Try our new research platform with insights from 80,000+ expert users
Anil Chauhan - PeerSpot reviewer
Information Security Specialist at SG Fleet Group Ltd
Real User
Top 20
Offers a super easy setup phase to users
Pros and Cons
  • "The most valuable features of the solution are the log inspection and the IPS, which are the most effective compared to other tools."
  • "The tool needs to be made more user-friendly. The dashboard is there, but the solution's false positives are a bit higher."

What is our primary use case?

I work in a finance-based company, so what we look at would be an anti-malware suite to inspect IPS policies, firewalls, and other such stuff.

What is most valuable?

The most valuable features of the solution are the log inspection and the IPS, which are the most effective compared to other tools.

Log inspection completely reviews all the logs on the machine rather than me going and investigating. I can take a quick look into the issues with Trend Micro Deep Security.

What needs improvement?

The tool needs to be made more user-friendly. The dashboard is there, but the solution's false positives are a bit higher.

For how long have I used the solution?

I have been using Trend Micro Deep Security for three years. I am a customer of the solution.

Buyer's Guide
Trend Micro Deep Security
September 2025
Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.

What do I think about the stability of the solution?

It is a stable solution. Stability-wise, I rate the solution a six to seven out of ten.

What do I think about the scalability of the solution?

I have no complaints about the scalability of the product. Scalability-wise, I rate the solution a seven out of ten.

How are customer service and support?

If I speak about the support directly from Trend Micro's team, I rate the technical support as five out of ten.

If I consider the support that I get from Trend Micro's sales engineering team, I would rate the support as a seven or eight. The support team does not reply, and if they do, they provide a response after a week, even if you say that we urgently need their help. The local team in my country, which is the engineering team from the sales side, contacted us and asked whether they could help us in any way with the ticket raised from our end.

How would you rate customer service and support?

Neutral

How was the initial setup?

The product's initial setup phase was super easy. Trend Micro's team was there to support us when we were setting it up. The sales team and sales engineering team were also helpful.

If ten means very easy setup and one means difficult, I rate the setup phase a seven to eight.

Within business hours, the solution was deployed in two days, considering that there was a need to set up policies and servers.

What other advice do I have?

With Trend Micro's virtual patching in place, the IPS rules are quite effective, so I don't have to patch my systems right away. Trend Micro has been quite aggressive in releasing the IPS rules, which protect our servers from any such incidents.

I wouldn't think that I have seen any reduction in security-related costs since implementing the solution. I have not seen a reduction in the pricing of the security suite, given the fact that the risks have been increasing worldwide or at a global level. We have to put more money to protect ourselves.

I would not blame Trend Micro for not ensuring that users see the cost reductions. Considering the many developments in the general market, the tool has to stay updated.

The compliance management in Trend Micro Deep Security has not very much improved the security audits, especially since we are using the on-prem version. With the on-prem version, you don't get much of the compliance management part. The SaaS version is quite different and we are looking to switch to it.

The fact that Trend Micro Deep Security has integrated everything with Trend Vision One is something that is more than sufficient.

We are using the tool's on-prem version, so I don't think I have seen anything related to AI.

I have not seen anything related to automation in the tool.

The suite is better, so when you are buying a product, make sure that you squeeze everything into one since that is where the real money lies.

I think the major value for my company does not come from Trend Micro Deep Security but from Trend Micro Vision One, XDR Telemetry, and everything else.

If a person has completed the integration, you don't have to look at the different modules of Trend Micro Deep Security, as you can just log into Trend Vision One and do all the XDR analysis.

I rate the tool an eight out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Vikas Saxena - PeerSpot reviewer
Information Technology Manager at BCML
Real User
Top 5
Provides good vulnerability assessment and real-time scanning features
Pros and Cons
  • "The most valuable and advanced feature of the solution is the ability to check vulnerabilities."
  • "The solution's reports should include more details of events like device control, live health status of the server, and inventory management."

What is our primary use case?

We are using the solution for IPS and XDR.

What is most valuable?

Trend Micro Deep Security has fantastic and very advanced features. The most valuable and advanced feature of the solution is the ability to check vulnerabilities. The solution's real-time scanning allows me to monitor my entire network.

What needs improvement?

The solution's reports should include more details of events like device control, live health status of the server, and inventory management.

For how long have I used the solution?

I have been using Trend Micro Deep Security for two years.

What do I think about the stability of the solution?

Trend Micro Deep Security is a very stable solution. Our network and servers haven't experienced any downtime.

I rate the solution’s stability ten out of ten.

What do I think about the scalability of the solution?

I rate the solution a nine out of ten for scalability.

How are customer service and support?

The solution's technical support is good and responsive.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We previously used a different solution. We switched to Trend Micro Deep Security because we wanted cloud deployment and more advanced security. Trend Micro Deep Security has modules like vulnerability assessment and TAC mode, which were not available in our previous tool.

How was the initial setup?

The solution's initial setup is very easy. The solution can be deployed within a few minutes.

What's my experience with pricing, setup cost, and licensing?

The solution’s pricing is reasonable.

What other advice do I have?

We are using Trend Micro Deep Security on our servers, which are in TAC mode. We can only monitor them, and the servers are behind the firewall. We are using the solution only in our LAN environment. There is no direct internet traffic on that server. Since we only work in the LAN environment, we don't get any IPS events. It is very easy to deploy the client and manage the console.

Overall, I rate the solution ten out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Trend Micro Deep Security
September 2025
Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
868,787 professionals have used our research since 2012.
SuhailSyed - PeerSpot reviewer
HICT Administrator (Security Operations Lead) at HICT
Real User
Along with a straightforward installation process, it provides virtual patching functionality
Pros and Cons
  • "It is a scalable solution. If required, we can scale it more. That's not an issue...The solution's initial setup process was straightforward."
  • "In the solution, servers often go offline for various reasons, requiring us to manually check the cause or issue, such as connectivity issues, and to find out why the agent went offline."

What is our primary use case?

We use Trend Micro Deep Security for servers and not for endpoints. So when it comes to the server, the key feature or reason why we went for Deep Security is because of its virtual patching. Usually, the server owners don't tend to keep their servers updated with the latest Microsoft patches. Trend Micro Deep Security provides a layer of security and virtual patching. So even if the server is not patched manually, it ensures that it is protected through this virtual VM.

What is most valuable?

Virtual patching is one feature I found to be the most valuable in the solution.

What needs improvement?

In the solution, servers often go offline for various reasons, requiring us to manually check the cause or issue, such as connectivity issues, and to find out why the agent went offline. The aforementioned details are to be considered for improvement in the solution.

I would like the solution to improve its stability and ability to go online and offline.

For how long have I used the solution?

I have experience with Trend Micro Deep Security for four years. Also, I am using the solution's latest version.

What do I think about the stability of the solution?

Stability-wise, I rate the solution an eight out of ten. No solution is fully secured or always up to the mark. All solutions have pros and cons.

What do I think about the scalability of the solution?

It is a scalable solution. If required, we can scale it more. That's not an issue. Three engineers in my company use the solution.

How are customer service and support?

Our company has contacted the technical support of the solution, and they were good.

How was the initial setup?

The solution's initial setup process was straightforward. For deployment, we have more than a thousand servers. So, it took a month to roll out. One of the steps in the deployment process is leading the team involved in the technical part. We are deploying using Microsoft SAP. So through that, we push the agents to all the servers, and sometimes it requires a restart in some of the agent updates, and sometimes it doesn't require a restart. So, coordination is required during deployment.

For deployment and maintenance, four to five engineers are required.

What about the implementation team?

Our company usually opts for vendor support and principal vendors also.

What other advice do I have?

I would recommend the solution to those planning to use it. Overall, I rate the solution an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Head of Data Link at Telecom Egypt
Real User
Top 5
Good agentless protection feature for virtual and cloud environments
Pros and Cons
  • "The agentless protection is very nice in Trend Micro."
  • "The implementation can be inflexible and not easy, as it requires knowledge of things like virtualization and administration on Windows."

What is our primary use case?

Agentless protection is very good for certain use cases.

What is most valuable?

The agentless protection is very nice in Trend Micro.

What needs improvement?

The implementation is hard to deploy, and it should be easier. There is room for improvement here. 

The implementation can be inflexible and not easy, as it requires knowledge of things like virtualization and administration on Windows.

For how long have I used the solution?

I have been using Trend Micro Deep Security for two years. 

What do I think about the stability of the solution?

It is a stable solution. There is always room for stability.

What do I think about the scalability of the solution?

I would rate the scalability a nine out of ten. 

How are customer service and support?

The customer service and support team is good. 

Which solution did I use previously and why did I switch?

I have also used Kaspersky and VMware. 

How was the initial setup?

The deployment process was long. It took about two months for the last implementation I did.

What about the implementation team?

A few teams are involved in the deployment and maintenance process, such as the team that changes the tools, the team that handles the solution, and the team that handles devices.

What's my experience with pricing, setup cost, and licensing?

The license cost is based on the socket of the server's host and the number of hosts that will be integrated. I wouldn't give it a perfect ten because the license situation can be improved.

What other advice do I have?

I would recommend it. It's a good antivirus solution and helps to secure the system and investments.

Overall, I would rate the solution a nine out of ten. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Implementer
PeerSpot user
ArundevarajM - PeerSpot reviewer
Senior Technical Specialist at Softcell Technologies Limited
Real User
Easy to set up with good protection and helpful support services
Pros and Cons
  • "It can scale well."
  • "Sometimes the patching is a bit slow."

What is our primary use case?

We primarily use the solution for security and analysis. We provide the solution to our customers who want to protect endpoint security, and this offers a level of protection for endpoints. For customers using the solution for development and in the production environment, it can be used on the server.

It has application control, log integration, and monitoring. Everything there is in Deep Security. They can look at the product to see how it is working and what its usage is. 

What is most valuable?

The solution offers many good features, including application control, IPS engines, logging, anti-malware, and integrated monitoring. The IPS is the best.

It offers a good level of protection. 

It is easy to setup.

The solution is stable.

It can scale well.

Technical support is very good. 

What needs improvement?

We're using the manager and cloud security. The cloud security does have different features available.

If they continue to offer better protection, we can do a better job of offering protection at the first level.

Sometimes the patching is a bit slow.

We need to have them do a better job of protecting the servers. 

There needs to be a bit of maintenance time before running the solution on production.

The pricing could always be better. Some clients would appreciate it if the pricing was reduced. 

For how long have I used the solution?

I've been using the solution for four years. 

What do I think about the stability of the solution?

The solution is stable. However, we have to do some workarounds. We need to keep monitoring to ensure it is stable. We need to keep up with everything and how it will work together in order to ensure security. We don't want to affect the applications before placing them in production mode, so we need to provide all of the requirements and policies before going live. 

What do I think about the scalability of the solution?

The scalability depends on the customer. It can scale by storage or endpoints. There's no problem with extending it.

We have various clients on the solution. Some clients have different departments. We've had 60 to 70 customers on the solution, and we provide the solution to them according to their needs. 

How are customer service and support?

Technical support is very helpful and responsive. They work based on priorities. If it is more critical, they move the ticket up. We get answers within a day or two depending on the severity. 

How was the initial setup?

We find the solution very easy to set up, even for enterprises. We can set it up on primary and secondary servers.

Based on the requirements of the customer, we'll deploy the solution to match their needs.

We can install and implement the solution within one to two hours. It can be set up in 20 minutes; however, testing the use cases takes one to two hours on top of that. 

We always recommend a check of the servers before beginning. Whether it is Windows or Linux, we make sure we implement the latest security measures. 

We give the clients a checklist and go through everything once we begin the installation. Then we deal with the dependencies and the connectivity. 

What about the implementation team?

I'm able to assist clients with the implementation.

What's my experience with pricing, setup cost, and licensing?

Licensing depends on the requirements. You can extend the license and grow it if you need to.

The solution isn't overly expensive. However, it can vary from quarter to quarter. 

I'm on the technical team, so I can't speak to the exact cost. 

What other advice do I have?

I'm an implementor. We provide the endpoint and server security.

I'd recommend the solution to other users. 

I would rate the product nine out of ten. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Implementer
PeerSpot user
Tushar Sinha - PeerSpot reviewer
Technologist (IoT & Automation), IT & Digital at Tata Metaliks Limited
Real User
A stable solution that prevents ransomware attacks and other unauthorized access attempts
Pros and Cons
  • "It is a stable solution...The solution's initial setup was straightforward."
  • "It would be helpful if they could send emails notifying their users about the recommended upgraded versions to address the newly discovered vulnerabilities."

What is our primary use case?

In our company, all critical systems are connected to a Security Operation Center (SOC), and we use Trend Micro Deep Security on these servers. Our company is in the manufacturing industry, dealing with metals and mining processes, and many of our solutions are hosted on public IP and accessed from outside organizations' networks. Installing Trend Micro Deep Security helps us prevent ransomware attacks and other unauthorized access attempts. Since we are connected to SOC, we receive detailed information on any attempts to penetrate our systems from outside, apart from just letting us know if there are any vulnerabilities or not. Additionally, Trend Micro Deep Security provides features like sandboxing. However, we have not been able to utilize these features fully.

Since I wanted to know the additional features that Trend Micro Deep Security offers beyond what we currently use in our solution, I was trying to find a comparison between Trend Micro Deep Security and Trend Micro Apex One.

What is most valuable?

Virtualization and sandboxing are the two features available in the solution. I learned about these two features from our service provider, through whom we secured the license required for the solution. So, our service provider is a reseller and not directly related to Trend Micro. Also, I am yet to go through the technical documents of the solution since I couldn't find much information about the solution online.

Regarding the deployment process, we first conducted a study to identify potential vulnerabilities and cybersecurity requirements for the business. Once we clearly understood these objectives, we began exploring solutions that could meet them. We then evaluated options such as a Security Operations Center (SOC) and Trend Micro Deep Security as part of this process.

What needs improvement?

I haven't received any distribution emails from the Trend Micro team regarding recent vulnerabilities and their efforts to mitigate them. It would be helpful if they could send emails notifying their users about the recommended upgraded versions to address the newly discovered vulnerabilities. This is an area that could be improved from more of a marketing perspective than a technical aspect.

For how long have I used the solution?

In our company, we have been using Trend Micro Deep Security for at least two years now. Presently, we are using the latest version. So, we keep updating the solution. We provide the solution to the servers on a public IP.

What do I think about the stability of the solution?

It is a stable solution.

What do I think about the scalability of the solution?

It is a scalable solution. Considering the different price ranges available, one needs to buy a device. It needs device-based licensing. For instance, if 50 more devices in our organization require Trend Micro Deep Security, then I have to purchase 50 more licenses. So, scalability is not a challenge in the solution. Also, we have around 100 people in our organization using the solution.

The solution is being used very extensively in our organization. In the company where I work, we have only a single solution for all of our servers. That single solution is Trend Micro Deep Security. Also, we have been using Trend Micro Apex One for the past two or three years.

How are customer service and support?

I need to check with my team to know whether we ever interacted with the solution's technical support team.

How was the initial setup?

The solution's initial setup was straightforward. It's not kind of a cumbersome one.

The deployment process did not take more than two months post-order placement for the solution. So, Trend Micro Deep Security and SOC are two separate parts. For SOC's deployment, we took around six to nine months. Trend Micro Deep Security is a type of endpoint security solution which, post procurement, takes around four to six weeks to configure.

Regarding the solution's deployment model, the managing, monitoring and diagnostics part of the solution is on the cloud, while all of our clients have chosen an on-premises deployment model. Basically, the clients are installed on physical devices.

Previously we had support for a deployment and maintenance procedure from the service provider. Currently, the solution is managed by our team as it is deployed on-premises.

What's my experience with pricing, setup cost, and licensing?

We need to make yearly payments for the solution's licensing. There are different pricing models, like subscription-based and perpetual. Our company has chosen perpetual pricing. So for us, multiple reassignments are possible. If I choose one license and assign it to one device, I can later remove it from that device and assign it to a different one. Given the requirements that our company has, the solution is not too expensive.

Which other solutions did I evaluate?

According to our process, our organization usually explores three solutions by making a detailed technical comparison. After that, based on the business requirements, pricing and technical ratings that our experts provide, we go ahead with one of them. I do not know which two solutions were compared with Trend Micro Deep Security.

What other advice do I have?

Currently, my organization relies on Trend Micro Deep Security to meet its business needs in the cybersecurity space. It is important to stay vigilant and explore all possible cybersecurity interventions. Despite having access to many of the solution's features, my organization has not yet deployed them all. As our organization and its systems and solutions continue to grow, in our organization, we want to enable all of the solution's potential, which can provide us with security. Therefore, I was seeking to compare the additional features available within the solution to identify any that could provide significant security benefits to my organization.

I would definitely recommend the solution to those planning to use it. Overall, I rate the solution between eight to nine out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Harel Cohen - PeerSpot reviewer
Security Solution Architect at Safeway
Real User
Offers excellent endpoint protection and great stability
Pros and Cons
  • "The solution's endpoint protection is the most valuable feature."
  • "The email relays and proxies could be improved."

What is our primary use case?

I use the solution to provide general security for my enterprise clients, primarily for servers. Deployments include cloud and on-prem. 

How has it helped my organization?

I've been deploying Trend Micro for my clients for a long time, which has been a significant factor in our security posture.

What is most valuable?

The solution's endpoint protection is the most valuable feature. 

What needs improvement?

The email relays and proxies could be improved. 

For how long have I used the solution?

I've been using the solution for around 16 years.

What do I think about the stability of the solution?

The stability is very good. In my experience, everyone is in the same boat because every product has faults or challenges.

What do I think about the scalability of the solution?

The product is scalable; I rate it eight out of ten for scalability. 

How are customer service and support?

Technically speaking, the customer support is okay, but the responsiveness needs to be improved. I'm referring to the universal support, as the Israeli staff are excellent and always willing to help. However, opening a case and entering into a back-and-forth with emails takes too much time. It should be working more quickly and smoothly.

How would you rate customer service and support?

Neutral

How was the initial setup?

The deployment is straightforward; I rate it nine out of ten for ease of setup. The time the solution takes to set up depends upon the deployment's scale and complexity, as well as the use case.

What's my experience with pricing, setup cost, and licensing?

Trend Micro Deep Security is average compared to other products on the market; it's neither particularly expensive nor cheap.

What other advice do I have?

I rate the solution nine out of ten; it's in the top three or top five products of its type. 

My advice to others considering the solution is that two major considerations when looking for a product are stability and vendor company experience. Trend has been around for ages and has a good reputation; this and the stability work in their favor.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Mustufa Kamaal Afghan - PeerSpot reviewer
Specialist Enterprise Security Architect at Ooredoo Qatar
Real User
Excellent deep security solution with low footprint
Pros and Cons
  • "The solution has a low footprint and does not have a lot of impact on the host."
  • "The solution should focus on the EDR part and probably have an integrated data leak prevention module."

What is our primary use case?

Our company uses Trend Micro for anti-malware support on servers and user PCs. Its normal anti-virus, file integrity monitoring, and threat prevention modules are also active in our systems.

What is most valuable?

The overall vision and execution of the vendor are really good. The solution has a low footprint and does not have a lot of impact on the host. The reporting mechanism is also good, and at any given point in time, we can see how many endpoints are compliant. The product support is also good.

What needs improvement?

The solution should focus on the EDR part and probably have an integrated data leak prevention module as well.

In future releases, the solution should provide one agent who takes care of EDR, end-point security, DLP, and application control.

For how long have I used the solution?

I have been using Trend Micro Deep Security for more than five years.

What do I think about the stability of the solution?

It is a stable solution. I would rate its stability a ten out of ten.

What do I think about the scalability of the solution?

The solution is scalable. I would rate its scalability a ten out of ten. Currently, the solution is being used by around 4,000 users in our organization.

How are customer service and support?

The customer service and support team is good.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup is straightforward and only a matter of a couple of clicks. Once you have a design in place, deployment is not a challenge. In terms of time– one part goes into solution deployment and the other into solution adaptation. Solution deployment does not take much time; solution adaptation does.

What about the implementation team?

The solution was deployed by consultants. I think one professional from the system integrator or the OEM and one in-house resource are enough for this deployment.

Moreover, it is just like any other IT solution in terms of maintenance. Since it is installed on a server host, whatever general maintenance is required for that host is what’s needed—just general IT maintenance. We have an in-house team of IT and security engineers who take care of the maintenance.

What's my experience with pricing, setup cost, and licensing?

Just like in any other IT solution. General IT maintenance, we have an in-house team of IT and security engineers who take care of the maintenance.

What other advice do I have?

Before deploying a solution, new users must refer to market research. For companies like ours, we select top-of-the-line products. Although this is the best product suiting our requirements, the decision should be based on individual evaluation.

Overall, I rate the solution an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Trend Micro Deep Security Report and get advice and tips from experienced pros sharing their opinions.
Updated: September 2025
Buyer's Guide
Download our free Trend Micro Deep Security Report and get advice and tips from experienced pros sharing their opinions.