
Overview
Video 1
Video 1
Video 2
Security built to fit DevOps with robust API's and automated protection. Lock down servers with Application Control, protect Docker containers, and increase malware protection with behavioral analysis, and predictive machine learning. Get proactive protection for EC2 workloads with Trend Micro Deep Security. Secure hybrid environments with the Deep Security AMI and pay hourly per workload protected. Buy and deploy a Deep Security AMI and protect your physical, virtual or cloud resources with an agent or our industry leading virtual appliance, and pay for it all on your AWS bill.
Defend against threats, malware and vulnerabilities with a single product. With protection, starting at just $0.01 / hour, you can: Defend your network against attack with host-based intrusion detection and prevention; Stop patching live systems by shielding from vulnerability exploits; Protect Windows and Linux workloads from malware; Streamline the last mile of compliance with File and System Integrity Monitoring; and, get alerts about potential security events in system logs.
BYOL and SaaS versions of Deep Security are also available.
Security tips & tricks and technical resources available at <www.trendmicro.com/aws > or email us at aws.marketplace@trendmicro.com with any questions.
Highlights
- Secure Docker containers with DevOps friendly API security processes including automation security and lock down servers with application control built for the cloud.
- Accelerate compliance and streamline audit evidence gathering with a single security tool that delivers IPS, Application Control, Anti-malware, Predictive Machine Learning, Integrity Monitoring, Log Inspection, and Content Filtering.
- Prevent network threats and proactively protect against zero-day exploits with Intrusion Detection and Prevention (IDS/IPS).
Details
Unlock automation with AI agent solutions

Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Dimension | Cost/host/hour |
|---|---|
Any Micro, Small or Medium EC2 instance types | $0.01 |
Any Large EC2 instance types | $0.03 |
Any Xlarge or larger EC2 instance types | $0.06 |
Other Cloud - 1 Core | $0.01 |
Other Cloud - 2 Cores | $0.03 |
Other Cloud - 4+ Cores | $0.06 |
Data Center | $0.06 |
Amazon Workspace | $0.01 |
Vendor refund policy
We do not currently support refunds, but you can cancel at any time.
Custom pricing options
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
Additional details
Usage instructions
To get started with Deep Security, navigate to https://<instance IP or hostname>:8080 to access the installer. See the Getting Started with Deep Security for AWS Marketplace guide for more details: https://help.deepsecurity.trendmicro.com/hc/en-us/articleÂ
Support
Vendor support
Need help? Contact our AWS security experts at aws.marketplace@trendmicro.comÂ
Your purchase also includes 24x7 support from Trend Micro. You can log a support ticket right from the Deep Security console. aws.marketplace@trendmicro.comÂ
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

Standard contract
Customer reviews
Provides daily threat monitoring and fast response through integrated investigation tools
What is our primary use case?
Trend Micro Deep Security is used in our environment for monitoring and incident response to detect any malicious activity. We utilize the Intrusion Prevention System module, virtual patching, and application control features to manage and secure our applications effectively.
Incident response and monitoring through Trend Micro Deep Security are integrated with Trend Micro Vision One. When an alert is triggered, such as a workbench ID being created for detected malware activity, we receive the alert and begin our investigation in Vision One. We identify the source of the alert, verify associated indicators such as the SHA value, and determine whether the file is malicious. A detailed investigation is conducted to understand the threat, assess its impact, and implement preventive measures. If the file has not been quarantined automatically, we collect and submit it to Trend Micro for further analysis before assessing its severity.
On a daily basis, Trend Micro Deep Security supports our operational activities. We add exclusion files as needed, monitor all malware-related activity, and review application control data to ensure that only approved applications are whitelisted while any unauthorized or risky applications are blocked.
How has it helped my organization?
Trend Micro Deep Security helps organizations stay protected by offering a single, centralized platform that secures physical, virtual, cloud, and container environments from cyber threats and vulnerabilities. What sets it apart is how it brings together different layers of defense—like intrusion prevention, anti-malware, virtual patching, application control, and integrity monitoring—into one easy-to-manage solution. This approach not only helps prevent breaches but also reduces downtime through virtual patching, keeping systems safe even before traditional patches are deployed. When integrated with Trend Micro Vision One, it enhances visibility and speeds up incident detection and response with better context and threat intelligence. It also supports compliance by simplifying reporting and applying consistent security policies across all environments. In short, Trend Micro Deep Security strengthens overall protection, improves efficiency, and helps organizations stay compliant while maintaining strong performance across their hybrid and cloud setups.
What is most valuable?
Trend Micro Deep Security offers several powerful features, with the Intrusion Prevention System module standing out as one of the most valuable. Unlike a typical antivirus product, Deep Security functions more like an advanced AV or EDR solution. It not only provides protection but also assists in managing vulnerability patches. The IPS module delivers virtual patching that mitigates risks immediately, making it an especially effective tool for securing servers.
The virtual patching capability has been highly beneficial for our organization. On Windows platforms, not all vulnerabilities can be patched through standard updates, but the IPS module typically offers virtual patches to close those gaps. This helps maintain system stability and protection without requiring disruptive updates.
In addition to IPS, the platform includes strong features such as the anti-malware module, firewall, and application control modules—all of which enhance system security and help prevent unknown or suspicious activities. Web reputation capabilities further strengthen protection and assist our team in daily operations.
Trend Micro Deep Security has positively impacted our organization by supporting both Windows and non-Windows environments, including Linux and AIX. Its cross-platform compatibility simplifies deployment and monitoring. The product performed exceptionally well even on older systems such as Windows Server 2003, where many antivirus solutions often struggled.
From an operational perspective, Deep Security also improves compliance outcomes. Unlike many tools that require reinstallation for issue resolution, most problems can be fixed by reactivating the agent or using simple troubleshooting commands. Moreover, its integration with Trend Micro Vision One provides comprehensive visibility across the environment, helping our team maintain better oversight and security posture.
What needs improvement?
Trend Micro Deep Security performs well overall, but the anti-malware exclusion policy requires improvement, as adding exclusions is a complicated process. Everything else is good.
For how long have I used the solution?
I use Trend Micro Deep Security currently, and my day-to-day activity involves going through Trend Micro Deep Security. I have used it for a total of four years or more.
What do I think about the stability of the solution?
Trend Micro Deep Security has demonstrated excellent stability. Over the past four to five years, I have not encountered any downtime or reliability issues.
What do I think about the scalability of the solution?
Trend Micro Deep Security offers excellent scalability, allowing it to easily adapt to growth or changes within an environment. I have observed clients expand their deployment from around one hundred to as many as one thousand eight hundred servers without any disruptions or performance issues.
How are customer service and support?
I have had a positive experience with Trend Micro Deep Security’s customer support. The platform offers two types of support: normal and premium. I have used the premium support, which ensures immediate and efficient assistance. Even the normal support is far superior to that of other providers, such as Microsoft, whose response times are often much longer.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Before using Trend Micro Deep Security, I worked with solutions such as Symantec, CrowdStrike, and Trellix. I switched to Trend Micro Deep Security because its implementation and management are more efficient, and its console is intuitive, making it easier to troubleshoot and handle issues.
How was the initial setup?
Setting up Trend Micro Deep Security was fairly easy with proper preparation. The process required ensuring that the system met all requirements and that the network was correctly configured. You had to install the manager, set up the database, open the necessary ports, and deploy agents on each machine. A few steps, such as verifying software authenticity and synchronizing system clocks, required attention. Overall, with the installation guide and a bit of planning, the setup went smoothly, and once everything was configured, the solution started protecting the environment seamlessly.
What about the implementation team?
I’ve had experience implementing Trend Micro Deep Security through both a vendor team and an in-house setup. The vendor team demonstrated solid expertise and handled the deployment efficiently, ensuring that all configurations and network prerequisites were properly met. On the other hand, managing the setup in-house provided deeper technical insight and more control over customization and fine-tuning. Both approaches were effective, but having hands-on involvement in the in-house implementation offered valuable learning and operational flexibility.
What was our ROI?
I have experienced a strong return on investment with Trend Micro Deep Security, as it has helped save both time and money. Several people I know have also invested in it, and they have found it equally beneficial in both aspects.
What's my experience with pricing, setup cost, and licensing?
Regarding the pricing, setup cost, and licensing for Trend Micro Deep Security, I do not have much firsthand experience since it is managed internally, but from what I know, it is good.
Which other solutions did I evaluate?
I did not evaluate any other options before choosing Trend Micro Deep Security.
What other advice do I have?
I highly recommend Trend Micro Deep Security to anyone considering it. If you have prior experience with security solutions such as Microsoft Defender, Symantec, or Trellix, you will appreciate its user-friendly interface and straightforward management. The platform stands out for its simplicity, efficient policy deployment, and excellent technical support. It is definitely worth trying to experience the difference compared to other tools.
Although our organization purchased Trend Micro Deep Security through another channel, I do not recall the exact source. Overall, I rate this solution a solid ten out of ten.
Has protected legacy servers with strong virtual patching and improved incident visibility
What is our primary use case?
My main use case for Trend Micro Deep Security was that I worked as an implementation engineer, and I was responsible for managing the tool in the client environment, so it served as a main resource for that and a single point of contact.
I managed Trend Micro Deep Security in my client's environment by implementing the project and the policies based on their environment, such as when any server was going to upgrade or some activity was going to happen.
How has it helped my organization?
Trend Micro Deep Security has positively impacted my organization by being a mature tool and a stable platform, and its virtual patching capability is very strong, with good visibility and reporting features that I find beneficial.
When I mention good visibility and reporting, I have seen measurable improvements since using Trend Micro Deep Security. The visibility refers to the dashboard where I can see an overall summary of the environment in a single view, and if there is any critical alert, I can take action on that, such as checking with the consent team if a server abruptly shuts down or restarts.
What is most valuable?
The best features Trend Micro Deep Security offers include virtual patching, which is well-known to protect against zero-day vulnerabilities, integrity monitoring, which is useful for monitoring unauthorized config changes, and anti-malware and firewall that helps to reduce noise, along with cloud integration that assists in the auto-discovery of different workloads.
In my experience, virtual patching has been the most valuable feature because Trend Micro Deep Security is well-known for this capability, and it helps clients using legacy servers who do not want to upgrade as their applications require that functionality. Virtual patching helps us by providing the necessary security to protect those servers.
What needs improvement?
Trend Micro Deep Security can be improved in areas such as policy tuning, which takes time in a complex environment, along with slightly high pricing for smaller deployments, especially for SMBs, and the help documentation on their website can be simplified for new users to easily understand solutions to their issues, as I have observed that they can sometimes feel confused.
SMBs face challenges with higher pricing, compelling them to seek competitive solutions for better pricing. Regarding documentation, for example, if you check FortiGate, you can find good solutions for different issues, so Trend Micro Deep Security can also enhance that aspect.
For how long have I used the solution?
I have been using Trend Micro Deep Security for more than five years.
What do I think about the stability of the solution?
Trend Micro Deep Security is stable.
What do I think about the scalability of the solution?
The scalability of Trend Micro Deep Security is also acceptable.
How are customer service and support?
Customer support is very responsive and technically strong, and the ticket resolution time is very acceptable, as the engineers are knowledgeable and help resolve issues as soon as possible.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previously, I have worked on Symantec and WatchGuard, but when I started working on Trend Micro Deep Security, I found it to be very user-centric and helpful, requiring no excessive technical expertise to manage.
What was our ROI?
I have seen a return on investment with Trend Micro Deep Security because its deployment feature is very effective, and the single agent helps monitor multiple things while ensuring employees were not affected during the deployment, as the downtime was minimal, so much so that they did not notice when it happened.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing is that pricing is a little high for smaller environments, but for larger organizations, it is acceptable. The setup cost is reasonable, and we work with a partner who assists with deployment along with Trend Micro Deep Security support.
Which other solutions did I evaluate?
Before choosing Trend Micro Deep Security, I evaluated other options and have used features from all the tools, including integrity monitoring, anti-malware, cloud, virtual patching, IPS, and IDS, so I have experience with all the features of this tool.
What other advice do I have?
My advice for others looking into using Trend Micro Deep Security is that they can proceed with the solution if they have a hybrid environment or a cloud environment, as it is suitable for all types of environments, and I would recommend it. My overall rating for this solution is 8.5 out of 10.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Virtual patching has improved our server protection and reduced response time for critical alerts
What is our primary use case?
Trend Micro Deep Security serves as my main solution for antivirus and endpoint security. In this use case, we manage security policies, file protection, and scanning activities with Trend Micro Deep Security .
What is most valuable?
Virtual patching stands out as the best feature Trend Micro Deep Security offers. Patching allows us to virtually patch servers without downtime, which is critical given our limited patching windows, and helps prevent servers from being exploited.
The alerting system is another valuable feature, as we can use the logs for SIEMÂ integration and receive real-time alerts, enabling us to track and work on any issues. Activity monitoring and automation in Trend Micro Deep Security have saved us time and improved our response time for critical alerts, as we immediately receive alerts that prompt our team to begin working on them.
The most prominent positive impacts of Trend Micro Deep Security on my organization include how we configure alerting and automate tasks. Additionally, we are using cloud security capabilities, and the file integrity monitoring is very helpful.
What needs improvement?
The console provided by Trend Micro Deep Security seems quite complicated. Although Trend Micro Deep Security offers many features related to policy creation, making it more user-friendly would encourage more people to use it and enhance trust in the product.
The main improvement needed is to make the console's appearance more attractive. I work with multiple platforms, including Defender, Sophos, Palo Alto Networks, and Proofpoint, and the dark colors of Trend Micro Deep Security's console can deter administrators from spending time on it.
For how long have I used the solution?
I have been in my current field for more than five years.
What do I think about the stability of the solution?
Trend Micro Deep Security is comparatively stable in its performance.
What do I think about the scalability of the solution?
The scalability of Trend Micro Deep Security is adequate, as it is utilized across our enterprise services, making it scalable.
How are customer service and support?
I have interacted with customer support mostly for analysis when we encounter issues. About eighty percent of the time, we receive satisfactory responses, with the remaining twenty percent reflecting delays or the necessity for their internal engineering team to provide assistance.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I previously used McAfee, which is now Trellix. We made the switch after a ransomware attack in our organization on November 9, 2022, when McAfee failed to detect the ransomware threat.
Which other solutions did I evaluate?
Before selecting Trend Micro Deep Security, I looked into Defender due to its lower costs and also reviewed Sophos, as we were already utilizing it to manage external devices on laptops. After reviewing both, we decided on Trend Micro Deep Security.
What other advice do I have?
I would rate Trend Micro Deep Security around eight out of ten. I chose an eight out of ten because I noted two points regarding the console not being visually appealing or simple to operate and the limitations in creating various policies, emphasizing the need for flexibility in policy creation to show clients that we can implement advanced security measures such as zero-trust segmentation.
My advice for others looking to use Trend Micro Deep Security is to consider the excellent feature of virtual patching, particularly if they currently only run basic antivirus or file integrity systems. Trend Micro Deep Security is good and has significantly contributed to my career growth, but I am very unhappy with its current performance, as it struggles to compete with CrowdStrike. Customers often prioritize attractiveness and marketing over product performance. I have assigned a review rating of eight to Trend Micro Deep Security.
Have created application-specific security policies and maintained compliance through daily log and patch monitoring
What is our primary use case?
For Trend Micro Deep Security , I mainly implement and monitor policies and create policies regarding recommendations. I allow and block applications, create trusted zones, and establish firewall rules.
We have created server-to-server policies. We monitor all the policies and create them based on what we are blocking in our network. For application control, there are many trusted banking applications, so we have to exclude them. We have created rules by vendors.
For anti-malware, we are using a weekly scheduled scan. We monitor the logs to see if any alerts are coming and if it's working or not. We also have daily security patch updates and monitor the alerts and reports on a daily basis.
There is also application control and activity monitoring, such as web control. There is a web reputation module.
What is most valuable?
The best feature of Trend Micro Deep Security is log monitoring, integrity monitoring, and IDS/IPS rules, which are basically for virtual patching and zero-day attacks. It's very easy to use and a very powerful tool for server security.
For integrity monitoring, when a user's privileges are escalated, for example, from a least privilege user, and they are running an administrator tool or deleting sensitive files, it will show us that someone is using that command. For log monitoring, when we view the application and operating system logs, they go to our SIEMÂ or SOARÂ and give me in-depth alerts on that behalf.
What needs improvement?
For Trend Micro Deep Security, there is no hash value separator. In Trend Micro, there is one option they have to add for a hash value block. We have to depend on a third-party tool, hash tools. Also, we are not able to manually delete any hash from the console. We have to go to the SQL database, and from there, we have to do that. So it's just a process for SQL.
I took one point off for the integration part for SIEM . It gives you all the things, but for incidents, it gives them to you module-wise. You have to integrate it based on specific log types, so it depends on which SIEM you are using, such as Splunk, QRadar, or LogRhythm .
For how long have I used the solution?
I have been working with Trend Micro Deep Security for the last 3.5 years.
What do I think about the stability of the solution?
Trend Micro Deep Security is very stable. If it's not, you have to create a case, and they will release new code for that.
What do I think about the scalability of the solution?
For Trend Micro Deep Security's scalability, you can use it for a better experience. It's easy to install script-wise. You can install it on a script basis for Linux and Windows. In my opinion, we get 80 to 90% resolution of installation. For all other different types of OS, it will give you different types of operating system agents. But if you are not able to switch operating systems, you can also install it with a script. For Windows, it's one way, and for Linux, it's another.
How are customer service and support?
The customer support is good. For premium, it basically comes within three hours. A dedicated support engineer will come in within three hours, but if your Trend Micro account manager is good, it will be aligned within one to two hours.
On a scale of 1 to 10, I will rate the customer support at eight because it takes about five to six hours or one day to get its analysis.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previously we were using Trellix server security. In Trellix, we were getting very strong effects of slowness. That's why we changed. The server hung sometimes, and due to that, our business was hampered.
Which other solutions did I evaluate?
We evaluated Trend Micro Deep Security with Sophos, and not only Sophos, we evaluated it with CrowdStrike, but CrowdStrike did not have such granular-level security postures.
What other advice do I have?
We have implemented Trend Micro Deep Security in our organization and have been working with it for the last six to seven years. As compared with other solutions, it's very easy to use. To implement or troubleshoot at an L1 or L2 level, there are more KB articles for that and in-depth knowledge about what to do with a step-by-step procedure. It's easy to implement, configure, deploy, and also monitor the logs.
For Trend Micro Deep Security, we save our time creating policies, and we never have to go to L3 or L8 level engineers because we can resolve and troubleshoot all the issues on our own on behalf of the KBs. The Trend Micro KB articles are very useful for that. Also, its support is great. For a product with great services, there is no struggle to work with it.
The reporting is good. All events are very customizable, but we will say about blocking the hashes. In today's market for server security, I have never seen any other OEM's product which is close to it. For one node, the price is much more than other products. When we talk about other OEMs, it's 10 to 12K. But when we come to Trend Micro Deep Security, one node is approximately 25 to 30K.
Trend Micro Deep Security is a premium segment product. Definitely not money saved, but you have no tension for the business, their compromisation, and things. Also, their updates are much better than other OEMs. It is also easy to use, so there are no negative points for that part.
My advice to others looking into using Trend Micro Deep Security is that for a better experience, it is easy to use. We just have to schedule updates and upgrades. It will automatically upgrade, and there is customer support or articles support. It's really very helpful for troubleshooting. If you face any issue, you have to simply go on Chrome and search the error code. It will give you details on what to do, why to do it, and why it happens.
I rate Trend Micro Deep Security a nine out of ten.
Virtual patching has protected critical workloads and reduced downtime across financial environments
What is our primary use case?
My main use case for Trend Micro Deep Security is its best feature, virtual patching, which allows us to secure our server against known vulnerabilities without having to immediately apply OS or application patches. This has helped reduce downtime, improve compliance, and safeguard critical workloads. The solution has seven modules, including anti-malware, web reputation, firewall, integrity monitoring, and log inspection, but its best feature remains virtual patching.
I use Trend Micro Deep Security in multiple organizations, primarily in the financial sector and multiple banks, where I have protected both our physical and virtual servers from vulnerabilities. Its role is primarily virtual patching, meaning if our server is vulnerable due to a zero-day attack and a patch is not applied, Trend Micro Deep Security creates a virtual patch. That remains the best feature. I perform day-to-day operations with it.
I have implemented and tested multiple use cases on Trend Micro Deep Security solution for different modules, including intrusion prevention and integrity monitoring. For the anti-malware module, I have tested and observed how this product protects against any malicious or suspicious activity.
What is most valuable?
The best features Trend Micro Deep Security offers include virtual patching and comprehensive protection from multiple modules such as anti-malware, web reputation, firewall, integrity monitoring, and log inspection. It is very user-friendly, easy to understand, and helps us integrate multiple products with Deep Security.
The user-friendly aspect and integration of Trend Micro Deep Security have helped my team significantly. For example, we can integrate our SIEMÂ product, Active Directory, and multiple platforms. If an operations engineer cannot find something or forgets about a suspicious activity, we can identify the suspicious thing with the help of the SIEMÂ . With Active Directory, we maintain our compliance, checking which server has Deep Security and which does not. By integrating these solutions, we effectively maintain compliance in our environment.
Trend Micro Deep Security has positively impacted our organization because we have implemented it for multiple purposes, primarily for server security. It is installed on both multiple virtual and physical servers with minimal performance impact. It has been extremely stable throughout our usage, with no major disturbances.
What needs improvement?
Trend Micro Deep Security is a good solution. I have been working on and using this product for almost four years. While it is fundamentally good, the patches are released every month; if it could remain stable for a longer time, it would be helpful instead of requiring monthly patches.
Regarding outcomes, I have noticed reduced downtime potentially due to higher utilization on the server. By adding an exception, we can minimize this type of incident. Additionally, we can track which incidents are happening through the XDRÂ solution.
For how long have I used the solution?
I have been using Trend Micro Deep Security for almost four years and continue to use it.
What do I think about the stability of the solution?
Trend Micro Deep Security is a stable product. It has positively impacted our organization because we have implemented it for multiple purposes, primarily for server security. It is installed on both multiple virtual and physical servers with minimal performance impact. It has been extremely stable throughout our usage, with no major disturbances.
What do I think about the scalability of the solution?
When discussing scalability, Trend Micro Deep Security is used in multiple organizations across the financial and retail sectors.
How are customer service and support?
The customer support for Trend Micro Deep Security is good, and they provide timely responses.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I previously used Symantec and Trellix products before switching to Trend Micro Deep Security because the tech support was delayed and not satisfactory. I struggled to get timely assistance.
How was the initial setup?
My experience with pricing, setup cost, and licensing for Trend Micro Deep Security is almost good and average.
What was our ROI?
I have seen a return on investment with Trend Micro Deep Security. It is a time-saving and money-saving product. The management console is very useful and easy to operate, allowing policy deployment in a minimal amount of time.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing for Trend Micro Deep Security is almost good and average.
Which other solutions did I evaluate?
Before choosing Trend Micro Deep Security, I evaluated other options such as CrowdStrike, among multiple products in the market.
What other advice do I have?
I strongly recommend Trend Micro Deep Security to any organization looking for a powerful, scalable, and future-ready server security solution. It has been invaluable for us, and I believe it will be equally beneficial for future users and buyers.
Trend Micro Deep Security is a powerful solution in the market for server security.
My advice for others considering Trend Micro Deep Security is to strongly recommend it as a powerful, stable, and future-ready server security solution. It has been invaluable for us, and I believe it will be equally beneficial for future users.
On a scale of one to ten, I rate Trend Micro Deep Security a nine.