Trend Micro Deep Discovery Primary Use Case
The solution is used for server protection.
View full review »The solution can scan the virtual environment and give reports.
View full review »SB
reviewer2208705
Product manager at a comms service provider with 10,001+ employees
The most applicable use case I find particularly easier to maneuver around is role-based access. The admin consoles in Trend Micro Deep Discovery have a specific layer for providing role-based access, which is also available in other solutions. However, the product's usability is more accurate and efficient when adhering to industry standards.
View full review »
Buyer's Guide
Trend Micro Deep Discovery
March 2024
Learn what your peers think about Trend Micro Deep Discovery. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
767,847 professionals have used our research since 2012.
AT
Ammad Tahir
Information Security Manager at Reacon
I use the solution in my company, but there is nothing to work on the tool. In our company, we just installed Trend Micro Deep Discovery on our servers, and that is it, after which we forgot about it.
CS
Top Sag
SOC at Airline Company
It's been useful in checking network traffic.
View full review »Most of our clients are in the government, so they must comply with regulatory requirements for security because their networks are classified as critical infrastructure. Trend Micro ticks all the boxes for endpoint protection, application whitelisting, file protection, disk protection, etc. Our solutions are typically on-prem because our clients aren't comfortable with the cloud. There use a few cloud solutions, but it's rare.
We use the product for signature-based user behavior analysis. It helps us detect threats in virtual environments as well.
View full review »NP
Nagendran Ponnan
DGM-IT at a construction company with 10,001+ employees
Our primary use case of Deep Discovery is as a sandbox. It sorts the DDAN, our on-premise Deep Discovery Analyzer solution, so if Deep Security or Trend Micro isn't able to find out whether a particular file or memory is a threat or not, they will send that file signature or file to the DDAN. The DDAN will then deploy that file inside their virtual sandbox, analyze the implications, and return the result to the concerned agent. We mainly use it for zero-day vulnerability protection.
Deep Discovery is deployed on-premise.
View full review »We use the solution for its security features. Trend Micro has an MSP portal where you can create customer accounts, assign some licenses, and make your customers use those licenses from a portal. Trend Micro is ahead of its competitors in providing MSP services to customers.
View full review »Deep Discovery is good for network protection. There is also an Email Inspector.
View full review »We use Trend Micro Deep Discovery to identify ransomware attacks.
View full review »This solution can be used as threat protection and to block phishing emails.
We are using version 6.0.
There are 15 people using this solution in my organization.
View full review »DO
Dmytro Ostapenko
Pre-Sales Engineer at Elcore Distribution AG
I work for a distribution partner company. We use the on-prem, physical model of this solution.
View full review »SB
Sanjeet Kumar Bhuyan
Security Consultant and Cybersecurity Support at a tech services company with 51-200 employees
Normally we use the solution to send the traffic. We get traffic on it and once I get the traffic, I get the SPN diagnosis and all the network services diagnostics and whatever else that I run in the office file server. It scans through that. For example, when we download some files, in our portal we are uploading some of the activity documents, as well as Excel and Word documents, etc. They get scanned through and we have DDI Rules that are enabled for the file management.
Basically, any uploading, downloading, etc. of items from our website server get scanned and analyzed.
View full review »VA
reviewer1594215
CEO at a computer software company with 11-50 employees
We are using this solution for network security.
View full review »RN
reviewer1328895
Consultant at a consultancy with 10,001+ employees
The primary use case of this solution is to protect the equity, command, and control and botnet infections.
View full review »AA
reviewer1193289
Network Support Specialist at a financial services firm with 5,001-10,000 employees
We use the onsite version, not cloud. Our primary use case is for intrusion detection, including threats, malware, and basically anything that might be a threat. Traffic that is intercepted from emails going outbound or inbound is also analyzed.
View full review »BG
BobenGeorge
Sr.Customer Engineer- Projects at a tech services company with 201-500 employees
We primarily use the solution as a firewall and for endpoint protection. It's used for security purposes for the most part. We use it for protection.
View full review »ÖA
reviewer1544904
Technology Consultant at a tech services company with 51-200 employees
We are integrators. We work on integrated systems.
Our clients use this solution to know what is happening in the network and to analyze it.
View full review »Buyer's Guide
Trend Micro Deep Discovery
March 2024
Learn what your peers think about Trend Micro Deep Discovery. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
767,847 professionals have used our research since 2012.