Security Consultant and Cybersecurity Support at a tech services company with 51-200 employees
Real User
Feb 13, 2020
Normally we use the solution to send the traffic. We get traffic on it and once I get the traffic, I get the SPN diagnosis and all the network services diagnostics and whatever else that I run in the office file server. It scans through that. For example, when we download some files, in our portal we are uploading some of the activity documents, as well as Excel and Word documents, etc. They get scanned through and we have DDI Rules that are enabled for the file management. Basically, any uploading, downloading, etc. of items from our website server get scanned and analyzed.
Network Support Specialist at a financial services firm with 5,001-10,000 employees
Real User
Sep 23, 2019
We use the onsite version, not cloud. Our primary use case is for intrusion detection, including threats, malware, and basically anything that might be a threat. Traffic that is intercepted from emails going outbound or inbound is also analyzed.
Learn what your peers think about Trend Micro Deep Discovery [EOL]. Get advice and tips from experienced pros sharing their opinions. Updated: February 2026.
Trend Micro Deep Discovery [EOL] offers real-time network traffic visibility, advanced sandboxing, and threat intelligence sharing, improving threat management for organizations through seamless integration with security products and precise threat detection in simulated environments.Recognized for its ability to detect advanced persistent threats and zero-day exploits, Trend Micro Deep Discovery [EOL] provides insights into malicious activities while maintaining compatibility with multiple...
Normally we use the solution to send the traffic. We get traffic on it and once I get the traffic, I get the SPN diagnosis and all the network services diagnostics and whatever else that I run in the office file server. It scans through that. For example, when we download some files, in our portal we are uploading some of the activity documents, as well as Excel and Word documents, etc. They get scanned through and we have DDI Rules that are enabled for the file management. Basically, any uploading, downloading, etc. of items from our website server get scanned and analyzed.
We use the onsite version, not cloud. Our primary use case is for intrusion detection, including threats, malware, and basically anything that might be a threat. Traffic that is intercepted from emails going outbound or inbound is also analyzed.
I work for a distribution partner company. We use the on-prem, physical model of this solution.