Ahmed Elmenshawy - PeerSpot reviewer
PS IT Security Engineer at Alex Bank
Real User
Top 5Leaderboard
Helps us with user behavior analysis and has an easy setup process
Pros and Cons
  • "The platform provides all essential features for discovery and administration."
  • "The product's security features need enhancement."

What is our primary use case?

We use the product for signature-based user behavior analysis. It helps us detect threats in virtual environments as well.

What is most valuable?

The platform provides all essential features for discovery and administration. There is no need for customization options as the features are designed with a user-centered approach. We can identify the root cause of the problem and share the results with the users.

What needs improvement?

The product's security features need enhancement.

For how long have I used the solution?

We have been using Trend Micro Deep Discovery for ten months.

Buyer's Guide
Trend Micro Deep Discovery
March 2024
Learn what your peers think about Trend Micro Deep Discovery. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
768,886 professionals have used our research since 2012.

What do I think about the stability of the solution?

I rate the product's stability an eight out of ten.

What do I think about the scalability of the solution?

I rate Trend Micro Deep Discovery's scalability an eight out of ten. We use it 24/7.

How are customer service and support?

The technical support team replies on time in case of any issues.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup process is easy. It doesn't require a lot of experience for implementation. It needs five executes for deployment and maintenance.

What other advice do I have?

I recommend Trend Micro Deep Discovery to others and rate it an eight out of ten. I advise others to implement it in a test environment if they use it for IPS and IDS purposes.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
DGM-IT at a construction company with 10,001+ employees
Real User
Useful for zero-day vulnerability protection
Pros and Cons
  • "One of the most valuable features is the performance, since, so far, we have not faced any issues with Deep Discovery."
  • "This solution could be improved with faster technical support and cheaper licensing prices."

What is our primary use case?

Our primary use case of Deep Discovery is as a sandbox. It sorts the DDAN, our on-premise Deep Discovery Analyzer solution, so if Deep Security or Trend Micro isn't able to find out whether a particular file or memory is a threat or not, they will send that file signature or file to the DDAN. The DDAN will then deploy that file inside their virtual sandbox, analyze the implications, and return the result to the concerned agent. We mainly use it for zero-day vulnerability protection. 

Deep Discovery is deployed on-premise. 

What is most valuable?

One of the most valuable features is the performance, since, so far, we have not faced any issues with Deep Discovery. 

What needs improvement?

This solution could be improved with faster technical support and cheaper licensing prices. 

For how long have I used the solution?

We have been using Deep Discovery for a couple of years. 

What do I think about the stability of the solution?

I'm satisfied with the stability and performance of Deep Discovery. So far, we have not faced any issues. 

What do I think about the scalability of the solution?

In our organization, we have around one thousand licenses for Trend Micro. Whether or not we increase our usage will depend on business requirements. 

How are customer service and support?

Trend Micro's technical support could be better and faster. 

How was the initial setup?

The installation was done by a Trend Micro implementation partner. It took about one or two weeks. 

For deployment and maintenance, we have a team of two engineers and a few managers. 

What about the implementation team?

We implemented Deep Discovery through a Trend Micro partner. 

What's my experience with pricing, setup cost, and licensing?

The licensing cost is a bit pricey. We pay a yearly subscription. 

What other advice do I have?

I rate Deep Discovery an eight out of ten. I would recommend Deep Discovery to others. If people are ready to invest as a capital, then I can recommend a Deep Discovery license. Otherwise, they can go with their cloud-based solution. 

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Trend Micro Deep Discovery
March 2024
Learn what your peers think about Trend Micro Deep Discovery. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
768,886 professionals have used our research since 2012.
OzgurEkinci3 - PeerSpot reviewer
Solutions Architect at NGN
Real User
Top 5
Ahead of its competitors in providing MSP services to customers

What is our primary use case?

We use the solution for its security features. Trend Micro has an MSP portal where you can create customer accounts, assign some licenses, and make your customers use those licenses from a portal. Trend Micro is ahead of its competitors in providing MSP services to customers.

What is most valuable?

Trend Micro Endpoint Encryption is stable and easy to use. It's very useful for an MSP company, making it easy and efficient to work with.

What needs improvement?

Security features could be improved.

For how long have I used the solution?

I have been using Trend Micro Endpoint Encryption for one year.

What do I think about the stability of the solution?

The product is very stable.

What do I think about the scalability of the solution?

The solution is scalable because it doesn't require an on-premise server installed. Everything is being monitored and managed from the cloud portal, irrespective of the number of agents. You can manage all from one portal.

How are customer service and support?

Vendors are locally present in our country. We contact them via email, etc. We are very flexible with vendor support.

How was the initial setup?

The initial setup is straightforward. One person is enough for it.

An MSP company creates customer accounts from Trend Micro's MSP portal. Then, the customer gets the key. After that, they can log in to the Trend Micro portal. They will see the agent to be downloaded for Windows and Linux. It takes about two or three minutes to deploy.

What about the implementation team?

Deployment can be done by yourself.

What's my experience with pricing, setup cost, and licensing?

The MSP's model and licensing is global and has very reasonable prices. Also, the perpetual license model is reasonable. It's cheap for the assembly companies. Licensing is very straightforward.

What other advice do I have?

Around five to ten technical persons are using the support. We will be able to sell those agents to more than 20 companies.

Only one technical person is enough for a large company for the installation and the management. In terms of management, many logs, alarms, and entries are happening in the portal.

Trend Micro can be a viable option for SMBs looking for a basic EDR or PRT solution. However, for larger organizations or those with highly complex security needs demanding advanced services and sophisticated department knowledge, Trend Micro's capabilities might not be sufficient.

Overall, I rate the solution a seven out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
Nadeem Syed - PeerSpot reviewer
CEO at Haniya Technologies
Real User
Top 5Leaderboard
Easy to use, easy to deploy, and helpful for quickly figuring out the problems in the network
Pros and Cons
  • "It is a very good solution. It is very light, and it is quite quick to figure out the problem in your network."
  • "Trend Micro can improve the pricing in general. There is nothing else they can add or improve in the solution."

What is our primary use case?

Deep Discovery is good for network protection. There is also an Email Inspector.

What is most valuable?

It is a very good solution. It is very light, and it is quite quick to figure out the problem in your network.

It is very easy to use. It is also very easy to install and deploy.

What needs improvement?

Trend Micro can improve the pricing in general. There is nothing else they can add or improve in the solution.

What do I think about the stability of the solution?

It is very stable.

What do I think about the scalability of the solution?

There are quite a lot of clients who use this solution. It is an enterprise solution, and 80% of the enterprise-level companies are using it over here.

How are customer service and support?

We do hear of issues from our clients. We go over there for technical support, but there is nothing major for which they require support from Trend Micro itself.

How was the initial setup?

It is straightforward. It doesn't take much time. It usually takes an hour or two. It requires a maximum of a day.

What's my experience with pricing, setup cost, and licensing?

Its price is fine, but Trend Micro can improve the pricing in general. 

It is a hardware solution. It is based on the number of nodes, and according to the number of nodes, clients decide which box they should acquire. They have to renew their license every year. It is subscription-based.

What other advice do I have?

Trend Micro has divided most of the solutions into different sectors. If you want to go for the end-to-end solution, they are very much in a position to provide that. You do not have to add different kinds of products or vendors. Trend Micro covers almost everything.

I would definitely recommend this solution. It is a very good solution. I would rate it a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer:
PeerSpot user
Kulwinder Singh - PeerSpot reviewer
Network Security Associate Manager at Eir evo
Real User
Top 5
Provides complete end-to-end visibility of threats
Pros and Cons
  • "The most valuable feature of Trend Micro Deep Discovery is its complete end-to-end visibility of threats."
  • "Trend Micro Deep Discovery's technical support could be improved, and it could be made more active."

What is our primary use case?

We use Trend Micro Deep Discovery to identify ransomware attacks.

What is most valuable?

The most valuable feature of Trend Micro Deep Discovery is its complete end-to-end visibility of threats.

What needs improvement?

Trend Micro Deep Discovery's technical support could be improved, and it could be made more active.

For how long have I used the solution?

I have been using Trend Micro Deep Discovery for four to five months.

How was the initial setup?

Trend Micro Deep Discovery's initial setup is easy.

What other advice do I have?

Trend Micro Deep Discovery's interface and threat mechanism are very proactive.

Overall, I rate Trend Micro Deep Discovery a nine out of ten.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Ahmet Burak Aydin - PeerSpot reviewer
Security Engineer at Intertech Information Technology and Marketing Inc.
Real User
Useful for threat protection and to block phishing emails
Pros and Cons
  • "Initial setup is easy. It can be done by yourself."
  • "The solution could be more secure."

What is our primary use case?

This solution can be used as threat protection and to block phishing emails.

We are using version 6.0.

There are 15 people using this solution in my organization.

What needs improvement?

The solution could be more secure.

What do I think about the stability of the solution?

It's stable.

What do I think about the scalability of the solution?

It's scalable.

How are customer service and support?

We are using local technical support. We haven't had any problems with it.

How was the initial setup?

Initial setup is easy. It can be done by yourself.

What other advice do I have?

I would rate this solution 9 out of 10.

I would recommend this solution to anyone who wants to start using it.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Pre-Sales Engineer at Elcore Distribution AG
Real User
Intuitive, user-friendly, and easy to use solution that helps to detect advanced threats and attacks
Pros and Cons
  • "The most valuable feature is that the user can customize images of virtual machines in the sandbox functionality. The other vendors only use images that were created by the vendor but not the customer, end-user or partner. This helps to detect advanced threats and attacks."
  • "I would like the ability to analyze all files in our internal network, at the same time on different operating systems. Not just three of them, but as many as possible."

What is our primary use case?

I work for a distribution partner company. We use the on-prem, physical model of this solution.

What is most valuable?

It's intuitive and has a user-friendly interface. It's also flexible. We can put files, web links in this solution through other Windows.

The most valuable feature is that the user can customize images of virtual machines in the sandbox functionality. The other vendors only use images that were created by the vendor but not the customer, end-user or partner. This helps to detect advanced threats and attacks. It helps to clone the internal structure, IT structure of some companies. So you could clone the computer of the director or the financial department and place it to the sandbox. The bad guys who are looking for a way to get into your organization when they get to a computer, they think that it's a real computer. They see software or something connected with finance and they think that this is a real computer and not a laboratory or a sandbox so they run the bad script and think that they're stealing some important information or encrypting some important information. Antivirus solutions can stop attacks when they know how these attacks play out. If we don't know how the attack is going to go, we can't identify it. It customizes the images and Trend Micro helps to identify these unknown attacks.

Different parts of the organization can quickly receive information about the bad scripts. It helps to protect the organization's infrastructure from these attacks. 

What needs improvement?

We'd like to see more video guides. I'd also like for them to increase the numbers of different virtual images. Now the solution can use only three different images. For example, it's Windows 7, Windows 10, and the Windows servers are 2016. Only three of them at the same time. It would be more useful if the solution can operate with around five or six different images like Windows 7 2019, Windows 8.1. I would like the ability to analyze all files in our internal network, at the same time on different operating systems. Not just three of them, but as many as possible.

For how long have I used the solution?

I have been using this solution for a year and a half.

What do I think about the stability of the solution?

It's very stable.

What do I think about the scalability of the solution?

It's a solution for enterprise antivirus protection. It's not for small companies. The price of this solution corresponds to its class.

In my company only I use this solution. It's a stand-alone laboratory. It's a stand-alone server that analyzes files, URLs, and messages from all IT infrastructure in an organization. It's not a solution for one person or 10 people. It's a solution for all employees inside an organization.

How are customer service and technical support?

We haven't had the need to contact technical support. It's very easy to use. 

Which solution did I use previously and why did I switch?

The main difference from other solutions is that it uses customized images inside sandboxes. They're similar in functionality. All of them run, scan, and notice every change that some files, some scripts, some links do inside the system. The environment is imported inside the sandbox and in this way, Trend Micro is the leader in the world's markets of sandbox solutions.

How was the initial setup?

The initial setup was straightforward and very easy. You don't need special knowledge or courses to complete an installation of this solution. It's very easy.

What about the implementation team?

We implemented it ourselves. 

What other advice do I have?

I would rate it a ten out of ten. 

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Information Security Manager at a legal firm with 1,001-5,000 employees
Vendor
The built-in auto tuning system does a great job of detecting legitimate services and devices on the network.

What is most valuable?

Ease of use, just connect to a span port on your core switch and you're ready to go. Of course, you will see a bunch of white noise, but the built-in auto tuning system does a great job of detecting legitimate services and devices on the network, and from there you white-list the ones which you've confirmed to be known goods. Built in sandboxing provides an additional layer of defense to shake out suspicious objects and processes. This works especially well if you're running Trend Micro's Office Scan Endpoint Protection, where DDi is able to generate a new virus definition via the sandbox, and push it out to the Office Scan AV engine to provide protection across your network.

How has it helped my organization?

DDi rapidly discovers C2 traffic and pinpoints the offenders, source and recipient. It also provides a set of eyes to keep track of suspicious lateral movements between nodes. The out of the box rule set does a great job of hunting down previously unflagged threats, but can easily be customized for those that like to tweak and refine.

What needs improvement?

Not too much to complain about, really. There were a few instances where legitimate traffic (WPAD) was flagged as C2 communication. There were some challenges in white-listing it, which resulted in a bunch of alerts/noise.

For how long have I used the solution?

2 years

What was my experience with deployment of the solution?

No

What do I think about the stability of the solution?

Never

What do I think about the scalability of the solution?

It can get expensive if you wish to monitor all core switches across many satellite offices. My suggestion is to put one or more DDi appliances at core switches nearest to where your critical data is housed.

How are customer service and technical support?

Customer Service:

Customer service is very good.

Technical Support:

Very good.

Which solution did I use previously and why did I switch?

FireEye. Fire Eye is incredibly expensive, and requires multiple appliances which together, scan far less protocols than DDi. It also hasn't fared so well in terms of detection rates, in independent tests against competing products.

How was the initial setup?

Straightforward setup.

What about the implementation team?

Implemented in-house along with Trend's team.

What other advice do I have?

Be sure to implement Trend's Control Manager module (free) for more flexible reporting, along with integration with other Trend products (strongly suggest using this along with Office Scan and Deep Discovery Endpoint Sensor, which is an EDR solution).

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Trend Micro Deep Discovery Report and get advice and tips from experienced pros sharing their opinions.
Updated: March 2024
Buyer's Guide
Download our free Trend Micro Deep Discovery Report and get advice and tips from experienced pros sharing their opinions.