We use Trend Micro Deep Security for servers and not for endpoints. So when it comes to the server, the key feature or reason why we went for Deep Security is because of its virtual patching. Usually, the server owners don't tend to keep their servers updated with the latest Microsoft patches. Trend Micro Deep Security provides a layer of security and virtual patching. So even if the server is not patched manually, it ensures that it is protected through this virtual VM.
HICT Administrator (Security Operations Lead) at HICT
Along with a straightforward installation process, it provides virtual patching functionality
Pros and Cons
- "It is a scalable solution. If required, we can scale it more. That's not an issue...The solution's initial setup process was straightforward."
- "In the solution, servers often go offline for various reasons, requiring us to manually check the cause or issue, such as connectivity issues, and to find out why the agent went offline."
What is our primary use case?
What is most valuable?
Virtual patching is one feature I found to be the most valuable in the solution.
What needs improvement?
In the solution, servers often go offline for various reasons, requiring us to manually check the cause or issue, such as connectivity issues, and to find out why the agent went offline. The aforementioned details are to be considered for improvement in the solution.
I would like the solution to improve its stability and ability to go online and offline.
For how long have I used the solution?
I have experience with Trend Micro Deep Security for four years. Also, I am using the solution's latest version.
Buyer's Guide
Trend Micro Deep Security
April 2025

Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
851,823 professionals have used our research since 2012.
What do I think about the stability of the solution?
Stability-wise, I rate the solution an eight out of ten. No solution is fully secured or always up to the mark. All solutions have pros and cons.
What do I think about the scalability of the solution?
It is a scalable solution. If required, we can scale it more. That's not an issue. Three engineers in my company use the solution.
How are customer service and support?
Our company has contacted the technical support of the solution, and they were good.
How was the initial setup?
The solution's initial setup process was straightforward. For deployment, we have more than a thousand servers. So, it took a month to roll out. One of the steps in the deployment process is leading the team involved in the technical part. We are deploying using Microsoft SAP. So through that, we push the agents to all the servers, and sometimes it requires a restart in some of the agent updates, and sometimes it doesn't require a restart. So, coordination is required during deployment.
For deployment and maintenance, four to five engineers are required.
What about the implementation team?
Our company usually opts for vendor support and principal vendors also.
What other advice do I have?
I would recommend the solution to those planning to use it. Overall, I rate the solution an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Head of Data Link at Telecom Egypt
Good agentless protection feature for virtual and cloud environments
Pros and Cons
- "The agentless protection is very nice in Trend Micro."
- "The implementation can be inflexible and not easy, as it requires knowledge of things like virtualization and administration on Windows."
What is our primary use case?
Agentless protection is very good for certain use cases.
What is most valuable?
The agentless protection is very nice in Trend Micro.
What needs improvement?
The implementation is hard to deploy, and it should be easier. There is room for improvement here.
The implementation can be inflexible and not easy, as it requires knowledge of things like virtualization and administration on Windows.
For how long have I used the solution?
I have been using Trend Micro Deep Security for two years.
What do I think about the stability of the solution?
It is a stable solution. There is always room for stability.
What do I think about the scalability of the solution?
I would rate the scalability a nine out of ten.
How are customer service and support?
The customer service and support team is good.
Which solution did I use previously and why did I switch?
I have also used Kaspersky and VMware.
How was the initial setup?
The deployment process was long. It took about two months for the last implementation I did.
What about the implementation team?
A few teams are involved in the deployment and maintenance process, such as the team that changes the tools, the team that handles the solution, and the team that handles devices.
What's my experience with pricing, setup cost, and licensing?
The license cost is based on the socket of the server's host and the number of hosts that will be integrated. I wouldn't give it a perfect ten because the license situation can be improved.
What other advice do I have?
I would recommend it. It's a good antivirus solution and helps to secure the system and investments.
Overall, I would rate the solution a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Implementer
Buyer's Guide
Trend Micro Deep Security
April 2025

Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
851,823 professionals have used our research since 2012.
CTO at RightCloud Pte. Ltd.
Virtual patching makes it easier, and you are protected as soon as the patch is released
Pros and Cons
- "For day-to-day efficiency, it provides a good dashboard, so our team can be active 24/7 instead of doing a lot of manual stuff. We just look at the dashboard, and it's all done."
- "It needs to improve its integration with a lot of other products. This should be in the road map because we have a lot of SaaS-based appliances which are not connected with each other."
What is our primary use case?
It's used as a part of our managed solutions. Security is key for them because we have seen a lot of ransomware in the past. We do very well on security side, whether it is application network or a host-based security. This is one of the offerings that we offer to our customer by default.
As it is a core part of our managed services, it integrates with other products which revolve around patch management. We have our own IP which takes care of the actual patch management that we leverage. We also have a lot of monitoring platforms with a single, integrate dashboard taking the data from the APIs.
How has it helped my organization?
Previously, a lot of attacks happened.
Sometimes, you have your files which you don't want anybody to change. With this product, you can monitor that very easily. Therefore, whenever someone tries to play with that file, you receive an alert.
For day-to-day efficiency, it provides a good dashboard, so our team can be active 24/7 instead of doing a lot of manual stuff. We just look at the dashboard, and it's all done.
What is most valuable?
- Anti-malware
- IPS
- IDS
- Prevention against the ransomware
- File integrated monitoring
- Virtual patching
Every module is important because it serves a different purpose.
Because a lot of vulnerabilities are coming out, we work with a lot of large enterprises using virtual patching. It is very difficult to patch, because you have to take approvals, and go through the cycle, as there is a proper process in place. However, if you have virtual patching, it makes it easier, and you are protected as soon as the patch is released.
What needs improvement?
It needs to improve its integration with a lot of other products. This should be in the road map because we have a lot of SaaS-based appliances which are not connected with each other. Thus, I'm looking forward to more integrations coming together as a part of the product.
Going forward, I would like to have more APIs and integration with more application monitoring intelligence platforms.
For how long have I used the solution?
More than five years.
What do I think about the stability of the solution?
Stability-wise, it is one of the best in the market. However, since a lot of innovation is happening, it comes with a lot of risk as well. Certain times, we have seen where a customer is being attacked irrespective of if the product was there. The reason is that patch is not available. While I know the team who works on it does a lot proactively, sometimes things get missed out.
What do I think about the scalability of the solution?
We have customers in five to six different regions, ranging from Japan, Korea, Singapore, India, and the U.S. We use it for a lot of our customers (about 90 percent). Their size ranges from 500 servers to thousands of servers. We work with a lot of enterprises, including Telco, retail, government sector, and media.
How is customer service and technical support?
We are very well-connected with our technical support. Most of our team is quite trained on the product. 95 percent of the time, our team doesn't need the technical support team's help.
How was the initial setup?
The integration and configuration in our AWS is user-friendly. When you work with enterprise, you have a multi-cloud strategy. We can deploy it in AWS and use it in other clouds as well. So, it is pretty robust.
What was our ROI?
In the case of ransomware, every time it happens, for every machine that you have, you have to pay something like $400 USD or more. With Trend Micro, you are paying a couple of dollars every month to save the environment, and you don't have to go into that part where you pay a hacker to get back your data. Therefore, it's a good ROI, though it's an investment.
What's my experience with pricing, setup cost, and licensing?
We are an original partner with AWS, so a couple of customers chose to directly take it from AWS Marketplace. A couple of customers will want us to take care of the billing. So, it's a mixed type of reaction that we receive from the customer. Eventually, for us, it matters that customers are secure.
The customers can deploy in their environment and the licensing model goes through our reseller.
The price is reasonably good as compared to other products into the market.
Which other solutions did I evaluate?
There are products, like Symantec, but Deep Security from Trend Micro is quite helpful for us. It is being absorbed by a lot of customers, whether they belong to an enterprise or the public sector. It is highly adopted.
We went with Trend Micro because it was more cloud native, the architecture was more on the high availability side of it, and it had the the implementation that we wanted.
What other advice do I have?
Do your evaluation well. After the core evaluation, choose what fits best for your customer.
I used to previously work with on-premise solutions and private cloud. Now, I work with AWS.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Manager at a manufacturing company with 1,001-5,000 employees
Has valuable intrusion prevention capabilities, helping us block unauthorized connections
Pros and Cons
- "The platform's IP detection feature is particularly effective in identifying connections to our servers."
- "There could be a centralized management server to oversee all platform functionalities."
What is most valuable?
The platform's IP detection feature is particularly effective in identifying connections to our servers.
What needs improvement?
There could be a centralized management server to oversee all platform functionalities.
For how long have I used the solution?
We have been using Trend Micro Deep Security for approximately three years.
What do I think about the stability of the solution?
I would rate the product's scalability a seven out of ten.
What do I think about the scalability of the solution?
The scalability was limited; the product did not detect as many behavioral patterns as CrowdStrike, which provided more comprehensive insights.
How are customer service and support?
The technical support experience was good, but there was room for improvement in terms of response time.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We decided to switch to a more AI-based solution from Trend Micro to address the rise in ransomware attacks better and reduce the number of servers needed for management.
What's my experience with pricing, setup cost, and licensing?
While the pricing was on the higher side, the manageability and comprehensive alerts provided by the product justified the cost. I paid approximately 26,000 per license. There is an additional cost involved for support services.
Which other solutions did I evaluate?
I compared the product to McAfee.
What other advice do I have?
The product's intrusion prevention capabilities were beneficial as they allowed me to block unauthorized connections and potential threats at both the server and firewall levels.
I rate Trend Micro Deep Security a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
IT Security Specialist at TT Systems LLC
Offers a good firewall that blocks unwanted ports
Pros and Cons
- "For server security purposes, I like the product's firewall."
- "Sometimes, the product is not very stable, but it is something that depends on the infrastructure in which the tool is used."
What is our primary use case?
I use the solution in my company to reduce SMB attacks on the data center site and ensure data center protection from flooding and threats.
What is most valuable?
For server security purposes, I like the product's firewall. The firewall has three features we use in our company, of which one controls flooding, the other blocks unwanted ports, and the third allows us to control traffic via Deep Security if the firewall port is open from the switch or router side.
What needs improvement?
In our company's infrastructure, we have not faced any challenges with the product. Considering the lack of issues or challenges faced with the use of the product in our company's environment, I feel that it is a good solution.
Sometimes, the product is not very stable, but it is something that depends on the infrastructure in which the tool is used. The aforementioned area can be considered for improvement.
If Trend Micro Deep Security wants to implement some new features in it, then I would say that it should focus from a networking point of view and see how to control network traffic specifically coming from external to internal traffic on the servers.
For how long have I used the solution?
I have been using Trend Micro Deep Security for two years. My company operates as a system integrator for Trend Micro.
What do I think about the stability of the solution?
If I consider my company's infrastructure, everything is good with the product because we have enabled the threat protection systems to control our environment, so we don't see any suspicious activities.
I rate the solution's stability as ten out of ten.
What do I think about the scalability of the solution?
Scalability-wise, it is a good tool, and I rate the solution as nine out of ten.
How are customer service and support?
When it comes to technical support, I would say that none of the products are bad, and all the tools are usually good. There are a few areas where certain modifications or changes are required, and it is something that varies from client to client. In my opinion, all products, including Symantec and Trend Micro, are good. Based on the infrastructure of users and what they want to implement, there are a few things that Trend Micro should understand. I rate the technical support an eight out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I work with Trend Micro Endpoint Security with Apex One. I also use Symantec.
How was the initial setup?
If I consider my company's infrastructure, everything is good with the product because we have enabled the threat protection systems to control our environment, so we don't see any suspicious activities.
I rate the solution's stability as ten out of ten.
The solution is deployed on the cloud.
Which other solutions did I evaluate?
Symantec and Trend Micro Deep Security are good products, and I don't have any issues with either of the solutions, specifically from a technical perspective.
The costs associated with both the products are taken care of by the sales department or management in our company. Symantec and Trend Micro Deep Security have features that are almost 80 to 90 percent similar. The only area where Symantec needs to improve is related to the remote capabilities it offers.
What other advice do I have?
The product's intrusion prevention system works fine, but we have not implemented any other policies in our company. In our company, we use the default policy in our environment to deal with and prevent intrusions, so we have not customized any policies associated with the intrusion prevention system. With the default policies in place, whenever there is some traffic coming in, the tool will automatically detect, allow, or take action based on the signatures.
I have learned many things while using the product, including the fact that it is very important for a company to decide what they want before purchasing a solution.
I rate the tool a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Integrator
Senior Technical Specialist at Softcell Technologies Limited
Easy to set up with good protection and helpful support services
Pros and Cons
- "It can scale well."
- "Sometimes the patching is a bit slow."
What is our primary use case?
We primarily use the solution for security and analysis. We provide the solution to our customers who want to protect endpoint security, and this offers a level of protection for endpoints. For customers using the solution for development and in the production environment, it can be used on the server.
It has application control, log integration, and monitoring. Everything there is in Deep Security. They can look at the product to see how it is working and what its usage is.
What is most valuable?
The solution offers many good features, including application control, IPS engines, logging, anti-malware, and integrated monitoring. The IPS is the best.
It offers a good level of protection.
It is easy to setup.
The solution is stable.
It can scale well.
Technical support is very good.
What needs improvement?
We're using the manager and cloud security. The cloud security does have different features available.
If they continue to offer better protection, we can do a better job of offering protection at the first level.
Sometimes the patching is a bit slow.
We need to have them do a better job of protecting the servers.
There needs to be a bit of maintenance time before running the solution on production.
The pricing could always be better. Some clients would appreciate it if the pricing was reduced.
For how long have I used the solution?
I've been using the solution for four years.
What do I think about the stability of the solution?
The solution is stable. However, we have to do some workarounds. We need to keep monitoring to ensure it is stable. We need to keep up with everything and how it will work together in order to ensure security. We don't want to affect the applications before placing them in production mode, so we need to provide all of the requirements and policies before going live.
What do I think about the scalability of the solution?
The scalability depends on the customer. It can scale by storage or endpoints. There's no problem with extending it.
We have various clients on the solution. Some clients have different departments. We've had 60 to 70 customers on the solution, and we provide the solution to them according to their needs.
How are customer service and support?
Technical support is very helpful and responsive. They work based on priorities. If it is more critical, they move the ticket up. We get answers within a day or two depending on the severity.
How was the initial setup?
We find the solution very easy to set up, even for enterprises. We can set it up on primary and secondary servers.
Based on the requirements of the customer, we'll deploy the solution to match their needs.
We can install and implement the solution within one to two hours. It can be set up in 20 minutes; however, testing the use cases takes one to two hours on top of that.
We always recommend a check of the servers before beginning. Whether it is Windows or Linux, we make sure we implement the latest security measures.
We give the clients a checklist and go through everything once we begin the installation. Then we deal with the dependencies and the connectivity.
What about the implementation team?
I'm able to assist clients with the implementation.
What's my experience with pricing, setup cost, and licensing?
Licensing depends on the requirements. You can extend the license and grow it if you need to.
The solution isn't overly expensive. However, it can vary from quarter to quarter.
I'm on the technical team, so I can't speak to the exact cost.
What other advice do I have?
I'm an implementor. We provide the endpoint and server security.
I'd recommend the solution to other users.
I would rate the product nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Implementer
Provides good support and threat prevention
Pros and Cons
- "Support and threat prevention are the most valuable features of this solution."
- "Trend Micro is scalable if you have the budget for it."
What is our primary use case?
Trend Micro Deep Security protects our organization from threats. Trend Micro has kept us compliant with PCI and PPA.
What is most valuable?
Support and threat prevention are the most valuable features of this solution.
For how long have I used the solution?
I have been using Trend Micro Deep Security for five years.
What do I think about the stability of the solution?
The solution is stable. Trend Micro gets threat intelligence and is always up-to-date with all cybersecurity threats zero-day. Updates are provided through our email. If anything needs to be adjusted on our system, or their product, they will advise us right away.
What do I think about the scalability of the solution?
Trend Micro is scalable if you have the budget for it. All of our 2,500 employees are covered with Trend Micro Deep Security.
How are customer service and support?
The support from Trend Micro Deep Security is good. The company has a good knowledge base where we can troubleshoot any issues. We also have a support portal with them where we can raise issues that we can't solve on our own. This includes on-call support with them in case the issue needs to be resolved urgently.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Prior to using Trend Micro, we were using Sophos.
How was the initial setup?
The initial setup of the product was straightforward. All you need to do is install the firmware, ensure the firewall connections are open, and you are done.
What about the implementation team?
It took about one month for us to deploy Trend Micro Deep Security. We had an integrator deploy the pilot of the first 30. After the pilot, our team deployed the rest.
What's my experience with pricing, setup cost, and licensing?
If you need an additional 10 or 20 licenses, you will need to pay additional fees.
What other advice do I have?
This product is one of the leaders in terms of endpoint protection, server protection, and network protection. They provide good support, and it is easy to deploy. They are scalable, and the threat intelligence is very good. They stay up to date with what is happening in the cyber world.
Personally, I like anti-malware and integrity monitoring. The anti-malware has its own behavioral monitoring and machine learning. It detects all species and objects in the server or the file integrity monitoring. If there are any changes on the server side, they will alert you. I would like to see these tools as part of Trend Micro Deep Security.
I would rate Trend Micro Deep Security a nine out of ten overall.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Principal Infrastructure Security Architect at OSI
We use it for managing application whitelisting, and intrusion detection and prevention for the CLOUD Act
Pros and Cons
- "The integration and configuration of this product in our AWS environment was good. We haven't had any problems at all."
- "The initial setup needs improvement, as it was a bit challenging."
What is our primary use case?
It is for managing application whitelisting, and intrusion detection and prevention for the CLOUD Act.
What is most valuable?
- It is flexible.
- The configuration is quite easy.
What needs improvement?
The initial setup needs improvement. Once it is set up, the configuration is relatively simple. However, the initial setup was a bit of a challenge.
What do I think about the stability of the solution?
We haven't had any issues with stability. It has been rock solid for us.
In the past year, it is still a fairly lightweight environment, so there has not been a lot of stress.
What do I think about the scalability of the solution?
Size of our particular environment is about 200 systems. The scalability has worked very well for us.
How is customer service and technical support?
We used the technical support for setting up profiles. Working with them was pretty good, they are extremely responsive and helpful.
How was the initial setup?
The integration and configuration of this product in our AWS environment was good. We haven't had any problems at all.
What was our ROI?
We haven't really seen ROI so far. Since it is a light traffic environment right now, the product hasn't had that many incidents to deal with yet.
What's my experience with pricing, setup cost, and licensing?
Our company chose to procure this product via AWS Marketplace due to regulatory requirements. We mostly use it in the AWS GovCloud.
Which other solutions did I evaluate?
I was not at the company when they evaluated the other products. I do know that they evaluated Symantec.
Trend Micro was selected because it has better whitelisting of applications, its intrusion detection was far superior, and it has configurability.
What other advice do I have?
The best approach is to start off with a node where it is sort of monitoring and looking at stuff, then work your way into the actual prevention and blocking. Because it can turn off a bunch of services without too much effort which can be good, but it can also shut things down.
We haven't really gone into the integration aspect yet.
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Buyer's Guide
Download our free Trend Micro Deep Security Report and get advice and tips from experienced pros
sharing their opinions.
Updated: April 2025
Popular Comparisons
Akamai Guardicore Segmentation
VMware NSX
Cisco Secure Workload
Trend Micro TippingPoint Threat Protection System
Check Point CloudGuard Network Security
Juniper vSRX
Symantec Data Center Security
Sophos Virtualization Security
vArmour DSS
Buyer's Guide
Download our free Trend Micro Deep Security Report and get advice and tips from experienced pros
sharing their opinions.