Trend Micro Deep Discovery Primary Use Case

Subhendu Dhar - PeerSpot reviewer
Director at Diamond Infotech Pvt ltd

The solution is used for server protection. 

View full review »
ArundevarajM - PeerSpot reviewer
Senior Technical Specialist at Softcell Technologies Limited

The solution can scan the virtual environment and give reports.

View full review »
SB
Product manager at a comms service provider with 10,001+ employees
The most applicable use case I find particularly easier to maneuver around is role-based access. The admin consoles in Trend Micro Deep Discovery have a specific layer for providing role-based access, which is also available in other solutions. However, the product's usability is more accurate and efficient when adhering to industry standards. View full review »
Buyer's Guide
Trend Micro Deep Discovery
March 2024
Learn what your peers think about Trend Micro Deep Discovery. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
767,847 professionals have used our research since 2012.
AT
Information Security Manager at Reacon

I use the solution in my company, but there is nothing to work on the tool. In our company, we just installed Trend Micro Deep Discovery on our servers, and that is it, after which we forgot about it.

View full review »
CS
SOC at Airline Company

It's been useful in checking network traffic.

View full review »
Malik Usman Aslam - PeerSpot reviewer
Network & Security Team Lead at Tech Stations

Most of our clients are in the government, so they must comply with regulatory requirements for security because their networks are classified as critical infrastructure. Trend Micro ticks all the boxes for endpoint protection, application whitelisting, file protection, disk protection, etc. Our solutions are typically on-prem because our clients aren't comfortable with the cloud. There use a few cloud solutions, but it's rare.

View full review »
Ahmed Elmenshawy - PeerSpot reviewer
PS IT Security Engineer at Alex Bank

We use the product for signature-based user behavior analysis. It helps us detect threats in virtual environments as well.

View full review »
NP
DGM-IT at a construction company with 10,001+ employees

Our primary use case of Deep Discovery is as a sandbox. It sorts the DDAN, our on-premise Deep Discovery Analyzer solution, so if Deep Security or Trend Micro isn't able to find out whether a particular file or memory is a threat or not, they will send that file signature or file to the DDAN. The DDAN will then deploy that file inside their virtual sandbox, analyze the implications, and return the result to the concerned agent. We mainly use it for zero-day vulnerability protection. 

Deep Discovery is deployed on-premise. 

View full review »
OzgurEkinci3 - PeerSpot reviewer
Solutions Architect at NGN

We use the solution for its security features. Trend Micro has an MSP portal where you can create customer accounts, assign some licenses, and make your customers use those licenses from a portal. Trend Micro is ahead of its competitors in providing MSP services to customers.

View full review »
Nadeem Syed - PeerSpot reviewer
CEO at Haniya Technologies

Deep Discovery is good for network protection. There is also an Email Inspector.

View full review »
Kulwinder Singh - PeerSpot reviewer
Network Security Associate Manager at Eir evo

We use Trend Micro Deep Discovery to identify ransomware attacks.

View full review »
Ahmet Burak Aydin - PeerSpot reviewer
Security Engineer at Intertech Information Technology and Marketing Inc.

This solution can be used as threat protection and to block phishing emails.

We are using version 6.0.

There are 15 people using this solution in my organization.

View full review »
DO
Pre-Sales Engineer at Elcore Distribution AG

I work for a distribution partner company. We use the on-prem, physical model of this solution.

View full review »
SB
Security Consultant and Cybersecurity Support at a tech services company with 51-200 employees

Normally we use the solution to send the traffic. We get traffic on it and once I get the traffic, I get the SPN diagnosis and all the network services diagnostics and whatever else that I run in the office file server. It scans through that. For example, when we download some files, in our portal we are uploading some of the activity documents, as well as Excel and Word documents, etc. They get scanned through and we have DDI Rules that are enabled for the file management. 

Basically, any uploading, downloading, etc. of items from our website server get scanned and analyzed. 

View full review »
VA
CEO at a computer software company with 11-50 employees

We are using this solution for network security.

View full review »
RN
Consultant at a consultancy with 10,001+ employees

The primary use case of this solution is to protect the equity, command, and control and botnet infections.

View full review »
AA
Network Support Specialist at a financial services firm with 5,001-10,000 employees

We use the onsite version, not cloud. Our primary use case is for intrusion detection, including threats, malware, and basically anything that might be a threat. Traffic that is intercepted from emails going outbound or inbound is also analyzed.

View full review »
BG
Sr.Customer Engineer- Projects at a tech services company with 201-500 employees

We primarily use the solution as a firewall and for endpoint protection. It's used for security purposes for the most part. We use it for protection.

View full review »
ÖA
Technology Consultant at a tech services company with 51-200 employees

We are integrators. We work on integrated systems.

Our clients use this solution to know what is happening in the network and to analyze it. 

View full review »
Buyer's Guide
Trend Micro Deep Discovery
March 2024
Learn what your peers think about Trend Micro Deep Discovery. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
767,847 professionals have used our research since 2012.