We changed our name from IT Central Station: Here's why

Trend Micro Deep Security Pros

IT Executive at IFB
In terms of valuable features, I would say its intrusion prevention. Each and every IP connecting to the server gets scanned so we know everyone who is accessing our server and we can block whichever IP's do not belong to us at the firewall.
View full review »
GG
Technical Director at a security firm with 1-10 employees
The solution is quite secure.
View full review »
RN
Senior Security Advisor at a healthcare company with 1,001-5,000 employees
DLP, Data Loss Prevention, and the complexity of how we manage the console and how this client, or this tool, will notify us when there is something going wrong within the server and endpoint, is good.
View full review »
Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: January 2022.
563,327 professionals have used our research since 2012.
CEO at Haniya Technologies
Patch management is most valuable. The major selling point of Deep Security is that it is based on the cloud. Deep Security is for the servers and databases of data centers, and generally, for patch management, you have to shut down the machines, and then you have to restart them. So, they need shutdown time, which is a cost. Big enterprises don't want to shut down their database or their data center for any kind of patch. Deep Security creates a wall and downloads all patches. You install it on the cloud. So, it saves your server from any kind of intrusion or any kind of penetration, and whenever you get a chance or time, in six, eight, or nine months, you can physically download or install all those patches in one go. So, it saves you time. It also saves your shutdown time and keeps your data center safe.
View full review »
AP
Risk info security at a financial services firm with 501-1,000 employees
Deep Security is a good product for managing a few servers.
View full review »
MT
Security Engineer/Architect at Telecom Italia
It integrates well with the cloud; for example, AWS, and Google Cloud Provider.
View full review »
DGM-IT at a construction company with 10,001+ employees
One of the most valuable features is that it's a firewall-based solution. We just open the required reports to the server—to server communication—and that's how we use Deep Security.
View full review »
RK
Founder at a financial services firm with 1-10 employees
Automated virtual patching is a good feature.
View full review »
Sr.Customer Engineer- Projects at a tech services company with 201-500 employees
The traceback feature in XDR is amazing. You can trace back an attack. You can playback where an attack actually occurred and see how the attacker moved. We can easily show this to management, and it makes it easy to make them understand and convince them, which is the best thing.
View full review »
LN
Principal Solutions Architect at a computer software company with 201-500 employees
Deep Security's most valuable features are antivirus and host intrusion detection.
View full review »

Trend Micro Deep Security Cons

IT Executive at IFB
As for what could be improved, I think it should come with an XDR facility without any extra cost. They're always releasing new features, but we need to pay extra for them.
View full review »
GG
Technical Director at a security firm with 1-10 employees
The product isn't very user-friendly.
View full review »
RN
Senior Security Advisor at a healthcare company with 1,001-5,000 employees
The risk is very complex. We need our tools to be more intelligent, more automated, more detectable.
View full review »
Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: January 2022.
563,327 professionals have used our research since 2012.
CEO at Haniya Technologies
It should have XDR and EDR integration. It would be nice if they can tie it up with an XDR or EDR.
View full review »
AP
Risk info security at a financial services firm with 501-1,000 employees
Post-implementation is time-consuming. You have to do monitoring, and that takes time. After you set up everything, it's not a full-fledged implementation. You have to keep on monitoring and configuring.
View full review »
MT
Security Engineer/Architect at Telecom Italia
The problem with this solution is that if you go on large sites you have to have an external database, which would increase the cost.
View full review »
DGM-IT at a construction company with 10,001+ employees
Deep Security's reporting functionality could be improved.
View full review »
RK
Founder at a financial services firm with 1-10 employees
Requires simplification, a fair amount of trouble shooting required.
View full review »
Sr.Customer Engineer- Projects at a tech services company with 201-500 employees
There should be more tools to trace back. Some sort of module needs to be included to attach all the things. It should be more stable, and the traceback feature should be improved. There were cases when we got virtual analyzer or CMC errors. We got false-positive malware notifications, but we couldn't trace them. I raised a case with Trend Micro two or three times, but they couldn't resolve it. Their support should be improved in terms of technical abilities to troubleshoot complex issues. They should be more knowledgeable.
View full review »
LN
Principal Solutions Architect at a computer software company with 201-500 employees
Deep Security's most valuable features are antivirus and host intrusion detection.
View full review »
Learn what your peers think about Trend Micro Deep Security. Get advice and tips from experienced pros sharing their opinions. Updated: January 2022.
563,327 professionals have used our research since 2012.