Try our new research platform with insights from 80,000+ expert users

Kaspersky Anti-Targeted Attack Platform vs Trend Vision One comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 9, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Kaspersky Anti-Targeted Att...
Ranking in Endpoint Detection and Response (EDR)
57th
Average Rating
6.6
Reviews Sentiment
6.1
Number of Reviews
6
Ranking in other categories
No ranking in other categories
Trend Vision One
Ranking in Endpoint Detection and Response (EDR)
4th
Average Rating
8.6
Reviews Sentiment
7.2
Number of Reviews
69
Ranking in other categories
Network Detection and Response (NDR) (3rd), Extended Detection and Response (XDR) (5th), Attack Surface Management (ASM) (2nd), AI-Powered Cybersecurity Platforms (3rd)
 

Mindshare comparison

As of April 2025, in the Endpoint Detection and Response (EDR) category, the mindshare of Kaspersky Anti-Targeted Attack Platform is 0.1%, up from 0.1% compared to the previous year. The mindshare of Trend Vision One is 2.9%, down from 3.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Detection and Response (EDR)
 

Featured Reviews

Muhammad Ali Aziz - PeerSpot reviewer
A cost-effective solution for endpoint protection and EDR
The Kaspersky Anti-Targeted Attack Platform is designed to detect various attacks, such as Mitraframe, and provide alerts for each attack technique and procedure. It also offers alerts for potential threats and conducts thorough analyses through its sandbox environment, which isolates and executes malware or unknown files within virtual machines. This allows for real-time threat detection and feedback on potential threats. The platform is a SOC tool and thus requires skilled resources for effective operation, as it involves both automation and manual understanding of attack scales. Third-party intelligence integration enriches the alert system but may lead to occasional false positives, which can be fine-tuned through exclusion options and custom rule creation. The platform offers extensive customization options, allowing users to create rules specific to file detection or PowerShell activities. It provides visibility into telemetry data, enabling comprehensive monitoring of environmental activities. Integration with frameworks like Mitraframe helps tailor policies and rules to suit specific environments. The platform competes with products like FireEye, Snowflake, and Trend Micro. Integration between Kaspersky and other products is seamless, allowing unified threat detection. It is a solid choice for enterprises seeking advanced threat detection capabilities in the Middle East. Overall, I rate the solution eight out of ten.
DavidBowman - PeerSpot reviewer
It improves the detection speed, but it could be more customizable
They need to stop changing Vision One once a week. They're in a hurry to change things so badly and so fast that I can't find where stuff is half the time, which is a challenge sometimes. I've given one piece of feedback to their product guys. One thing that they're trying to make is a SIEM. It's a product where you input all the logs from your tools, and it creates additional insights into how things look. They've been kind of playing the "me too" game on that, even though that's not what I bought the product for. They have a new gateway where I can take my firewall of email logs and send it over there. In theory, it's supposed to do a more comprehensive evaluation of all my stuff to improve that risk index score. I'm not impressed with it, and I've told them as much. I feel if you're good at something, you should keep working on that and not try to be all the things to all the people. I bought a different email solution even though it would have been 10 times easier to just stay with their email solution because they aren't great at it. They are great at other things, but they're playing the "me too" game with some of their products. Their competitors do this, so they should be doing this, too. They need to pick a product and keep being good at that. If they're going to roll new things out, they should do it but do it right. They have a button to isolate an endpoint because it looks bad, but it doesn't usually work. I've had no chance to argue with the product guys to show them examples of how their button doesn't work. You think it does, but it doesn't work in a real environment. That can be a challenge sometimes. I can see in the data showing what is a false positive. But it doesn't save me time helping them figure out how to fix the problem in their engine. It can help me identify it as a false positive, but it doesn't apply that consistently. It will ignore the false positive for that device, but if they start detecting a false positive on Apple devices, I have eight thousand Apple devices and get 8,000 alerts. I can tell that specific false positive, but it doesn't learn from that particularly well. We use the executive dashboards, but I don't find them particularly useful. One is the ability to customize. That has gotten a little better, and it'll be better in the future. Most of what they have on there are data points that are generic and not particularly actionable. That's why it's called an executive dashboard. Executives want to see if we are secure, but it's hard for me to find out why our attack surface risk went down by x percentage. I don't know. It says that on the dashboard, but it doesn't give me specific details about why. I find it confuses my executives, and it's not useful for me because it doesn't give me things to work on. It will give me generic things on the executive dashboard like you have a thousand accounts with an old password. Those are big generic things, but I also can't tell it that our password policy is different from what your automatic detection model means, and I don't have a problem with that, so quit lowering my risk score. The risk score is useless. In theory, it's based on the random intelligence they're getting from their various customers. I'm in K-12 education, so they have a decent amount of K-12 customers, but it's a subset, and the baseline of what's common in K-12 education is not the same. There's not enough data to make that particularly clean or useful. Vision One is not custom, and that's part of my beef. That index score is based on whatever random report they're looking at from their data sources at any given moment in time. It's nice, but I'd rather have one that's based on your particular circumstances. Instead, it's saying that the number one attack threat surface for school districts is email phishing. It's too generic.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable use is detailing metadata collection from the endpoint and network."
"I feel the anti-ransomware update is one of the tool's valuable features."
"The solution is very easy to use. Its interface is very simple, and you can build IOC's indicators. You can use your rules to detect these attacks because you can leverage threat intelligence. Y"
"The product's deployment phase is easy."
"Kaspersky Anti-Targeted Attack Platform is stable and runs all the time."
"The email security feature is really good."
"Its threat intelligence sources enable it to automatically block domains known for command-and-control callbacks, effectively preventing attacks from those sources."
"The organizational view simplifies management and improves visibility, helping us identify areas for action."
"The integration is also nice because there are many external tools that we can connect to the platform, such as configuration management tools. Because the platform is integrated, I can manage almost the whole company across our global organization."
"It helps us with investigations."
"We can scale the product as needed."
"For our day-to-day use cases, the correlation and attribution of different alerts are valuable. It is sort of an SIEM, but it is intelligent enough to run the queries and intentionally detect and prioritize attacks for you. At the end of the day, it is different data that you see. It correlates data for you and makes it meaningful. You can see that someone got an email and clicked a link. That link downloaded, for example, malware into the memory of the machine. From there, you can see that they started moving laterally to your environment. I quite like it because it gives visibility, so Workbench is what we use every day"
"The workbench alerts provide valuable insights into attack chains and relevant information, while Observer techniques give a comprehensive overview of ongoing activities."
"It has good vulnerability protection."
 

Cons

"The blind spot or gap in the platform is network analysis functionality."
"In some of the places I have come across, even though they use Kaspersky, the ransomware enters their system."
"I think the tool is still not really good enough for integration compared to other products."
"The solution lacks cloud integrations."
"The backup and recovery features of the product are not good."
"Kaspersky Anti-Targeted Attack Platform is not a good product. We had problems with endpoints and the solution did not detect it. We didn't get any alerts about the attack."
"It should integrate with more tools. There are a lot of tools that can do the PTP dump."
"The solution only supports Windows and Mac. It would be helpful if it could support other OS, such as Linux."
"The zero trust is a bit complicated compared to other parts of the solution."
"A room for improvement in Trend Micro XDR is more visibility into the alerts. We do get alerts from the solution, but when we are away, we need to have more visibility."
"I believe that the interface could be more user-friendly. At times, it is challenging to locate certain features, and they need to reorganize the user interfaces."
"We do use the automation capability a little. However, we noticed some limitations, especially on the playbook side."
"It would be great if there were Trend Micro products that could enhance the security of these devices, either as part of our product or in some other way integrated into our offering."
"The reports lack detail and customization options, particularly for XDR, which hinders our ability to provide tailored reports to clients."
 

Pricing and Cost Advice

"The solution has competitive pricing."
"Kaspersky Anti-Targeted Attack Platform is cheap."
"Kaspersky is one of the cheaper solutions."
"Trend Micro solutions are very expensive compared to other solutions. Even though everything is in one console, each feature requires a separate license."
"It is costly. It is not that affordable for a small organization. Only big organizations can afford it. It is a new feature that has been added, so its price is fair. Its licensing is probably subscription-based. It is for one or two years."
"From a pricing standpoint, they're a really good negotiator and they'll work with you."
"The pricing is fair compared to other solutions."
"Trend Micro XDR has a good price, and on a scale of one to five, I would rate it a four out of five in terms of price."
"Trend Micro's licensing is outsourced to third-party vendors, resulting in price variations depending on the vendor."
"The price is reasonable. It's not exorbitant. CrowdStrike and other players are on the higher side."
"We have an annual subscription and I believe there is no option for monthly billing at the moment."
report
Use our free recommendation engine to learn which Endpoint Detection and Response (EDR) solutions are best for your needs.
845,040 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
38%
Computer Software Company
16%
Government
9%
Financial Services Firm
9%
Educational Organization
24%
Computer Software Company
18%
Financial Services Firm
5%
Healthcare Company
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about Kaspersky Anti-Targeted Attack Platform?
The solution is very easy to use. Its interface is very simple, and you can build IOC's indicators. You can use your rules to detect these attacks because you can leverage threat intelligence. Y
What is your experience regarding pricing and costs for Kaspersky Anti-Targeted Attack Platform?
Its price is reasonable; it's neither very high nor very low, considering its capabilities.
What needs improvement with Kaspersky Anti-Targeted Attack Platform?
I think the tool is still not really good enough for integration compared to other products. If you need to integrate with the ecosystem of the Kaspersky primary, and if we are going to the third p...
What do you like most about Trend Micro XDR?
I appreciate the value of real-time activity monitoring.
What is your experience regarding pricing and costs for Trend Micro XDR?
It is very good. The flexibility to temporarily exceed license limits when setting up new devices is helpful, as it allows us to ensure security before purchasing additional licenses.
What needs improvement with Trend Micro XDR?
Improving the user interface would be helpful—it can be confusing, especially if you do not use it daily. We do not see a need for additional features. The tool has so many capabilities that it can...
 

Also Known As

Kaspersky Anti Targeted Attack
Trend Micro XDR, Trend Micro XDR for Users, Trend Vision One - XDR for Networks
 

Interactive Demo

Demo not available
 

Overview

 

Sample Customers

Republic of Serbia, Goods.ru, Tael, Insolar
Panasonic North America, Decathlon, Fischer Homes, Banijay Benelux, Unigel, DHR Health,
Find out what your peers are saying about Kaspersky Anti-Targeted Attack Platform vs. Trend Vision One and other solutions. Updated: March 2025.
845,040 professionals have used our research since 2012.