We compared Trend Micro Deep Security and VMware Carbon Black Endpoint based on our users reviews in five parameters. After reading the collected data, you can find our conclusion below:
Comparison Results: When comparing Trend Micro Deep Security and VMware Carbon Black Endpoint, it is generally believed that Deep Security has a simpler and more straightforward initial setup. Deep Security also offers a wider variety of deployment options and provides helpful documentation and video tutorials. Conversely, Carbon Black Endpoint's setup can be more difficult, requiring complex configurations and customized policies. However, Carbon Black Endpoint has advantageous features like MDR capability and a whitelisting process for protection against zero-day threats. Deep Security has a smaller impact on system resources and efficient threat detection, whereas Carbon Black Endpoint offers superior log analysis and continuous monitoring. Some customers find Deep Security's pricing to be high, while Carbon Black Endpoint is generally described as expensive. The quality of customer service for both products has received mixed reviews and has room for improvement.
"Some of the main features of this solution are it is reliable and can be used in small to large size businesses."
"Deep Security enables us to bridge the gap between patching windows using the Virtual Patching feature. This allows us to make sure full patching is tested properly in our testing environments before rollout."
"The most valuable features of the solution we have enabled in our organization are its anti-malware capabilities, applications, web reputation, and integrity monitoring."
"It provides a comprehensive feature set and a strong security baseline for us with integrations into other security tools."
"We find that their technical support team is always accessible and willing to assist."
"I switched to Trend Micro because of its good marketing techniques."
"There are compliance issues for legacy applications and after applying OS security patches. The product's HIPS (Host Intrusion Prevention System) modules do the job for you automatically, without any downtime."
"We've found stability to be great so far."
"We can access computers remotely if we need to."
"Carbon Black Cb Defense improved our endpoint level security. It helped to identify endpoint and infrastructure loopholes."
"The tool is pretty stable."
"I rate Carbon Black CB Defense an eight out of ten for the ease of its initial setup."
"The solution is extremely scalable."
"One of the most valuable features is that it will block vulnerable sites. If there was a connection between one of our devices to a known malware site, it will block it."
"Technical support is excellent."
"It gives you all of the information in a short and sweet fashion."
"The support for email protection can be improved."
"There should be signature-based advanced and responsive features."
"There is room for improvement with Trend Micro Deep Security, as there are instances where installations may need to be redone. There seem to be glitches when working with older Windows servers, such as those from 2003 or 2005, requiring us to uninstall and reinstall the product to resolve the issue."
"I would like them to add EDR features, moving away from traditional signature-based anti-malware."
"When implementing this solution, sometimes we have challenges with SQL migration."
"The cost is very high."
"I've not worked with CrowdStrike Falcon, but one of our customers also had CrowdStrike Falcon on some of the devices. I was only supporting Trend Micro. They had a ransomware attack, but Trend Micro didn't detect that particular ransomware attack, whereas CrowdStrike did."
"It would be helpful if they could send emails notifying their users about the recommended upgraded versions to address the newly discovered vulnerabilities."
"They will most likely need to create or include a feature that checks the network."
"CB Defense could be more compatible with Linux, and its cloud provision could be improved."
"Carbon Black CB Defense has helped improve my organization by allowing us to have better data so that we can do correlation and get visibility into the alerts."
"It would be a better solution if Carbon Black Cb Defense had an on-promise solution and a virus auto delete or quarantine."
"When you view the triage, it will show you everything within a given time frame, and not only the attack that caused the alert, which is what I want to see. It shows you all the events during that time, and that can be quite confusing."
"In our company, we also wanted to have network detection, like a host-based IDS on VMware Carbon Black Endpoint, but we did not get it."
"Sensor deployment requires extensive fine-tuning, and creating deployment packages is time-consuming."
"Carbon Black needs to do a better job of proving their platform in the industry, and providing a bit more access to do industry testing with real world examples to help prove their platform."
Trend Micro Deep Security is ranked 1st in Virtualization Security with 80 reviews while VMware Carbon Black Endpoint is ranked 17th in Endpoint Protection Platform (EPP) with 61 reviews. Trend Micro Deep Security is rated 8.6, while VMware Carbon Black Endpoint is rated 8.0. The top reviewer of Trend Micro Deep Security writes "Offers excellent endpoint protection and great stability ". On the other hand, the top reviewer of VMware Carbon Black Endpoint writes "Centralization via the cloud allows us to protect and control people working from home". Trend Micro Deep Security is most compared with Trend Micro Apex One, CrowdStrike Falcon, Microsoft Defender for Endpoint, Symantec Endpoint Security and Trellix Endpoint Security, whereas VMware Carbon Black Endpoint is most compared with CrowdStrike Falcon, Microsoft Defender for Endpoint, SentinelOne Singularity Complete, Symantec Endpoint Security and Trellix Endpoint Security.
We monitor all Virtualization Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.