Citrix Endpoint Management vs. Trend Micro Cloud One - Workload Security

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Citrix Endpoint Management
Score 8.3 out of 10
N/A
Citrix Endpoint Management (formerly XenMobile), is a UEM and enterprise mobility management application for securing mobile applications and devices.N/A
Trend Micro Cloud One - Workload Security
Score 8.6 out of 10
N/A
Trend Micro Cloud One Workload Security (formerly Deep Security) is cloud security software suite, from Trend Micro, for hybrid cloud environments and virtualization security.N/A
Pricing
Citrix Endpoint ManagementTrend Micro Cloud One - Workload Security
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Citrix Endpoint ManagementTrend Micro Cloud One - Workload Security
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details——
More Pricing Information
Community Pulse
Citrix Endpoint ManagementTrend Micro Cloud One - Workload Security
Top Pros
Top Cons
Best Alternatives
Citrix Endpoint ManagementTrend Micro Cloud One - Workload Security
Small Businesses
NinjaOne
NinjaOne
Score 9.2 out of 10
Acronis Cyber Protect Cloud
Acronis Cyber Protect Cloud
Score 8.2 out of 10
Medium-sized Companies
NinjaOne
NinjaOne
Score 9.2 out of 10
Druva Data Resiliency Cloud
Druva Data Resiliency Cloud
Score 9.6 out of 10
Enterprises
Automox
Automox
Score 8.9 out of 10
Druva Data Resiliency Cloud
Druva Data Resiliency Cloud
Score 9.6 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Citrix Endpoint ManagementTrend Micro Cloud One - Workload Security
Likelihood to Recommend
9.0
(7 ratings)
9.0
(4 ratings)
Likelihood to Renew
-
(0 ratings)
10.0
(1 ratings)
Usability
10.0
(1 ratings)
8.0
(1 ratings)
Support Rating
9.8
(2 ratings)
10.0
(2 ratings)
Implementation Rating
-
(0 ratings)
10.0
(1 ratings)
User Testimonials
Citrix Endpoint ManagementTrend Micro Cloud One - Workload Security
Likelihood to Recommend
Citrix
This product is well suited for any healthcare organization, especially one privately owned by the providers. Many of our providers were displeased with our efforts to use a product that forced sandboxing of Exchange information. Therefore, we needed something that was flexible enough that sandboxing could be used where desired but still allowed native OS integration where necessary.
Read full review
Trend Micro
Hypervisor based agentless security this product excels at. It provides thorough protection for your VM's. The web filtering product that comes with it also does a great job filtering out malicious websites from being accessed by users with a very user friendly prompt that they are going to a website which has been found to be malicious. This is particularly useful when it comes to VDI.
Read full review
Pros
Citrix
  • It has efficient security control system. Easy to use and administer.
  • It is very easy to install, it connects well with with other apps.
  • SecureWeb Xenmobile provides secured access to the websites and eliminates the need of VPN.
  • It connects very well with other apps.
Read full review
Trend Micro
  • It's easy to use the console.
  • It has a very similar look and feels to Deep Security Console.
  • It plugs into the Apex Central for easy management.
Read full review
Cons
Citrix
  • issues with non apple, non samsung devices: if it is not setup with an apple or samsung phone, then the Certificate onboarding is a struggle/unable to be done.
  • user-pin setup: for a user to be onboarded, requiring a PIN; there is a self service way but it is clunky and users prefer to call in instead of trying to follow the 15 step process via PDF
  • if the certificate is ever lost, due to an upgrade via IOS or android, then the entire process [uninstall, reinstall] has to be done, which means downtime for the end user, and higher call volume when a service provider pushes an iOS update.
Read full review
Trend Micro
  • Trend Micro has very little room for improvement. I am using version 9.6 at this time and it is extremely reliable. Some of the upgrades were not completely intuitive, but in those cases Deep Security support came through with documentation that covered all the bases.
Read full review
Likelihood to Renew
Citrix
No answers on this topic
Trend Micro
It's the best one compared to other security applications
Read full review
Usability
Citrix
The software's usability is what we expected. We knew what our organization needed and Citrix was able to meet our needs. The ability to have the apps on a mobile device has been a great plus and Citrix seems to have really developed a software based on the every day needs of the user.
Read full review
Trend Micro
It is the best application I've used. Its features are effective.
Read full review
Support Rating
Citrix
Overall the support from the customer service team has been good. They are very timely and expert in resolving the tickets. They have appropriate knowledge to resolve issues in all stages to development. They were up to the point during the implementation stage of the XenMobile, all queries were answered in time to help finish the deployment. The support for last three years has been extraordinary in helping us use XenMobile effectively and efficiently.
Read full review
Trend Micro
Trend Micro's support is pretty decent, we have had issues in the past and they have been fairly responsive to us and our complaints. Depending on how severe the issue was. Any ticket that had a high priority was handled very shortly especially when we contacted our account rep even if it was after hours, we were still able to get support within a short time period.
Read full review
Implementation Rating
Citrix
No answers on this topic
Trend Micro
Everything is good
Read full review
Alternatives Considered
Citrix
With a zero trust solution for the entire digital workspace, you can continually monitor and assess session activities before, during, and after login. Reduce risk, gain more control over every session, and get deeper insights across your entire application landscape. To achieve this strong security posture across all environments, you need an application delivery solution that shares a common code base. This lets you implement consistent security policies across all your applications for comprehensive protection.
Read full review
Trend Micro
We selected trend micro to take the AV scans and filtering out of the hands of the Windows and Linux vm's we have deployed and move it to the hypervisor level. This has led us to be able to deploy only a single DSVA per host and can protect all VM"s that are on that hosts. This has allowed for more time being spent on other priority security tasks.
Read full review
Return on Investment
Citrix
  • Specific ROI was on us avoiding purchasing company managed cell phones - one of the most important drivers
  • Makes on boarding, and especially offboarding remote users a heck of a lot easier w/the ability to wipe the container, even if not connected (via time setting)
  • Easy access to internal resources - no need for separate vpn, etc...
Read full review
Trend Micro
  • 100% positive ROI. Without Deep Security we would have to leverage and endpoint protection management solution like Sophos or SEPM (Symantec). Although both are good products, from a cost perspective it would have hit us much harder. Trend Micro Deep Security scales very nicely.
  • Since Deep Security actually has zero (or at least unnoticeable) resource footprint on monitored VMs, it is a huge cost benefit for us. As previously mentioned, actual antivirus clients installed on each virtual machine (VM) would have significantly affected performance. This would have cost us much more additionally in paying for additional resources to allocate over VMs in the VMware environment. Deep Security is almost completely unintrusive from a resource perspective.
  • Also, from a layered security perspective, it helps us meet our goals; and since the price of Trend Micro Deep Security quite reasonable, it is that much easier to get approval for this specific internal layer of security.
Read full review
ScreenShots