It makes your IT system visible and secure.
December 30, 2021

It makes your IT system visible and secure.

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Modules Used

  • Trend Micro Deep Discovery Inspector

Overall Satisfaction with Trend Micro Deep Discovery

Trend Micro Deep Discovery, like other cyber security applications in our organization, is the most central and indispensable part of the Trend Micro ecosystem. Trend Micro Deep Discovery can detect even the smallest anomalies immediately due to its 24/7 detection and monitoring capability, rather than just pre-known and defined threats.
  • Increases visibility on the network
  • Scan engine and custom sandbox system
  • Real-time custom defense
  • When viewed as a single product, it is like a secret box.
  • When viewed together with other modules and XDR, vision one, it can be seen that it is a complete system.
  • Sandbox
  • Intrusion Detection and Prevention Systems - IDPS
  • Instant detection and self defense system
  • See what's going on in the network.
  • The platform offers a single, manufacturer-independent solution.
  • Since the management interface is comfortable to use, there is no need for additional training or personnel.
  • No maintenance and repair costs because almost military-standard setup and forgets about maintenance
When you use Trend Micro Deep Discovery, it feels like you are running the SOC team of a company like Trend Micro in your own office. Other companies can also provide this, but the feeling it gives feels like they are providing service by phone from a distant city.

Do you think Trend Micro Deep Discovery delivers good value for the price?


Are you happy with Trend Micro Deep Discovery's feature set?


Did Trend Micro Deep Discovery live up to sales and marketing promises?


Did implementation of Trend Micro Deep Discovery go as expected?


Would you buy Trend Micro Deep Discovery again?


I think Trend Micro Deep Discovery will be suitable for every system, but considering its cost, companies that will want to work in this scenario will usually have systems with multiple branches, multiple clients, and systems that host many independent platforms and communication methods - protocols. In summary, if you have a medium to large structure and you cannot protect this structure because you cannot monitor it in every area, you definitely need this product.