The primary use case of this solution is for anti-malware and virtual paths.
IT Infrastructure Manager at a computer software company with 51-200 employees
Good Virtual path function for anti-malware and good support
Pros and Cons
- "The most valuable feature of this solution is the virtual path function, which is the reason we chose to implement it."
- "I would like to see an EDR function for the servers, as that would be useful for us."
What is our primary use case?
What is most valuable?
The most valuable feature of this solution is the virtual path function, which is the reason we chose to implement it.
What needs improvement?
I would like to see an EDR function for the servers, as that would be useful for us.
Detection and Response directly to the servers.
For how long have I used the solution?
I have been using Trend Micro Deep Security since last year.
Buyer's Guide
Trend Micro Deep Security
April 2025

Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
851,823 professionals have used our research since 2012.
What do I think about the stability of the solution?
It's a stable product. We have not had issues.
We have a team of 40 to support and maintain this solution.
What do I think about the scalability of the solution?
This is a scalable solution. We have 2,000 users and a total of 20,000 staff members in our organization. We have more than 40 hospitals in Thailand.
How are customer service and support?
We are satisfied with the support that we have received.
Which solution did I use previously and why did I switch?
We are also using CrowdStrike.
Also, we were using Kasperky for anti-malware for the servers.
How was the initial setup?
The initial setup was not easy because when we deployed it, we had to restart our server, and needed permissions from our client.
It took approximately six months to deploy.
What other advice do I have?
I recommend this solution to others who are interested in using it.
I would rate this solution a ten out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.

CTO at a tech vendor with 1-10 employees
We don't have to worry about intrusions
Pros and Cons
- "It provides the type of data and availability that we need to have. We don't have to worry about intrusions."
- "Trend Micro is not government certified or federal complaint. If they could become compliant/certified, this would make it easier for us to use it for our government projects."
What is our primary use case?
We are primarily using the product for IDS, IPS, and deep security.
How has it helped my organization?
It provides the type of data and availability that we need to have. We don't have to worry about intrusions.
What is most valuable?
- They delivered what they said that they would.
- The IDS and IPS features.
What needs improvement?
Trend Micro is not government certified or federal complaint. If they could become compliant/certified, this would make it easier for us to use it for our government projects.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
I would give the product's stability a high rating. We trust the Trend Micro brand.
What do I think about the scalability of the solution?
We are not that big in size, so we haven't had any scalability issues.
How is customer service and technical support?
We are experiencing major technical support issues right now, and the technical support has been reasonable about fixing them.
How was the initial setup?
The integration and configuration of Trend Micro in our AWS environment was easy. We haven't had any issues with this at all.
What's my experience with pricing, setup cost, and licensing?
We did not purchase it through the AWS Marketplace because we have used Trend Micro in the past. We have not compared the pricing and licensing of buying it on the AWS Marketplace.
Which other solutions did I evaluate?
We also considered Pure Storage. In the end, we decided to only pursue Trend Micro because it is easier for us to install and use. The decision to use Trend Micro was based on cost, brand name, and ease of use.
What other advice do I have?
I would recommend Trend Micro. We are happy with them. In the current world, you have to earn the business because it is like a subscription, and they keep us happy.
We don't have Trend Micro integrated with any other product except for our internal cloud solution. We just use the AWS version of the product.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Trend Micro Deep Security
April 2025

Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
851,823 professionals have used our research since 2012.
Manager, Enterprise Risk Consulting at a tech company with 1,001-5,000 employees
Provides AV, file monitoring and log collection in a single agent.
Pros and Cons
- "There are a good signature set and a high rate of detection."
- "Installation and operations may have issues on some machines owing to their configuration of the network cards as the product is a DPI driver."
What is most valuable?
It is lightweight and provides a multi-platform for the client. It combines host intrusion prevention and provides AV, file monitoring, log collection, etc. in a single agent.
There are a good signature set and a high rate of detection.
It is one of the best client protection available for cloud computing.
For how long have I used the solution?
I have used this product for three years.
What do I think about the stability of the solution?
Installation and operations may have issues on some machines owing to their configuration of the network cards as the product is a DPI driver. The typical client-server issues exist as with any other product.
How was the initial setup?
The setup is simple as the agent provides a feature called as the Recommendation Scan. This scans the profiles of the host computer and provides recommendations on the appropriate signature and the policies to apply.
The installation of the agents, subsequent patching of the agents, etc. can be automated, thereby reducing the management overhead.
Which other solutions did I evaluate?
What other advice do I have?
If you are looking for an all-rounder for endpoint protection, then don't look any further than TM Deep Security.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Consultant at a computer software company with 51-200 employees
Provides a view of what's happening and enhances security, but we should be able to have an automated response for some of the threats
Pros and Cons
- "In addition to providing our clients a view of what's happening in their data centers, it also does virtual patching in the data center. It enhances the security in the data center big time."
- "What this product lacks at this stage is the ability to have automated workbooks to do the response. At this stage, the response is more manual, and it is not automated. If there is a response functionality in Deep Security, similar to what we have in EDR these days, to automatically respond to some of the threats, it would be cool. So, we'd like to have an automated response. There should be a response functionality."
What is our primary use case?
It gives clients an additional view of what's happening in their data centers.
Deep Security is on-prem at this stage, but it has got cloud workload protection that has similar functionality in the cloud.
What is most valuable?
In addition to providing our clients a view of what's happening in their data centers, it also does virtual patching in the data center. It enhances the security in the data center big time.
What needs improvement?
What this product lacks at this stage is the ability to have automated workbooks to do the response. At this stage, the response is more manual, and it is not automated. If there is a response functionality in Deep Security, similar to what we have in EDR these days, to automatically respond to some of the threats, it would be cool. So, we'd like to have an automated response. There should be a response functionality.
For how long have I used the solution?
We have been providing this solution for a few years.
What do I think about the stability of the solution?
It is stable.
What do I think about the scalability of the solution?
It is scalable, but it is fairly expensive.
In terms of its usage, we're not using it internally. We have three clients at the moment. They are fairly big clients.
How are customer service and support?
Their technical support is good.
How was the initial setup?
It is a bit more difficult because it needs a bit of hardware, etc. Deep Security is more complex to set up than web security. Implementing Deep Security properly is usually about a week's worth of work because of the change control in the company. It is the change control that's an issue.
In terms of people required for its deployment, one engineer is usually enough.
What's my experience with pricing, setup cost, and licensing?
Most of it is annual at this stage.
What other advice do I have?
I would definitely recommend it for medium enterprises.
I would rate it a seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Enterprise System Administrator at a healthcare company with 1,001-5,000 employees
It's agile, flexible, and performs multiple tasks simultaneously. We're able to do firewalls, IPS, and log inspections with it.
Valuable Features
The comprehensive agility is the most valuable feature. It's very agile and flexible, and performs multiple tasks simultaneously very effectively. We're able to do firewalls, IPS, and log inspections with it.
Improvements to My Organization
It's very difficult for an enterprise, especially one of our size, to patch effectively at all times. The IPS helped us with this. Oftentimes, there's a delay between discovery of malicious threats and production of patches. The IPS allows us to virtually protect against those threats before true patches can be applied to our inputs.
Room for Improvement
Deep Security is a fantastic product but there are certain little details that could be tweaked or improved to make it a ten.
VMware and Trend Micro are pursuing a strategy to develop a light version of NSX that will allow us to run it agentlessly.
They also need to offer support for Apple machines. Almost every vendor I've seen, they're all junk. For Trend Micro to take a step either with their office-end product or with Deep Security to actually protect Macs, that would be a huge game-changer for iOS.
Use of Solution
We've been using it for three years.
Deployment Issues
We've had no issues with deployment.
Stability Issues
Overall, I'd say the product is very stable, both agentless and agent-based. Agentless is less stable due to the nature of how many moving parts have to be working and in place for the whole system to work effectively. However, moving forward with the relationship with VMware, agentless protection is not going to be possible without VMware NSX setup with the environment.
Scalability Issues
Our organization has 1,500 servers and 18,000 endpoints -- and it's growing.
Customer Service and Technical Support
Trend Micro has excellent technical support.
Initial Setup
Starting off with agentless, it was complex. With agentless, you have a lot of moving parts and they all have to be in-sync and working together for the whole system to work. It adds a level of complexity with vShield, the DSVA's, and all the different moving parts.
Other Advice
Come up with a solid working plan before you even think about actually implementing anything. The foundation is all in the preparation, the education and the project management.
No product is perfect. Deep Security is a fantastic product but there are certain little details, I think, that could be tweaked or improved. Do your homework, engage Trend Micro, get trained, get all the knowledge you can and come up with a solid working plan before you even think about actually implementing anything.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Risk info security at a financial services firm with 501-1,000 employees
Good for managing a few servers but it requires a lot of manual configuration after deployment
Pros and Cons
- "Deep Security is a good product for managing a few servers."
- "Post-implementation is time-consuming. You have to do monitoring, and that takes time. After you set up everything, it's not a full-fledged implementation. You have to keep on monitoring and configuring."
What is our primary use case?
Deep Security is a server protection product. We use it for virtual patching and file integration. You can use this with your cloud or an NX environment, virtual services, VMware, etc.
What is most valuable?
Deep Security is a good product for managing a few servers.
For how long have I used the solution?
I've been using Deep Security for more than five years.
What do I think about the stability of the solution?
Performance is fine. You need to keep an eye on the new files getting detected, or so you have to keep on applying those file folders. So you have to keep monitoring, or else it is not going to help. So especially for the file integrity model and all.
What do I think about the scalability of the solution?
I don't know about the scalability, but it's good for few servers where you can manage.
How are customer service and support?
There is a local Trend Micro team in Mumbai that we call for support or to log a ticket.
How was the initial setup?
Deployment and post-deployment implementation are a little complicated. We can't touch servers, and we can't modify the settings. It should be automated, and Trend Micro should make the process more intelligent. The scope is broad, and you have to manually monitor the file scans and respond whenever there is a detection.
The deployment itself is not that difficult because it's client based. So you want to install clients on each of those servers, and then you have to keep monitoring and adding features. You check the server's performance, and if everything is fine, you can keep adding servers. But post-implementation is time-consuming. You have to do monitoring, and that takes time. After you set up everything, it's not a full-fledged implementation. You have to keep on monitoring and configuring.
And there are times when the malware protection or some other virtual patching is working fine, but you need a technician to get all the more advanced features to work. It takes around two or three technicians to implement. Our team is responsible for security while a different team handles server management. Then there are one or two people who manage the security console. And then, there are OEM support and SI support.
What's my experience with pricing, setup cost, and licensing?
We have a subscription. It's not a surface subscription. It's only the AMC part.
What other advice do I have?
I rate Trend Micro Deep Security six out of 10. I would recommend it. It depends on the other security controls you have in place. If you're using the entire Trend Micro suite, then you have a PT web gateway. So if you have the whole suite, you have tight integration with your APT and firewall story. In that case, Trend Micro Control Manager is there. So you have everything tied to a single console, so security and everything play as a complete story.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
AVP - Cyber Secuirty at Cloud4C Services
Good application integration and supports virtual patching
Pros and Cons
- "This product offers good protection against many types of malware."
- "They need to build in a central console because central integration is not very good right now."
What is our primary use case?
Trend Micro makes up part of our overall security solution.
How has it helped my organization?
This product offers good protection against many types of malware.
What is most valuable?
The most valuable feature is the virtual patching. It means that you don't have to patch applications manually, such as the monthly updates that are released from Microsoft.
Application integration is good. For example, there is a specific module for SAP.
What needs improvement?
They need to build in a central console because central integration is not very good right now. I have four locations and I need to log in to each location's portal to look at it. That is a very big job and I would like to have a consolidated report for all of them.
We would like to see the advanced threat protection (ATP) built-in, without having to use another product.
For how long have I used the solution?
I have been working with Trend Micro Deep Security for three years.
What do I think about the stability of the solution?
I have never had an issue with stability. Some of my colleagues have had problems but technical support dealt with them quickly.
How are customer service and technical support?
My colleagues were able to receive support for issues quickly. I would rate the support a nine out of ten.
Which solution did I use previously and why did I switch?
I also have experience with McAfee and one of the nice features it has is a central portal, where different locations are integrated and I can do everything from one place.
How was the initial setup?
The initial setup is not at all complex. Anybody can do the implementation. The length of time required for deployment depends on how many systems are being integrated.
What other advice do I have?
This is a product that I definitely recommend.
I would rate this solution a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Solution Expert -Security at a financial services firm with 10,001+ employees
A solution that's easily scalable, reduces false positives and is easy to set up
Pros and Cons
- "The vulnerability scanning reduces false positives by quite a bit."
- "The client can show as offline sometimes, and that becomes a bit difficult for troubleshooting. We end up basically redeploying the client. This is something that could be improved in the future."
What is most valuable?
The HIPS feature, as well as the monitoring around the file integrity, are very valuable aspects of the solution.
The vulnerability scanning reduces false positives by quite a bit.
What needs improvement?
The client can show as offline sometimes, and that becomes a bit difficult for troubleshooting. We end up basically redeploying the client. This is something that could be improved in the future.
It would be helpful if they added more machine learning into the solution in the future.
For how long have I used the solution?
I've been using the solution for five years.
What do I think about the stability of the solution?
The solution is largely stable, except for the fact that when the client communication breaks, you end up troubleshooting and you sometimes have to redeploy to get the client to establish the connection again.
What do I think about the scalability of the solution?
The solution is good from a scalability perspective. It doesn't take much effort.
How are customer service and technical support?
Technical support is okay. I would rate them 7.5 out of ten. My experience with Trend Micro has been that if there are issues with respect to databases, it takes time for them to resolve the problem.
How was the initial setup?
The initial setup is straightforward. From a deployment perspective, I would say all vendors are quite similar.
What other advice do I have?
We largely work with enterprise-level organizations.
I advise others to make sure that any recommendations in terms of system requirements that have been given to them are followed properly.
I would rate the solution 8.5 out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.

Buyer's Guide
Download our free Trend Micro Deep Security Report and get advice and tips from experienced pros
sharing their opinions.
Updated: April 2025
Popular Comparisons
Akamai Guardicore Segmentation
VMware NSX
Cisco Secure Workload
Trend Micro TippingPoint Threat Protection System
Check Point CloudGuard Network Security
Juniper vSRX
Symantec Data Center Security
Sophos Virtualization Security
vArmour DSS
Buyer's Guide
Download our free Trend Micro Deep Security Report and get advice and tips from experienced pros
sharing their opinions.