We just raised a $30M Series A: Read our story

Trend Micro Deep Security OverviewUNIXBusinessApplication

Trend Micro Deep Security is the #1 ranked solution in our list of top Virtualization Security tools. It is most often compared to Trend Micro Apex One: Trend Micro Deep Security vs Trend Micro Apex One

What is Trend Micro Deep Security?

The Trend Micro Cloud and Data Center Security solution protects applications and data and prevents business disruptions, while helping meet regulatory compliance. Whether you are focused on securing physical virtual, cloud, or hybrid environments, Trend Micro provides the advanced server security you need  with the Trend Micro™ Deep Security™ platform.

Trend Micro Deep Security is also known as Deep Security.

Trend Micro Deep Security Buyer's Guide

Download the Trend Micro Deep Security Buyer's Guide including reviews and more. Updated: September 2021

Trend Micro Deep Security Customers

Rush University Medical Center, Guess? Inc., Mazda Motor Logistics Europe, MEDHOST, KSC Commercial Internet Co., Ricoh Company Ltd., Square Enix, SoftBank Telecom, Telecom Italia, United Way of Greater Atlanta, A&W Food Services of Canada

Trend Micro Deep Security Video

Archived Trend Micro Deep Security Reviews (more than two years old)

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
VM
Senior Security Specialist at a tech services company
Reseller
Handles the important task of virtual patching, although the agent-based version has performance issues

Pros and Cons

  • "The most valuable feature is the virtual patching."
  • "When implementing this solution, sometimes we have challenges with SQL migration."

What is our primary use case?

We recommend the use of this solution to our clients, both with virtual and traditional servers.

How has it helped my organization?

This has helped our customers keep up to date with security patches. Many customers do not patch their software after a new purchase has been released because there are a lot of other technologies and considerations to be carried out. It takes time to go through all of these, and some customers have not been patched for many years. Especially for those customers, this solution will protect them against those vulnerabilities.

What is most valuable?

The most valuable feature is the virtual patching. This offers protection of the application before it can be patched by the actual vendor.

What needs improvement?

Some areas for improvement are:

  • There are new additions to the standard product that should be included with the Deep Security version.
  • When implementing this solution, sometimes we have challenges with SQL migration.
  • Some of our customers complain about the cost of this solution.
  • I would like to see an AI component added to the next release of this solution.
  • The agent-based version has performance issues and they have to make it more lightweight.
  • The forensic analysis capability needs to be improved.

What do I think about the stability of the solution?

This is a stable and well-known solution in the market. It is especially well-known for use in virtualized server networks. 

What do I think about the scalability of the solution?

We have not faced scalability issues whatsoever. This solution is commonly used for servers, and not in workstations. We only recommend it for the customer's servers.

How are customer service and technical support?

There are different service levels available for technical support.

When a problem occurs then we collect the logs and submit them. There is some time lost here because we do not always immediately deal with somebody who has sufficient expertise with the solution. This is something that we would like to see change. 

Generally, reaching technical support is fine, but in terms of having problems resolved, it varies. Sometimes it can take three days, while other problems can take three months.

How was the initial setup?

The complexity of the initial setup depends on the customer's environment. There are different methods of deployment. If it is an agentless deployment then there are prerequisites for that. The agent-based version is a bit easier to set up than the agentless version.

They have to go through setting up policies, which will take time to implement and fine tune. They have to make sure that the solution is communicating with the management server, and that there are no conflicts with other applications that are running. If there is anything that is broken or should not be running, then that is fixed. Once the initial application is perfectly up and running without any issues, and the policies have been fine-tuned, there should not be an issue.

Depending on the customer's environment, the deployment time varies. We have deployed some solutions in one day, while others have taken months to complete the fine-tuning. 

Generally, for any implementation, we will not use more than two staff. For cases with more than one hundred machines, this can be a challenge during deployment. 

What about the implementation team?

We do the complete deployment and implementation of this solution for our clients.

Which other solutions did I evaluate?

We resell a variety of products, some of which are similar to the Trend Micro solution, but our recommendation depends on our customer's requirements. Some customers will demand a particular vendor, such as Trend Micro, while others will specify that they do not want to use solutions by a specific vendor. In these cases, we work on alternative solutions for our clients.

Some of the other options our clients consider are solutions by McAfee, Kaspersky, and Symantec. 

What other advice do I have?

It is important to implement this kind of solution because many people do not have security on their servers. This includes the vulnerability patching that should be done.

This solution has improved over time. They have been introducing third-party plug-ins and integration, and there is a cloud version available as well. 

I would rate this solution a seven out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller.
MB
Solution Expert -Security at a financial services firm with 10,001+ employees
Real User
A solution that's easily scalable, reduces false positives and is easy to set up

Pros and Cons

  • "The vulnerability scanning reduces false positives by quite a bit."
  • "The client can show as offline sometimes, and that becomes a bit difficult for troubleshooting. We end up basically redeploying the client. This is something that could be improved in the future."

What is most valuable?

The HIPS feature, as well as the monitoring around the file integrity, are very valuable aspects of the solution. 

The vulnerability scanning reduces false positives by quite a bit.

What needs improvement?

The client can show as offline sometimes, and that becomes a bit difficult for troubleshooting. We end up basically redeploying the client. This is something that could be improved in the future.

It would be helpful if they added more machine learning into the solution in the future.

For how long have I used the solution?

I've been using the solution for five years.

What do I think about the stability of the solution?

The solution is largely stable, except for the fact that when the client communication breaks, you end up troubleshooting and you sometimes have to redeploy to get the client to establish the connection again.

What do I think about the scalability of the solution?

The solution is good from a scalability perspective. It doesn't take much effort.

How are customer service and technical support?

Technical support is okay. I would rate them 7.5 out of ten. My experience with Trend Micro has been that if there are issues with respect to databases, it takes time for them to resolve the problem.

How was the initial setup?

The initial setup is straightforward. From a deployment perspective, I would say all vendors are quite similar.

What other advice do I have?

We largely work with enterprise-level organizations.

I advise others to make sure that any recommendations in terms of system requirements that have been given to them are followed properly. 

I would rate the solution 8.5 out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: September 2021.
542,267 professionals have used our research since 2012.
Rayees Tamton
Data Center Manager/Support Delivery Manager at Salam Technology
Real User
A user-friendly product that protects us from both internal and external attacks

Pros and Cons

  • "The most valuable features are web security, email filtering, and content filtering."
  • "The support for email protection can be improved."

What is our primary use case?

Our primary use case for this solution is to prevent DDoS and other types of attacks from internal or external sources.

How has it helped my organization?

This solution protects us against different types of attacks, including email phishing, and it includes spam filtering. There have been some spam cases that we found recently and Trend Micro had already detected them. It caught EXE files in email and we put policies in place to block Excel attacks.

There are daily updates and we can even protect the internal workstations from viruses.

What is most valuable?

The most valuable features are web security, email filtering, and content filtering. The user interface is very friendly, and it is easy to control things from the policy.

What needs improvement?

The support for email protection can be improved.

For how long have I used the solution?

Since 2017.

What do I think about the stability of the solution?

I have been using different Trend Micro products in 2009 or 2010. For me, this is the best on the market.

What do I think about the scalability of the solution?

This product scales very easily. We have more than one hundred and thirty licenses and more than five thousand users.

The people who use this solution are experts in networking and cybersecurity. All of them are CCIE certified.

We will be increasing our usage by adding another site. Right now we are using an MDRC (Mobile Disaster Recovery Center), but within two or three months, we will have a PDC (Primary Data Center).

How are customer service and technical support?

When we call technical support they respond immediately. They are local and we have met them three or four times in the last couple of months. After they visited our office, we had a discussion with them.

We get very good support from them, and we appreciate it.

Which solution did I use previously and why did I switch?

We have been using Trend Micro products and we were happy with them so we went with this solution.

How was the initial setup?

The initial setup for this solution is straightforward.

For the deployment, we are using three cybersecurity engineers and three network security engineers.

What about the implementation team?

We implemented this solution using a local provider in Qatar. The support was amazing. Every day, we received updates from our representative.

What was our ROI?

I cannot predict the ROI at the moment because we are still planning to implement other areas, such as the PDC.

What's my experience with pricing, setup cost, and licensing?

It is approximately three million Qatari Riyal ($820,000 USD) for our licensing fees. The cost is approximately six thousand Qatari Riyal ($1,650 USD) per user.

Which other solutions did I evaluate?

We did evaluate other options, including Kaspersky. I know that it does not have the capability that we need. We did use it for endpoints, but we were not happy with it at the time.

What other advice do I have?

We would recommend this solution to others. This is based on our security implementation. We are strongly protected through Trend Micro.

I would rate this solution a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
ITCS user
Hewlett Packard Enterprise Solution Architect at a tech services company with 11-50 employees
Consultant
It provides full protection against vulnerabilities

Pros and Cons

  • "It has improved functions by bringing us complete security on our clients' virtual environment."
  • "It has a perfect SaaS which integrates with AWS, offering flexibility to deploy quickly and easily in the cloud."
  • "It needs better global visibility of the virtual environment."

What is our primary use case?

We use it for virtual environment protection.

How has it helped my organization?

It has improved functions by bringing us complete security on our clients' virtual environment.

What is most valuable?

  • Security capabilities in a Smart Scan Agent. 
  • It provides full protection against vulnerabilities.
  • It has the ability to assume and maintain several IT requirements.

What needs improvement?

It needs better global visibility of the virtual environment.

I would like more security tools which could fit into a DevOps environment.

For how long have I used the solution?

Less than one year.

What do I think about the stability of the solution?

We use it just for DevOps workloads.

What do I think about the scalability of the solution?

We have used it to deploy a client's DevOps environment.

How was the initial setup?

It has a perfect SaaS which integrates with AWS, offering flexibility to deploy quickly and easily in the cloud.

What's my experience with pricing, setup cost, and licensing?

Purchasing this solution through the AWS Marketplace was secure and quick. We did it as a renewal license for one of our customers. AWS has good prices for a good product.

What other advice do I have?

While it is a good security product, they have to develop better tools to manage it.

I have not tried to integrate it with other products.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Matthew White
Production DBA at BLUE MOTOR FINANCE LIMITED
Real User
Endpoint Security in the Cloud, providing a strong set of controls and protection

Pros and Cons

  • "Deep Security enables us to bridge the gap between patching windows using the Virtual Patching feature. This allows us to make sure full patching is tested properly in our testing environments before rollout."
  • "It provides a comprehensive feature set and a strong security baseline for us with integrations into other security tools."
  • "I would like them to add EDR features, moving away from traditional signature-based anti-malware."

What is our primary use case?

Our primary use case is to provide endpoint security for our AWS EC2 instances, covering features, such as host-based firewall, IDS/IPS, anti-malware, and application control.

How has it helped my organization?

Deep Security has given us strong protection and configuration of our endpoint security and enables us to bridge the gap between patching windows using the Virtual Patching feature. This allows us to make sure full patching is tested properly in our testing environments before roll out. This especially helps when, like this month, a patch is released which can’t be used, due to stability/performance issues.

What is most valuable?

  • IDS/IPS
  • Host-based firewall

I am also currently looking into the newer integrations with our various other security tools.

What needs improvement?

The training needs improvement. It is expensive (classroom training), and it is often hard to find answers by yourself using the documentation.

I would like them to add EDR features, moving away from traditional signature-based anti-malware.

For how long have I used the solution?

One to three years.

What do I think about the stability of the solution?

The product seems very stable. We have only ever had one incident which caused us concern, and Trend Micro identified a way to mitigate it for future occurrences. They also ensured the issue was patched.

What do I think about the scalability of the solution?

It seems to work at the scale that we are currently using it at: Approximately 65 EC2 instances.

How is customer service and technical support?

Customer service team are fantastic and help provide timely resolution to issues and questions

How was the initial setup?

Configuration in our AWS environment is straightforward and policy-based with inheritance, e.g., making it easy to align with Active Directory. Event-based triggers can automate the correct policy implementation.

What's my experience with pricing, setup cost, and licensing?

It is simple and cost-effective to purchase through the AWS Marketplace, which provides an easy understanding of the scale of the costs. Our organization purchased it through the AWS Marketplace because it is easier to track when added to our AWS bill and convenient purchasing model.

The AWS licensing model is scalable and easy to use, but could do with tiered discounts. I am not sure how well this model will scale when we start to use Auto Scaling with AWS resources.

What other advice do I have?

It provides a comprehensive feature set and a strong security baseline for us with integrations into other security tools.

It integrates with AlienVault USM Anywhere and AWS GuardDuty in our environment.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Divyang P
Senior Cyber Security Consultant at Infosec Ventures
Reseller
Top 20
Straightforward implementation without downtime, user-friendly interface

Pros and Cons

  • "There are compliance issues for legacy applications and after applying OS security patches. The product's HIPS (Host Intrusion Prevention System) modules do the job for you automatically, without any downtime."
  • "Very user-friendly interface, easy to understand."
  • "​Very straightforward and very easy to implement.​"
  • "There is no competition for this product, as no other product provides HIPS, host-firewall, and anti-malware together."
  • "The default reports provided don't provide much insight."
  • "I would rate tech support in the range of six to eight out of 10. Time to provide solution could be improved."

How has it helped my organization?

There are compliance issues of legacy applications and after applying OS security patches. The product's HIPS (Host Intrusion Prevention System) modules do the job for you automatically, without any downtime.

What is most valuable?

  • Hassle-free implementation, no downtime required and no scaling issues at all.
  • Very user-friendly interface, easy to understand.

What needs improvement?

Reports. The default reports provided don't provide much insight.

For how long have I used the solution?

One to three years.

What do I think about the stability of the solution?

No stability issues.

What do I think about the scalability of the solution?

No scalability issues.

How are customer service and technical support?

I would rate tech support in the range of six to eight out of 10. Time to provide solution could be improved.

Which solution did I use previously and why did I switch?

There is no competition for this product, as no other product provides HIPS, host-firewall, and anti-malware together.

What about the implementation team?

Very straightforward and very easy to implement.

What's my experience with pricing, setup cost, and licensing?

Deep Security SaaS provides security for cloud-hosted servers for only INR 1 RS/hour/server.

What other advice do I have?

I would rate this product at nine out of 10. There is always a chance that it can be improved.

Go for it without any hesitation.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Jason Cradit
Director of Cloud Architecture and Security at a consultancy with 1,001-5,000 employees
Real User
It links directly to AWS to tell me if a new instance created is unprotected. When running reports, you see can whether or not your environment is covered.

How has it helped my organization?

It's made the security guy's life a lot easier. A lot of what it does is automated and it's simple. You put it into place and the security guy just uses it instead of trying to administer it.

What is most valuable?

The most valuable feature is the direct link to AWS to tell me if a new instance created is unprotected. That's just so valuable to me. When running reports, you see can whether or not your environment is covered.

It also has a full breadth of services that include not just antivirus, but also IDS/IPS and file integrity and vulnerability management. It's really meant for the cloud and is proactive on AWS.

What needs improvement?

I'd like to have the ability to manage heterogenous clouds so that, for example, AWS and Microsoft are protected with the same security patterns. It already does that, but I think they may have rolled it back recently.

Also, it has great IDS/IPS built in, but I'd like a way to visualize the traffic. This way, there's more of an artistic view of security and the ability to ask question about the data. That would be really beneficial.

What do I think about the stability of the solution?

We don't have any issues with stability. I will get alerts at times for problems that have already been addressed, but I wouldn't call that instability.

What do I think about the scalability of the solution?

I haven't hit any thresholds that tell me that it's not scalable. We just add servers and agents and keep going. As far as I'm concerned, it'll scale for anything.

How is customer service and technical support?

We had a little bit of trouble when we first implemented the tool. We couldn't configure something, but it was our own problem as we weren't reading the documentation. We ended up calling implementation support, and they were excellent. They were patient and walked us through the process. They didn't charge us a dime. Since then, we haven't had to use support other than providing our feedback to the product teams.

How was the initial setup?

The initial setup was pretty straightforward. We were novices to the cloud anyways, so we were struggling with some of the ideas. But I think that if you're acclimated with AWS, it's pretty straightforward. We were struggling to learn cloud concepts and we couldn't understand how to ping horizontal scaling versus vertical scaling.

What other advice do I have?

Think about it. It's for the cloud and not meant to be retro-fitted. You're not managing a core server and it's got elastic scalability up and down from a cost perspective. You just pay per agent. If you don't need a server anymore, you don't pay.

When you implement and install, really learn how to set up the dashboard. You have to have a good intimate knowledge of your environment. Take the time to learn the product; don't just plug it in because it's not meant for that.

Disclosure: IT Central Station contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Mohit Sharma
CTO at RightCloud Pte. Ltd.
Real User
Virtual patching makes it easier, and you are protected as soon as the patch is released

Pros and Cons

  • "For day-to-day efficiency, it provides a good dashboard, so our team can be active 24/7 instead of doing a lot of manual stuff. We just look at the dashboard, and it's all done."
  • "It needs to improve its integration with a lot of other products. This should be in the road map because we have a lot of SaaS-based appliances which are not connected with each other."

What is our primary use case?

It's used as a part of our managed solutions. Security is key for them because we have seen a lot of ransomware in the past. We do very well on security side, whether it is application network or a host-based security. This is one of the offerings that we offer to our customer by default.

As it is a core part of our managed services, it integrates with other products which revolve around patch management. We have our own IP which takes care of the actual patch management that we leverage. We also have a lot of monitoring platforms with a single, integrate dashboard taking the data from the APIs.

How has it helped my organization?

Previously, a lot of attacks happened. 

Sometimes, you have your files which you don't want anybody to change. With this product, you can monitor that very easily. Therefore, whenever someone tries to play with that file, you receive an alert.

For day-to-day efficiency, it provides a good dashboard, so our team can be active 24/7 instead of doing a lot of manual stuff. We just look at the dashboard, and it's all done.

What is most valuable?

  • Anti-malware
  • IPS
  • IDS
  • Prevention against the ransomware
  • File integrated monitoring
  • Virtual patching

Every module is important because it serves a different purpose.

Because a lot of vulnerabilities are coming out, we work with a lot of large enterprises using virtual patching. It is very difficult to patch, because you have to take approvals, and go through the cycle, as there is a proper process in place. However, if you have virtual patching, it makes it easier, and you are protected as soon as the patch is released.

What needs improvement?

It needs to improve its integration with a lot of other products. This should be in the road map because we have a lot of SaaS-based appliances which are not connected with each other. Thus, I'm looking forward to more integrations coming together as a part of the product.

Going forward, I would like to have more APIs and integration with more application monitoring intelligence platforms.

For how long have I used the solution?

More than five years.

What do I think about the stability of the solution?

Stability-wise, it is one of the best in the market. However, since a lot of innovation is happening, it comes with a lot of risk as well. Certain times, we have seen where a customer is being attacked irrespective of if the product was there. The reason is that patch is not available. While I know the team who works on it does a lot proactively, sometimes things get missed out.

What do I think about the scalability of the solution?

We have customers in five to six different regions, ranging from Japan, Korea, Singapore, India, and the U.S. We use it for a lot of our customers (about 90 percent). Their size ranges from 500 servers to thousands of servers. We work with a lot of enterprises, including Telco, retail, government sector, and media.

How is customer service and technical support?

We are very well-connected with our technical support. Most of our team is quite trained on the product. 95 percent of the time, our team doesn't need the technical support team's help.

How was the initial setup?

The integration and configuration in our AWS is user-friendly. When you work with enterprise, you have a multi-cloud strategy. We can deploy it in AWS and use it in other clouds as well. So, it is pretty robust.

What was our ROI?

In the case of ransomware, every time it happens, for every machine that you have, you have to pay something like $400 USD or more. With Trend Micro, you are paying a couple of dollars every month to save the environment, and you don't have to go into that part where you pay a hacker to get back your data. Therefore, it's a good ROI, though it's an investment.

What's my experience with pricing, setup cost, and licensing?

We are an original partner with AWS, so a couple of customers chose to directly take it from AWS Marketplace. A couple of customers will want us to take care of the billing. So, it's a mixed type of reaction that we receive from the customer. Eventually, for us, it matters that customers are secure.

The customers can deploy in their environment and the licensing model goes through our reseller.

The price is reasonably good as compared to other products into the market.

Which other solutions did I evaluate?

There are products, like Symantec, but Deep Security from Trend Micro is quite helpful for us. It is being absorbed by a lot of customers, whether they belong to an enterprise or the public sector. It is highly adopted.

We went with Trend Micro because it was more cloud native, the architecture was more on the high availability side of it, and it had the the implementation that we wanted.

What other advice do I have?

Do your evaluation well. After the core evaluation, choose what fits best for your customer.

I used to previously work with on-premise solutions and private cloud. Now, I work with AWS.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Tanweer Surve
Sr. Director, Enterprise Architecture & Cloud Technologies at Essilor
Real User
The file integrity and log inspection are game-changing features for us

Pros and Cons

  • "The file integrity and log inspection are game-changing features for us."
  • "They are still working on the company integration from TippingPoint because this was a recent acquisition from a few years ago. So, a Tipping Point integration with Deep Security, having one single pane of glass dashboard, would provide us a simple use case."

What is our primary use case?

We use Trend Micro Deep Security as a Service on AWS through Marketplace and Trend Micro Deep Security on-prem to meet our virtualization security & compliance requirements.

How has it helped my organization?

Besides increasing more visibility into data insight, I strongly believe we have not only reduced potential risks while gaining significant performance but also our investment costs was rightly justified.

What is most valuable?

The file integrity and log inspection are game-changing features for us. Provides deep data insights while meeting compliance requirements.

What needs improvement?

I'm currently evaluating TippingPoint. Trend Micro is still working on building tight integration with TippingPoint being a recent acquisition from a few years ago. So, a Tipping Point integration with Deep Security, having one single pane of glass dashboard, would provide us a simple use case.

For how long have I used the solution?

Three to five years.

What do I think about the stability of the solution?

well, we have had no hiccups. It's an awesome product.

What do I think about the scalability of the solution?

It's as scaled as it can get.

How is customer service and technical support?

The technical support is very helpful and geographically dispersed.

What was our ROI?

We have saved a 50% ROI for the on-premise product. It gave us significant improvement overall in productivity, costs, and efficiency.

What's my experience with pricing, setup cost, and licensing?

With AWS, we get single, consolidated billing. This is the beauty of it; its ease of use.

Purchasing on AWS Marketplace is like shopping on Amazon Prime.

We do pay-as-you-go pricing, which is good for us. We are working with Trend Micro to see if we can have something similar for on-premise.

Which other solutions did I evaluate?

After our move to virtualization was complete and its security woes were becoming evident, we began our search for a new security solution that could protect both its physical and virtual environments. After a three-month proof of concept with solutions from Gartner and Forrester’s top five security vendors, we selected Trend Micro Deep Security. “We wanted a solution that provided seamless integration with VMware vCenter management software and true agentless deployment. Deep Security for VMware was the only solution that really worked.

What other advice do I have?

We started with it on-premise, and now we also have it on the cloud to protect our cloud workloads. The cloud has all the features and functionality turned on by default, which makes it very easy and simple to use. This hosted solution means there's no set up or configuration and they handle all the product and kernel updates for us.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Swami Venkat
CTO at a tech vendor with 1-10 employees
Real User
We don't have to worry about intrusions

Pros and Cons

  • "It provides the type of data and availability that we need to have. We don't have to worry about intrusions."
  • "Trend Micro is not government certified or federal complaint. If they could become compliant/certified, this would make it easier for us to use it for our government projects."

What is our primary use case?

We are primarily using the product for IDS, IPS, and deep security.

How has it helped my organization?

It provides the type of data and availability that we need to have. We don't have to worry about intrusions.

What is most valuable?

  • They delivered what they said that they would.
  • The IDS and IPS features.

What needs improvement?

Trend Micro is not government certified or federal complaint. If they could become compliant/certified, this would make it easier for us to use it for our government projects.

For how long have I used the solution?

Three to five years.

What do I think about the stability of the solution?

I would give the product's stability a high rating. We trust the Trend Micro brand.

What do I think about the scalability of the solution?

We are not that big in size, so we haven't had any scalability issues.

How is customer service and technical support?

We are experiencing major technical support issues right now, and the technical support has been reasonable about fixing them.

How was the initial setup?

The integration and configuration of Trend Micro in our AWS environment was easy. We haven't had any issues with this at all.

What's my experience with pricing, setup cost, and licensing?

We did not purchase it through the AWS Marketplace because we have used Trend Micro in the past. We have not compared the pricing and licensing of buying it on the AWS Marketplace.

Which other solutions did I evaluate?

We also considered Pure Storage. In the end, we decided to only pursue Trend Micro because it is easier for us to install and use. The decision to use Trend Micro was based on cost, brand name, and ease of use.

What other advice do I have?

I would recommend Trend Micro. We are happy with them. In the current world, you have to earn the business because it is like a subscription, and they keep us happy.

We don't have Trend Micro integrated with any other product except for our internal cloud solution. We just use the AWS version of the product.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Dirty Blueshirt (Aaron S)
Principal Infrastructure Security Architect at S2 Global
Real User
We use it for managing application whitelisting, and intrusion detection and prevention for the CLOUD Act

Pros and Cons

  • "The integration and configuration of this product in our AWS environment was good. We haven't had any problems at all."
  • "The initial setup needs improvement, as it was a bit challenging."

What is our primary use case?

It is for managing application whitelisting, and intrusion detection and prevention for the CLOUD Act.

What is most valuable?

  • It is flexible.
  • The configuration is quite easy.

What needs improvement?

The initial setup needs improvement. Once it is set up, the configuration is relatively simple. However, the initial setup was a bit of a challenge.

What do I think about the stability of the solution?

We haven't had any issues with stability. It has been rock solid for us.

In the past year, it is still a fairly lightweight environment, so there has not been a lot of stress.

What do I think about the scalability of the solution?

Size of our particular environment is about 200 systems. The scalability has worked very well for us.

How is customer service and technical support?

We used the technical support for setting up profiles. Working with them was pretty good, they are extremely responsive and helpful.

How was the initial setup?

The integration and configuration of this product in our AWS environment was good. We haven't had any problems at all.

What was our ROI?

We haven't really seen ROI so far. Since it is a light traffic environment right now, the product hasn't had that many incidents to deal with yet.

What's my experience with pricing, setup cost, and licensing?

Our company chose to procure this product via AWS Marketplace due to regulatory requirements. We mostly use it in the AWS GovCloud.

Which other solutions did I evaluate?

I was not at the company when they evaluated the other products. I do know that they evaluated Symantec.

Trend Micro was selected because it has better whitelisting of applications, its intrusion detection was far superior, and it has configurability.

What other advice do I have?

The best approach is to start off with a node where it is sort of monitoring and looking at stuff, then work your way into the actual prevention and blocking. Because it can turn off a bunch of services without too much effort which can be good, but it can also shut things down.

We haven't really gone into the integration aspect yet.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
KK
DevOps Engineer at a financial services firm with 501-1,000 employees
Real User
Their support is good. They are responsive.

What is our primary use case?

The primary use case is its antivirus and anti-malware capabilities. We mostly integrate it with the EC2 instances.

What is most valuable?

Their support is good. They are responsive, which is nice.

What needs improvement?

I know that they are working on it, but their automation needs improvement. I would also like to see more containerization stuff, specifically Docker.

For how long have I used the solution?

One to three years.

What do I think about the stability of the solution?

It has been stable so far. We don't put a lot stress on it.

What do I think about the scalability of the solution?

It scales very well. We have around 2,000 instances running.

How is customer service and technical support?

Their technical support is great. …

What is our primary use case?

The primary use case is its antivirus and anti-malware capabilities.

We mostly integrate it with the EC2 instances.

What is most valuable?

Their support is good. They are responsive, which is nice.

What needs improvement?

I know that they are working on it, but their automation needs improvement.

I would also like to see more containerization stuff, specifically Docker.

For how long have I used the solution?

One to three years.

What do I think about the stability of the solution?

It has been stable so far. We don't put a lot stress on it.

What do I think about the scalability of the solution?

It scales very well. We have around 2,000 instances running.

How is customer service and technical support?

Their technical support is great.

How was the initial setup?

The integration and configuration of Trend Micro in our AWS environment seemed pretty seamless.

What other advice do I have?

Take it for a spin. Ask their support for a demo. The product is really solid.

We previously used the on-premise version. Now, we are using it on a SaaS environment (AWS). 

Disclosure: I am a real user, and this review is based on my own experience and opinions.
EX
Systems Administrator at Alfred Publishing
Real User
It is a reliable product, and we have one centralized place to look at threats.

Pros and Cons

  • "There is a degree of set it and forget it in regards to the actual endpoints and what you can do with the console, which is nice."
  • "If I had more reporting, the product would be an A plus."

What is our primary use case?

  • End users
  • Some servers

How has it helped my organization?

There is a degree of set it and forget it in regards to the actual endpoints and what you can do with the console, which is nice.

What is most valuable?

  • Its reliability: We have one centralized place to look at threats. 
  • The ease of installing it for users.

What needs improvement?

If I had more reporting, the product would be an A plus. Reporting is the one thing that we are sort of missing, especially with more log information. 

For how long have I used the solution?

One to three years.

What do I think about the stability of the solution?

I trust this product more than Symantec. Since we have installed the program, we have had no intrusions at all.

How are customer service and technical support?

They're tech support is on top of things. The few times when we had questions, they have gotten back to me quite rapidly.

Which solution did I use previously and why did I switch?

We have quite a bit of old servers that we are trying to migrate off of, and we had Symantec on them. Because of Symantec's logs, we were on the constant battle of always having to clean up the space, where when we put on Trend Micro on it, we didn't have to worry about that anymore. It has been easy to use. I can control it from the computer on my desk and not have to worry about it. I can push definitions, which has been easy to use as opposed to having to be on the actual user's computer.

How was the initial setup?

The integration and configuration of this product in our AWS environment was very easy.

What's my experience with pricing, setup cost, and licensing?

Purchasing on the AWS Marketplace was easy. We decided to purchase this solution on the AWS Marketplace since we were already there.

The pricing is fair.

Which other solutions did I evaluate?

There were three runners up when evaluating this product: Sophos, Symantec, and Trend Micro.

We chose Trend Micro for the following reasons:

  • Its smaller footprint.
  • It did not take up a lot of storage space. 
  • The agent was small enough to where you wouldn't even notice it.
  • The ease for the user to install it themselves. 
  • The actual web portal.
  • Cost: The price offered was decent compared to Sophos, which was extremely expensive.

What other advice do I have?

It integrates well with other products, e.g., we use it on user endpoints, servers, physical servers, VMware, and AWS. We use it on a lot of platforms.

Right now, we are using a cloud-based version, which I believe is the AWS version. We have the risk-free version which gives us a web format for us to push out programs to computer servers.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
SebastianFernandez
VP of Enterprise Architecture at Broadridge
Real User
IDS and IPS are its most valuable features

Pros and Cons

  • "Trend Micro gave our security teams a certain degree of comfort by just having it in the background, as they have familiarity with the product."
  • "AWS products could become more compatible with intrusion detection products leveraging help from Trend Micro."

What is our primary use case?

It's for security: IDS, IPS, intrusion detection, and securing our perimeter in general. E.g., OWASP rules.

How has it helped my organization?

Trend Micro gave our security teams a certain degree of comfort by just having it in the background, as they have familiarity with the product.

What is most valuable?

IDS and IPS are its most valuable features.

What needs improvement?

AWS products could become more compatible with intrusion detection products leveraging help from Trend Micro.  

For how long have I used the solution?

One to three years.

What do I think about the stability of the solution?

We have had no stability issues.

What do I think about the scalability of the solution?

Scalability hasn't been an issue.

We have different workloads, so it depends on if we're talking about development, QA, or the testing environment. They are all separate accounts. We have a central account to try to manage all of them. A lot of these type products, like Trend Micro, fit into these shared environments. 

Right now, we've got a few production workloads, but most of the workloads are still in development.

What about the implementation team?

Automation is a big part of everything that we do. The team setting it up would have had to set up Chef scripts and other things to make sure that we could automatically deploy. This would have been part of the configuration and management into the AWS environment.

Which other solutions did I evaluate?

We were looking for a tool to help secure our environment. There wasn't anything immediately available as an AWS native service, so we looked for a third-party tool which could do it. 

We would like to see more from AWS natively on the intrusion detection side.

What other advice do I have?

Take a good look at all the different options. If there are things which I think teams are familiar with, that always gives a product a bit of a leg up. This is not just from the perspective of the people who support and deploy the product, but even the security teams who may be already familiar with the product and know how effective it is. It gives them a lot more comfort seeing something that they have some background with.

Our company uses the on-premise and AWS versions. I work with the AWS version, and have been happy with it. I am seeing more of the end result of it rather than the infrastructure and security perimeter.

We decided to use AWS because it was something the teams were familiar with. Our teams, who are currently using Trend Micro, were already familiar with the product and wanted to make use of it in the cloud as well. It was just a matter of continuity.

It is integrated with a SIEM, security incident and event management, platform. A lot of the output which comes from Trend Micro, we fed into the SIEM system so the security teams and the monitoring teams have a single pane of glass view into all the security features of our environment.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Carlos Sampaio
HR Analyst Manager at Cesar
Real User
It is connected into an intelligence database and is quick to pick up new threats

Pros and Cons

  • "It is connected into an intelligence database and is quick to pick up new threats. It also reduces my workload with its speed and the protection that it provides."
  • "The working interface and the reports for non-technical people could use improvement. They are a bit scary."

What is our primary use case?

We use it for security, specifically for old servers still in the company. It is doing its job.

How has it helped my organization?

I have heard of a lot of threats coming from Europe, but they have never touched our company.

The reports are very extensive. They give us information about things that we are not expecting, such as number of threats that failed due to compromised servers.

What is most valuable?

It is connected into an intelligence database and is quick to pick up new threats. It also reduces my workload with its speed and the protection that it provides.

What needs improvement?

The working interface and the reports for non-technical people could use improvement. They are a bit scary.

For how long have I used the solution?

Less than one year.

What do I think about the stability of the solution?

It is very stable. We are not putting too much stress on it since we are scaling down.

What do I think about the scalability of the solution?

We have not had any problems with scalability. We have very few servers for it to protect. Instead of scaling out, we are shrinking the number of servers (scaling down).

What about the implementation team?

We hired a third-party to do the AWS integration and configuration. The reseller appointed them, and everything was done for us.

What's my experience with pricing, setup cost, and licensing?

On an AWS defined scope, it will cheaper than buying the on-premise service. We did a trial for the on-premise version, but we decided to go with the AWS version. We are downsizing our server room, and it didn't make sense to put more machines in there, as we already have workloads in Indianapolis. 

Which other solutions did I evaluate?

We already use Trend Micro for their endpoint protection. Therefore, we selected them for their server product because we liked their endpoint protection product. The process took a week to ten days. 

What other advice do I have?

I would recommend it. I have been satisfied, as it is a good product.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Vinod Shankar
Manager, Enterprise Risk Consulting at a tech company with 1,001-5,000 employees
Consultant
Provides AV, file monitoring and log collection in a single agent.

What is most valuable?

It is lightweight and provides a multi-platform for the client. It combines host intrusion prevention and provides AV, file monitoring, log collection, etc. in a single agent. There are a good signature set and a high rate of detection. It is one of the best client protection available for cloud computing.

For how long have I used the solution?

I have used this product for three years.

What do I think about the stability of the solution?

Installation and operations may have issues on some machines owing to their configuration of the network cards as the product is a DPI driver. The typical client-server issues exist as with any other product.

How was the initial setup?

The setup is simple as the agent provides a feature called as the Recommendation…

What is most valuable?

It is lightweight and provides a multi-platform for the client. It combines host intrusion prevention and provides AV, file monitoring, log collection, etc. in a single agent.

There are a good signature set and a high rate of detection.

It is one of the best client protection available for cloud computing.

For how long have I used the solution?

I have used this product for three years.

What do I think about the stability of the solution?

Installation and operations may have issues on some machines owing to their configuration of the network cards as the product is a DPI driver. The typical client-server issues exist as with any other product.

How was the initial setup?

The setup is simple as the agent provides a feature called as the Recommendation Scan. This scans the profiles of the host computer and provides recommendations on the appropriate signature and the policies to apply.

The installation of the agents, subsequent patching of the agents, etc. can be automated, thereby reducing the management overhead.

Which other solutions did I evaluate?

We evaluated McAfee and Symantec.

What other advice do I have?

If you are looking for an all-rounder for endpoint protection, then don't look any further than TM Deep Security.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Jusiah Noah
Co-Founder at a tech services company with 51-200 employees
Real User
Top 20
It's enabled us to protect our enterprise applications and data from breaches and business disruptions without emergency patching.

What is most valuable?

Working mostly with the virtual security data center (the server security platform) feature has been crucial in day-to-day businesses of the company because we're in data center services.

How has it helped my organization?

It's enabled us to protect our enterprise applications and data from breaches and business disruptions without emergency patching.

Not only do these benefits reduce both capital and operational expenditures, but they also provide resource agility that promotes business innovation and growth.

What needs improvement?

They need to improve their perimeter detection and tenancy.

What was my experience with deployment of the solution?

We haven't had any issues with deployment.

What do I think about the stability of the solution?

We've had no issues with stability.

What do I think about the scalability of the solution?

We've had no issues with scalability.

How was the initial setup?

The setup is easy, as is the configuration.

What other advice do I have?

With the changing tech world, with competitors not sleeping as time is money, simplified management is very crucial to my business.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
it_user339417
Network Administrator at a financial services firm with 1,001-5,000 employees
Vendor
Having centralized malware is practical. There should be a way to migrate without having to uninstall prior antivirus products.

What is most valuable?

Having centralized malware is very practical, but there should be a way to migrate without having to uninstall prior antivirus products.

How has it helped my organization?

Centralizing rules is practical and greatly accelerates the administration.

What needs improvement?

They should improve the interface of the main dashboard. It is difficult to find where templates define policies. Also, if you are not careful, your policy implementation can lead to management problems. It should have warnings before applying policies. They also need to improve its dashboard to help monitor the rules that are incorrect or are duplicated.

For how long have I used the solution?

We’ve been using it for one-and-a-half years.

What was my experience with deployment of the solution?

The product should have a strategy for installation. Prior to installation, the vendor should advise on a logical design of installation depending on the customer’s needs. In my case, it was not successful and produced serious inconveniences in our virtual infrastructure.

What do I think about the stability of the solution?

There were some stability issues in the virtual infrastructure due to issues with the deployment.

What do I think about the scalability of the solution?

We have had no issues scaling it for our needs.

How are customer service and technical support?

The level of technical support is just regular. They failed to advise how to carry out the setup and this caused serious drawbacks with interoperability between virtual machines. The consultant was not certified enough for installation to the point that after the installation, we lost money fixing the issues.

Which solution did I use previously and why did I switch?

I was the one who installed the solution, as well as charged with maintaining it. Also, I'm the ESL tester who creates policies and installs them.

How was the initial setup?

It is complex to install. As I said, we were not well-guided, we did not get certified support, and we weren't trained according to best practices.

Which other solutions did I evaluate?

We did not evaluate anything else.

What other advice do I have?

Prior evaluations of possible scenarios have resulted in determining problem areas as well as good practices. Also, it should be clear the level of integration with VMware and its different versions. My advice would be to have the most updated versions of ESXi, vCenter, vShield, etc. It's fundamental to have a network or network segment for the administration and management of all infrastructure.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
ITCS user
Tech Evangelist at a tech services company with 501-1,000 employees
Consultant
We can extend the security of the datacenter to cloud using API integration in a single management console.

What is most valuable?

Virtual Patching (part of Integrity Monitoring module) is the most valuable because it shields vulnerabilities in critical systems until an actual patch is available and deployed reducing the downtime, and protecting unpatchable systems extending the life of legacy systems and applications. Also, the possibility to know which files have been changed in the host machine.

The possibility to extend the security of the datacenter to cloud using API integration to AWS, vCloud, Azure and others in a single management console is also valuable.

How has it helped my organization?

In the past, we had to search for a window of time to patch the OS and some applications and it took a long time up a virtual machine and make it available for our needs because its update process was very slow. Now, we don’t have to wait for this process because when we need a VM we can just boot one up and run and patch the VM at an opportune time.

We use it to help a large payment company in Brazil to process millions of credit card transactions a day, and others company with similar challenges.

What needs improvement?

It needs real-time anti-malware support for Amazon Linux and an option that allows you to classify and mark reports using tags like Top Secret or Confidential which are missing in Deep Security 9.5 but are in v9.6, which was released in January. We're still homologating 9.6 version with this new feature.

An improvement on its Control Manager integration is also needed because it's insufficient for individual and granular management. Control Manager is a console that integrates all Trend Micro products.

For how long have I used the solution?

I've been using it since it was first released in 2010 and have used it in two different ways. At my own company, it's used to protect about 40 VMs on two hosts using VMware. It's also used for installing and supporting 36 clients over 250 servers and millions of transactions per day.

I'm one of the founders of company and I've been working as a technician from the beginning, my role was design, deployment planning and pre-sales support until the end of the last year with our support team. Now, I'm dedicating my time to executing our vision as CEO.

What was my experience with deployment of the solution?

We have had no issues deploying it, especially when following the guides.

What do I think about the stability of the solution?

It has been stable in our deployments.

What do I think about the scalability of the solution?

We have no issues scaling it when we need to.

How are customer service and technical support?

Trend Micro has a Channel Partner ecosystem highly prepared to solve any questions and they work very closely with Trend Micro support services to deliver the best experience to their customers.

Which solution did I use previously and why did I switch?

We did not have anything in place previously.

How was the initial setup?

The deployment depends on how you set up your VMware environment and what features you’re using. Following the steps described in the Administrator and Deployment guides helps you to avoid any complications.

What about the implementation team?

The implementation team was formed with inside analysts and vendor specialists. It's strongly recommended to use someone with the necessary skills to work with VMware and have someone familiar with infrastructure and security analysis.

What's my experience with pricing, setup cost, and licensing?

Start with a small group of servers and the most important modules for your company. Depending on the way you buy the product, you have the benefit of renewing discounts up to 50% in the next year.

What other advice do I have?

It's a hybrid platform with about five modules that will help you to manage and secure your datacenter and cloud initiative with multi-platform support. To get the same solution, you may have to contract at least four different vendors.

Disclosure: My company has a business relationship with this vendor other than being a customer: We are a Trend Micro Gold Partner from Brazil. We were the first company to sell this product in Latin America six years ago.
it_user402825
Server Manager at a healthcare company with 1,001-5,000 employees
Vendor
The modules that are included with it will help us displace the local anti-virus that we're currently using.

Valuable Features:

The modules that are included with it will help us displace the local anti-virus that we're currently using today.

Room for Improvement:

There are a couple of areas for improvement. It needs better support for Mac, and there are some challenges in its implementation.

Unfortunately, the relationship with VMware that Trend Micro has, prohibits us from continuing our use of the non agent-based solution as NSX is now required to go forward from version 5.5 to version 6. NSX has now become a necessity to go with agent-based, so we're moving to an agent-based solution on the VDI's and our server-based as well.

Use of Solution:

We've used it for four years.

Deployment Issues:

There's an ongoing, continuing education process that needs to be in-sync with your Trend Micro staff. It's not a total set-it-and-forget-it type of solution. You need to continually manage and maintain it.

Stability Issues:

We're experiencing some instability, but my understanding from VMware and Trend Micro is that there's a relationship being built. They're pursuing a strategy to come up with perhaps a light version of NSX.

Scalability Issues:

We've had no issues with scalability.

Implementation Team:

I was involved in the setup from a managerial perspective. I contracted with Trend Micro support to provide us with implementation support.

Other Solutions Considered:

We've looked at McAfee, Kaspersky, and Symantec.

My team specifically looks at what's there on a regular basis. We work closely with the security team to be sure that we are making a good, conscious choice on an annual basis.

Other Advice:

It's important that you get a baseline of training, then partner with Trend Micro, whether it's an engineer pre-sales or an engineer that's implemented the product before. Be certain that your staff have the steering wheel and Trend Micro are the ones helping you navigate through the solution.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
it_user400656
Security Practice Director at Rolta AdvizeX
Consultant
It makes controls available to consultants and security architects in the new, software-defined datacenter and traversing up into the cloud.

Valuable Features

Deep Security is a really innovative security solution in the world of software-defined data centers and in the NSX space. It makes controls available to consultants and security architects in the new, software-defined datacenter and traversing up into the cloud. It's optimized to support security for virtual desktop infrastructures.

Room for Improvement

It's not a well-recognized solution and there's not much buzz around it in the marketplace. When I speak with an auditor about what Trend Micro is doing to cover my compliance footprint, it's not well-understood. That's where the challenge lies.

Stability Issues

There were some initial challenges with it, those in my experience have all been worked out, and it's a very stable solution now. We're working on taking it out, we do a lot of consulting in an NSX space, with software-defined networking, and we're taking Trend Micro out to all of our customers.

Scalability Issues

It works in relatively small scenarios, and up to the biggest scenario that I can imagine.

Customer Service and Technical Support

Never had an issue with Trend Micro support. It's fantastic.

Initial Setup

It's in a complex technological space, typically proposed into NSX or cross-hybrid cloud scenario. There are a lot of moving parts and it's a challenging space to implement technologies and controls, but I think Trend Micro does it well.

Other Advice

The important thing that I would encourage people to look at with Deep Security is how it plays with Endpoint, how it plays with your particular software-defined data center or hybrid cloud, and make sure that you understand where the capabilities are available to you. Because for most people it's surprising that Trend Micro can do all the things that it can.

Disclosure: My company has a business relationship with this vendor other than being a customer: We're partners.
it_user400725
Enterprise System Administrator at a healthcare company with 1,001-5,000 employees
Vendor
It's agile, flexible, and performs multiple tasks simultaneously. We're able to do firewalls, IPS, and log inspections with it.

Valuable Features

The comprehensive agility is the most valuable feature. It's very agile and flexible, and performs multiple tasks simultaneously very effectively. We're able to do firewalls, IPS, and log inspections with it.

Improvements to My Organization

It's very difficult for an enterprise, especially one of our size, to patch effectively at all times. The IPS helped us with this. Oftentimes, there's a delay between discovery of malicious threats and production of patches. The IPS allows us to virtually protect against those threats before true patches can be applied to our inputs.

Room for Improvement

Deep Security is a fantastic product but there are certain little details that could be tweaked or improved to make it a ten.

VMware and Trend Micro are pursuing a strategy to develop a light version of NSX that will allow us to run it agentlessly.

They also need to offer support for Apple machines. Almost every vendor I've seen, they're all junk. For Trend Micro to take a step either with their office-end product or with Deep Security to actually protect Macs, that would be a huge game-changer for iOS.

Use of Solution

We've been using it for three years.

Deployment Issues

We've had no issues with deployment.

Stability Issues

Overall, I'd say the product is very stable, both agentless and agent-based. Agentless is less stable due to the nature of how many moving parts have to be working and in place for the whole system to work effectively. However, moving forward with the relationship with VMware, agentless protection is not going to be possible without VMware NSX setup with the environment.

Scalability Issues

Our organization has 1,500 servers and 18,000 endpoints -- and it's growing.

Customer Service and Technical Support

Trend Micro has excellent technical support.

Initial Setup

Starting off with agentless, it was complex. With agentless, you have a lot of moving parts and they all have to be in-sync and working together for the whole system to work. It adds a level of complexity with vShield, the DSVA's, and all the different moving parts.

Other Advice

Come up with a solid working plan before you even think about actually implementing anything. The foundation is all in the preparation, the education and the project management.

No product is perfect. Deep Security is a fantastic product but there are certain little details, I think, that could be tweaked or improved. Do your homework, engage Trend Micro, get trained, get all the knowledge you can and come up with a solid working plan before you even think about actually implementing anything.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
it_user386796
Epic Client Systems Manager at a healthcare company with 1,001-5,000 employees
Vendor
It's agentless, meaning we can implement it without having to protect every guest at a guest-by-guest level.

Valuable Features

The most valuable feature for us is that it's agentless, meaning we can implement it without having to protect every guest at a guest-by-guest level. That's huge for us.

Improvements to My Organization

Everything on our ESXi host is protected and we don't have to worry about pushing an anti-virus to individual guests. All we have to do is activate Deep Security in the console and we're set.

Room for Improvement

There's a little room for improvement as far as being more concise with the error messages. It's a small thing, and maybe that's coming in a newer version. Better notifications would be nice, such as error messages that a particular ESXi host is not protected properly.

If there's a problem, you have to drill down manually. You have to click and click and click to see what the message is. It would be nice to have a more transparent meaning instead of having to click so much to get to different levels.

Use of Solution

I've used it for six months.

Stability Issues

We did have one issue where the signature files we received were not valid files. It caused the host to continuously try to scan, causing a performance issue. We had it resolved within a couple of hours by powering up our Deep Security appliances until we got the proper update. Then we were able to move on.

Customer Service and Technical Support

Customer Service:

Mike Horton is our account rep. He and technical support work as a team. We all work well together.

Technical Support:

Technical support is where Trend Micro really shines. They're not a big group, which is great because you feel like you're not just a customer, but also a partner in the product. You really feel like they're interested in making sure you know how to work the product to its full potential.

Other Advice

Be involved with the installation so that you really get a feel for what the product's doing. If they provide any support or any training, definitely attend that. It is an intuitive product but there's a lot of moving parts. You're doing virus scanning so you definitely want to make sure you understand what you're doing because if you do have an issue, it’s very important piece of your infrastructure to make sure you're protecting your server.

Disclosure: IT Central Station contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
it_user382038
Senior Consultant at a tech consulting company with 51-200 employees
Consultant
There are several valuable features -- it's agentless, each module can be installed on its own, and it provides a single pane of glass for managing it.

What is most valuable?

There are several features I find valuable, including the fact that it's agentless, each module can be installed on its own, it provides a single pane of glass for managing it, its integration with VMWare (NSX), and items are auto-added as soon as they're discovered. Ease of use is a big plus because of the foregoing items.

How has it helped my organization?

We were having some AV issues around 2010 and the incumbent product had gotten big and clunky and was interfering with several desktops performance. When the solution let 3 viruses in over a few weeks I deemed it no longer suitable and we chose Trend Micro Deep Security as the replacement.

Right from the start it was easy: the installation routine very kindly sought out and removed the previous solution, greatly reducing deployment time (we implemented OfficeScan first) and DS uses auto discovery. Updates are automatic and run smoothly in off hours (except for pattern updates of course).

The Trend Micro solution was stable after a few tweaks and was instrumental in stopping an incursion of ransom ware that could have brought the company to its knees. Instead we had only a few file directories encrypted and we were able to restore those in about a day. We spend way less time on AV issues since implementing Trend Micro Deep Security.

What needs improvement?

There are several areas for improvement:

  • The ability to manage agent-based AV (i.e. integrate Officescan into Deep Security) for desktops and laptops;
  • Streamline the install (specifically configuring of external product requirements i.e. the VMware side); and
  • Better integration with Control Manager (had a few issues with it not recognizing the DS server).

For how long have I used the solution?

I've used it for over five years.

What was my experience with deployment of the solution?

Deployment went surprisingly smoothly. Mind you we had a Trend Micro tech (Trevor) do the initial config.

What do I think about the stability of the solution?

We've had no issues with stability.

What do I think about the scalability of the solution?

We've had no issues with scalability, but we're not a big shop (under 200 VM’s).

How are customer service and technical support?

Customer Service:

Trend Micro's service has always been one of its strong points. I don’t particularly like the online case management tool, but response has always been good. Local support is stellar (Vancouver, Canada area) – both reps and support techs.

Technical Support:

Technical support is excellent. A Trend Micro tech was always available to me locally and this helped reduce the time-to-resolution of the few issues that came up.

Which solution did I use previously and why did I switch?

Yes, we used Symantec. We found it was getting a larger footprint in memory and was starting to cause performance issues. When it failed to stop viruses 3 times in 3 weeks, I had enough. On all counts, Trend Micro is a superior product with superior people, and I have never regretted the switch.

How was the initial setup?

It was a fairly standard install as we were not a large data centre. Trevor (then Martin) – both local Trend Micro techs - took about a day to get it all settled down. Over the next month, I made several support calls but mostly because I did not yet have the experience with it. After a month or so, I no longer needed the support.

What about the implementation team?

The install was done by a Trend Micro tech (Trevor) and later supported by Martin Sima. Both are excellent fellows.

What was our ROI?

I'm not exactly sure what our ROI is as we did not quantify it. But I can say that supporting our users got a whole lot easier and we had a significant reduction in time spent on AV issues at the desktop. Management was easier (auto add new VM’s, etc.) and Control Manager provided reports for my bosses.

What's my experience with pricing, setup cost, and licensing?

Trend Micro now does certificates and this made getting certs easy and fast. Pricing was competitive, although I have not looked at pricing recently. Licensing was also easy as each additional module could be licensed separately.

Which other solutions did I evaluate?

I was pretty aware of the market in 2010. I knew Symantec was not doing the job anymore and I had used Trend Micro in a previous life and knew the OfficeScan product. I also considered Sophos as they have a large local presence. I do not ever want McAfee again (bad experience back in the ‘90s). And I didn’t trust the Russian product.

What other advice do I have?

Make friends with your local rep and support tech – they can help you over the gotchas and issues that invariably arise with a new implementation. There is lots of online training also from Trend Micro. And classroom courses are available; I took the Deep Security course in Ottawa the first year we had it.

Disclosure: My company has a business relationship with this vendor other than being a customer: The vendor was Trend Micro direct. And I have a very good relationship with TM: I was invited by TM to speak on a panel at VMWorld 2014 about DS integration with VMWare (NSX).
it_user380925
Program Manager / Enterprise Services at Entertainment Partners
Vendor
​The most valuable feature for us is moving the AV scanning engine to the hypervisor and removing it from the virtual machine.

What is most valuable?

The most valuable feature for us is moving the AV scanning engine to the hypervisor and removing it from the virtual machine. We also use the compliance reporting (reporting in general) feature.

How has it helped my organization?

It's given us a significant reduction of CPU/memory footprint required to run traditional AV products inside a virtual machine (VDI).

What needs improvement?

I'm not sure how this product could improve, although we did have some compatibility issues between it and versions of vSphere.

For how long have I used the solution?

We've used it for 13 months.

What was my experience with deployment of the solution?

During deployment, we had the issue of compatibility between vSphere and Deep Security.

What do I think about the stability of the solution?

The stability issue we had was with regard to vSphere.

What do I think about the scalability of the solution?

We had no issues with scalability.

How are customer service and technical support?

Customer Service:

Customer service was initially very poor, but once we reclassified our account from mid-size to enterprise, the support was very good.

Technical Support:

Technical support is above average.

Which solution did I use previously and why did I switch?

We previously used Symantec SAV, but it was too heavy for VDI.

How was the initial setup?

Our initial setup was somewhat complex and required a significant interaction with Trend Micro support. This is a very new concept of taking the AV engine outside the VM and it took us some time to feel comfortable with the whole idea. It also required some deep understanding of how Trend Micro Deep Security “embeds” into a VMware environment, and that was not a easy task to master.

What about the implementation team?

We did the initial setup with our in-house team with significant help from Trend Micro technical support. I'd rate them very poorly because they completely missed the compatibility with vSphere issue. It took us a lot of time to fix the entire mess.

What was our ROI?

Our ROI is still unclear, but I'll have more details once the entire enterprise is moved to Trend Micro Deep Security.

What's my experience with pricing, setup cost, and licensing?

Get a good reseller (our original VAR, MicroAge, had a difficult time clarifying some of the licensing vs. maintenance costs).

Which other solutions did I evaluate?

ESET and Symantec

What other advice do I have?

Make sure your VMware SME is plugged in from the very beginning, do a limited low-level impact POC, and plug into the Trend Micro user community.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
it_user369318
Supervisor with 1,001-5,000 employees
Real User
The most valuable feature for us is the fact that we can control what the PC or server is doing protection-wise, even remotely.

Valuable Features:

The most valuable feature for us is mainly the fact that we can control what the PC or server is doing protection-wise, even remotely. We use this protection feature all the time.

Improvements to My Organization:

The main benefit it provides us is that it will show what the issues might be and it's scalable. It allows us to know that if we have an issue somewhere on one device or endpoint, we can correct it or get down to a level where we can find out what the problem is. For example, we can apply exclusions to set policies for a certain type of group that can scale for a lot of environments, whether it's Linux or Windows servers or Windows 10 endpoints.

Room for Improvement:

I'd like to see some sort of database out-of-the-box. Deep Security uses its own database, with which we have some issues, but we just go right to SQL or another database. Right now, the standard database as to be converted to SQL or Oracle, but that's something that should be out-of-the-box standard.

Use of Solution:

We've used it for four years.

Deployment Issues:

We've had no issues with deployment, other than the database issue.

Stability Issues:

We had one failure, but it came back up within twenty minutes, so we've really had no downtime.

Scalability Issues:

Yes, it's been scalable. In the coming year, we're going to be testing many more policies and deploying it out in our system.

Initial Setup:

The setup was a little complex on the security side. But the endpoints -- desktops, laptops, were pretty easy. The server environments were a little more complicated and in-depth.

Implementation Team:

We implemented with a vendor team.

ROI:

We very much have an ROI, and although I don't have numbers, I can see that we've been able to catch problems before they happen.

Other Advice:

Make sure you perform thorough testing as there were different situations that came up for us that we didn't account for. I think that a POC would really be worth the investment because you can find out what the structure can do and what it can't. That's really important.

Disclosure: IT Central Station contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
it_user378123
IT Security Analyst - Systems Administrator at a consumer goods company with 1,001-5,000 employees
Vendor
The anti-virus module, the firewall module, and integrity monitoring are the most valuable features for us that we use daily.

What is most valuable?

Of course, the anti-virus module, the firewall module, and integrity monitoring are the big ones for us. They're the most valuable features that we use daily.

How has it helped my organization?

It’s protected our network from viruses, and it’s done a really good job with that. It’s allowed us to set up business rules and notifications on changes to our operating systems and our firewall rules, which is a big piece of our business right now. It’s working really well.

What needs improvement?

I would like to see a little bit of better means of agent distribution. The ability to deploy agents maybe from the solution itself that would be a good one.

I’d like to see more of a database involved with integrity monitoring, a database that would be developed to identify some of the more well-known processes and files, trends, etc. Anything that would help me do less research would be an improvement.

For how long have I used the solution?

I've used it for one year.

What was my experience with deployment of the solution?

There were no issues with the deployment.

What do I think about the stability of the solution?

I would say it’s probably 8 or 9/10. The server operating systems are probably a 9/10, the agent installations on our work stations and servers are an 8 or 9/10, and finally on our laptop computers/remote users the number goes down a little to a 7/10 for stability.

What do I think about the scalability of the solution?

Scaling it has been fine as we haven’t done a whole lot but it seems to handle everything we need it to do. If we doubled in size tomorrow, I’d say it could handle it because the product has the availability to have more than one server with the cost remaining the same. I’d say scalability is very good.

How are customer service and technical support?

I’d say they are very good, very knowledgeable, and very proactive. It's all good.

Which solution did I use previously and why did I switch?

I would say it was pretty straightforward. We have a complex network, so if it was complex, it was because of us.

How was the initial setup?

We had an engineer come out and spend a week with us to help everything run smoothly.

Which other solutions did I evaluate?

I wasn't involved with the process, but I know we looked at a number of other solutions. I know, however, the reasons they went with this solution is because of its compatibility with VMware, which was one of the big factors. Also, the cost was a deciding factor.

What other advice do I have?

I would say that before Trend Micro comes out to install the product, you need to come up with a plan with the product. That could be anti-virus and a good plan of how you want anti-virus to work on your work stations, computers, and servers. I shouldn't just say anti-virus, but also firewall protection, integrity, what exclusions do you want. You want a good plan for each system and that will make the installation much faster. If you have to go back when the person is with you and try to figure it out as you go along, it will slow you down. Get a good plan.

Disclosure: I am a real user, and this review is based on my own experience and opinions.