Try our new research platform with insights from 80,000+ expert users
Ahmet Burak Aydin - PeerSpot reviewer
Security Engineer at Intertech Information Technology and Marketing Inc.
Real User
Leaderboard
Provides adequate security and technical assistance
Pros and Cons
  • "The performance is good."
  • "f it had the capability of generating retroactive alerts it would be helpful."

What is our primary use case?

We use Trend Micro Deep Security for security protection.

What is most valuable?

The performance is good. It is better than FireEye Email Security.

What needs improvement?

I would like to see a retroactive alert. If it had the capability of generating retroactive alerts it would be helpful.

While it is stable, it has room to improve.

For how long have I used the solution?

I have been working with Trend Micro Deep Security for six months.

Buyer's Guide
Trend Micro Deep Security
June 2025
Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.

What do I think about the stability of the solution?

Trend Micro Deep Security is a stable solution.

What do I think about the scalability of the solution?

Trend Micro Deep Security is scalable.

In our company, we have approximately 1,000 users.

How are customer service and support?

I am satisfied with the technical support that we have.

Which solution did I use previously and why did I switch?

We are also working with FireEye Email Security.

How was the initial setup?

I was not a part of the installation. It was installed by our technical team.

This solution is maintained and deployed by a team of ten managers and engineers.

What's my experience with pricing, setup cost, and licensing?

We don't pay any licensing fees.

What other advice do I have?

I would recommend this solution to others who are considering using it.

I would rate Trend Micro Deep Security a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1698441 - PeerSpot reviewer
Risk info security at a financial services firm with 501-1,000 employees
Real User
Good for managing a few servers but it requires a lot of manual configuration after deployment
Pros and Cons
  • "Deep Security is a good product for managing a few servers."
  • "Post-implementation is time-consuming. You have to do monitoring, and that takes time. After you set up everything, it's not a full-fledged implementation. You have to keep on monitoring and configuring."

What is our primary use case?

Deep Security is a server protection product. We use it for virtual patching and file integration. You can use this with your cloud or an NX environment, virtual services, VMware, etc. 

What is most valuable?

Deep Security is a good product for managing a few servers.

For how long have I used the solution?

I've been using Deep Security for more than five years.

What do I think about the stability of the solution?

Performance is fine. You need to keep an eye on the new files getting detected, or so you have to keep on applying those file folders. So you have to keep monitoring, or else it is not going to help. So especially for the file integrity model and all. 

What do I think about the scalability of the solution?

I don't know about the scalability, but it's good for few servers where you can manage. 

How are customer service and support?

There is a local Trend Micro team in Mumbai that we call for support or to log a ticket.

How was the initial setup?

Deployment and post-deployment implementation are a little complicated. We can't touch servers, and we can't modify the settings. It should be automated, and Trend Micro should make the process more intelligent. The scope is broad, and you have to manually monitor the file scans and respond whenever there is a detection. 

The deployment itself is not that difficult because it's client based. So you want to install clients on each of those servers, and then you have to keep monitoring and adding features. You check the server's performance, and if everything is fine, you can keep adding servers. But post-implementation is time-consuming. You have to do monitoring, and that takes time. After you set up everything, it's not a full-fledged implementation. You have to keep on monitoring and configuring. 

And there are times when the malware protection or some other virtual patching is working fine, but you need a technician to get all the more advanced features to work. It takes around two or three technicians to implement. Our team is responsible for security while a different team handles server management. Then there are one or two people who manage the security console. And then, there are OEM support and SI support.

What's my experience with pricing, setup cost, and licensing?

We have a subscription. It's not a surface subscription. It's only the AMC part.

What other advice do I have?

I rate Trend Micro Deep Security six out of 10. I would recommend it. It depends on the other security controls you have in place. If you're using the entire Trend Micro suite, then you have a PT web gateway. So if you have the whole suite, you have tight integration with your APT and firewall story. In that case, Trend Micro Control Manager is there. So you have everything tied to a single console, so security and everything play as a complete story.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Trend Micro Deep Security
June 2025
Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
Sr.Customer Engineer- Projects at a tech services company with 201-500 employees
Real User
Easy to deploy with the traceback feature that lets you trace back an attack
Pros and Cons
  • "The traceback feature in XDR is amazing. You can trace back an attack. You can playback where an attack actually occurred and see how the attacker moved. We can easily show this to management, and it makes it easy to make them understand and convince them, which is the best thing."
  • "There should be more tools to trace back. Some sort of module needs to be included to attach all the things. It should be more stable, and the traceback feature should be improved. There were cases when we got virtual analyzer or CMC errors. We got false-positive malware notifications, but we couldn't trace them. I raised a case with Trend Micro two or three times, but they couldn't resolve it. Their support should be improved in terms of technical abilities to troubleshoot complex issues. They should be more knowledgeable."

What is our primary use case?

I used it in my previous company, and it was basically used for security levels. My company was into the implementation of projects, and we used to implement security solutions. Along with Trend Micro, we used to implement these devices. We had several customers of this solution.

What is most valuable?

The traceback feature in XDR is amazing. You can trace back an attack. You can playback where an attack actually occurred and see how the attacker moved. We can easily show this to management, and it makes it easy to make them understand and convince them, which is the best thing.

What needs improvement?

There should be more tools to trace back. Some sort of module needs to be included to attach all the things. 

It should be more stable, and the traceback feature should be improved. There were cases when we got virtual analyzer or CMC errors. We got false-positive malware notifications, but we couldn't trace them. I raised a case with Trend Micro two or three times, but they couldn't resolve it. Their support should be improved in terms of technical abilities to troubleshoot complex issues. They should be more knowledgeable.

For how long have I used the solution?

I have been using this solution for the past three years.

What do I think about the stability of the solution?

It is stable in a way, but you get false-positive malware notifications.

How are customer service and technical support?

Their support can be improved. For our case related to the virtual analyzer or CMC error, they couldn't trace back the issue. We were frequently getting notifications on that server, which were false-positive. They couldn't say why this is happening, and what is making this client trigger these errors. They couldn't advise on that. They should be more knowledgeable.

How was the initial setup?

Its initial setup is straightforward. Deployment duration depends on the environment. Sometimes, we needed to deploy two or three devices, and we had to consult Trend Micro. Their best practices are also there.

What about the implementation team?

We had a technical team of four engineers, including me.

What other advice do I have?

I would recommend this solution, but it has scope for improvement. 

I would rate Trend Micro Deep Security an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Technology Support Engineer at a energy/utilities company with 501-1,000 employees
Real User
A stable, yet affordable solution for deep security protection with fast customer support response times
Pros and Cons
  • "The customer service/technical support for this solution is very fast."
  • "The setup is fairly complex. The deployment took around two months."

What is our primary use case?

The primary use case of this solution is for deep security protection when accessing the internet and when performing online accounting.

What needs improvement?

An additional feature that should be included in the next release is the ability to scan more document types.

For how long have I used the solution?

I have been using this solution for five months.

What do I think about the stability of the solution?

The solution is stable.

How are customer service and technical support?

The customer service/technical support for this solution is very fast.

How was the initial setup?

The setup is fairly complex. The deployment took around two months.

What's my experience with pricing, setup cost, and licensing?

The solution is considerably cheaper than other similar solutions.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
IT Infrastructure Manager at a computer software company with 51-200 employees
Real User
Good Virtual path function for anti-malware and good support
Pros and Cons
  • "The most valuable feature of this solution is the virtual path function, which is the reason we chose to implement it."
  • "I would like to see an EDR function for the servers, as that would be useful for us."

What is our primary use case?

The primary use case of this solution is for anti-malware and virtual paths.

What is most valuable?

The most valuable feature of this solution is the virtual path function, which is the reason we chose to implement it.

What needs improvement?

I would like to see an EDR function for the servers, as that would be useful for us.

Detection and Response directly to the servers.

For how long have I used the solution?

I have been using Trend Micro Deep Security since last year.

What do I think about the stability of the solution?

It's a stable product. We have not had issues.

We have a team of 40 to support and maintain this solution.

What do I think about the scalability of the solution?

This is a scalable solution. We have 2,000 users and a total of 20,000 staff members in our organization. We have more than 40 hospitals in Thailand.

How are customer service and technical support?

We are satisfied with the support that we have received.

Which solution did I use previously and why did I switch?

We are also using CrowdStrike.

Also, we were using Kasperky for anti-malware for the servers.

How was the initial setup?

The initial setup was not easy because when we deployed it, we had to restart our server, and needed permissions from our client.

It took approximately six months to deploy.

What other advice do I have?

I recommend this solution to others who are interested in using it.

I would rate this solution a ten out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
AVP - Cyber Secuirty at Cloud4C Services
Real User
Good application integration and supports virtual patching
Pros and Cons
  • "This product offers good protection against many types of malware."
  • "They need to build in a central console because central integration is not very good right now."

What is our primary use case?

Trend Micro makes up part of our overall security solution.

How has it helped my organization?

This product offers good protection against many types of malware.

What is most valuable?

The most valuable feature is the virtual patching. It means that you don't have to patch applications manually, such as the monthly updates that are released from Microsoft.

Application integration is good. For example, there is a specific module for SAP.

What needs improvement?

They need to build in a central console because central integration is not very good right now. I have four locations and I need to log in to each location's portal to look at it. That is a very big job and I would like to have a consolidated report for all of them.

We would like to see the advanced threat protection (ATP) built-in, without having to use another product.

For how long have I used the solution?

I have been working with Trend Micro Deep Security for three years.

What do I think about the stability of the solution?

I have never had an issue with stability. Some of my colleagues have had problems but technical support dealt with them quickly.

How are customer service and technical support?

My colleagues were able to receive support for issues quickly. I would rate the support a nine out of ten.

Which solution did I use previously and why did I switch?

I also have experience with McAfee and one of the nice features it has is a central portal, where different locations are integrated and I can do everything from one place.

How was the initial setup?

The initial setup is not at all complex. Anybody can do the implementation. The length of time required for deployment depends on how many systems are being integrated.

What other advice do I have?

This is a product that I definitely recommend.

I would rate this solution a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Senior Security Specialist at a tech services company
Reseller
Handles the important task of virtual patching, although the agent-based version has performance issues
Pros and Cons
  • "The most valuable feature is the virtual patching."
  • "When implementing this solution, sometimes we have challenges with SQL migration."

What is our primary use case?

We recommend the use of this solution to our clients, both with virtual and traditional servers.

How has it helped my organization?

This has helped our customers keep up to date with security patches. Many customers do not patch their software after a new purchase has been released because there are a lot of other technologies and considerations to be carried out. It takes time to go through all of these, and some customers have not been patched for many years. Especially for those customers, this solution will protect them against those vulnerabilities.

What is most valuable?

The most valuable feature is the virtual patching. This offers protection of the application before it can be patched by the actual vendor.

What needs improvement?

Some areas for improvement are:

  • There are new additions to the standard product that should be included with the Deep Security version.
  • When implementing this solution, sometimes we have challenges with SQL migration.
  • Some of our customers complain about the cost of this solution.
  • I would like to see an AI component added to the next release of this solution.
  • The agent-based version has performance issues and they have to make it more lightweight.
  • The forensic analysis capability needs to be improved.

What do I think about the stability of the solution?

This is a stable and well-known solution in the market. It is especially well-known for use in virtualized server networks. 

What do I think about the scalability of the solution?

We have not faced scalability issues whatsoever. This solution is commonly used for servers, and not in workstations. We only recommend it for the customer's servers.

How are customer service and technical support?

There are different service levels available for technical support.

When a problem occurs then we collect the logs and submit them. There is some time lost here because we do not always immediately deal with somebody who has sufficient expertise with the solution. This is something that we would like to see change. 

Generally, reaching technical support is fine, but in terms of having problems resolved, it varies. Sometimes it can take three days, while other problems can take three months.

How was the initial setup?

The complexity of the initial setup depends on the customer's environment. There are different methods of deployment. If it is an agentless deployment then there are prerequisites for that. The agent-based version is a bit easier to set up than the agentless version.

They have to go through setting up policies, which will take time to implement and fine tune. They have to make sure that the solution is communicating with the management server, and that there are no conflicts with other applications that are running. If there is anything that is broken or should not be running, then that is fixed. Once the initial application is perfectly up and running without any issues, and the policies have been fine-tuned, there should not be an issue.

Depending on the customer's environment, the deployment time varies. We have deployed some solutions in one day, while others have taken months to complete the fine-tuning. 

Generally, for any implementation, we will not use more than two staff. For cases with more than one hundred machines, this can be a challenge during deployment. 

What about the implementation team?

We do the complete deployment and implementation of this solution for our clients.

Which other solutions did I evaluate?

We resell a variety of products, some of which are similar to the Trend Micro solution, but our recommendation depends on our customer's requirements. Some customers will demand a particular vendor, such as Trend Micro, while others will specify that they do not want to use solutions by a specific vendor. In these cases, we work on alternative solutions for our clients.

Some of the other options our clients consider are solutions by McAfee, Kaspersky, and Symantec. 

What other advice do I have?

It is important to implement this kind of solution because many people do not have security on their servers. This includes the vulnerability patching that should be done.

This solution has improved over time. They have been introducing third-party plug-ins and integration, and there is a cloud version available as well. 

I would rate this solution a seven out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller.
PeerSpot user
it_user651714 - PeerSpot reviewer
Solution Expert -Security at a financial services firm with 10,001+ employees
Real User
A solution that's easily scalable, reduces false positives and is easy to set up
Pros and Cons
  • "The vulnerability scanning reduces false positives by quite a bit."
  • "The client can show as offline sometimes, and that becomes a bit difficult for troubleshooting. We end up basically redeploying the client. This is something that could be improved in the future."

What is most valuable?

The HIPS feature, as well as the monitoring around the file integrity, are very valuable aspects of the solution. 

The vulnerability scanning reduces false positives by quite a bit.

What needs improvement?

The client can show as offline sometimes, and that becomes a bit difficult for troubleshooting. We end up basically redeploying the client. This is something that could be improved in the future.

It would be helpful if they added more machine learning into the solution in the future.

For how long have I used the solution?

I've been using the solution for five years.

What do I think about the stability of the solution?

The solution is largely stable, except for the fact that when the client communication breaks, you end up troubleshooting and you sometimes have to redeploy to get the client to establish the connection again.

What do I think about the scalability of the solution?

The solution is good from a scalability perspective. It doesn't take much effort.

How are customer service and technical support?

Technical support is okay. I would rate them 7.5 out of ten. My experience with Trend Micro has been that if there are issues with respect to databases, it takes time for them to resolve the problem.

How was the initial setup?

The initial setup is straightforward. From a deployment perspective, I would say all vendors are quite similar.

What other advice do I have?

We largely work with enterprise-level organizations.

I advise others to make sure that any recommendations in terms of system requirements that have been given to them are followed properly. 

I would rate the solution 8.5 out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner.
PeerSpot user
Buyer's Guide
Download our free Trend Micro Deep Security Report and get advice and tips from experienced pros sharing their opinions.
Updated: June 2025
Buyer's Guide
Download our free Trend Micro Deep Security Report and get advice and tips from experienced pros sharing their opinions.