Trend Micro Deep Security

Trend Micro is among the key providers of cutting-edge security solutions. It provides FIM through its Deep Security solution, which is delivered as a software or SaaS. It aims to secure an organization's data centers and cloud infrastructure from data breaches and business disruptions. It can be deployed as a single, multifunction agent through all environments, which help simplify security operations with a single management dashboard for various capabilities such as IPS, web reputation, anti-malware, firewall, log inspection, and integrity monitoring. The solution integrates with various cloud platforms such as AWS, Microsoft Azure, and VMware vCloud Air, permitting organizations to extend data center security policies to cloud-based workloads. The solution screens sensitive files such as OS and application files, which include registry keys, directories, and values, to detect and report malicious and unexpected modifications in real time. Trend Micro is among the key providers of cutting-edge security solutions. It provides FIM through its Deep Security solution, which is delivered as a software or SaaS. It aims to secure an organization's data centers and cloud infrastructure from data breaches and business disruptions. It can be deployed as a single, multifunction agent through all environments, which help simplify security operations with a single management dashboard for various capabilities such as IPS, web reputation, anti-malware, firewall, log inspection, and integrity monitoring. The solution integrates with various cloud platforms such as AWS, Microsoft Azure, and VMware vCloud Air, permitting organizations to extend data center security policies to cloud-based workloads. The solution screens sensitive files such as OS and application files, which include registry keys, directories, and values, to detect and report malicious and unexpected modifications in real time

USP : Trend Micro is among the leading developers and sellers of hybrid cloud security, network defense, small business security, and endpoint security solutions. The company also provides services and technical support in the security market. The products protect critical assets and businesses from advanced threats such as ransomware, zero-day attacks, targeted attacks, and other vulnerabilities. It offers FIM through its Deep Security solution, which is a robust security platform for physical, virtual, and cloud servers. The FIM protection module detects modifications done in the file and Windows registry and indicates suspicious activities. The solution includes other integrated modules that include anti-malware, IPS, web reputation, firewall, and log inspection to help safeguard server, application, and data security across physical, virtual, and cloud infrastructures

BUYERS
VENDORS
EXPERTS
3.0
ANALYSTS

TREND MICRO INCORPORATED detailed analysis

Product Maturity
Company Maturity
Most IMPORTANT
0.0
0.0
0.0
Breadth and Depth of Product Offerings
2.20
2.40
4.20
Product Features and Functionality
5.00
5.00
3.90
Focus on Product Innovation
1.90
4.70
2.30
Product Quality and Reliability
2.00
2.25
2.10
LEAST IMPORTANT LESS IMPORTANT

PARTICIPATING QUADRANTS

TREND MICRO INCORPORATED has chosen it’s strengths in these 3 territories
  • Niche Quadrant

    All-Middle East and Africa

    13 Participants

  • Niche Quadrant

    All-Asia-Pacific

    19 Participants

  • Niche Quadrant

    All-Europe

    18 Participants

STRENGTHS
  • Product Maturity / Solutions Offered
    Agent Less
  • Product Maturity / Deployment Model
    Hosted / On-Cloud
  • Product Maturity / Deployment Model
    Hybrid
  • Product Maturity / Deployment Model
    On-Premise
  • Product Maturity / Operating System supported
    Linux
  • Product Maturity / Operating System supported
    Unix
  • Product Maturity / Operating System supported
    Windows
  • Product Maturity / Product Updation
    log management
  • Product Maturity / Product Updation
    security configuration management
  • Product Maturity / Product Updation
    SIEM
  • Product Maturity
    Product Features and Functionality
  • Product Maturity / Product features
    Web application Servers, DNS Servers
  • Product Maturity / Product features
    Active Directories/DLAP
  • Product Maturity / Product features
    Databases
  • Product Maturity / Product features
    Desktops
  • Product Maturity / government regulations
    HIPAA
  • Product Maturity / Product features
    Network Devices
  • Product Maturity / government regulations
    PCI-DSS
  • Product Maturity / Product features
    POS
  • Product Maturity / Product features
    VMWare ESX/ESXi ConfigurationMonitoring
WEAKNESSES
  • Product Maturity / Focus on Product Innovation
    R&D Spend
  • Product Maturity / Breadth and Depth of Product Offerings
    Differential Pricing and Features to Meet Customer Needs
  • Product Maturity / Solutions Offered
    Agent Based
  • Product Maturity / Services Offered
    Managed Services
  • Product Maturity / Services Offered
    Professional Services
  • Product Maturity / Channel for Delivery of Support Services
    On-Site Support
  • Product Maturity / Channel for Delivery of Support Services
    Remote Support
  • Product Maturity / government regulations
    CSA
  • Product Maturity / government regulations
    DIACAP
  • Product Maturity / government regulations
    FISMA
  • Product Maturity / government regulations
    NERC Standard CIP
  • Product Maturity / government regulations
    SANA
  • Product Maturity / government regulations
    SANS
  • Product Maturity / government regulations
    SOX
  • Product Maturity / services
    Other Support Services
  • Product Maturity / services
    Customer Support
  • Product Maturity / services
    Sales Support
  • Product Maturity / services
    Technical Support
  • Product Maturity / Focus on Product Innovation
    product enhancement
  • Product Maturity
    Breadth and Depth of Product Offerings
See More

Have you EVER used TREND MICRO INCORPORATED Products?

Share your experience with potential buyers.

TOP FEATURES
  • Product Features and Functionality
    Features provided
  • Product Features and Functionality
    Product features
  • Product Features and Functionality
    Operating System supported
  • Product Features and Functionality
    Product Updation
  • Deployment Model
    On-Premise
  • Product Updation
    SIEM
  • Features provided
    Authorization protocols - Who have authorize..
  • Product Updation
    log management
  • Solutions Offered
    Agent Less
  • Features provided
    Identifying Abnormal Behavior

CONNECT with this company

360 Connect helps you reach out to vendors and find the right people connect to it. Think of it as a concierge service for businesses to connect with other businesses, to buy, sell or invest in.

Questions & Answers

TOP REVIEWS

Get help

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.

TOP NEWS