Try our new research platform with insights from 80,000+ expert users
DGM-IT at a construction company with 10,001+ employees
Real User
Makes the server run very smoothly and without any security flaws
Pros and Cons
  • "One of the most valuable features is that it's a firewall-based solution. We just open the required reports to the server—to server communication—and that's how we use Deep Security."
  • "Deep Security's reporting functionality could be improved."

What is our primary use case?

Our primary use case of Deep Security is running our server smoothly and without any security flaws. The server-level layers have more functionality when compared to desktop-level layers, so Deep Security captures and fulfills all of that functionality and runs smoothly. At the end of the day, Deep Security is also getting the zero-day vulnerabilities from our on-premise and other solutions. 

This solution is deployed on-premise, and we are using the latest version. 

What is most valuable?

One of the most valuable features is that it's a firewall-based solution. We just open the required reports to the server—to server communication—and that's how we use Deep Security. 

What needs improvement?

Deep Security's reporting functionality could be improved. 

For how long have I used the solution?

We have been using Deep Security for more than three years. 

Buyer's Guide
Trend Micro Deep Security
June 2025
Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.

What do I think about the stability of the solution?

Deep Security is stable. 

What do I think about the scalability of the solution?

This solution is scalable, but you need to procure licenses for each server. 

We have around 50 users of Deep Security in our organization. Whether we will increase usage depends on our business requirements. If our business needs more servers, then we will procure more servers and more Deep Security licenses. 

How are customer service and support?

The technical support could be better. Whenever an issue is raised, we need to wait for a long time for technical support to resolve it. Our only issue is that the support could be faster. 

Which solution did I use previously and why did I switch?

Before implementing Deep Security, we used Trend Micro OfficeScan alone. 

How was the initial setup?

Deep Security is very easy to install. Installation didn't take much time, but after installing the center console, we needed to apply some kinds of policies, for which we needed some experience. It took some time to decide which policies we needed to apply and which rules we didn't want to apply, and for those things, we needed help from more experienced people—either Trend Micro support or their authorized partner's support. You can handle the installation on your own, with the help of some technical team. The implementation is not a very long-term process. 

What's my experience with pricing, setup cost, and licensing?

The pricing is okay. Deep Security is single-server license-based, so it will work based on how many licenses you have procured. There is a yearly subscription for each license. 

What other advice do I have?

I rate Deep Security an eight out of ten, and would definitely recommend it to others to use. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Assistance Manager-IT at ONGC Petro additions Limited
Real User
Good protection and patching features stable, easy to scale, and easy to install
Pros and Cons
  • "We like the Smart protection and the Virtual patching."
  • "I would like to see better pricing. The pricing could be lower."

What is our primary use case?

We use Trend Micro Deep Security in our server environment.

We are also using it for virtualization security and antimalware functionality.

How has it helped my organization?

From a security point of view, it has been performing very well against our malware and vulnerabilities that are now in the market. Previously, we were getting patches from OEMs, and now we get patching from the Deep Security Protection Cloud which helps us to mitigate and minimize the attacks.

What is most valuable?

We are satisfied with this solution.

We like the Smart protection and the Virtual patching. those are the two best features we have in Trend Micro Deep Security. 

What needs improvement?

I would like to see better pricing. The pricing could be lower.

For how long have I used the solution?

We have been using Trend Micro Deep Security for four years.

What do I think about the stability of the solution?

We have no issues with the stability of Trend Micro Deep Security.

What do I think about the scalability of the solution?

Trend Micro Deep Security is a scalable product.

Which solution did I use previously and why did I switch?

We are using both Trend Micro Deep Security and Trend Micro Apex One. 

One is designed for server security, and the other is for endpoint devices. These are mostly Windows 10 and Windows 8. We use Apex One for our endpoints.

How was the initial setup?

The initial setup was easy.

What's my experience with pricing, setup cost, and licensing?

Trend Micro Deep Security pricing is on the high side.

We are paying approximately $50,000 each month, it's definitely expensive.

What other advice do I have?

I think this solution is practically perfect.

I would rate Trend Micro Deep Security a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Trend Micro Deep Security
June 2025
Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
Ahmed Elmenshawy - PeerSpot reviewer
PS IT Security Engineer at Alex Bank
Real User
Top 5Leaderboard
Highly stable product with a straightforward setup process
Pros and Cons
  • "It helps with virtual patching and IDS fetching."
  • "There should be signature-based advanced and responsive features."

What is our primary use case?

We use Trend Micro Deep Security to monitor the environment in case of zero-day attacks.

What is most valuable?

The product's most valuable feature is the threat prevention module. It helps with virtual patching and IDS fetching.

What needs improvement?

They should include WAF modules in the product. There should be signature-based advanced and responsive features.

For how long have I used the solution?

We have been using Trend Micro Deep Security for a year.

What do I think about the stability of the solution?

It is a highly stable product. I rate its stability a ten out of ten.

What do I think about the scalability of the solution?

I rate Trend Micro Deep Security's scalability a ten out of ten. We use it 24/7.

How was the initial setup?

The implementation is straightforward. I rate the process a nine out of ten. We require a team of five executives for troubleshooting.

What other advice do I have?

Trend Micro Deep Security has robust virtual patching features. I rate it a ten out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2125236 - PeerSpot reviewer
Deputy General Manager at a comms service provider with 10,001+ employees
Real User
Helps to detect malicious threats, secure the endpoints, and disable the UFT
Pros and Cons
  • "We use the solution to detect malicious threats, secure the endpoints, and disable the UFT."
  • "The tool needs to improve its subscription."

What is our primary use case?

We use the solution to detect malicious threats, secure the endpoints, and disable the UFT.

What needs improvement?

The tool needs to improve its subscription. 

For how long have I used the solution?

I am working with the tool for twelve years. 

What do I think about the stability of the solution?

The product is stable. 

What do I think about the scalability of the solution?

The product is scalable. 

How are customer service and support?

The tech support is good. 

How would you rate customer service and support?

Positive

How was the initial setup?

The tool's setup is easy. The tool doesn't take more than five to eight minutes on average to deploy at an endpoint. 

What's my experience with pricing, setup cost, and licensing?

The tool's pricing is high. 

What other advice do I have?

I would rate the product an eight out of ten. The solution is suitable for enterprises. Cost is a challenge factor for small organizations. 

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
reviewer1746138 - PeerSpot reviewer
IT Engineer at a healthcare company with 10,001+ employees
Real User
A stable solution that helps with server security
Pros and Cons
  • "The tool provides information on server activities and hosts."
  • "The tool should integrate SIM functionality. It should also improve customer support."

What is our primary use case?

We use the solution for server security. 

What is most valuable?

The tool provides information on server activities and hosts. 

What needs improvement?

The tool should integrate SIM functionality. It should also improve customer support. 

For how long have I used the solution?

I have been working with the tool for a year. 

What do I think about the stability of the solution?

I would rate the product's stability a nine out of ten. 

What do I think about the scalability of the solution?

I would rate the tool's scalability an eight out of ten. My company has around 40 users for the solution. 

How are customer service and support?

You need to wait to get through the support. The product's support is mostly by mail and not through calls. The support team would only agree to call if the issue is immediate.

How would you rate customer service and support?

Negative

Which solution did I use previously and why did I switch?

I have used SAP product before. SAP solution is much better in terms of services. 

How was the initial setup?

The tool's deployment is straightforward. 

What's my experience with pricing, setup cost, and licensing?

The tool's pricing is quite high. 

What other advice do I have?

I would rate the overall solution an eight out of ten. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Senior manager at SBI Cap security
Real User
Very helpful from a security perspective
Pros and Cons
  • "Signatures are frequently updated."
  • "The price could be reduced."

What is our primary use case?

Our main use case of this product is for antivirus and virtual patching.

What is most valuable?

From a security perspective, signatures and that kind of thing are frequently updated and we have not come across any virus detection.

What needs improvement?

It would help if they would reduce the price. 

For how long have I used the solution?

I've been using this solution for four years. 

What do I think about the scalability of the solution?

Scalability is good. We currently have 8,000 users and are planning to increase in the future. 

How are customer service and support?

The technical support is fine. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Nikhilesh Verma - PeerSpot reviewer
IT Security Specialist at TT Systems LLC
Real User
Top 5
Scalable, stable, straightforward setup
Pros and Cons
  • "It is stable and we have not faced any challenges during the rolled out"
  • "I would like to see XDR features and endpoint sensor become available."

What is our primary use case?

Most of our traffic comes from blacklisted IPs, virus types, and phishing proofing. These are the major use cases that we observe in our daily operations.

What needs improvement?

I would like to see XDR features and endpoint sensors become available.

For how long have I used the solution?

I have been using Trend Micro Deep Security for one and a half years now.

What do I think about the stability of the solution?

It is stable and we have not faced any challenges during the rollout.

What do I think about the scalability of the solution?

Trend Micro Deep Security is definitely scalable.

How are customer service and support?

We raise a ticket with Trend Micro Deep Security customer service when any issue occurs.

How was the initial setup?

The setup is straightforward and takes around a month to deploy. We deployed through the SCCM tool.

What other advice do I have?

We have four hundred servers globally. I would rate Trend Micro Deep Security a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1043193 - PeerSpot reviewer
Principal Solutions Architect at a computer software company with 201-500 employees
Real User
Price is reasonable and competitive
Pros and Cons
  • "Deep Security's most valuable features are antivirus and host intrusion detection."
  • "Deep Security's most valuable features are antivirus and host intrusion detection."

What is most valuable?

Deep Security's most valuable features are antivirus and host intrusion detection.

What needs improvement?

Deep Security's biggest shortcoming is its reporting.

For how long have I used the solution?

I've been using Deep Security for about two or three years.

What do I think about the stability of the solution?

Deep Security is pretty solid. 

How was the initial setup?

Deployment took a week or two because we didn't know what we were doing. But once we got it up, it's not like I had to install it multiple times. But if I did, it wouldn't be that bad. Deep Security is pretty low maintenance. It patches itself then downloads all the new buyer signatures, the common vulnerabilities, and everything like that. So it pretty much takes care of itself. However, when we're patching everything else, it could knock one of the agents offline. So we have to deal with that aspect a little bit.

What's my experience with pricing, setup cost, and licensing?

I'm not sure about the exact price, but it's reasonable and competitive. Compared to its competitors, you get a lot of bang for your buck. This was the way to go. There aren't any hidden costs. Everything was straight-up. However, it has a built-in malware detector that sends you alerts, but you need someone to monitor and respond to that. You need an incident response team, and Trend Micro Has a service for that called XDR. So if you want that monitoring service, you have to pay extra.

What other advice do I have?

I would rate Trend Micro Deep Security nine out of 10. It met all our requirements, and Trend Micro provided us with a lot of help getting it set up. I would almost give it a 10, to be honest, but there is some room for improvement with the reporting. For someone implementing Deep Security, I would advise them to pay attention to their kernel numbers. But then again, if we were using Red Hat Linux, Deep Security would be so seamless. Sometimes the kernel versions get out of sync, but as long as you stick to the standards, it's seamless. Once you deviate, the mileage may vary.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Trend Micro Deep Security Report and get advice and tips from experienced pros sharing their opinions.
Updated: June 2025
Buyer's Guide
Download our free Trend Micro Deep Security Report and get advice and tips from experienced pros sharing their opinions.