We use this solution for protection from ransomware.
We use artificial intelligence in the Trend Micro engine for deep security inspection. It allows us to analyze the data and threats.
We use this solution for protection from ransomware.
We use artificial intelligence in the Trend Micro engine for deep security inspection. It allows us to analyze the data and threats.
It's easy to use and the interface is simple.
The biggest drawback with Trend Micro is even when it is connected to the server, it will show as offline.
Another issue is, if I want to suggest this solution to a customer, we won't get the pricing immediately, which is a major problem.
I would like to see cloud-based integration.
I have been using this solution for four years.
It's a stable product.
It's a scalable solution. We have installed 10 to 15 customers.
We have contacted technical support, and they are very good.
We provide OfficeScan, OfficeScan XG, Apex models, and Worry-Free Business.
The installation is the same as in Symantec. We have not installed the cloud-based version of Trend Micro. We have installed the on-premises version and it is easy to do.
To deploy the server, it will take 15 minutes and only five minutes to deploy each client.
We would recommend this solution to others who are interested in using it.
I would rate Trend Micro Deep Security a seven out of ten.
It's kind of hard to point out one single feature, however, if I had to, then I would say that they have a great roll-back feature. You can use this if your machine is compromised. You have the ability to roll it back to the previous good version, so you can actually save, say, 90% to 95% of your data.
The solution is stable.
You can scale the solution to different versions.
Technical support is helpful.
The pricing is a bit expensive. If they want to target SMBs, small enterprises, and small networks, then they need to reduce their prices.
It would be better if they merge a few features into one product. For example, they have an encryption feature that is separately sold. If they could merge it with Apex One or any endpoint security solution, maybe it would also be good for the end user.
I've used the solution for three or four years.
The solution is very stable and reliable. There are no bugs or glitches. It doesn't crash or freeze.
Scalability is possible if you move to different versions. For example, you can move from Apex One to the XDR solution, and then from XDR, you can involve Deep Security. There, it is very much scalable if you want to start from the bottom, from end-point security, and move it up to the servers as well.
We do not really contact technical support.
Mostly we have technical people over here in our company. And basically, they go to training first to get some certifications from Trend Micro, then they start deploying and installing any product in any network.
Having said that, sometimes, when we get stuck or after installation and running Trend Micro in the network, if we have a problematic situation where we are not able to solve it, then we do contact Trend Micro support.
They have a two-tier level of support. One is local support available directly from Trend Micro. Then, they also have online support where you can get help directly from their head offices.
Positive
I tend to work with Trend Micro, Kaspersky, and McAfee. I haven't used Microsoft Defender.
The solution is not too difficult and not exactly straightforward. It was a moderate setup. Anyone with a little bit of knowledge of installing antiviruses can actually handle the process.
I'd rate the ease of setup a two or three out of five.
I won't call the cost of the solution cheap. Compared to any other antiviruses in the market right now, they are on the expensive side.
I'd rate the level of expense a four out of five, where five is the most expensive option.
We are a partner.
If someone is looking to implement security solutions, including endpoint security, then I would suggest that person go for the whole Trend Micro suite, not just for the endpoint security. They have different products for security solutions, including Deep Security, Network Security, Trend, et cetera. If they buy the whole package, it would be easy for them to control their network security-wise and manage it quickly, rather than having a different brand and security solution for different departments or layers of their network.
I'd rate the solution eight out of ten. There's always a margin to improve both in a technical sense and financially as well. I'm giving them two points less in hopes they'll continue improving their product.
We recommend the use of this solution to our clients, both with virtual and traditional servers.
This has helped our customers keep up to date with security patches. Many customers do not patch their software after a new purchase has been released because there are a lot of other technologies and considerations to be carried out. It takes time to go through all of these, and some customers have not been patched for many years. Especially for those customers, this solution will protect them against those vulnerabilities.
The most valuable feature is the virtual patching. This offers protection of the application before it can be patched by the actual vendor.
Some areas for improvement are:
This is a stable and well-known solution in the market. It is especially well-known for use in virtualized server networks.
We have not faced scalability issues whatsoever. This solution is commonly used for servers, and not in workstations. We only recommend it for the customer's servers.
There are different service levels available for technical support.
When a problem occurs then we collect the logs and submit them. There is some time lost here because we do not always immediately deal with somebody who has sufficient expertise with the solution. This is something that we would like to see change.
Generally, reaching technical support is fine, but in terms of having problems resolved, it varies. Sometimes it can take three days, while other problems can take three months.
The complexity of the initial setup depends on the customer's environment. There are different methods of deployment. If it is an agentless deployment then there are prerequisites for that. The agent-based version is a bit easier to set up than the agentless version.
They have to go through setting up policies, which will take time to implement and fine tune. They have to make sure that the solution is communicating with the management server, and that there are no conflicts with other applications that are running. If there is anything that is broken or should not be running, then that is fixed. Once the initial application is perfectly up and running without any issues, and the policies have been fine-tuned, there should not be an issue.
Depending on the customer's environment, the deployment time varies. We have deployed some solutions in one day, while others have taken months to complete the fine-tuning.
Generally, for any implementation, we will not use more than two staff. For cases with more than one hundred machines, this can be a challenge during deployment.
We do the complete deployment and implementation of this solution for our clients.
We resell a variety of products, some of which are similar to the Trend Micro solution, but our recommendation depends on our customer's requirements. Some customers will demand a particular vendor, such as Trend Micro, while others will specify that they do not want to use solutions by a specific vendor. In these cases, we work on alternative solutions for our clients.
Some of the other options our clients consider are solutions by McAfee, Kaspersky, and Symantec.
It is important to implement this kind of solution because many people do not have security on their servers. This includes the vulnerability patching that should be done.
This solution has improved over time. They have been introducing third-party plug-ins and integration, and there is a cloud version available as well.
I would rate this solution a seven out of ten.
It's for security: IDS, IPS, intrusion detection, and securing our perimeter in general. E.g., OWASP rules.
Trend Micro gave our security teams a certain degree of comfort by just having it in the background, as they have familiarity with the product.
IDS and IPS are its most valuable features.
AWS products could become more compatible with intrusion detection products leveraging help from Trend Micro.
We have had no stability issues.
Scalability hasn't been an issue.
We have different workloads, so it depends on if we're talking about development, QA, or the testing environment. They are all separate accounts. We have a central account to try to manage all of them. A lot of these type products, like Trend Micro, fit into these shared environments.
Right now, we've got a few production workloads, but most of the workloads are still in development.
Automation is a big part of everything that we do. The team setting it up would have had to set up Chef scripts and other things to make sure that we could automatically deploy. This would have been part of the configuration and management into the AWS environment.
We were looking for a tool to help secure our environment. There wasn't anything immediately available as an AWS native service, so we looked for a third-party tool which could do it.
We would like to see more from AWS natively on the intrusion detection side.
Take a good look at all the different options. If there are things which I think teams are familiar with, that always gives a product a bit of a leg up. This is not just from the perspective of the people who support and deploy the product, but even the security teams who may be already familiar with the product and know how effective it is. It gives them a lot more comfort seeing something that they have some background with.
Our company uses the on-premise and AWS versions. I work with the AWS version, and have been happy with it. I am seeing more of the end result of it rather than the infrastructure and security perimeter.
We decided to use AWS because it was something the teams were familiar with. Our teams, who are currently using Trend Micro, were already familiar with the product and wanted to make use of it in the cloud as well. It was just a matter of continuity.
It is integrated with a SIEM, security incident and event management, platform. A lot of the output which comes from Trend Micro, we fed into the SIEM system so the security teams and the monitoring teams have a single pane of glass view into all the security features of our environment.
We use Trend Micro Deep Security to monitor the environment in case of zero-day attacks.
The product's most valuable feature is the threat prevention module. It helps with virtual patching and IDS fetching.
They should include WAF modules in the product. There should be signature-based advanced and responsive features.
We have been using Trend Micro Deep Security for a year.
It is a highly stable product. I rate its stability a ten out of ten.
I rate Trend Micro Deep Security's scalability a ten out of ten. We use it 24/7.
The implementation is straightforward. I rate the process a nine out of ten. We require a team of five executives for troubleshooting.
Trend Micro Deep Security has robust virtual patching features. I rate it a ten out of ten.
Our primary use case for this solution is to prevent DDoS and other types of attacks from internal or external sources.
This solution protects us against different types of attacks, including email phishing, and it includes spam filtering. There have been some spam cases that we found recently and Trend Micro had already detected them. It caught EXE files in email and we put policies in place to block Excel attacks.
There are daily updates and we can even protect the internal workstations from viruses.
The most valuable features are web security, email filtering, and content filtering. The user interface is very friendly, and it is easy to control things from the policy.
The support for email protection can be improved.
I have been using different Trend Micro products in 2009 or 2010. For me, this is the best on the market.
This product scales very easily. We have more than one hundred and thirty licenses and more than five thousand users.
The people who use this solution are experts in networking and cybersecurity. All of them are CCIE certified.
We will be increasing our usage by adding another site. Right now we are using an MDRC (Mobile Disaster Recovery Center), but within two or three months, we will have a PDC (Primary Data Center).
When we call technical support they respond immediately. They are local and we have met them three or four times in the last couple of months. After they visited our office, we had a discussion with them.
We get very good support from them, and we appreciate it.
We have been using Trend Micro products and we were happy with them so we went with this solution.
The initial setup for this solution is straightforward.
For the deployment, we are using three cybersecurity engineers and three network security engineers.
We implemented this solution using a local provider in Qatar. The support was amazing. Every day, we received updates from our representative.
I cannot predict the ROI at the moment because we are still planning to implement other areas, such as the PDC.
It is approximately three million Qatari Riyal ($820,000 USD) for our licensing fees. The cost is approximately six thousand Qatari Riyal ($1,650 USD) per user.
We did evaluate other options, including Kaspersky. I know that it does not have the capability that we need. We did use it for endpoints, but we were not happy with it at the time.
We would recommend this solution to others. This is based on our security implementation. We are strongly protected through Trend Micro.
I would rate this solution a nine out of ten.
It's made the security guy's life a lot easier. A lot of what it does is automated and it's simple. You put it into place and the security guy just uses it instead of trying to administer it.
The most valuable feature is the direct link to AWS to tell me if a new instance created is unprotected. That's just so valuable to me. When running reports, you see can whether or not your environment is covered.
It also has a full breadth of services that include not just antivirus, but also IDS/IPS and file integrity and vulnerability management. It's really meant for the cloud and is proactive on AWS.
I'd like to have the ability to manage heterogenous clouds so that, for example, AWS and Microsoft are protected with the same security patterns. It already does that, but I think they may have rolled it back recently.
Also, it has great IDS/IPS built in, but I'd like a way to visualize the traffic. This way, there's more of an artistic view of security and the ability to ask question about the data. That would be really beneficial.
We don't have any issues with stability. I will get alerts at times for problems that have already been addressed, but I wouldn't call that instability.
I haven't hit any thresholds that tell me that it's not scalable. We just add servers and agents and keep going. As far as I'm concerned, it'll scale for anything.
We had a little bit of trouble when we first implemented the tool. We couldn't configure something, but it was our own problem as we weren't reading the documentation. We ended up calling implementation support, and they were excellent. They were patient and walked us through the process. They didn't charge us a dime. Since then, we haven't had to use support other than providing our feedback to the product teams.
The initial setup was pretty straightforward. We were novices to the cloud anyways, so we were struggling with some of the ideas. But I think that if you're acclimated with AWS, it's pretty straightforward. We were struggling to learn cloud concepts and we couldn't understand how to ping horizontal scaling versus vertical scaling.
Think about it. It's for the cloud and not meant to be retro-fitted. You're not managing a core server and it's got elastic scalability up and down from a cost perspective. You just pay per agent. If you don't need a server anymore, you don't pay.
When you implement and install, really learn how to set up the dashboard. You have to have a good intimate knowledge of your environment. Take the time to learn the product; don't just plug it in because it's not meant for that.
As a security competency company, we play a lot on this product. For us, it's one of the best for data center solutions. Deep Security is something that is a classic antivirus. However, it uses two-function device control. Everything is inside. We have virtual patching capabilities, which are very interesting in Deep Security. Virtual patching is just a host IPS solution which, if there is a delay in installing the patch, the patch is available by the editor.
It's a good product overall.
There is not a lot of bugs like you have in other antivirus solutions. It's quite stable.
The initial setup is pretty easy.
The solution is scalable.
The solution is quite secure.
The main drawback is that it's complicated. With Trend Micro solutions, everything is complicated. Deep Security has its own management console, and every product in Trend Micro has its own management console. Everything is siloed. Now, they are trying now to connect everything inside the main control management or reporting console, however, it's still not a central management console. It makes for a lot of work when applying policies and security solutions.
The product isn't very user-friendly.
It's a bit old-fashioned in its design and approach.
While, for example, McAfee might have a new version every two months, Trend Micro might not release a new version for two years. While it's very stable, it could be a bit too long in-between versions.
It would be ideal if the solution communicated better with other security solutions from other brands. This is an issue. They need to open up their API or give access, or exchange information with other security products so that everything can communicate together, learn from each other, and block malicious threats better.
We've been using the solution for a long time. It's been three or four years or so.
The stability is very good. There aren't a lot of bugs or glitches. In comparison, for example, Sophos has some bugs and McAfee has a lot of bugs. When they give you a new version, you know that you have to wait for the service pack, to be sure that it will be up and running in production.
This product doesn't crash or freeze. It's reliable.
The thing users need to understand about the solution is that Deep Security is not by default meant to manage 100,000 PCs. It's for data centers, and it's for less than 300 servers at the same time. That said, even a big company doesn't have a lot of servers available. In terms of scalability, we don't find a limit for the moment based on the customer base we have.
You can also scale via the cloud. It's very flexible and you can deploy on command, on a virtual server in the cloud.
We've dealt with technical support in the past. We only call them, from time to time, if we can't figure out the answer ourselves. While four or so years ago they weren't as fast, not we get a quick response. Over the past year, we've been quite pleased with the level of support.
We're familiar with older versions of McAfee. We are playing with Sophos for the UTM, the NG Firewall, and for the antivirus, Sophos Intercept X. I've also worked with Kaspersky.
Which is best depends on the client. While Kaspersky, for example, is good for smaller clients, Trend Micro is better for medium to larger ones. However, the solution isn't something you just set and forget. You have to take details, verify, validate, and be aware that a small change will not produce too many logs on the threat detection.
The implementation process is not very complex. If the initial setup is just replacing a competitor antivirus with Trend Micro, it's very easy. The only thing you have to be sure of is that you are setting up the right functionality. Trend Micro Deep Security, has a lot of functions. If you want a classic antivirus, there are very few functions to set up. However, if you want a specific functionality, there may be more steps. There will be more fine-tuning that is required to make sure you are well-protected.
When you have start Deep Security on something that was not equipped with an antivirus, or equipped with, let's say, Bitdefender or Windows Defender, you have very few protections. If you don't take care of covering all these safety functions, you'll be vulnerable. That said, you need to be careful of which functions you activate. You need to make sure it makes sense in terms of the rest of your setup.
It's been one of the four main antivirus solutions, deployed in an industrial way. We've been quite happy with it. You can deploy it on-premises or the cloud, and it's possible to use it with Windows and Linux.
I'd rate the solution at a nine out of ten. We've been very happy with it and found it to be quite secure.
Of course, next-generation solutions such as Crowd Strike or Carbon Black are game-changing.