The solution is used for server protection.
Director at a tech services company with 51-200 employees
A physical or virtual network appliance designed to quickly detect advanced malware
Pros and Cons
- "There is no downtime or server vulnerability with this solution."
- "The solution needs improvement in terms of pricing."
What is our primary use case?
What is most valuable?
It is basically a combination of antivirus, intrusion prevention, host-based firewalls, and a lot of other features. There is no downtime or server vulnerability with this solution.
In addition, we can patch the operating system OEM. We can also reboot the server and evaluate scheduled downtime for the same, which is very valuable.
What needs improvement?
The solution needs improvement in terms of pricing. Its Duo Desk Hyperion system is also weak.
For how long have I used the solution?
I have been working with Trend Micro Deep Discovery for six years.
Buyer's Guide
Trend Micro Deep Discovery
January 2026
Learn what your peers think about Trend Micro Deep Discovery. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.
What do I think about the stability of the solution?
It is a stable solution. I rate the stability an eight out of ten.
What do I think about the scalability of the solution?
It is a scalable solution. I rate the scalability a ten out of ten. Twenty customers are using the solution in the SMB environment.
How was the initial setup?
You will need a team of engineers who know the ins and outs of the solution or a solution similar to Deep Discovery.
It is not a plug-and-play solution. A lot of fine-tuning is required when doing the installation. We faced a lot of problems when installing the solution's data centers. A lot of the servers and applications stopped working. We then needed to do a lot of fine-tuning and understand why the solution was not properly working. When the application does not work properly, the security is down.
We do the maintenance for our customers and five to six people are required. We have a team of engineers who maintain and remotely manage the solution for our customers.
What other advice do I have?
Overall, I would rate Trend Micro Deep Discovery an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer.
Network & Security Team Lead at a tech services company with 11-50 employees
It's scalable and integrates smoothly with other solutions
Pros and Cons
- "Deep Discovery is scalable and compatible with other products. It's crucial to have that compatibility because it's an integral part of our security solution. It integrates smoothly. The interface is user-friendly, so administration is simple."
- "Deep Discovery is easy to manage, but there is still room for improvement on the administration and operations side. Competing products have a cleaner interface that makes it easier to manage their products. Trend Micro offers a lot of features in one product suite, but it can be unwieldy for the customer to manage all that with a single interface."
What is our primary use case?
Most of our clients are in the government, so they must comply with regulatory requirements for security because their networks are classified as critical infrastructure. Trend Micro ticks all the boxes for endpoint protection, application whitelisting, file protection, disk protection, etc. Our solutions are typically on-prem because our clients aren't comfortable with the cloud. There use a few cloud solutions, but it's rare.
What is most valuable?
Deep Discovery is scalable and compatible with other products. It's crucial to have that compatibility because it's an integral part of our security solution. It integrates smoothly. The interface is user-friendly, so administration is simple.
What needs improvement?
Deep Discovery is easy to manage, but there is still room for improvement on the administration and operations side. Competing products have a cleaner interface that makes it easier to manage their products. Trend Micro offers a lot of features in one product suite, but it can be unwieldy for the customer to manage all that with a single interface.
For how long have I used the solution?
I've worked with Trend Micro solutions for many years on various projects, but I've only used Deep Discovery at this company for three or four years.
What do I think about the stability of the solution?
I rate Deep Discovery eight out of 10. The stability depends on the customer's environment. In an environment that meets all the prerequisites, I would give it an eight out of 10.
What do I think about the scalability of the solution?
I rate Deep Discovery seven out of 10 for scalability. It's scalable, but I haven't worked on many use cases that push the limits of it.
How are customer service and support?
I rate Trend Micro support eight out of 10. We've contacted them for a few issues, and they were excellent.
How would you rate customer service and support?
Positive
How was the initial setup?
I rate Deep Discovery seven out of 10 for ease of setup. I wouldn't necessarily say that the deployment is hard, but there are many external factors that might determine whether the deployment goes smoothly. Overall, it's straightforward, but it's not the easiest product to install. It isn't a "next, next, finish" installation. One person is enough to implement Deep Discovery, but you need someone from the network and applications team to deploy the entire project.
What's my experience with pricing, setup cost, and licensing?
I am not involved in purchasing. However, I know that the price isn't the same for every customer. We have account managers who work with distributors, so the price isn't stable. However, I can say generally that the price is competitive. There are more expensive vendors than Trend Micro. It's reasonable.
Which other solutions did I evaluate?
There are many factors to consider, such as pricing, interface, support, and integration. Based on all those dimensions, I would place Trend Micro in the top three.
What other advice do I have?
I rate Trend Micro Deep Discovery eight out of 10. I would recommend it. You need a knowledgeable team to work with the solution. It isn't a solution where you can run an installer, and it's ready to go. You must understand your use cases and prepare accordingly. It's an excellent product, and you will get a lot of value from it if you know what you're getting yourself into.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Buyer's Guide
Trend Micro Deep Discovery
January 2026
Learn what your peers think about Trend Micro Deep Discovery. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,082 professionals have used our research since 2012.
Head of Technical - Systems and Security at a tech consulting company with 51-200 employees
custom sandboxing capability is well-received and users can replicate their own environment within the sandbox, allowing for more accurate threat detection and analysis
Pros and Cons
- "The reporting is very good, providing detailed analysis in a short amount of time."
- "The price range is a little high."
What is our primary use case?
It's a good fit for organizations that follow strict data regulations and need to keep sensitive data on-premises. In Sri Lanka, for example, financial data cannot be used in the cloud. So, Deep Discovery is a good solution because it's an on-premises device. We can do the sandboxing on-site. This is a strong selling point.
We are distributors. A couple of our customers use this product. There are three customer references in Sri Lanka that use Deep Discovery.
How has it helped my organization?
There are some zero-day attacks that we cannot block with regular firewall rules. We need to execute the file to see whether it is truly an attack or not. Sandboxing helps to identify this by safely executing and analyzing suspicious files in an isolated environment.
Moreover, it has some features that stand out compared to other products. For example, we can get live snapshots and instant reports, and we can submit files manually for free.
It is effective at protecting against various threats.
What is most valuable?
The custom sandboxing capability is well-received by customers, who appreciate its performance and flexibility.
With the custom sandboxing feature, customers can replicate their own environment within the sandbox, allowing for more accurate threat detection and analysis.
So, the sandbox itself is a major factor. Additionally, the reporting is very good, providing detailed analysis in a short amount of time. It takes just a millisecond to analyze the file. It doesn't take much time.
Another thing is the integration capability with other Trend Micro products. We can integrate Deep Discovery with, for example, Trend Micro Vision One to gain insights and visibility into network threats and vulnerabilities.
What needs improvement?
The price range is a little high, which can deter customers from buying the product.
Additionally, cloud sandboxing features are valuable now, and their inclusion would be a significant improvement. These are points of concern that should be addressed with Trend Micro regarding pricing.
For how long have I used the solution?
I have experience with it for about three years now.
What do I think about the stability of the solution?
The product is stable. If you configure the product in the correct way, it runs smoothly without any issues. I can rate it a nine or ten for stability.
What do I think about the scalability of the solution?
I can rate it a ten out of ten for scalability.
How are customer service and support?
The first response time and accountability should be improved.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We worked with Sophos, BluVector Cortex and Kaspersky.
How was the initial setup?
There are no difficulties in the setup process.
The device comes with a preloaded sandbox. We can upload custom sandbox images to the device if needed. The installation is straightforward, documentation is available, and our team is certified as a Deep Discovery Analyzer.
The deployment time depends on the environment. The deployment can take a couple of days or be completed within a day. It depends on the customer providing the necessary resources.
From the beginning, we need redundant power, network configuration, port forwarding, and other requirements. So, it usually takes two to three days to complete the deployment.
Deployment resources: We can do it with two people. It is usually two to three people. My team and I, for example, have three people involved in the deployment.
What was our ROI?
Having a sandbox improves our security posture. Traditional security tools cannot detect all zero-day and sophisticated attacks.
We can't check the monetary value directly, but it can prevent ransomware attacks, spam attacks, and phishing attacks. It helps to avoid enormous losses, which is crucial for any organization.
What's my experience with pricing, setup cost, and licensing?
I would rate the pricing a three out of ten, where one would be very expensive, and ten would be very cheap.
What other advice do I have?
Overall, I would rate it a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer.
Maximizes bandwidth, offers little degradation of performance and is simple to set up
Pros and Cons
- "The performance and stability are great."
- "The scalability is sometimes limited."
What is our primary use case?
It's been useful in checking network traffic.
What is most valuable?
The performance and stability are great.
We've been using it to detect any malicious traffic. It confirms any malicious traffic that is detected from other products. It informs us whenever we need to remediate or lock or quarantine or block or disable a workstation. It provides us with the threat analysis, the CVEs.
The initial setup is easy.
What needs improvement?
The scalability is sometimes limited.
For how long have I used the solution?
I've used the solution for five years.
What do I think about the stability of the solution?
The solution is okay. It's been stable for the longest time. There's little degradation of performance. We've been able to maximize the bandwidth allocated to us. The Trend Micro vendor really provided us with good steps in computing the bandwidth that we need and also where to place all the missing sniffing ports. Strategically, they've been very, very helpful to us. The DVI really, really works well for us.
What do I think about the scalability of the solution?
Part of the limitation is the switches. If you want to sniff traffic from a certain segment, you have to have an integrator. There's something where you can put your DDI in the middle of the connection so that you can intercept traffic. You have to purchase that part of the solution.
While the scalability could be better, it depends on the design of our network. The DDI is there. If you want to sniff more segments, you have to have the DDI, however, you have to also calculate your ports and switches, and you have to purchase additional switches if you want more segments to be sniffed.
How are customer service and support?
The solution's technical support is okay. The solution works well, however, and we're benefitting from that aspect of it.
We get premium support of Trend Micro, so we have no problems with them.
Which solution did I use previously and why did I switch?
I'm not sure if we previously used a different solution.
How was the initial setup?
The solution is easy to implement. It's very straightforward. We just deploy the machine. We plug in all the sniffing ports. Then we added another dirty line for the sandboxing, that's it. We're able to get logs from it with no problem.
For Deep Discovery, the deployment took around one to two weeks.
What about the implementation team?
Our vendor handled the deployment for us.
What was our ROI?
We're seen a pretty good ROI. Considering the cost incurred if you are infected, it stabilizes cybersecurity and helps save money.
What's my experience with pricing, setup cost, and licensing?
I'm not sure about the licensing aspect of the solution.
We have an enterprise license and then we just renew it as needed.
What other advice do I have?
We are not quite at version 5.5.
I'd recommend the solution to others.
The relationship our company has with Trend Micro is very, very good. They've been very, very supportive of us. We are prioritized whenever we have a problem.
I'd rate the solution nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
CEO at a tech services company with 1-10 employees
A stable and specific product for threat intelligence with smart protection
Pros and Cons
- "Trend Micro Deep Discovery is a very specific product for threat intelligence with smart protection."
- "Trend Micro Deep Discovery is a very expensive solution, making it very hard to sell."
What is most valuable?
Trend Micro Deep Discovery is a very specific product for threat intelligence with smart protection. Trend Micro Deep Discovery is a very good product from a security point of view.
What needs improvement?
Trend Micro Deep Discovery is a very expensive solution, making it very hard to sell. The solution's initial setup could be made easier for the end users.
For how long have I used the solution?
I have been working with Trend Micro Deep Discovery for about one year.
What do I think about the stability of the solution?
I rate Trend Micro Deep Discovery a nine out of ten for stability.
What do I think about the scalability of the solution?
I rate Trend Micro Deep Discovery an eight out of ten for scalability.
How are customer service and support?
Overall, the solution's technical support is pretty good. The solution has a 3-tier system, where one is partner support, then distributor support, and then Trend Micro support. You can purchase the support directly from Trend Micro, where you don't have to open a ticket with the partner or distributor. You just have to open a ticket with Trend Micro, and they will handle the issue. The technical support team's response time is very fast, and they are quite quick.
How would you rate customer service and support?
Positive
How was the initial setup?
The solution's initial setup is not complex, but you must have training or a certified engineer to do it.
What's my experience with pricing, setup cost, and licensing?
Trend Micro Deep Discovery is quite expensive compared to other endpoint security products.
What other advice do I have?
Feature-wise, Trend Micro can add other products to one product or get a new product on top of the security.
Users need to train their IT support department on Trend Micro, especially on the products they buy. If they are not trained, it's very hard for them to understand and run or manage the product. They have to call someone every time they have even small issues. Since users do not always purchase the support directly from Trend Micro, resolving issues takes time, which hurts them.
Overall, I rate Trend Micro Deep Discovery a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
Solutions Architect at a tech services company with 51-200 employees
Ahead of its competitors in providing MSP services to customers
What is our primary use case?
We use the solution for its security features. Trend Micro has an MSP portal where you can create customer accounts, assign some licenses, and make your customers use those licenses from a portal. Trend Micro is ahead of its competitors in providing MSP services to customers.
What is most valuable?
Trend Micro Endpoint Encryption is stable and easy to use. It's very useful for an MSP company, making it easy and efficient to work with.
What needs improvement?
Security features could be improved.
For how long have I used the solution?
I have been using Trend Micro Endpoint Encryption for one year.
What do I think about the stability of the solution?
The product is very stable.
What do I think about the scalability of the solution?
The solution is scalable because it doesn't require an on-premise server installed. Everything is being monitored and managed from the cloud portal, irrespective of the number of agents. You can manage all from one portal.
How are customer service and support?
Vendors are locally present in our country. We contact them via email, etc. We are very flexible with vendor support.
How was the initial setup?
The initial setup is straightforward. One person is enough for it.
An MSP company creates customer accounts from Trend Micro's MSP portal. Then, the customer gets the key. After that, they can log in to the Trend Micro portal. They will see the agent to be downloaded for Windows and Linux. It takes about two or three minutes to deploy.
What about the implementation team?
Deployment can be done by yourself.
What's my experience with pricing, setup cost, and licensing?
The MSP's model and licensing is global and has very reasonable prices. Also, the perpetual license model is reasonable. It's cheap for the assembly companies. Licensing is very straightforward.
What other advice do I have?
Around five to ten technical persons are using the support. We will be able to sell those agents to more than 20 companies.
Only one technical person is enough for a large company for the installation and the management. In terms of management, many logs, alarms, and entries are happening in the portal.
Trend Micro can be a viable option for SMBs looking for a basic EDR or PRT solution. However, for larger organizations or those with highly complex security needs demanding advanced services and sophisticated department knowledge, Trend Micro's capabilities might not be sufficient.
Overall, I rate the solution a seven out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Security Engineer at a tech services company with 501-1,000 employees
Useful for threat protection and to block phishing emails
Pros and Cons
- "Initial setup is easy. It can be done by yourself."
- "The solution could be more secure."
What is our primary use case?
This solution can be used as threat protection and to block phishing emails.
We are using version 6.0.
There are 15 people using this solution in my organization.
What needs improvement?
The solution could be more secure.
What do I think about the stability of the solution?
It's stable.
What do I think about the scalability of the solution?
It's scalable.
How are customer service and support?
We are using local technical support. We haven't had any problems with it.
How was the initial setup?
Initial setup is easy. It can be done by yourself.
What other advice do I have?
I would rate this solution 9 out of 10.
I would recommend this solution to anyone who wants to start using it.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
CEO at a tech services company with 1-10 employees
Easy to use, easy to deploy, and helpful for quickly figuring out the problems in the network
Pros and Cons
- "It is a very good solution. It is very light, and it is quite quick to figure out the problem in your network."
- "Trend Micro can improve the pricing in general. There is nothing else they can add or improve in the solution."
What is our primary use case?
Deep Discovery is good for network protection. There is also an Email Inspector.
What is most valuable?
It is a very good solution. It is very light, and it is quite quick to figure out the problem in your network.
It is very easy to use. It is also very easy to install and deploy.
What needs improvement?
Trend Micro can improve the pricing in general. There is nothing else they can add or improve in the solution.
What do I think about the stability of the solution?
It is very stable.
What do I think about the scalability of the solution?
There are quite a lot of clients who use this solution. It is an enterprise solution, and 80% of the enterprise-level companies are using it over here.
How are customer service and support?
We do hear of issues from our clients. We go over there for technical support, but there is nothing major for which they require support from Trend Micro itself.
How was the initial setup?
It is straightforward. It doesn't take much time. It usually takes an hour or two. It requires a maximum of a day.
What's my experience with pricing, setup cost, and licensing?
Its price is fine, but Trend Micro can improve the pricing in general.
It is a hardware solution. It is based on the number of nodes, and according to the number of nodes, clients decide which box they should acquire. They have to renew their license every year. It is subscription-based.
What other advice do I have?
Trend Micro has divided most of the solutions into different sectors. If you want to go for the end-to-end solution, they are very much in a position to provide that. You do not have to add different kinds of products or vendors. Trend Micro covers almost everything.
I would definitely recommend this solution. It is a very good solution. I would rate it a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Trend Micro Deep Discovery Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2026
Product Categories
Intrusion Detection and Prevention Software (IDPS) Advanced Threat Protection (ATP) Network Detection and Response (NDR)Popular Comparisons
Fortinet FortiGate
Palo Alto Networks WildFire
Cisco Secure Network Analytics
Microsoft Defender for Identity
Gigamon Deep Observability Pipeline
Splunk User Behavior Analytics
ExtraHop Reveal(x)
Trend Micro TippingPoint Threat Protection System
Palo Alto Networks Advanced Threat Prevention
Barracuda CloudGen Firewall
Fortinet FortiSandbox
Buyer's Guide
Download our free Trend Micro Deep Discovery Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- When evaluating Intrusion Detection, what aspect do you think is the most important to look for?
- What is your recommended cost-effective solution to detect and prevent APT attacks?
- What product do you recommend for a Campus IPS appliance implementation?
- How do you use the MITRE ATT&CK framework for improving enterprise security?
- What are the pros and cons of Darktrace vs CrowdStrike Falcon vs alternative EPP solutions?
- Which alternative solutions (other than Darktrace) do you recommend for an SMB?
- Which is the best intrusion detection and prevention solution?
- What is the best IDPS security tool and why?
- What is Cognitive Cybersecurity and what is it used for?



















