Try our new research platform with insights from 80,000+ expert users
Tushar Sinha - PeerSpot reviewer
Technologist (IoT & Automation), IT & Digital at a mining and metals company with 1,001-5,000 employees
Real User
Mar 28, 2023
A stable solution that prevents ransomware attacks and other unauthorized access attempts
Pros and Cons
  • "It is a stable solution...The solution's initial setup was straightforward."
  • "It would be helpful if they could send emails notifying their users about the recommended upgraded versions to address the newly discovered vulnerabilities."

What is our primary use case?

In our company, all critical systems are connected to a Security Operation Center (SOC), and we use Trend Micro Deep Security on these servers. Our company is in the manufacturing industry, dealing with metals and mining processes, and many of our solutions are hosted on public IP and accessed from outside organizations' networks. Installing Trend Micro Deep Security helps us prevent ransomware attacks and other unauthorized access attempts. Since we are connected to SOC, we receive detailed information on any attempts to penetrate our systems from outside, apart from just letting us know if there are any vulnerabilities or not. Additionally, Trend Micro Deep Security provides features like sandboxing. However, we have not been able to utilize these features fully.

Since I wanted to know the additional features that Trend Micro Deep Security offers beyond what we currently use in our solution, I was trying to find a comparison between Trend Micro Deep Security and Trend Micro Apex One.

What is most valuable?

Virtualization and sandboxing are the two features available in the solution. I learned about these two features from our service provider, through whom we secured the license required for the solution. So, our service provider is a reseller and not directly related to Trend Micro. Also, I am yet to go through the technical documents of the solution since I couldn't find much information about the solution online.

Regarding the deployment process, we first conducted a study to identify potential vulnerabilities and cybersecurity requirements for the business. Once we clearly understood these objectives, we began exploring solutions that could meet them. We then evaluated options such as a Security Operations Center (SOC) and Trend Micro Deep Security as part of this process.

What needs improvement?

I haven't received any distribution emails from the Trend Micro team regarding recent vulnerabilities and their efforts to mitigate them. It would be helpful if they could send emails notifying their users about the recommended upgraded versions to address the newly discovered vulnerabilities. This is an area that could be improved from more of a marketing perspective than a technical aspect.

For how long have I used the solution?

In our company, we have been using Trend Micro Deep Security for at least two years now. Presently, we are using the latest version. So, we keep updating the solution. We provide the solution to the servers on a public IP.

Buyer's Guide
Trend Micro Deep Security
January 2026
Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,733 professionals have used our research since 2012.

What do I think about the stability of the solution?

It is a stable solution.

What do I think about the scalability of the solution?

It is a scalable solution. Considering the different price ranges available, one needs to buy a device. It needs device-based licensing. For instance, if 50 more devices in our organization require Trend Micro Deep Security, then I have to purchase 50 more licenses. So, scalability is not a challenge in the solution. Also, we have around 100 people in our organization using the solution.

The solution is being used very extensively in our organization. In the company where I work, we have only a single solution for all of our servers. That single solution is Trend Micro Deep Security. Also, we have been using Trend Micro Apex One for the past two or three years.

How are customer service and support?

I need to check with my team to know whether we ever interacted with the solution's technical support team.

How was the initial setup?

The solution's initial setup was straightforward. It's not kind of a cumbersome one.

The deployment process did not take more than two months post-order placement for the solution. So, Trend Micro Deep Security and SOC are two separate parts. For SOC's deployment, we took around six to nine months. Trend Micro Deep Security is a type of endpoint security solution which, post procurement, takes around four to six weeks to configure.

Regarding the solution's deployment model, the managing, monitoring and diagnostics part of the solution is on the cloud, while all of our clients have chosen an on-premises deployment model. Basically, the clients are installed on physical devices.

Previously we had support for a deployment and maintenance procedure from the service provider. Currently, the solution is managed by our team as it is deployed on-premises.

What's my experience with pricing, setup cost, and licensing?

We need to make yearly payments for the solution's licensing. There are different pricing models, like subscription-based and perpetual. Our company has chosen perpetual pricing. So for us, multiple reassignments are possible. If I choose one license and assign it to one device, I can later remove it from that device and assign it to a different one. Given the requirements that our company has, the solution is not too expensive.

Which other solutions did I evaluate?

According to our process, our organization usually explores three solutions by making a detailed technical comparison. After that, based on the business requirements, pricing and technical ratings that our experts provide, we go ahead with one of them. I do not know which two solutions were compared with Trend Micro Deep Security.

What other advice do I have?

Currently, my organization relies on Trend Micro Deep Security to meet its business needs in the cybersecurity space. It is important to stay vigilant and explore all possible cybersecurity interventions. Despite having access to many of the solution's features, my organization has not yet deployed them all. As our organization and its systems and solutions continue to grow, in our organization, we want to enable all of the solution's potential, which can provide us with security. Therefore, I was seeking to compare the additional features available within the solution to identify any that could provide significant security benefits to my organization.

I would definitely recommend the solution to those planning to use it. Overall, I rate the solution between eight to nine out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Harel Cohen - PeerSpot reviewer
Security Solution Architect at a retailer with 10,001+ employees
Real User
Mar 25, 2023
Offers excellent endpoint protection and great stability
Pros and Cons
  • "The solution's endpoint protection is the most valuable feature."
  • "The email relays and proxies could be improved."

What is our primary use case?

I use the solution to provide general security for my enterprise clients, primarily for servers. Deployments include cloud and on-prem. 

How has it helped my organization?

I've been deploying Trend Micro for my clients for a long time, which has been a significant factor in our security posture.

What is most valuable?

The solution's endpoint protection is the most valuable feature. 

What needs improvement?

The email relays and proxies could be improved. 

For how long have I used the solution?

I've been using the solution for around 16 years.

What do I think about the stability of the solution?

The stability is very good. In my experience, everyone is in the same boat because every product has faults or challenges.

What do I think about the scalability of the solution?

The product is scalable; I rate it eight out of ten for scalability. 

How are customer service and support?

Technically speaking, the customer support is okay, but the responsiveness needs to be improved. I'm referring to the universal support, as the Israeli staff are excellent and always willing to help. However, opening a case and entering into a back-and-forth with emails takes too much time. It should be working more quickly and smoothly.

How would you rate customer service and support?

Neutral

How was the initial setup?

The deployment is straightforward; I rate it nine out of ten for ease of setup. The time the solution takes to set up depends upon the deployment's scale and complexity, as well as the use case.

What's my experience with pricing, setup cost, and licensing?

Trend Micro Deep Security is average compared to other products on the market; it's neither particularly expensive nor cheap.

What other advice do I have?

I rate the solution nine out of ten; it's in the top three or top five products of its type. 

My advice to others considering the solution is that two major considerations when looking for a product are stability and vendor company experience. Trend has been around for ages and has a good reputation; this and the stability work in their favor.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Buyer's Guide
Trend Micro Deep Security
January 2026
Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,733 professionals have used our research since 2012.
Gowtham N - PeerSpot reviewer
Manager at a financial services firm with 5,001-10,000 employees
Real User
Dec 19, 2023
Provides necessary protection against current and relevant threats
Pros and Cons
  • "The integration options of Trend Micro Deep Security have been particularly valuable."
  • "Enhancements in agent performance are needed, specifically in reducing server utilization during scanning."

What is our primary use case?

I use Trend Micro Deep Security to enhance the security of our servers, which run various operating systems, including Solaris. For our servers, especially those involved in Webex, we deploy agents and enable specific modules like anti-malware, intrusion detection, and firewall protection.

How has it helped my organization?

Trend Micro Deep Security has significantly improved our organization's security posture. It has streamlined reporting processes, enhanced claim filing efficiency, and provided robust protection for our IT systems. With features like real-time threat monitoring, it ensures a secure environment.

What is most valuable?

The integration options of Trend Micro Deep Security have been particularly valuable. The integration options in Trend Micro Deep Security are crucial for our banking organization. With DLP campaigns being a priority, the seamless integration ensures that endpoints are effectively enabled, providing necessary protection against current and relevant threats. 

What needs improvement?

There is room for improvement in Trend Micro Deep Security, particularly in endpoint security. Enhancements in agent performance are needed, specifically in reducing server utilization during scanning. This improvement would contribute to increased efficiency and lower operational costs, ensuring a smoother and more responsive system.

For how long have I used the solution?

I have been working with Trend Micro Deep Security for three years.

What do I think about the stability of the solution?

I would rate the stability as a nine out of ten.

What do I think about the scalability of the solution?

I have faced some issues with Trend Micro Deep Security's scalability, like communication errors and settings in green states. Resolving these requires support and knowledge to allocate resources effectively.

How are customer service and support?

The technical support for Trend Micro Deep Security has been decent. However, I believe there's room for improvement in engagement. When raising a case, the ability to quickly connect remotely and discuss specific documentation related to our environment would enhance the overall support experience. I would rate the technical support as a seven out of ten. 

How would you rate customer service and support?

Neutral

How was the initial setup?

I would rate the easiness of the initial setup as a seven out of ten. Setting up Trend Micro Deep Security was not entirely straightforward. While there is a comprehensive solution, the complexity arises from the diverse components in our environment. Unlike a single-box setup, we manage multiple components, which requires careful configuration for effective deployment. It took three months to deploy the solution.

What was our ROI?

We have seen a return on investment from using the solution.

What's my experience with pricing, setup cost, and licensing?

I would rate the costliness of the solution as a seven out of ten. The pricing for Trend Micro Deep Security is fixed for five years, and there are no additional costs beyond the standard license increase during this time.

What other advice do I have?

My advice for someone considering Trend Micro Deep Security is to conduct a thorough POC before implementation. Ensure all modules are enabled during the POC and carefully assess how the solution works in your specific environment. Check the enrollment process and functionality before moving forward with the implementation. Overall, I would rate the solution as an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Deputy General Manager at a comms service provider with 10,001+ employees
Real User
Top 5
May 18, 2023
Helps to detect malicious threats, secure the endpoints, and disable the UFT
Pros and Cons
  • "We use the solution to detect malicious threats, secure the endpoints, and disable the UFT."
  • "The tool needs to improve its subscription."

What is our primary use case?

We use the solution to detect malicious threats, secure the endpoints, and disable the UFT.

What needs improvement?

The tool needs to improve its subscription. 

For how long have I used the solution?

I am working with the tool for twelve years. 

What do I think about the stability of the solution?

The product is stable. 

What do I think about the scalability of the solution?

The product is scalable. 

How are customer service and support?

The tech support is good. 

How would you rate customer service and support?

Positive

How was the initial setup?

The tool's setup is easy. The tool doesn't take more than five to eight minutes on average to deploy at an endpoint. 

What's my experience with pricing, setup cost, and licensing?

The tool's pricing is high. 

What other advice do I have?

I would rate the product an eight out of ten. The solution is suitable for enterprises. Cost is a challenge factor for small organizations. 

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Mustufa Kamaal Afghan - PeerSpot reviewer
Specialist Enterprise Security Architect at a comms service provider with 1,001-5,000 employees
Real User
May 12, 2023
Excellent deep security solution with low footprint
Pros and Cons
  • "The solution has a low footprint and does not have a lot of impact on the host."
  • "The solution should focus on the EDR part and probably have an integrated data leak prevention module."

What is our primary use case?

Our company uses Trend Micro for anti-malware support on servers and user PCs. Its normal anti-virus, file integrity monitoring, and threat prevention modules are also active in our systems.

What is most valuable?

The overall vision and execution of the vendor are really good. The solution has a low footprint and does not have a lot of impact on the host. The reporting mechanism is also good, and at any given point in time, we can see how many endpoints are compliant. The product support is also good.

What needs improvement?

The solution should focus on the EDR part and probably have an integrated data leak prevention module as well.

In future releases, the solution should provide one agent who takes care of EDR, end-point security, DLP, and application control.

For how long have I used the solution?

I have been using Trend Micro Deep Security for more than five years.

What do I think about the stability of the solution?

It is a stable solution. I would rate its stability a ten out of ten.

What do I think about the scalability of the solution?

The solution is scalable. I would rate its scalability a ten out of ten. Currently, the solution is being used by around 4,000 users in our organization.

How are customer service and support?

The customer service and support team is good.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup is straightforward and only a matter of a couple of clicks. Once you have a design in place, deployment is not a challenge. In terms of time– one part goes into solution deployment and the other into solution adaptation. Solution deployment does not take much time; solution adaptation does.

What about the implementation team?

The solution was deployed by consultants. I think one professional from the system integrator or the OEM and one in-house resource are enough for this deployment.

Moreover, it is just like any other IT solution in terms of maintenance. Since it is installed on a server host, whatever general maintenance is required for that host is what’s needed—just general IT maintenance. We have an in-house team of IT and security engineers who take care of the maintenance.

What's my experience with pricing, setup cost, and licensing?

Just like in any other IT solution. General IT maintenance, we have an in-house team of IT and security engineers who take care of the maintenance.

What other advice do I have?

Before deploying a solution, new users must refer to market research. For companies like ours, we select top-of-the-line products. Although this is the best product suiting our requirements, the decision should be based on individual evaluation.

Overall, I rate the solution an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Mangesh Masaye - PeerSpot reviewer
Manager at a agriculture with 1,001-5,000 employees
Real User
Top 5
Feb 2, 2022
Cloud-based antivirus with additional, useful features and quality support
Pros and Cons
  • "Aside from the basic antivirus features, there are additional features such as vulnerability protection, firewall, etc. which are helpful."
  • "Some of the reporting and integrations could be more robust."

What is our primary use case?

I am a manager for a non-profit and use this solution for its antivirus capabilities.

What is most valuable?

Aside from the basic antivirus features, there are additional features such as vulnerability protection, firewall, etc. which are helpful.

Since this is a SaaS service, we do not need to worry about getting version upgrades as everything is updated on the backend by Trend Micro.

Since this is a cloud-based product, we do not need any on-premise environment for antivirus.

What needs improvement?

Some of the reporting and integrations could be more robust.

For how long have I used the solution?

I have been using the solution for four or five years.

What do I think about the stability of the solution?

The solution is stable.

What do I think about the scalability of the solution?

The solution is scalable.

How are customer service and support?

Support is very good. There is a portal where you can go to raise support tickets, and there are three phone numbers that we can use to reach support. We also have been assigned a technical account manager to who we can reach out to with anything critical.

Which solution did I use previously and why did I switch?

We used McAfee in the past.

How was the initial setup?

The solution was straightforward to install. There is a default version that is ready to use as soon as it is installed and anything specific that the company desires can then be set.

We have about six to eight people with access to management.

What about the implementation team?

We used a combination of an integrator, a technical account manager, and our in-house team.

What's my experience with pricing, setup cost, and licensing?

There is a subscription cost to use this product.

What other advice do I have?

I would recommend this product and would rate it a nine out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Venugopal Potumudi - PeerSpot reviewer
Senior Consultant at a tech vendor with 10,001+ employees
Real User
Nov 17, 2022
Easy to implement, good integrations, and helpful technical support services
Pros and Cons
  • "It's scalable."
  • "We'd like to see extended capacity in the on-premises versions."

What is our primary use case?

It is mainly an antivirus product for both desktops as well as servers. It has additional modules which can be enabled in fast manner. It uses the same agent and additional modules like FIM, Filing Integrity Management and ELP services. 

What is most valuable?

The product is easy to implement and easy to integrate with additional advanced services.

It's scalable.

It has been mostly quite stable. 

Technical support in Europe is good.

What needs improvement?

They are working to improve the solution. For example, nowadays, they're offering cloud based EDR which addresses a lot of this scalability challenges like storage requirements, et cetera. We'd like to see extended capacity in the on-premises versions. 

They recently put out some more additions which I have yet to explore. They've already addressed a lot of previous concerns. 

We'd like the cloud model to have better pricing. 

For how long have I used the solution?

I've used the solution for more than four years. 

What do I think about the stability of the solution?

It is very stable. That said, there are certain agent problems. Once in a while we see certain agents get corrupted, so we clean up the agent and we need to install the agents again. However, that is rare. 

What do I think about the scalability of the solution?

It is scalable within some limitations of compromise. For example, since its an on-premise, there will be servers limitations. If you need to scale to large areas, then you need additional hosting solutions to extend the capacity. Otherwise, it's a good tool for scalability.

How are customer service and support?

Within Europe the technical support services are very good. I have not worked in other regions, however, within Europe the support was fantastic. They respond very fast.

How was the initial setup?

We deployed the solution to about 3,000 servers. We had is implemented in lesss than three months. 

What's my experience with pricing, setup cost, and licensing?

The pricing on the cloud model could be better. It's a bit high.

What other advice do I have?

It is very stable product and it's easy to deploy and easy to maintain. It is recommended as a product.

I'd rate the solution ten out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
SOC at a transportation company with 5,001-10,000 employees
Real User
Aug 22, 2022
Provides good support and threat prevention
Pros and Cons
  • "Support and threat prevention are the most valuable features of this solution."
  • "Trend Micro is scalable if you have the budget for it."

What is our primary use case?

Trend Micro Deep Security protects our organization from threats. Trend Micro has kept us compliant with PCI and PPA.

What is most valuable?

Support and threat prevention are the most valuable features of this solution.

For how long have I used the solution?

I have been using Trend Micro Deep Security for five years.

What do I think about the stability of the solution?

The solution is stable. Trend Micro gets threat intelligence and is always up-to-date with all cybersecurity threats zero-day. Updates are provided through our email. If anything needs to be adjusted on our system, or their product, they will advise us right away.

What do I think about the scalability of the solution?

Trend Micro is scalable if you have the budget for it. All of our 2,500 employees are covered with Trend Micro Deep Security.

How are customer service and support?

The support from Trend Micro Deep Security is good. The company has a good knowledge base where we can troubleshoot any issues. We also have a support portal with them where we can raise issues that we can't solve on our own. This includes on-call support with them in case the issue needs to be resolved urgently.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Prior to using Trend Micro, we were using Sophos.

How was the initial setup?

The initial setup of the product was straightforward. All you need to do is install the firmware, ensure the firewall connections are open, and you are done. 

What about the implementation team?

It took about one month for us to deploy Trend Micro Deep Security. We had an integrator deploy the pilot of the first 30. After the pilot, our team deployed the rest.

What's my experience with pricing, setup cost, and licensing?

If you need an additional 10 or 20 licenses, you will need to pay additional fees.

What other advice do I have?

This product is one of the leaders in terms of endpoint protection, server protection, and network protection. They provide good support, and it is easy to deploy. They are scalable, and the threat intelligence is very good. They stay up to date with what is happening in the cyber world.

Personally, I like anti-malware and integrity monitoring. The anti-malware has its own behavioral monitoring and machine learning. It detects all species and objects in the server or the file integrity monitoring. If there are any changes on the server side, they will alert you. I would like to see these tools as part of Trend Micro Deep Security.

I would rate Trend Micro Deep Security a nine out of ten overall.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Trend Micro Deep Security Report and get advice and tips from experienced pros sharing their opinions.
Updated: January 2026
Buyer's Guide
Download our free Trend Micro Deep Security Report and get advice and tips from experienced pros sharing their opinions.