How do you or your organization use this solution?
Please share with us so that your peers can learn from your experiences.
We primarily use the solution as a firewall and for endpoint protection. It's used for security purposes for the most part. We use it for protection.
We are using this solution for network security.
We are integrators. We work on integrated systems. Our clients use this solution to know what is happening in the network and to analyze it.
The primary use case of this solution is to protect the equity, command, and control and botnet infections.
Normally we use the solution to send the traffic. We get traffic on it and once I get the traffic, I get the SPN diagnosis and all the network services diagnostics and whatever else that I run in the office file server. It scans through that. For example, when we download some files, in our portal we are uploading some of the activity documents, as well as Excel and Word documents, etc. They get scanned through and we have DDI Rules that are enabled for the file management. Basically, any uploading, downloading, etc. of items from our website server get scanned and analyzed.
We use the onsite version, not cloud. Our primary use case is for intrusion detection, including threats, malware, and basically anything that might be a threat. Traffic that is intercepted from emails going outbound or inbound is also analyzed.
I work for a distribution partner company. We use the on-prem, physical model of this solution.
I would like to know if Trend Micro Deep Discovery Inspector is a good intrusion detection and prevention tool. Any feedback?