Try our new research platform with insights from 80,000+ expert users
Infosc Ann - PeerSpot reviewer
Information Security Specialist at Ministry of Education Computer Center
Real User
Top 10
We can get consolidated logs of suspicious objects and malware attacks in a single console
Pros and Cons
  • "I like One Endpoint Security. We can manage all the Trend Micro products from one console."
  • "We have had some false positives with One Endpoint Security's ransomware detection. We received an alert, but it wasn't a ransomware attack. When we did an investigation, we found it was only malware."

What is our primary use case?

We use Trend Vision One Endpoint Security for threat investigation, DDI, DLP,  analyzer, and email scanning. Other Trend Micro solutions share their suspicious objects with One Endpoint Security , and One Endpoint Security investigates the suspicious items. 

We are using One Endpoint Security  in the cloud because we are a ministry, and we have more than a hundred branches. All the branches are connected and integrated through the cloud. We have 6,500 endpoints or 20,000 if we include all the branches. 

How has it helped my organization?

We have all of the Trend Micro products, so it's beneficial to integrate them all and get consolidated logs of suspicious objects and malware attacks in a single console. We can do the same work with fewer employees because of One Endpoint Security's automation. 

What is most valuable?

I like Vision Central. We can manage all the Trend Micro products from one console. Vision One protects against zero-day attacks. It has a feature where it identifies suspicious objects and traffic. We believe it's easy to learn.

We perform cross-layer detection, threat hunting, and investigation from a single console. This capability is essential. We have 15-point IPS, DDI, and all these different security products that we can manage from one console. One Endpoint Security gives us end-to-end visibility. We can forward all the logs to the same solution and interact with the SOC team immediately. We get an alert about any suspicious objects or abnormal behavior, enabling us to take immediate action. 

What needs improvement?

We have had some false positives with One Endpoint Security's ransomware detection. We received an alert, but it wasn't a ransomware attack. When we did an investigation, we found it was only malware.

Buyer's Guide
Trend Vision One Endpoint Security
June 2025
Learn what your peers think about Trend Vision One Endpoint Security. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.

For how long have I used the solution?

We have used Trend Vision One Endpoint Security for five or six years. 

What do I think about the stability of the solution?

One Endpoint Security is highly stable. We have multiple devices configured in high availability. One is active, and one is passive. It's always active and working fine.

What do I think about the scalability of the solution?

One Endpoint Security is easy to scale because some of our devices are VM-based, so when we need that scalability, we can increase the RAM or CPU.

How are customer service and support?

I rate Trend Micro support 9 out of 10. We have contacted them many times. They provide immediate answers and sometimes connect remotely to solve problems for us. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We had QRadar and Symantec before that. We did a POC for Trend Micro with good results. One of the biggest benefits is that it is a consolidated solution. Everything is managed from one console. 

How was the initial setup?

The setup wasn't complicated. A Trend Micro engineer deployed it for us. We had an Active Directory deployment and pushed it to all our branches using our management software. 

What about the implementation team?


Which other solutions did I evaluate?

Every year, the ministry does POCs for other software. We recently did a POC for a Microsoft solution to replace One Endpoint Security , but we are fully satisfied with One Endpoint Security . One advantage of One Endpoint Security is that it's manageable. Once you change the policies, it updates the endpoints automatically. 

What other advice do I have?

I rate Trend Micro Vision One Endpoint Security One 10 out of 10.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Mehmet COŞKUN - PeerSpot reviewer
Head Computer Engineer at TRT
Real User
Top 10
Is user-friendly, efficient, and provides good visibility into our endpoints
Pros and Cons
  • "It provides comprehensive visibility into all client logs and seamlessly integrates with other products, such as CM."
  • "The time required for Apex One to notify us of detection in the central console should be reduced."

What is our primary use case?

We utilize Trend Micro Apex One for endpoint security across all of our clients, managing it centrally alongside the entire Trend Micro suite.

We implemented Trend Micro Apex One to improve our endpoint security.

How has it helped my organization?

Trend Micro Apex One is able to identify threats and notify us to investigate from a central location. From there we are able to inform the client and disconnect the affected device to protect the environment.

Apex One employs advanced protection features, including behavior analysis, to adapt to and defend against unknown threats. Apex One's ability to recognize abnormal behavior and terminate processes is crucial for safeguarding our organization's security.

Apex One utilizes runtime machine learning to detect ransomware, a crucial feature for safeguarding our data from ransomware attacks.

We utilize Apex Central as a single unified console for comprehensive management, enhanced visibility, and effective cross-layer threat detection, hunting, and investigations. As managers of Apex One, we require a centralized console for comprehensive threat detection, investigation, and hunting across all layers of the environment to effectively monitor and manage client performance.

Apex One's single console provides end-to-end visibility into the entire IT security environment.

The end-to-end visibility has significantly reduced our response time, enabling us to respond within five minutes.

We have integrated Apex One with other security products. Apex One is able to deploy rapid updates within ten minutes of detecting threats in the network sandbox. 

The ability to deploy updates immediately is crucial for me as a security manager.

Apex One is easy to learn.

Administering Apex One is more straightforward than the other products I manage.

Apex One has helped improve our production. We were able to see the benefits within two months.

Apex One offers virtual patching to mitigate vulnerabilities that attackers could exploit.

We have seen a reduction in viruses and malware since the implementation of Apex One.

Apex One has reduced our administrative overhead because it is easy to use.

What is most valuable?

Trend Micro Apex One's centralized management is user-friendly and efficient. It provides comprehensive visibility into all client logs and seamlessly integrates with other products, such as CM. This well-structured design facilitates effortless monitoring of the entire environment from a centralized location.

What needs improvement?

The time required for Apex One to notify us of detection in the central console should be reduced.

For how long have I used the solution?

I have been using Trend Micro Apex One for almost seven years.

What do I think about the stability of the solution?

I would rate the stability of Apex One nine out of ten.

What do I think about the scalability of the solution?

Apex One is scalable and can easily manage up to 5,000 endpoints.

Our client has 5,000 employees, and each employee uses two laptops. Therefore, we have plans to increase the usage to cover 10,000 endpoints.

How are customer service and support?

The technical support is good. They are able to action our requests.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We previously used Kaspersky Endpoint Detection and McAfee. We switched to Trend Micro Apex One because it offered a lower price, better central management, and is a popular solution in our country.

How was the initial setup?

The deployment was straightforward and took approximately six hours to complete. The vendor provided us with resources in advance, including database and IS configurations, before arriving to implement Apex One. This facilitated the download, implementation, and licensing of Apex One. One person was required for the deployment.

What about the implementation team?

The implementation was completed by a third-party vendor.

What's my experience with pricing, setup cost, and licensing?

The price of Apex One is competitive and lower than the prices of the solutions we compared it to.

Which other solutions did I evaluate?

We evaluated the different Kaspersky and McAfee offerings in addition to Trend Micro.

What other advice do I have?

I would rate Trend Micro Apex One nine out of ten.

Two people are required for maintenance.

I recommend Trend Micro Apex One. It is a good solution.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Trend Vision One Endpoint Security
June 2025
Learn what your peers think about Trend Vision One Endpoint Security. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
Meleria Mangaring - PeerSpot reviewer
Solutions Engineer at Trends and Technologies, Inc
Real User
Top 20
Offers great integration, has valuable ransomware protection, and behavior monitoring
Pros and Cons
  • "The ransomware protection and behavior monitoring features of Trend Micro Apex One are actually good."
  • "One of Trend Micro's weaknesses is its high resource utilization."

What is our primary use case?

Many clients come to us after they have been attacked by ransomware. They often ask us to immediately remediate the situation, but this is not possible once a system has been compromised. However, we can usually install Trend Micro Apex One or a Cloud One product right away. This is our standard response to these situations.

Most of the clients I work with are hospitals. They have been using a different endpoint security solution, but they were attacked by ransomware and reached out to us for a different solution.

In one of the use cases we worked on, we simply installed an endpoint security solution. During the proof of concept, the hospital actually encountered a ransomware attack. There were two systems that were attacked: our test PC running Apex One and the other that was using the existing endpoint security solution. The Trend Micro-installed PC was able to navigate the attack, but the files on the other PC were corrupted.

We also simulate other attacks, such as ransomware or simple malware, using the Intelligent Content Analysis and Response tool. We then check the Device Control feature. Apex One also has data loss prevention and application control features. The DLP feature is not as comprehensive as a full-blown DLP solution, but it can be used to leverage regular expressions, specific keywords, and specific attributes. We also test the application control feature.

Our most recent testing has been with the new Vision One product. This is an extended detection and response platform that can be integrated with not only Trend Micro's other solutions, but also with other security solutions from different vendors, such as SIEM, firewalls, NDR, and vulnerability management systems.

When we test the integration of Apex One and Vision One, we focus on automation, remediation, and cost analysis. We can see how an attack was carried out, down to the file level, hostname, and user. If Vision One is integrated with Active Directory, we can also see who the user was at the time of the attack.

This is the scope of the usual use cases we perform during proof of concepts for Trend Micro Apex One.

How has it helped my organization?

I would rate Apex One nine out of ten for its ability to defend endpoints against malware, ransomware, and malicious scripts.

Apex One can defend against zero-day attacks and stealthy attacks. This is important because in-house applications can have many vulnerabilities, such as coding errors and misconfigurations, which attackers can exploit. Having Apex One as an advantage would give clients a head start in defending against unknown threats.

It uses runtime machine learning to detect ransomware. Machine learning allows us to monitor activities and suspicious behaviors running in our system, not only at the file transfer level but also at the library and registry level. This is important because it allows us to identify potential threats. Runtime machine learning can see any entry points that ransomware might use to infect a system.

Trend Micro has announced that they will be migrating the Apex One platform to Vision One, which can be integrated with an XDR.

Our clients have integrated Apex One with a vulnerability management firewall, SIEM, MFA solutions integrated with Azure AD, and the native security of Microsoft 365.

Apex One is user-friendly. For those familiar with an endpoint security solution, it will not be difficult to learn Trend Micro Apex One. However, for those who are new to the solution, they will need to take some time to learn the ropes.

Administering Apex One is straightforward, especially for the SaaS solution compared to the on-premises solution. This is because we only need to download the installer. The installer is large, around 400 MB. Once we install it on the system, we can communicate with the management console, which is the same for both solutions. We just need to make sure that all required communication ports, FQDNs, IP addresses, and ports are allowed on the firewall. We usually take into consideration the clients when we are doing POCs, and we need to work with the infrastructure team to check on this.

Apex One provides our clients with virtual patching to protect against vulnerabilities. From the perspective of an impending threat, if a client is able to patch the vulnerability in the meantime, Apex One can see the potential threat and take action to protect the client. This is done by identifying the signatures of the vulnerability and creating a virtual patch. It is important to make sure that clients understand that this is not an official patch, but rather a temporary measure that can be used while the official patch is being developed and applied.

Before using Trend Micro, many of our larger clients, which are hospitals, were constantly attacked by malware. However, after adopting Apex One, the viruses and malware have been significantly reduced or eliminated altogether. This is why they continue to renew their subscriptions to Trend Micro.

Most of the time, we recommend the SaaS version of Apex One because the on-premises solution from Trend Micro requires significant resources from the client. If they do not have the necessary monetary resources, they will need to take this into account. This is because when we build an on-premises Apex One, we need two servers: one for Apex One on-premises and one for Apex in Cloud. Additionally, if we leverage the entire SPE package, we will also need a server for mobile security and file and drive encryption.

The endpoint deployment in the cloud has helped our clients reduce their staff workload, especially on the maintenance side.

Apex One has helped reduce our client's administrative overhead.

Some of our clients use Trend Micro's managed XDR service and they love it because the automation makes things easier for them. 

What is most valuable?

The ransomware protection and behavior monitoring features of Trend Micro Apex One are actually good. All endpoint security solutions are in the market to defend against and remediate threats. However, Trend Micro is particularly quick to identify suspicious activities. Any malicious virus or malware that can be extracted from the system is something that they can leverage and work on. One way they do this is through virtual patching. Most of the time, vulnerabilities come from legacy operating systems. These operating systems cannot always be updated, such as Windows 7. If Microsoft announces that it will no longer update a specific operating system, there is nothing that can be done about it. However, Trend Micro can anticipate specific vulnerabilities that can be exploited due to the lack of updates. They can then leverage these vulnerabilities to create a virtual patch that can be applied to the specific system. I believe this is one of the many highlights of Trend Micro Apex One.

What needs improvement?

One of Trend Micro's weaknesses is its high resource utilization. Many of our clients have complained about this, and it is a valid concern. However, we assure our clients that the level of security that Trend Micro provides is worth the high resource utilization. Trend Micro is very fast at detecting and protecting against threats. For example, they were able to identify suspicious signatures for a ransomware attack that was happening worldwide months before the attack actually occurred. We believe that this level of threat intelligence is a major strength of Trend Micro. Of course, no security solution is perfect. There are always ups and downs. However, we believe that Trend Micro's strengths outweigh its weaknesses. However, we do not only offer Trend Micro for this reason.

For how long have I used the solution?

I have been using Trend Micro Apex One for four years.

What do I think about the stability of the solution?

Trend Micro has consistently been in Gartner's Leaders Program year after year. Apex One is stable.

What do I think about the scalability of the solution?

Apex One is scalable.

How was the initial setup?

The initial setup is straightforward. We usually plan and gather data before implementing. We ensure that there are no residual old endpoints installed in the system. We then set expectations with the client and proceed with setting up the management console. We install the system step-by-step and then work on the policies. We also integrate with other systems and transfer knowledge and troubleshooting skills. 

I usually complete the deployments on my own, but for our larger clients with over 2,000 endpoints in different locations, we need to be on-site. For a three-month deployment of those 2,000 endpoints, we allocated three engineers. There was also one time when we had to allocate a lot of engineers for a government agency with eight thousand employees.

What's my experience with pricing, setup cost, and licensing?

The pricing for Apex One is midrange, and worth the costs.

What other advice do I have?

I would rate Trend Micro Apex One an eight out of ten.

All security solutions require maintenance. But with SaaS deployment and SaaS security solutions, most of the maintenance is actually covered by the principal itself.

Apex One can be resource-intensive and have high utilization, but it does a great job protecting our clients' endpoints.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company has a business relationship with this vendor other than being a customer. reseller
PeerSpot user
Asad Nafees - PeerSpot reviewer
Team Lead, Information Security (Manager) at FINCA Microfinance Bank
Real User
Top 10
Outstanding EDR solution with good efficiency and exceptional IPS control
Pros and Cons
  • "It's very good and efficient."
  • "Pricing could be improved."

What is our primary use case?

We are using their agents in our endpoints, almost 2,000 endpoints. We are using that as an EDR solution.

How has it helped my organization?

There is no other opinion; it's the best solution we have faced compared with Kaspersky and other solutions.

What is most valuable?

The best feature is IPS and IPS control base.

What needs improvement?

Pricing could be improved. It's a little bit expensive.

For how long have I used the solution?

We have been using Trend Vision One Endpoint Security for almost two years.

What do I think about the stability of the solution?

From one to ten, I would rate the stability as eight.

What do I think about the scalability of the solution?

It's very good and efficient. If I rate it out of ten, it would be seven to eight.

How are customer service and support?

Support is handled by the global team. In my experience, I would rate it seven to eight out of ten.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

In my previous organization, we used Kaspersky. This tool is better compared to Kaspersky.

How was the initial setup?

It's a user-friendly tool. I would rate it eight out of ten for ease of setup.

What about the implementation team?

The global team manages the implementation.

What's my experience with pricing, setup cost, and licensing?

Pricing could be improved as it's a little bit expensive.

Which other solutions did I evaluate?

In my previous organization, we used Kaspersky.

What other advice do I have?

I recommend it as the best tool for EDR and XDR solutions.

I'd rate the solution nine out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2097975 - PeerSpot reviewer
Cybersecurity Technician at a healthcare company with 1,001-5,000 employees
Real User
The playbooks make it easier to set rules and policies
Pros and Cons
  • "I like One Endpoint Security's playbooks because they make it easier to set rules and policies. You can customize the playbooks and use them in more than one company. If you manage multiple businesses, it's a great way to set separate policies for each group. You can check for vulnerabilities, attacks, bugs, or anything strange. It also allows you to conduct performance analysis."
  • "I want more options and flexibility when creating rules. I want to set rules that are contingent, like "If this happens, then this, this, and this will happen.""

What is our primary use case?

My company is working with multiple Trend Micro solutions, including its MDM solution, but I think they have removed that one. We are using One Endpoint Security for endpoint defense. Most companies need security installed on the server and agents on all organization's devices that can be managed from the same command console, so you can apply consistent policies to everyone. Trend Micro also offers an XDR solution called Vision One. 

How has it helped my organization?

Before implementing One Endpoint Security, we didn't have another security product, so we can't check to see if there has been an improvement from one over the other. You can save time with Apex One. For example, you can typically save about two hours of investigation time. You can save more time if you identify the problem device earlier and block it.  Also, the action is immediate. You don't need to check, read, and understand what happens, and then perform an action. All you do is take the action. 

The XDR is helpful because it requires less work to manage the endpoints. All the alerts are inside the window, and you can apply the different tools from the same console. You can find all the information and hold it in the sandbox for 30 days in case you need to check something. You can also make a bigger sandbox with more logs, but you don't need all that normally.

What is most valuable?

I like One Endpoint Security's playbooks because they make it easier to set rules and policies. You can customize the playbooks and use them in more than one company. If you manage multiple businesses, it's a great way to set separate policies for each group. You can check for vulnerabilities, attacks, bugs, or anything strange. It also allows you to conduct performance analysis. 

One Endpoint Security protects against unknown and novel threats. There are different processes you can set to monitor a vector and see if something is strange, like if a process has been modified or a new tenant has been created. If so, you can block them. I have already set rules that block when you install this for the time. You can manage them on the tab. Once all the rules are set, I can sleep well knowing that anything suspicious will be blocked. The next day, I can check the logs for any device or user account and see what happened.

There isn't a single application firewall that can filter all the malware. We have different applications and build multiple layers around the business. One of these is the antivirus, but we also have something on the DNS level to control access to the DNS.

You can detect ransomware with machine learning. There are multiple options for that. The threat database compiles all the knowledge of the attack methods and they are synchronized among the different companies. Information is coming from different regions, like Europe and the United States, or other systems.

Having a single console for threat hunting and investigation is the best thing about One Endpoint Security. If you buy the complete package, you also get Vision One, and you can manage both from the same console. Before we deployed Vision One, we had different windows and consoles. Trend Micro is like eight consoles in one. It's great. 

You can integrate One Endpoint Security with some products. In our case, we have only integrated it with Microsoft 365 products, so we can scan data or filter messages that are coming from outside. 

What needs improvement?

I want more options and flexibility when creating rules. I want to set rules that are contingent, like "If this happens, then this, this, and this will happen." 

What do I think about the stability of the solution?

I rate One Endpoint Security eight out of 10 for stability. 

What do I think about the scalability of the solution?

One Endpoint Security is highly scalable. We're covering more than a thousand endpoints. 

How are customer service and support?

I rate Trend Micro support eight out of 10. The quality varies depending on the technician.  All of them are qualified, but some have more qualifications than others. However, I'm happy with the support overall. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I previously worked with Kaspersky and McAfee, but we are new to the XDR. It's a relatively new service and there are only a few competing products. For example, Check Point also has this option.

I don't think that there is a significant difference between One Endpoint Security and other solutions, but I think this is an expert solution. I have not tried all of them, so I can't say definitively if they are better or worse. However, one difference is that an agent uses up processing power and computer memory. Kaspersky uses a lot of memory, whereas Micro Focus doesn't seem to cause the computer's performance to slow down. Maybe if you perform a huge scan, you'll notice it's working slower, but usually, it isn't too much.

How was the initial setup?

One Endpoint Security was already deployed when I joined the company, but it's straightforward. You can do it alone, but I always prefer to have someone from the support team available to address any issues I might have. 

What's my experience with pricing, setup cost, and licensing?

I find the price of One Endpoint Security to be reasonable. The pricing varies from company to company. Your business will have a different price than what we have because the product's price depends on the number of users. 

The product will likely cost more in the future because they are adding more features and will probably offer various modules, such as DLP. We will renew our license in 2025, so we will see if the price goes up. 

What other advice do I have?

I rate Trend Micro One Endpoint Security eight out of 10. I only have good things to say about this product.  This solution is constantly improving and could easily become a big name. If you want a better price, you can always check out the other products on the market. More and more products can do the same thing as One Endpoint Security. One Endpoint Security will work as expected. It matters how you deploy the service. If you install it on-premises or in the cloud, they will give you a different price. 

Using One Endpoint Security isn't easy at first. It's like learning to drive a car. You won't be able to do it the first time. You will need the time to learn about this product and use it in different situations to practice.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
System Administrator at Agility
Real User
Top 5Leaderboard
Provides web reputation, behavior monitoring, and advanced protection capabilities
Pros and Cons
  • "Web reputation and behavior monitoring are valuable features, as they allow us to control which websites users can visit and download from, and to protect against ransomware."
  • "The Apex One endpoint sensor has room for improvement."

What is our primary use case?

We use Trend Micro Apex One as our primary antivirus solution.

How has it helped my organization?

When we use Trend Micro, we can get pop-up messages about who is connecting additional USB hard drives or disks, and about cracked software that may be malware. We can also identify these issues from the client and from the central configuration manager. We can then push patches and behavioral monitoring to protect our custom clients.

With ransomware, malware, and other threats, behavioral monitoring can be a particular benefit because it can catch and quarantine ransomware or malware that is repeatedly using the same methods, even if the malware is new or unknown.

Apex One has advanced protection capabilities that adapt to protect against unknown and stealthy new threats, which is important for our clients, especially those who click on infected web content.

Apex One can detect most ransomware variants with real-time machine learning, which helps to detect threats before they spread.

We leveraged the practice sessions and Trend Micro's support to learn how to use Apex One which made it easy.

Administering Apex One is straightforward. We have a helpline available for the software, and the administrator user-level guide is accessible online.

Apex One has helped our organization improve its endpoint detection.

It has reduced the number of viruses and malware by more than 95 percent.

Apex One has reduced our administrative overhead by one hour per day because we can perform all administrative tasks from a single console.

What is most valuable?

Web reputation and behavior monitoring are valuable features, as they allow us to control which websites users can visit and download from, and to protect against ransomware.

What needs improvement?

The Apex One endpoint sensor has room for improvement.

For how long have I used the solution?

I have been using Trend Micro Apex One for three years.

What do I think about the stability of the solution?

Trend Micro Apex One is stable.

What do I think about the scalability of the solution?

We are managing 2,800 PCs and servers without any issues. With our current setup, Apex One can handle up to 5,000 PCs.

How are customer service and support?

The technical support team is available 24/7 and they are located in Dubai and India.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Our previous three antivirus solutions were Trend Micro 7, 8, and XP before we upgraded to Apex One.

How was the initial setup?

Our organization is responsible for the deployment of Apex One to all of our client's endpoints. The deployment is straightforward. The deployment took around five days. 

To deploy Apex One, we must first install it on the server. Then, open the firewall ports for all freelance clients. Next, check the availability of the client-server communication port. In the directory, place the login script and the existing agent. The client will then be automatically pushed to the Apex One Control Manager. The agent will be notified that there is new software available that needs to be migrated. The upgrade will take place, and the client will need to be restarted for the agent to be installed. The same process applies to roaming clients.

Eighteen people were involved in the deployment because there were 16 sites, including airports, landports, and seaports.

What's my experience with pricing, setup cost, and licensing?

Trend Micro Apex One is affordable. The licensing fee and support are bundled together.

What other advice do I have?

I would rate Trend Micro Apex One eight out of ten.

Apex One is deployed across multiple locations, connecting endpoint servers, PCs, and laptops to the LAN network through fiber channels of the Ministry of Communication, landlines, and private networks to our centralized data center.

We use two people for maintenance to ensure that updates are automatically pushed through to the servers.

Endgame and SentinelOne provide more protection than Apex One.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Principal Consultant at Jilit
Real User
Top 20
Great for defending endpoints, reduces threats, and is easy to manage
Pros and Cons
  • "Using the product as a service on the cloud has helped reduced employee workloads."
  • "It would be better if it was easier to administer Apex One."

What is our primary use case?

We primarily use the solution for endpoint protection. We have only used the solution for six months, however, it has already improved the security posture of our organization. 

How has it helped my organization?

The solution is good for monitoring endpoints and providing or removing access.

What is most valuable?

The automatic source updates are quite useful. The agent is installed on the machine and can provide updates to the clients. 

It's an extremely convenient product.

It's great for defending endpoints against threats like malware, ransomware, and malicious scripts. The product provides good protection overall. It helps protect our endpoints against even unknown or stealthy threats. It adapts well against various threats.

Apex One detects ransomware with runtime machine-learning capabilities. This is very important for us. It's protected us well against ransomware.

The product provides a single console for cross-layer detection, threat hunting, and investigation. Having a single layer of control makes things easy. It provides complete end-to-end visibility to the entire IT security environment.

Using it makes the management of threat detection smoother. It's reduced our response times by 60% to 70%.

It has provided us with virtual patching to protect us against vulnerabilities even before a patch is available for the source of the issue. This is very useful. It's a pretty significant aspect of the product.

We've seen a reduction in viruses since moving to ApexOne. We've seen a 50% to 60% reduction in events. 

Using the product as a service on the cloud has helped reduce employee workloads. It's also reduced administrative overhead. 

What needs improvement?

We'd like to have access to more learning materials to help us understand the solution better. It would be great if the company offered some core courses. 

It would be better if it was easier to administer Apex One. Right now, it is moderate. 

For how long have I used the solution?

I've been using the solution for the last six months. 

What do I think about the stability of the solution?

The solution is stable and has met our needs. 

What do I think about the scalability of the solution?

We can increase capacity based on our needs. It is a scalable product.

How are customer service and support?

I haven't had any issues with technical support. 

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

We have used Symantec, among other solutions, in the past. We read about this product and found it was better at endpoint protection. 

How was the initial setup?

The initial setup process was not easy or difficult. It was moderate. You do need to have some knowledge of the solution in order to deploy it effectively.

What's my experience with pricing, setup cost, and licensing?

I don't have any insights in terms of pricing.

Which other solutions did I evaluate?

We did not evaluate other options before choosing this solution. 

What other advice do I have?

I'm a customer and end-user.

We do not use the solution to integrate with other security products. We don't use any other products.

We have tried to use Trend Micro's managed XDR services in conjunction with Apex One, however, we weren't able to install an agent, so we're looking into it.

I'd rate the solution eight out of ten. I'd recommend it as a security solution.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Mangesh Masaye - PeerSpot reviewer
Manager at UPL
Real User
Top 10
Continuously adapts to threats, uses machine learning, and integrates well
Pros and Cons
  • "The antivirus is the most valuable aspect of Trend Micro Apex One."
  • "While the single console offers partial end-to-end visibility into our IT security environment, we leverage additional solutions to achieve comprehensive coverage, so this area can be improved by Apex One."

What is our primary use case?

We use Trend Micro Apex One for endpoint security on our devices.

How has it helped my organization?

Trend Micro Apex One has been doing a good job protecting our endpoints against malware and malicious scripts. We have not had to deal with any threats.

Apex One boasts advanced protection capabilities that continuously adapt to safeguard against previously unknown and deceptive new threats. The ability to adapt to evolving threats is crucial, especially considering the surge in new variants, including zero-day attacks.

It detects ransomware using machine learning. This capability is important to defend against ransomware attacks.

The solution provides a single console for cross-layer detection for threat hunting and investigations. This is particularly helpful for gaining visibility across multiple platforms.

Apex One is integrated with our other security products.

It is easy to learn. Updating the solution is also easy.

I have experience with previous versions of Trend Micro so for me administering Apex One is easy.

Apex One has protected our organization from threats.

Apex One provides virtual patching before patches are available for the source of the issue. The virtual patching helps minimize risk until the patch is ready.

Since using Apex One, we have seen a reduction in viruses and malware by 50 percent.

We use Apex One as a service and this has helped save our staff five percent of their time.

Apex One has reduced our administrative overhead by five percent.

What is most valuable?

The antivirus is the most valuable aspect of Trend Micro Apex One.

What needs improvement?

While the single console offers partial end-to-end visibility into our IT security environment, we leverage additional solutions to achieve comprehensive coverage, so this area can be improved by Apex One.

For how long have I used the solution?

I have been using Trend Micro Apex One for two years. 

What do I think about the stability of the solution?

Trend Micro Apex One is stable. We have not encountered any issues.

What do I think about the scalability of the solution?

Trend Micro Apex One is scalable. We have not had any limitations on our environment.

How are customer service and support?

We have a dedicated account manager that helps us with the support.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We previously used McAfee, but it was not protecting our endpoints as well as we liked. So, we switched to Trend Micro Apex One.

What's my experience with pricing, setup cost, and licensing?

Trend Micro Apex One is priced well.

What other advice do I have?

I would rate Trend Micro Apex One nine out of ten.

We have a team of six people who are responsible for the monitoring and maintenance of Trend Micro Apex One.

Trend Micro Apex One is deployed globally and we have 8,000 endpoints connected to it.

I recommend Trend Micro Apex One. It is a good solution with proper backend support.

To avoid any challenges, users need to consider hardware compatibility before implementing Trend Micro Apex One. 

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Trend Vision One Endpoint Security Report and get advice and tips from experienced pros sharing their opinions.
Updated: June 2025
Buyer's Guide
Download our free Trend Vision One Endpoint Security Report and get advice and tips from experienced pros sharing their opinions.