has very good performance."
"Using this solution allows us to set up rule-based access control."
"When it comes to their firewall, it notified me about a possible infection."
"The vulnerability scanning reduces false positives by quite a bit."
"The most valuable feature is the virtual patching."
"In terms of valuable features, I would say its intrusion prevention. Each and every IP connecting to the server gets scanned so we know everyone who is accessing our server and we can block whichever IP's do not belong to us at the firewall."
"The initial setup was straightforward and we didn't have any problem with it."
"This product offers good protection against many types of malware."
"Automated virtual patching is a good feature."
"It integrates well with the cloud; for example, AWS, and Google Cloud Provider."
"The most valuable feature of this solution is the virtual path function, which is the reason we chose to implement it."
"The solution would be improved if all of the advanced features were included in the SVM."
"We are unable to reliably specify bandwidth limits for particular clients, which is something that needs to be improved."
"I would like to see some new features for improving the security part of the solution."
"The client can show as offline sometimes, and that becomes a bit difficult for troubleshooting. We end up basically redeploying the client. This is something that could be improved in the future."
"When implementing this solution, sometimes we have challenges with SQL migration."
"As for what could be improved, I think it should come with an XDR facility without any extra cost. They're always releasing new features, but we need to pay extra for them."
"The situation with the currency in Turkey makes this solution a little bit on the expensive side, and if it were lowered then it would be more competitive."
"They need to build in a central console because central integration is not very good right now."
"Requires simplification, a fair amount of trouble shooting required."
"The problem with this solution is that if you go on large sites you have to have an external database, which would increase the cost."
"I would like to see an EDR function for the servers, as that would be useful for us."
"For virtualization security, the cost is approximately $50 USD per seat."
"Some of our customers complain about the cost of this solution."
"It's more expensive than other solutions, such as Sophos and Kaspersky, as an endpoint solution."
"The solution is considerably cheaper than other similar solutions."
"There is a license for this solution and there are extra features you can purchase."
Earn 20 points
The Trend Micro Cloud and Data Center Security solution protects applications and data and prevents business disruptions, while helping meet regulatory compliance. Whether you are focused on securing physical virtual, cloud, or hybrid environments, Trend Micro provides the advanced server security you need with the Trend Micro™ Deep Security™ platform.
Sophos Virtualization Security is ranked 4th in Virtualization Security with 3 reviews while Trend Micro Deep Security is ranked 1st in Virtualization Security with 12 reviews. Sophos Virtualization Security is rated 7.0, while Trend Micro Deep Security is rated 8.6. The top reviewer of Sophos Virtualization Security writes "Good performance, scalable, and multi-platform". On the other hand, the top reviewer of Trend Micro Deep Security writes "Each and every IP connecting to the server gets scanned so we can block whichever IPs do not belong to us at the firewall". Sophos Virtualization Security is most compared with , whereas Trend Micro Deep Security is most compared with Trend Micro Apex One, CrowdStrike Falcon, Symantec End-User Endpoint Security, Carbon Black CB Defense and Microsoft Defender Antivirus. See our Sophos Virtualization Security vs. Trend Micro Deep Security report.
See our list of best Virtualization Security vendors.
We monitor all Virtualization Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.