The platform's IP detection feature is particularly effective in identifying connections to our servers.
Manager at a manufacturing company with 1,001-5,000 employees
Has valuable intrusion prevention capabilities, helping us block unauthorized connections
Pros and Cons
- "The platform's IP detection feature is particularly effective in identifying connections to our servers."
- "There could be a centralized management server to oversee all platform functionalities."
What is most valuable?
What needs improvement?
There could be a centralized management server to oversee all platform functionalities.
For how long have I used the solution?
We have been using Trend Micro Deep Security for approximately three years.
What do I think about the stability of the solution?
I would rate the product's scalability a seven out of ten.
Buyer's Guide
Trend Micro Deep Security
September 2025

Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
What do I think about the scalability of the solution?
The scalability was limited; the product did not detect as many behavioral patterns as CrowdStrike, which provided more comprehensive insights.
How are customer service and support?
The technical support experience was good, but there was room for improvement in terms of response time.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We decided to switch to a more AI-based solution from Trend Micro to address the rise in ransomware attacks better and reduce the number of servers needed for management.
What's my experience with pricing, setup cost, and licensing?
While the pricing was on the higher side, the manageability and comprehensive alerts provided by the product justified the cost. I paid approximately 26,000 per license. There is an additional cost involved for support services.
Which other solutions did I evaluate?
I compared the product to McAfee.
What other advice do I have?
The product's intrusion prevention capabilities were beneficial as they allowed me to block unauthorized connections and potential threats at both the server and firewall levels.
I rate Trend Micro Deep Security a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Cybersecurity Engineer at a computer software company with 1,001-5,000 employees
Offers troubleshooting insights with a customizable dashboard for real-time monitoring and IPS activity
Pros and Cons
- "The solution's features, including real-time monitoring, IPS activity, and firewall alerts, are found to be the most effective in our company"
- "Our company faced issues syncing the active directory accounts"
What is our primary use case?
Our company uses Trend Micro Deep Security as a conventional IPS and for malware detection. The solution is also used for real-time monitoring and to evaluate the monitoring impact on the system. The solution's impact or consumption of memory can also be checked. Trend Micro Deep Security is compatible with various platforms, such as Windows and UNIX.
What needs improvement?
In an older version of Trend Micro Deep Security, our company faced issues syncing the active directory accounts. Anytime we revert to the support team of the solution, they always propose to update the Deep Security Manager to resolve every issue, which is an ineffective approach. I believe the support team should be more proactive in providing effective options or guidance to resolve issues around the product.
Although in our company, we try to add exclusions and troubleshoot for real-time monitoring and upgrade the version, there are clients who consume a lot of memory; on average, 30% of memory remains occupied. The solution's memory consumption impacts certain aspects of the client's infrastructure.
Even after whitelisting one of our company's port scanning servers or tools, the IPS activity continuously monitors and sends false positive alerts, we haven't found a solution to this over the past four months. Trend Micro Deep Security should have a lab-type environment where the solutions for every issue can be found through simulation.
Trend Micro Deep Security is looked upon as a new-generation antivirus that is used on the server end. In future versions of the solution, I would prefer the upgrade process to be simpler than on Linux; the upgrade is a lengthy but easy process. Our company expects the tool's upgrade process to be lighter over the Linux platform, similar to its offering for the Windows platform.
For how long have I used the solution?
I have been using Trend Micro Deep Security for four years.
What do I think about the stability of the solution?
I would rate the stability an eight out of ten. The solution is satisfyingly stable. But at times, I have experienced the solution to be non-responsive and there have been instances where the system had hanged without any notification.
Our company team had to manually intervene in the aforementioned scenarios to understand the issues. Often, I have witnessed the system hang and reboot while upgrading Trend Micro Deep Security, our company team had to manually force restart.
What do I think about the scalability of the solution?
I would rate the scalability an eight out of ten. Scaling the solution across Linux systems might be difficult. There are a few Windows systems in our organization that are quite old and out of support, but they are in production; I have rated the scalability after considering all such factors.
Trend Micro Deep Security is running 24/7 in our organization to receive alerts daily and evaluate the Deep Security Manager to manage issues of our company's clients. In our organization, we are presently trying to onboard more servers and we have plans to expand the solution to the Kubernetes cluster, but the present model of Trend Micro Deep Security does not fit in with the aforementioned cluster or infrastructure.
How are customer service and support?
I would rate the tech support an eight out of ten. Our company expects more accurate and effective solutions from the support team.
How would you rate customer service and support?
Positive
How was the initial setup?
I would rate the initial setup process an eight out of ten. Trend Micro Deep Security is not as robust or automated as any EDR solution, so most configurations must be implemented manually.
The manual configuration tasks include whitelisting, adding exclusions, and creating policies. By streamlining the manual configurations, the solution can become more advanced. From the solution's setup process initiation to production, it's a lengthy and exhausting process of manual tasks.
Our company belongs to the large-scale category with about 1500 system servers, and about three professionals are needed to maintain Trend Micro Deep Security even though we have eight managers, excluding the lab environment.
What was our ROI?
Trend Micro Deep Security is capable of providing an ROI. I would rate the solution's ROI as nine out of ten.
What's my experience with pricing, setup cost, and licensing?
The solution is offered at an average price point. I would rate the pricing an eight out of ten. To our company, Trend Micro Deep Security seems slightly expensive. In our organization, the solution's license is renewed yearly.
What other advice do I have?
The primary advantage of the solution is the insights obtained for a troubleshooting server. For example, the solution's insights often include creating a diagnostics package and directly sharing it with the support team to gain further troubleshooting advice. The insights provided by the solution are vital for the operations on the server side.
In our company, we always prefer Trend Micro Deep Security over an EDR solution due to its security capabilities, alerts, and a configurable dashboard that auto-updates daily. The solution's dashboard provides clarity on the number of infected files and also allows for the tracking of IPS activity. Any kind of ransomware attack is also mitigated by Trend Micro Deep Security.
The solution's features, including real-time monitoring, IPS activity, and firewall alerts, are found to be the most effective in our company for network defense.
In our company, we review the IPS alerts from the Trend Micro Deep Security console to have a fair understanding of what's entering and leaving the server and who is trying to breach the system. IPS is a crucial component in our organization's daily cybersecurity monitoring.
Most of the alerts will be false positives, but the solution can provide alerts at a rapid pace. First, the alerts arrive on the solution's dashboard, and then the SMTP is configured to distribute the same alerts over email. Once the alerts are received in email, our company team reviews them and tries to identify whether it's a real threat incident or a false positive. The solution thus not only tracks and blocks threats but also notifies the responsible engineers of an organization.
It's a robust and reliable solution that provides in-depth insights while troubleshooting. I would advise others to evaluate the licensing cost and the support availability in their region before adopting Trend Micro Deep Security.
I was previously working in the Middle East with the solution, where support was superior, and an executive would jump over a call with me to resolve the issue, but in Europe, the support quality is not the same, and communication is preferred only via email.
I expect to witness improvements in the solution's support quality in Europe, where issues are being solved over a single phone call instead of an extensive email thread. I would rate Trend Micro Deep Security as nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Trend Micro Deep Security
September 2025

Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
Provides necessary protection against current and relevant threats
Pros and Cons
- "The integration options of Trend Micro Deep Security have been particularly valuable."
- "Enhancements in agent performance are needed, specifically in reducing server utilization during scanning."
What is our primary use case?
I use Trend Micro Deep Security to enhance the security of our servers, which run various operating systems, including Solaris. For our servers, especially those involved in Webex, we deploy agents and enable specific modules like anti-malware, intrusion detection, and firewall protection.
How has it helped my organization?
Trend Micro Deep Security has significantly improved our organization's security posture. It has streamlined reporting processes, enhanced claim filing efficiency, and provided robust protection for our IT systems. With features like real-time threat monitoring, it ensures a secure environment.
What is most valuable?
The integration options of Trend Micro Deep Security have been particularly valuable. The integration options in Trend Micro Deep Security are crucial for our banking organization. With DLP campaigns being a priority, the seamless integration ensures that endpoints are effectively enabled, providing necessary protection against current and relevant threats.
What needs improvement?
There is room for improvement in Trend Micro Deep Security, particularly in endpoint security. Enhancements in agent performance are needed, specifically in reducing server utilization during scanning. This improvement would contribute to increased efficiency and lower operational costs, ensuring a smoother and more responsive system.
For how long have I used the solution?
I have been working with Trend Micro Deep Security for three years.
What do I think about the stability of the solution?
I would rate the stability as a nine out of ten.
What do I think about the scalability of the solution?
I have faced some issues with Trend Micro Deep Security's scalability, like communication errors and settings in green states. Resolving these requires support and knowledge to allocate resources effectively.
How are customer service and support?
The technical support for Trend Micro Deep Security has been decent. However, I believe there's room for improvement in engagement. When raising a case, the ability to quickly connect remotely and discuss specific documentation related to our environment would enhance the overall support experience. I would rate the technical support as a seven out of ten.
How would you rate customer service and support?
Neutral
How was the initial setup?
I would rate the easiness of the initial setup as a seven out of ten. Setting up Trend Micro Deep Security was not entirely straightforward. While there is a comprehensive solution, the complexity arises from the diverse components in our environment. Unlike a single-box setup, we manage multiple components, which requires careful configuration for effective deployment. It took three months to deploy the solution.
What was our ROI?
We have seen a return on investment from using the solution.
What's my experience with pricing, setup cost, and licensing?
I would rate the costliness of the solution as a seven out of ten. The pricing for Trend Micro Deep Security is fixed for five years, and there are no additional costs beyond the standard license increase during this time.
What other advice do I have?
My advice for someone considering Trend Micro Deep Security is to conduct a thorough POC before implementation. Ensure all modules are enabled during the POC and carefully assess how the solution works in your specific environment. Check the enrollment process and functionality before moving forward with the implementation. Overall, I would rate the solution as an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
IT Security Specialist at TT Systems LLC
Offers a good firewall that blocks unwanted ports
Pros and Cons
- "For server security purposes, I like the product's firewall."
- "Sometimes, the product is not very stable, but it is something that depends on the infrastructure in which the tool is used."
What is our primary use case?
I use the solution in my company to reduce SMB attacks on the data center site and ensure data center protection from flooding and threats.
What is most valuable?
For server security purposes, I like the product's firewall. The firewall has three features we use in our company, of which one controls flooding, the other blocks unwanted ports, and the third allows us to control traffic via Deep Security if the firewall port is open from the switch or router side.
What needs improvement?
In our company's infrastructure, we have not faced any challenges with the product. Considering the lack of issues or challenges faced with the use of the product in our company's environment, I feel that it is a good solution.
Sometimes, the product is not very stable, but it is something that depends on the infrastructure in which the tool is used. The aforementioned area can be considered for improvement.
If Trend Micro Deep Security wants to implement some new features in it, then I would say that it should focus from a networking point of view and see how to control network traffic specifically coming from external to internal traffic on the servers.
For how long have I used the solution?
I have been using Trend Micro Deep Security for two years. My company operates as a system integrator for Trend Micro.
What do I think about the stability of the solution?
If I consider my company's infrastructure, everything is good with the product because we have enabled the threat protection systems to control our environment, so we don't see any suspicious activities.
I rate the solution's stability as ten out of ten.
What do I think about the scalability of the solution?
Scalability-wise, it is a good tool, and I rate the solution as nine out of ten.
How are customer service and support?
When it comes to technical support, I would say that none of the products are bad, and all the tools are usually good. There are a few areas where certain modifications or changes are required, and it is something that varies from client to client. In my opinion, all products, including Symantec and Trend Micro, are good. Based on the infrastructure of users and what they want to implement, there are a few things that Trend Micro should understand. I rate the technical support an eight out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I work with Trend Micro Endpoint Security with Apex One. I also use Symantec.
How was the initial setup?
If I consider my company's infrastructure, everything is good with the product because we have enabled the threat protection systems to control our environment, so we don't see any suspicious activities.
I rate the solution's stability as ten out of ten.
The solution is deployed on the cloud.
Which other solutions did I evaluate?
Symantec and Trend Micro Deep Security are good products, and I don't have any issues with either of the solutions, specifically from a technical perspective.
The costs associated with both the products are taken care of by the sales department or management in our company. Symantec and Trend Micro Deep Security have features that are almost 80 to 90 percent similar. The only area where Symantec needs to improve is related to the remote capabilities it offers.
What other advice do I have?
The product's intrusion prevention system works fine, but we have not implemented any other policies in our company. In our company, we use the default policy in our environment to deal with and prevent intrusions, so we have not customized any policies associated with the intrusion prevention system. With the default policies in place, whenever there is some traffic coming in, the tool will automatically detect, allow, or take action based on the signatures.
I have learned many things while using the product, including the fact that it is very important for a company to decide what they want before purchasing a solution.
I rate the tool a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Integrator
Scrum Master at Inalpie Enterprise
Protects the customer's infrastructure
Pros and Cons
- "The solution provides ease of use, especially from non-technical testing. It's one of the best things. The deployment process is one of the easiest things because we didn't train our on-site consultant. The constant training from Trend Micro's side is that they develop internal causes to understand the upgrade because once they upgrade the platform, they also upgrade the technical person's skills."
- "Trend Micro can interact with their consultant to ensure that we receive constant training to understand their platform and how to improve it."
What is our primary use case?
We use the solution to protect the customer's infrastructure. It can ensure that the infrastructure is well protected and that the customer has a good institution.
What is most valuable?
The solution provides ease of use, especially from non-technical testing. It's one of the best things. The deployment process is one of the easiest things because we didn't train our on-site consultant. The constant training from Trend Micro's side is that they develop internal causes to understand the upgrade because once they upgrade the platform, they also upgrade the technical person's skills.
What needs improvement?
Trend Micro can interact with their consultant to ensure that we receive constant training to understand their platform and how to improve it.
For how long have I used the solution?
Our clients have used Trend Micro Deep Security for 36 months.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
15 users are using this solution.
How was the initial setup?
The initial setup is simple.
What's my experience with pricing, setup cost, and licensing?
You need to pay for a license per user for the product. There is no extra cost. It's pretty variable. It does match the value. It's quite valuable. The ultimate purpose is to ensure that no incident can destroy the company's reputation.
What other advice do I have?
The automation capabilities were perfect. Yeah, they interact with the software. If you install something, there will also be some reports. They will come back with feedback.
One of AI's benefits is improving automation and understanding between different parties. AI is frequently in the news, but everyone does not fully realize its potential. If there is a gap between the workforce and AI, it will remain a buzzword rather than something we fully utilize. We must understand AI, its benefits, and how to use it. Institutions should develop training platforms to bridge this gap and ensure a better understanding of AI's capabilities.
If you use deep security products, you'll be doing yourself a favor. They're not that expensive; they're pretty responsive, and they are perfect for your requirements.
Overall, I rate the solution a nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Endpoint Security Engineer at Netaccess India private ltd
A tool useful for its server maintenance and anti-malware capabilities that also provides stability
Pros and Cons
- "The most valuable features of the solution we have enabled in our organization are its anti-malware capabilities, applications, web reputation, and integrity monitoring."
- "A minor issue in Trend Micro Deep Security is that once the tool is upgraded, it shows some machines as offline or not reported while showing a recent update as outdated. The tool has some server connection issues."
What is our primary use case?
My company suggests Trend Micro Deep Security to our clients for server maintenance, and the customers can move a lot of servers in their environment with lesser hiccups. Our client uses around 10,000 servers, so we suggested they use Trend Micro Deep Security, a server support-based tool. Apex One and Apex Central are designed for laptops and desktops.
What is most valuable?
The most valuable features of the solution we have enabled in our organization are its anti-malware capabilities, applications, web reputation, and integrity monitoring.
What needs improvement?
Our company hasn't received any feedback or suggestions from our clients on Trend Micro Deep Security because it has been working fine. In Apex One and Apex Central, the new versions usually pose issues to their users after updating the tools. There haven't been any critical issues with the solution in the last few months.
A minor issue in Trend Micro Deep Security is that once the tool is upgraded, it shows some machines as offline or not reported while showing a recent update as outdated. The tool has some server connection issues. We have raised the concerns from our end with Trend Micro Deep Security to resolve them.
The real-time server is stopped, and it shows offline whenever we check our console.
I would like to see the tool add EDR features in the future.
For how long have I used the solution?
I have been using Trend Micro Deep Security for the last five years. I am using Trend Micro Deep Security Version 20. My organization functions as partner support for Trend Micro Deep Security.
What do I think about the stability of the solution?
It is a highly stable solution. Stability-wise, I rate the solution a ten out of ten.
What do I think about the scalability of the solution?
Scalability depends on whether Trend Micro Deep Security's dashboard shows its users with options like critical, medium, or low.
It is a good scalable tool, especially Trend Micro Deep Security Version 20, compared to its previous versions like Trend Micro Deep Security Version 10 or 12.
Scalability-wise, I rate the solution a ten out of ten.
Around 1,15,000 users are there for the solution. Mostly, my clients are large to medium-sized businesses.
How are customer service and support?
The solution's technical support quickly responds when you raise a ticket. I rate the technical support a nine out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup for Trend Micro Deep Security Version 20 was comfortable for me.
The solution is deployed on-premises.
Our company has multiple customers. Some customers have on-boarded the tool on-premises, while others have opted for SaaS models. With the SaaS deployment model, it takes only 20 to 30 mins to complete the setup phase if the license is already activated. For new users of the tool, once the license is activated, it initially needs some build-up for the entire deployment of the tool on the SaaS model, which then takes around a week because after a server gets ready, we have to coordinate with multiple teams.
I have seven years of experience with the setup phase of the tool.
The setup phase is carried out with the help of application control, web reputation, and integrity monitoring.
What's my experience with pricing, setup cost, and licensing?
The price of Trend Micro Deep Security is high when compared to the normal prices of Apex One and Apex Central.
I rate the price a seven on a scale of one to ten, where one is low, and ten is a high price. It is a very costly tool. We have been able to resolve the challenges related to the pricing of Trend Micro Deep Security.
There are no additional payments to be made other than the normal price of the tool.
What other advice do I have?
My organization uses Trend Micro Deep Security for Windows platforms, including Windows 2012, Windows 2016, and Windows 2019, as well as Linux.
I would recommend the solution to those planning to use it.
Overall, I rate the solution a ten out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. msp
Senior Talent Sourcer, Digital at Digitaltrack
Supports virtual patching, and is easy to deploy, use, and manage
Pros and Cons
- "Virtual patching is a wonderful feature where we do a recommendation scan and an internal assessment on the server, and it updates the IPS signatures to block any attack. I have seen instances where it has prevented attacks on the end-of-support servers such as 2018 R2, and many years ago, even 2007 servers that were end-of-support. It certainly helped there."
- "I've not worked with CrowdStrike Falcon, but one of our customers also had CrowdStrike Falcon on some of the devices. I was only supporting Trend Micro. They had a ransomware attack, but Trend Micro didn't detect that particular ransomware attack, whereas CrowdStrike did."
What is most valuable?
The virtual patching features of Trend Micro Deep Security are very good. If you're running an unpatched server and you need to do n-1 patching, you need to wait for a month for the patch to be rolled out. That one month is a long time for an attacker to do an attack. Virtual patching is a wonderful feature where we do a recommendation scan and an internal assessment on the server, and it updates the IPS signatures to block any attack. I have seen instances where it has prevented attacks on the end-of-support servers such as 2018 R2, and many years ago, even 2007 servers that were end-of-support. It certainly helped there.
Another big advantage of Trend Micro at the time was that it supported Linux. Nowadays, most of the vendors seem to be supporting the Linux operating system, but Trend Micro was the initial organization that started supporting Linux and anti-malware solutions. It only had the anti-malware solution. It didn't do file integrity monitoring or other things.
Trend Micro Deep Security is easy to use and deploy.
What needs improvement?
I've not worked with CrowdStrike Falcon, but one of our customers also had CrowdStrike Falcon on some of the devices. I was only supporting Trend Micro. They had a ransomware attack, but Trend Micro didn't detect that particular ransomware attack, whereas CrowdStrike did. I was not a big fan of CrowdStrike till then, but when I saw that Trend Micro couldn't detect that particular attack but CrowdStrike could, my opinion changed. All the servers with Trend Micro were impacted, but all the devices on which CrowdStrike agents were running weren't impacted. CrowdStrike detected and blocked the attack immediately. From that perspective, I have high regard for CrowdStrike because the role of an EDR is to detect and respond immediately and block an attack. Containment is the first priority. Trend Micro can give numerous ifs and buts about why it couldn't detect that attack, and even though I'm a fan of Trend Micro and have extensive experience with Trend Micro Deep Security and Trend Micro Apex One, in that particular instance, CrowdStrike literally beat Trend Micro.
A disadvantage of Trend Micro as compared to CrowdStrike is that it doesn't work well with other solutions. If you have McAfee for anti-malware and IPS and the firewall of Trend Micro, they don't go very well. I had challenges deploying it with Carbon Black as well as McAfee and Symantec. It's because of the way Trend Micro works. It integrates with the NIC driver, so if two agents are running, it doesn't work well because they both want to integrate with the NIC driver.
How was the initial setup?
It's easy to deploy. I've deployed it for more than 12,000 devices, which includes endpoints and servers. It's easy to deploy and easy to manage. You can do it automatically through the script. The ease of implementation and ease of management are there, but there are a few challenges. Linux compatibility has some issues because it's a kernel-based rollout. Especially with CentOS, I face challenges. CentOS is now Red Hat, so if we are running CentOS, we have to deploy Red Hat agents and not CentOS agents. It's not that easy to manage on Linux. If it's a stable, standard Linux version, it works, but with beta versions, there are some challenges.
What's my experience with pricing, setup cost, and licensing?
CrowdStrike had an advantage over Trend Micro when it came to pricing. Trend Micro had several modules, so it was a little priced up, but CrowdStrike was not. However, even CrowdStrike has increased their price now, so probably both of them are on par, but the number of modules that Trend Micro has is far more than CrowdStrike. It comes with file integrity monitoring, application control, and web reputation. It has outbound URL protection, and it also has ransomware protection for servers, whereas CrowdStrike Falcon is a straightforward solution. It isn't an apple-to-apple comparison. It's a big apple versus small apple kind of comparison.
What other advice do I have?
My general advice to everyone is to first define your must-haves. What is it that you are looking for in a product? Nowadays, there are so many products with overlapping features, so you need to first decide what it is you are looking for. From a feature perspective, you should define must-haves and nice-to-have.
You also need to test it out if you are running multiple products on the same server. You need to test it out on the utilization side because there is a huge utilization hit if you are running multiple agents on the same server. You need to work it out because Trend Micro, CrowdStrike, or any other agent would require a good amount of memory. There should be dedicated memory for them. If there is a 16-gig memory, at least 2-gig memory should be dedicated to them. There should be 2 gigs for it to just work and 8 gigs for the OS, so we are talking about a minimum of 10 gigs. If your servers are running on low memory, there'll be a huge utilization hit on the servers. Therefore, you need to choose the right agent. If you are running multiple agents, then you probably need to do a capacity evaluation before purchasing any of the tools. There are trial versions available, and PoCs are also available, so you can certainly check on it and see the utilization. Do proper homework before purchasing the tool. The tool is good, and it will perfectly work fine, but it also depends on the implementation.
At this time, I'd rate it an eight out of ten because of the challenge that I faced when I was dependent on this, but it couldn't protect the server. However, by now, Trend Micro would have fixed the problem that I faced a year ago. I know their Singapore EDR team. I worked with them, and they are quick in terms of fixing any bugs or issues. They would've definitely looked into it, but that was one instance for me where CrowdStrike outperformed Trend Micro.
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
Senior Officer Security Operations Center at a financial services firm with 10,001+ employees
High availability, effective VPM, and responsive support
Pros and Cons
- "The VPN is the most prized characteristic of Trend Micro Deep Security, which in addition addresses all zero-day vulnerabilities. This allows us to confidently transfer our system physically, as it presents to the external world, whether it be an intruder or a hacker, that our system is completely secure without any weak spots. Even if the latest security patches have not been installed or updated, the software virtually covers them for you."
- "There is room for improvement with Trend Micro Deep Security, as there are instances where installations may need to be redone. There seem to be glitches when working with older Windows servers, such as those from 2003 or 2005, requiring us to uninstall and reinstall the product to resolve the issue."
What is our primary use case?
We were using Trend Micro Deep Security for the sole purpose of virtual cloud management. It was the best VPM solution in the market, and other sites recognize the quality, such as the Gartner website.
What is most valuable?
The VPM is the most prized characteristic of Trend Micro Deep Security, which in addition addresses all zero-day vulnerabilities. This allows us to confidently transfer our system physically, as it presents to the external world, whether it be an intruder or a hacker, that our system is completely secure without any weak spots. Even if the latest security patches have not been installed or updated, the software virtually covers them for you.
What needs improvement?
There is room for improvement with Trend Micro Deep Security, as there are instances where installations may need to be redone. There seem to be glitches when working with older Windows servers, such as those from 2003 or 2005, requiring us to uninstall and reinstall the product to resolve the issue.
For how long have I used the solution?
I have been using Trend Micro Deep Security for approximately two years.
What do I think about the stability of the solution?
The stability of Trend Micro Deep Security is highly reliable. The updates are done quickly.
What do I think about the scalability of the solution?
Trend Micro Deep Security is highly scalable but requires licenses to be purchased for each endpoint that is configured. This may result in additional costs. However, it is compatible with a wide range of operating systems, including AIX, Linux, Windows Server, and Windows desktop operating systems.
We had two people managing Trend Micro Deep Security in my organization.
How are customer service and support?
Most of the time, the support provided by Trend Micro Deep Security was limited to sending us troubleshooting steps that were already available on their public sites, indicating a need for improvement in this area. However, their response time was very quick, with a reply to my ticket within minutes, depending on the level of escalation. Overall, they were quite supportive.
How was the initial setup?
The initial setup of Trend Micro Deep Security was easy. The setup process is GUI-based and straightforward. With just a few clicks, it can be installed on a virtual machine, and network access is then required. After installation, users can access the web application interface and proceed from there.
The deployment took approximately 10 to fifteen days if I exclude the network accesses.
What's my experience with pricing, setup cost, and licensing?
If you want to scale the solution you will have to adjust the license.
What other advice do I have?
If you manage a large IT infrastructure with hundreds of servers, it is not feasible to address them all at once, making Trend Micro Deep Security an excellent choice for first-time users. I highly recommend this solution to enterprise-level or large organizations that are hosting numerous servers. It is extremely helpful and saves a lot of time.
It is one of the best vulnerability management systems available on the market, providing fast management solutions.
I rate Trend Micro Deep Security for approximately a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Trend Micro Deep Security Report and get advice and tips from experienced pros
sharing their opinions.
Updated: September 2025
Popular Comparisons
Akamai Guardicore Segmentation
VMware NSX
Aqua Cloud Security Platform
Cisco Secure Workload
Check Point CloudGuard Network Security
Trend Micro TippingPoint Threat Protection System
Juniper vSRX
Symantec Data Center Security
vArmour DSS
Sophos Virtualization Security
Entrust CloudControl
Buyer's Guide
Download our free Trend Micro Deep Security Report and get advice and tips from experienced pros
sharing their opinions.