Try our new research platform with insights from 80,000+ expert users
Technical Manager at Digital World
Real User
Easy to use, with good support, but it should be integrated with the cloud
Pros and Cons
  • "It's easy to use and the interface is simple."
  • "Another issue is if I want to suggest this solution to a customer, we won't get the pricing immediately, which is a major problem."

What is our primary use case?

We use this solution for protection from ransomware. 

We use artificial intelligence in the Trend Micro engine for deep security inspection. It allows us to analyze the data and threats.

What is most valuable?

It's easy to use and the interface is simple.

What needs improvement?

The biggest drawback with Trend Micro is even when it is connected to the server, it will show as offline.

Another issue is, if I want to suggest this solution to a customer, we won't get the pricing immediately, which is a major problem.

I would like to see cloud-based integration.

For how long have I used the solution?

I have been using this solution for four years.

Buyer's Guide
Trend Micro Deep Security
April 2025
Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
851,823 professionals have used our research since 2012.

What do I think about the stability of the solution?

It's a stable product.

What do I think about the scalability of the solution?

It's a scalable solution. We have installed 10 to 15 customers.

How are customer service and support?

We have contacted technical support, and they are very good.

Which solution did I use previously and why did I switch?

We provide OfficeScan, OfficeScan XG, Apex models, and Worry-Free Business.

How was the initial setup?

The installation is the same as in Symantec. We have not installed the cloud-based version of Trend Micro. We have installed the on-premises version and it is easy to do.

To deploy the server, it will take 15 minutes and only five minutes to deploy each client.

What's my experience with pricing, setup cost, and licensing?

We would recommend this solution to others who are interested in using it.

I would rate Trend Micro Deep Security a seven out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Nadeem Syed - PeerSpot reviewer
CEO at Haniya Technologies
Reseller
Top 5Leaderboard
Expandable with great support and a useful roll-back feature
Pros and Cons
  • "You can scale the solution to different versions."
  • "It would be better if they merge a few features into one product. For example, they have an encryption feature that is separately sold. If they could merge it with Apex One or any endpoint security solution, maybe it would also be good for the end user."

What is most valuable?

It's kind of hard to point out one single feature, however, if I had to, then I would say that they have a great roll-back feature. You can use this if your machine is compromised. You have the ability to roll it back to the previous good version, so you can actually save, say, 90% to 95% of your data.

The solution is stable. 

You can scale the solution to different versions. 

Technical support is helpful. 

What needs improvement?

The pricing is a bit expensive. If they want to target SMBs, small enterprises, and small networks, then they need to reduce their prices.

It would be better if they merge a few features into one product. For example, they have an encryption feature that is separately sold. If they could merge it with Apex One or any endpoint security solution, maybe it would also be good for the end user.

For how long have I used the solution?

I've used the solution for three or four years. 

What do I think about the stability of the solution?

The solution is very stable and reliable. There are no bugs or glitches. It doesn't crash or freeze. 

What do I think about the scalability of the solution?

Scalability is possible if you move to different versions. For example, you can move from Apex One to the XDR solution, and then from XDR, you can involve Deep Security. There, it is very much scalable if you want to start from the bottom, from end-point security, and move it up to the servers as well.

How are customer service and support?

We do not really contact technical support. 

Mostly we have technical people over here in our company. And basically, they go to training first to get some certifications from Trend Micro, then they start deploying and installing any product in any network. 

Having said that, sometimes, when we get stuck or after installation and running Trend Micro in the network, if we have a problematic situation where we are not able to solve it, then we do contact Trend Micro support.

They have a two-tier level of support. One is local support available directly from Trend Micro. Then, they also have online support where you can get help directly from their head offices.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I tend to work with Trend Micro, Kaspersky, and McAfee. I haven't used Microsoft Defender.

How was the initial setup?

The solution is not too difficult and not exactly straightforward. It was a moderate setup. Anyone with a little bit of knowledge of installing antiviruses can actually handle the process. 

I'd rate the ease of setup a two or three out of five. 

What's my experience with pricing, setup cost, and licensing?

I won't call the cost of the solution cheap. Compared to any other antiviruses in the market right now, they are on the expensive side.

I'd rate the level of expense a four out of five, where five is the most expensive option. 

What other advice do I have?

We are a partner. 

If someone is looking to implement security solutions, including endpoint security, then I would suggest that person go for the whole Trend Micro suite, not just for the endpoint security. They have different products for security solutions, including Deep Security, Network Security, Trend, et cetera. If they buy the whole package, it would be easy for them to control their network security-wise and manage it quickly, rather than having a different brand and security solution for different departments or layers of their network.

I'd rate the solution eight out of ten. There's always a margin to improve both in a technical sense and financially as well. I'm giving them two points less in hopes they'll continue improving their product. 

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Buyer's Guide
Trend Micro Deep Security
April 2025
Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
851,823 professionals have used our research since 2012.
Senior Security Specialist at a tech services company
Reseller
Handles the important task of virtual patching, although the agent-based version has performance issues
Pros and Cons
  • "The most valuable feature is the virtual patching."
  • "When implementing this solution, sometimes we have challenges with SQL migration."

What is our primary use case?

We recommend the use of this solution to our clients, both with virtual and traditional servers.

How has it helped my organization?

This has helped our customers keep up to date with security patches. Many customers do not patch their software after a new purchase has been released because there are a lot of other technologies and considerations to be carried out. It takes time to go through all of these, and some customers have not been patched for many years. Especially for those customers, this solution will protect them against those vulnerabilities.

What is most valuable?

The most valuable feature is the virtual patching. This offers protection of the application before it can be patched by the actual vendor.

What needs improvement?

Some areas for improvement are:

  • There are new additions to the standard product that should be included with the Deep Security version.
  • When implementing this solution, sometimes we have challenges with SQL migration.
  • Some of our customers complain about the cost of this solution.
  • I would like to see an AI component added to the next release of this solution.
  • The agent-based version has performance issues and they have to make it more lightweight.
  • The forensic analysis capability needs to be improved.

What do I think about the stability of the solution?

This is a stable and well-known solution in the market. It is especially well-known for use in virtualized server networks. 

What do I think about the scalability of the solution?

We have not faced scalability issues whatsoever. This solution is commonly used for servers, and not in workstations. We only recommend it for the customer's servers.

How are customer service and technical support?

There are different service levels available for technical support.

When a problem occurs then we collect the logs and submit them. There is some time lost here because we do not always immediately deal with somebody who has sufficient expertise with the solution. This is something that we would like to see change. 

Generally, reaching technical support is fine, but in terms of having problems resolved, it varies. Sometimes it can take three days, while other problems can take three months.

How was the initial setup?

The complexity of the initial setup depends on the customer's environment. There are different methods of deployment. If it is an agentless deployment then there are prerequisites for that. The agent-based version is a bit easier to set up than the agentless version.

They have to go through setting up policies, which will take time to implement and fine tune. They have to make sure that the solution is communicating with the management server, and that there are no conflicts with other applications that are running. If there is anything that is broken or should not be running, then that is fixed. Once the initial application is perfectly up and running without any issues, and the policies have been fine-tuned, there should not be an issue.

Depending on the customer's environment, the deployment time varies. We have deployed some solutions in one day, while others have taken months to complete the fine-tuning. 

Generally, for any implementation, we will not use more than two staff. For cases with more than one hundred machines, this can be a challenge during deployment. 

What about the implementation team?

We do the complete deployment and implementation of this solution for our clients.

Which other solutions did I evaluate?

We resell a variety of products, some of which are similar to the Trend Micro solution, but our recommendation depends on our customer's requirements. Some customers will demand a particular vendor, such as Trend Micro, while others will specify that they do not want to use solutions by a specific vendor. In these cases, we work on alternative solutions for our clients.

Some of the other options our clients consider are solutions by McAfee, Kaspersky, and Symantec. 

What other advice do I have?

It is important to implement this kind of solution because many people do not have security on their servers. This includes the vulnerability patching that should be done.

This solution has improved over time. They have been introducing third-party plug-ins and integration, and there is a cloud version available as well. 

I would rate this solution a seven out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller.
PeerSpot user
VP of Enterprise Architecture at Broadridge
Real User
IDS and IPS are its most valuable features
Pros and Cons
  • "Trend Micro gave our security teams a certain degree of comfort by just having it in the background, as they have familiarity with the product."
  • "AWS products could become more compatible with intrusion detection products leveraging help from Trend Micro."

What is our primary use case?

It's for security: IDS, IPS, intrusion detection, and securing our perimeter in general. E.g., OWASP rules.

How has it helped my organization?

Trend Micro gave our security teams a certain degree of comfort by just having it in the background, as they have familiarity with the product.

What is most valuable?

IDS and IPS are its most valuable features.

What needs improvement?

AWS products could become more compatible with intrusion detection products leveraging help from Trend Micro.  

For how long have I used the solution?

One to three years.

What do I think about the stability of the solution?

We have had no stability issues.

What do I think about the scalability of the solution?

Scalability hasn't been an issue.

We have different workloads, so it depends on if we're talking about development, QA, or the testing environment. They are all separate accounts. We have a central account to try to manage all of them. A lot of these type products, like Trend Micro, fit into these shared environments. 

Right now, we've got a few production workloads, but most of the workloads are still in development.

What about the implementation team?

Automation is a big part of everything that we do. The team setting it up would have had to set up Chef scripts and other things to make sure that we could automatically deploy. This would have been part of the configuration and management into the AWS environment.

Which other solutions did I evaluate?

We were looking for a tool to help secure our environment. There wasn't anything immediately available as an AWS native service, so we looked for a third-party tool which could do it. 

We would like to see more from AWS natively on the intrusion detection side.

What other advice do I have?

Take a good look at all the different options. If there are things which I think teams are familiar with, that always gives a product a bit of a leg up. This is not just from the perspective of the people who support and deploy the product, but even the security teams who may be already familiar with the product and know how effective it is. It gives them a lot more comfort seeing something that they have some background with.

Our company uses the on-premise and AWS versions. I work with the AWS version, and have been happy with it. I am seeing more of the end result of it rather than the infrastructure and security perimeter.

We decided to use AWS because it was something the teams were familiar with. Our teams, who are currently using Trend Micro, were already familiar with the product and wanted to make use of it in the cloud as well. It was just a matter of continuity.

It is integrated with a SIEM, security incident and event management, platform. A lot of the output which comes from Trend Micro, we fed into the SIEM system so the security teams and the monitoring teams have a single pane of glass view into all the security features of our environment.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Ahmed Elmenshawy - PeerSpot reviewer
PS IT Security Engineer at Alex Bank
Real User
Top 5Leaderboard
Highly stable product with a straightforward setup process
Pros and Cons
  • "It helps with virtual patching and IDS fetching."
  • "There should be signature-based advanced and responsive features."

What is our primary use case?

We use Trend Micro Deep Security to monitor the environment in case of zero-day attacks.

What is most valuable?

The product's most valuable feature is the threat prevention module. It helps with virtual patching and IDS fetching.

What needs improvement?

They should include WAF modules in the product. There should be signature-based advanced and responsive features.

For how long have I used the solution?

We have been using Trend Micro Deep Security for a year.

What do I think about the stability of the solution?

It is a highly stable product. I rate its stability a ten out of ten.

What do I think about the scalability of the solution?

I rate Trend Micro Deep Security's scalability a ten out of ten. We use it 24/7.

How was the initial setup?

The implementation is straightforward. I rate the process a nine out of ten. We require a team of five executives for troubleshooting.

What other advice do I have?

Trend Micro Deep Security has robust virtual patching features. I rate it a ten out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Data Center Manager/Support Delivery Manager at Salam Technology
Real User
A user-friendly product that protects us from both internal and external attacks
Pros and Cons
  • "The most valuable features are web security, email filtering, and content filtering."
  • "The support for email protection can be improved."

What is our primary use case?

Our primary use case for this solution is to prevent DDoS and other types of attacks from internal or external sources.

How has it helped my organization?

This solution protects us against different types of attacks, including email phishing, and it includes spam filtering. There have been some spam cases that we found recently and Trend Micro had already detected them. It caught EXE files in email and we put policies in place to block Excel attacks.

There are daily updates and we can even protect the internal workstations from viruses.

What is most valuable?

The most valuable features are web security, email filtering, and content filtering. The user interface is very friendly, and it is easy to control things from the policy.

What needs improvement?

The support for email protection can be improved.

For how long have I used the solution?

Since 2017.

What do I think about the stability of the solution?

I have been using different Trend Micro products in 2009 or 2010. For me, this is the best on the market.

What do I think about the scalability of the solution?

This product scales very easily. We have more than one hundred and thirty licenses and more than five thousand users.

The people who use this solution are experts in networking and cybersecurity. All of them are CCIE certified.

We will be increasing our usage by adding another site. Right now we are using an MDRC (Mobile Disaster Recovery Center), but within two or three months, we will have a PDC (Primary Data Center).

How are customer service and technical support?

When we call technical support they respond immediately. They are local and we have met them three or four times in the last couple of months. After they visited our office, we had a discussion with them.

We get very good support from them, and we appreciate it.

Which solution did I use previously and why did I switch?

We have been using Trend Micro products and we were happy with them so we went with this solution.

How was the initial setup?

The initial setup for this solution is straightforward.

For the deployment, we are using three cybersecurity engineers and three network security engineers.

What about the implementation team?

We implemented this solution using a local provider in Qatar. The support was amazing. Every day, we received updates from our representative.

What was our ROI?

I cannot predict the ROI at the moment because we are still planning to implement other areas, such as the PDC.

What's my experience with pricing, setup cost, and licensing?

It is approximately three million Qatari Riyal ($820,000 USD) for our licensing fees. The cost is approximately six thousand Qatari Riyal ($1,650 USD) per user.

Which other solutions did I evaluate?

We did evaluate other options, including Kaspersky. I know that it does not have the capability that we need. We did use it for endpoints, but we were not happy with it at the time.

What other advice do I have?

We would recommend this solution to others. This is based on our security implementation. We are strongly protected through Trend Micro.

I would rate this solution a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
PeerSpot user
Director of Cloud Architecture and Security at a consultancy with 1,001-5,000 employees
Real User
It links directly to AWS to tell me if a new instance created is unprotected. When running reports, you see can whether or not your environment is covered.

How has it helped my organization?

It's made the security guy's life a lot easier. A lot of what it does is automated and it's simple. You put it into place and the security guy just uses it instead of trying to administer it.

What is most valuable?

The most valuable feature is the direct link to AWS to tell me if a new instance created is unprotected. That's just so valuable to me. When running reports, you see can whether or not your environment is covered.

It also has a full breadth of services that include not just antivirus, but also IDS/IPS and file integrity and vulnerability management. It's really meant for the cloud and is proactive on AWS.

What needs improvement?

I'd like to have the ability to manage heterogenous clouds so that, for example, AWS and Microsoft are protected with the same security patterns. It already does that, but I think they may have rolled it back recently.

Also, it has great IDS/IPS built in, but I'd like a way to visualize the traffic. This way, there's more of an artistic view of security and the ability to ask question about the data. That would be really beneficial.

What do I think about the stability of the solution?

We don't have any issues with stability. I will get alerts at times for problems that have already been addressed, but I wouldn't call that instability.

What do I think about the scalability of the solution?

I haven't hit any thresholds that tell me that it's not scalable. We just add servers and agents and keep going. As far as I'm concerned, it'll scale for anything.

How is customer service and technical support?

We had a little bit of trouble when we first implemented the tool. We couldn't configure something, but it was our own problem as we weren't reading the documentation. We ended up calling implementation support, and they were excellent. They were patient and walked us through the process. They didn't charge us a dime. Since then, we haven't had to use support other than providing our feedback to the product teams.

How was the initial setup?

The initial setup was pretty straightforward. We were novices to the cloud anyways, so we were struggling with some of the ideas. But I think that if you're acclimated with AWS, it's pretty straightforward. We were struggling to learn cloud concepts and we couldn't understand how to ping horizontal scaling versus vertical scaling.

What other advice do I have?

Think about it. It's for the cloud and not meant to be retro-fitted. You're not managing a core server and it's got elastic scalability up and down from a cost perspective. You just pay per agent. If you don't need a server anymore, you don't pay.

When you implement and install, really learn how to set up the dashboard. You have to have a good intimate knowledge of your environment. Take the time to learn the product; don't just plug it in because it's not meant for that.

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
reviewer1640424 - PeerSpot reviewer
Technical Director at a security firm with 1-10 employees
Real User
Scalable and secure with an easy initial setup
Pros and Cons
  • "The solution is quite secure."
  • "The product isn't very user-friendly."

What is most valuable?

As a security competency company, we play a lot on this product. For us, it's one of the best for data center solutions. Deep Security is something that is a classic antivirus. However, it uses two-function device control. Everything is inside. We have virtual patching capabilities, which are very interesting in Deep Security. Virtual patching is just a host IPS solution which, if there is a delay in installing the patch, the patch is available by the editor.

It's a good product overall.

There is not a lot of bugs like you have in other antivirus solutions. It's quite stable. 

The initial setup is pretty easy.

The solution is scalable. 

The solution is quite secure. 

What needs improvement?

The main drawback is that it's complicated. With Trend Micro solutions, everything is complicated. Deep Security has its own management console, and every product in Trend Micro has its own management console. Everything is siloed. Now, they are trying now to connect everything inside the main control management or reporting console, however, it's still not a central management console. It makes for a lot of work when applying policies and security solutions.

The product isn't very user-friendly.

It's a bit old-fashioned in its design and approach.

While, for example, McAfee might have a new version every two months, Trend Micro might not release a new version for two years. While it's very stable, it could be a bit too long in-between versions.

It would be ideal if the solution communicated better with other security solutions from other brands. This is an issue. They need to open up their API or give access, or exchange information with other security products so that everything can communicate together, learn from each other, and block malicious threats better.

For how long have I used the solution?

We've been using the solution for a long time. It's been three or four years or so.

What do I think about the stability of the solution?

The stability is very good. There aren't a lot of bugs or glitches. In comparison, for example, Sophos has some bugs and McAfee has a lot of bugs. When they give you a new version, you know that you have to wait for the service pack, to be sure that it will be up and running in production.

This product doesn't crash or freeze. It's reliable. 

What do I think about the scalability of the solution?

The thing users need to understand about the solution is that Deep Security is not by default meant to manage 100,000 PCs. It's for data centers, and it's for less than 300 servers at the same time. That said, even a big company doesn't have a lot of servers available. In terms of scalability, we don't find a limit for the moment based on the customer base we have.

You can also scale via the cloud. It's very flexible and you can deploy on command, on a virtual server in the cloud. 

How are customer service and technical support?

We've dealt with technical support in the past. We only call them, from time to time, if we can't figure out the answer ourselves. While four or so years ago they weren't as fast, not we get a quick response. Over the past year, we've been quite pleased with the level of support.

Which solution did I use previously and why did I switch?

We're familiar with older versions of McAfee. We are playing with Sophos for the UTM, the NG Firewall, and for the antivirus, Sophos Intercept X. I've also worked with Kaspersky.

Which is best depends on the client. While Kaspersky, for example, is good for smaller clients, Trend Micro is better for medium to larger ones. However, the solution isn't something you just set and forget. You have to take details, verify, validate, and be aware that a small change will not produce too many logs on the threat detection.

How was the initial setup?

The implementation process is not very complex. If the initial setup is just replacing a competitor antivirus with Trend Micro, it's very easy. The only thing you have to be sure of is that you are setting up the right functionality. Trend Micro Deep Security, has a lot of functions. If you want a classic antivirus, there are very few functions to set up. However, if you want a specific functionality, there may be more steps. There will be more fine-tuning that is required to make sure you are well-protected.

When you have start Deep Security on something that was not equipped with an antivirus, or equipped with, let's say, Bitdefender or Windows Defender, you have very few protections. If you don't take care of covering all these safety functions, you'll be vulnerable. That said, you need to be careful of which functions you activate. You need to make sure it makes sense in terms of the rest of your setup.

What other advice do I have?

It's been one of the four main antivirus solutions, deployed in an industrial way. We've been quite happy with it. You can deploy it on-premises or the cloud, and it's possible to use it with Windows and Linux.

I'd rate the solution at a nine out of ten. We've been very happy with it and found it to be quite secure. 

Of course, next-generation solutions such as Crowd Strike or Carbon Black are game-changing. 

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Buyer's Guide
Download our free Trend Micro Deep Security Report and get advice and tips from experienced pros sharing their opinions.
Updated: April 2025
Buyer's Guide
Download our free Trend Micro Deep Security Report and get advice and tips from experienced pros sharing their opinions.