We use the solution for event correlation.
Trend Enterprise Security Solutions
Trend MicroExternal reviews
External reviews are not included in the AWS star rating for the product.
A cloud solution for providing all information in one dashboard
What is our primary use case?
How has it helped my organization?
We are deploying a server inside our network to use it as a data collector.
What is most valuable?
The solution provides all the information in only one dashboard. We have integrated with Lumen, NETSCOUT, and other MDM products such as Microsoft Intune and ManageEngine MDM. We have also integrated Chrome with VisionOne.
What needs improvement?
The login system could be improved. We must pass two different dashboards to log in to the solution. We have a second-factor authentication. We need to check the platform, which delays three or four minutes because of logging, checking email, and returning to the platform. If you multiply the entire team, we lose a lot of time daily.
For how long have I used the solution?
I have been using Trend Vision One for two years.
What do I think about the stability of the solution?
I rate the solution’s stability an eight out of ten.
What do I think about the scalability of the solution?
I rate the solution’s scalability a nine out of ten.
Which solution did I use previously and why did I switch?
We have used Symantec before. We switched to Trend Vision because Symantec cut off support for Windows XP. We still have Windows XP in our environment.
How was the initial setup?
The initial setup is easy because our assets are in interactive directory.
What was our ROI?
We’ve seen ROI because we controlled a malware attack in our network with Trend Micro two weeks ago.
Which other solutions did I evaluate?
We have tried other malware solutions. We chose Trend Vision because it supports Windows XP.
What other advice do I have?
Overall, I rate the solution a nine out of ten.
Which deployment model are you using for this solution?
Centralized visibility, helpful support, and great for vulnerability detection
What is our primary use case?
I work with it as a third party in other companies. I installed XDR in other companies. And then, I help them understand the tool, help them with developing the necessary use cases, and understand, for example, how to do a threat intel, how to do a threat investigation, and stuff like that. Sometimes, I work with it as well by implementing it and actively using it in the customer's environment.
What is most valuable?
The workbench feature is excellent. It helps a lot with understanding how the environment is working and how the threats are working in their own environment. It helps a lot to understand where the threat is coming from, where it is going, how is it being dealt with, et cetera.
We do not use XDR to protect a multi-cloud or hybrid cloud environment. I have other solutions on the cloud, like Apex One, the endpoint protection feature in the cloud. I have Cloud One Workload Security, which is protection for workloads and servers where the main console is in the cloud. I'm mainly using this to protect an on-premises environment.
I've been using it for emails, for networks, endpoints, workload servers, et cetera. It has the ability to cover all of those. The coverage is really important. The integration between all those different tools and those different assets makes a big difference in understanding the analytics.
It provides centralized visibility and management across our protection layers. That helps in a lot of ways. For example, the fact that it has some centralized visibility means we can do searches between email addresses and an endpoint. We can take a workspace, for example, and do IPS detection in a workspace and understand from which endpoint something is coming.
We use the executive dashboards that they have almost every day. Once we see an anomaly or something that feels weird in the environment, we can go straight to work, straight to the detections, and we can take a look at it to see what's going on.
We use the Risk Index mainly to help us understand a customer's environment. We use it to get a brief overview of how the environment is, how high their risk is, and then, given the score that we've received, to understand what is causing this risk and then give them suggestions on how to take the score down.
We use the Managed XDR feature. It just basically collects the telemetry and sends it to the console so we can use it in other parts. It has helped a lot with the team's workload. The detection has been really, really useful. It helps a lot to rank where we should put our efforts. Sometimes we'll have to take a deep investigation into some of the stuff we see. Sometimes other issues emerge as we dig. It's helped in detection.
We use the risk management attack surface capability to understand the vulnerabilities and how high a risk something is in the environment. It can help with detection. It's helped us effectively identify blind spots.
The product has helped us decrease time to detect. We've had some issues with a couple of our customers in which the XDR helped us easily detect an issue, and it was fast enough for us to be able to react and respond quickly in order to mitigate damages.
What needs improvement?
The web viewer could be improved. I've had some issues with it in the past.
The zero trust is a bit complicated compared to other parts of the solution.
Mostly, I don't have any issues with XDR.
For how long have I used the solution?
I've used the solution for about three years.
What do I think about the stability of the solution?
I haven't had any issues with stability. There has been no crashing to lagging. We occasionally get informed about maintenance that may cause downtime.
What do I think about the scalability of the solution?
We've had no issues with scalability.
How are customer service and support?
I've contacted support in the past. They are pretty good. They have a high understanding of the platform and the solutions. If they need to escalate, it's easy to do so.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We did not use a different solution previously.
How was the initial setup?
I was involved in the installation. We have an agent installed in the endpoints or a sensor connected to the mail sensors.
The initial setup is straightforward. You just click through with a simple connection.
It doesn't require any maintenance on my end.
We had about four people handling the implementation. We just had to have some credential access, and once the connections were made, we had to distribute the sensors throughout the environment.
You need the whole platform to use XDR. However, there are some activities you don't need XDR to use.
What's my experience with pricing, setup cost, and licensing?
I'm not familiar with their pricing and licensing.
What other advice do I have?
We are an official Trend Micro partner.
We do not yet use the automation capabilities found in XDR.
I'd rate the solution nine out of ten.
After implementing XDR, have a good understanding of how the workbenches work to create a decent playbook. Use the service gateway to your benefit. Connect your active directories, make connections, and use integrations with your firewalls. These third-party integrations are really good, and they help you a lot with your environment.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Reduces the time to detect, investigate, and respond
What is our primary use case?
We have deployed Trend Micro XDR on all our endpoints. It is deployed as an agent because we are using Trend Micro Apex, the antivirus agent, and the SaaS agent. This means that we receive notifications from XDR for any suspicious activity related to endpoints. For example, if a user connects to a suspicious website, XDR should alert us based on our rules. It can also generate alerts for malicious Windows activities.
In addition to deploying XDR on our endpoints, we have connected Vision One XDR to our Office 365 email platform. This allows XDR to read incoming emails. We can then configure rules to remove emails from mailboxes if they have certain properties or are particularly suspicious.
We have also connected XDR to our Azure platform, which is our user authentication platform. XDR can monitor for risky user sign-ins, such as sign-ins from unusual locations. If it detects any risk, it will notify us.
Finally, we have integrated XDR with a third-party tool to receive indicators of compromise. When we receive an IOC, Vision One will automatically run a check in our environment to see if any endpoints have been compromised. It will also check to see if any emails have been sent from any of the senders in the IOC listing. If it finds any matches, it will notify us.
We can also configure playbooks to automatically take action when XDR detects a threat. For example, we could configure a playbook to force a user to reset their password or isolate an endpoint from the network.
We are using the Trend Micro Vision One XDR agent. This agent component is installed on all of our endpoints, including servers, workstations, desktops, and any other computer elements. Vision One also has an API-based element, which we have connected to our email system, such as Azure.
How has it helped my organization?
Before Vision One, we had limited visibility into our security posture. Things were happening all around us, but we couldn't see them. With Vision One, we have centralized visibility and management across all of our protection layers, so we can see and respond to threats quickly and effectively.
I cannot imagine my day-to-day operations without the visibility that Vision One provides. It makes all the difference. No other platform compares to Vision One in terms of simplicity, ease of use, and importance.
Vision One has improved our efficiency with centralized visibility. Before Vision One, we had to go to different platforms and tools in our environment. Sometimes the information was missing and sometimes we were searching with the wrong terms. But because I can now see everything at once, it has helped. The decision we are making now is simply to go there, and whatever we have been faced with, the console is enough to make a decision.
We just signed a contract for Managed XDR services. We were managing our security before, but we'll start using their managed services next year. We've received a few escalations from them already, but that's because they're proactively searching for threats, which is a good thing. For example, I got an escalation from them last week for something that we wouldn't have discovered on our own. It wasn't something that the tool would have generated an alert for either, because it was very similar to what a user would normally do. But they were able to find it because they're looking into all of the addresses that they have. This led to us being able to control incidents that would have happened otherwise.
The XDR service has saved us time, enabling us to work on other tasks. The environment is quite complex, so before we had XDR, we didn't have any tool that considered all possibilities or provided any visibility into our environment. When we first started using the tool, it was new to us, but after a couple of years of using it, we've found that it is a legitimate tool that provides valuable information. Instead of seeing it as adding more work to our workload, we see it as helping us to be more proactive and prevent future incidents. For me, it has been a great help and has added real value to our work.
XDR helped us reduce our time to detect and respond to threats. With a single click, I can isolate a computer from the rest of the compliant environment. I had to do this last week when I had to support two escalated computers. Without XDR, there would be hundreds of things that we would not have seen or known about. But with XDR, we can see everything. And that even includes coverage of devices or computers that are not owned by us, such as those used by vendors. If a vendor brings a malicious device onto the property and downloads something malicious, we can detect it as early as possible.
Trend Micro XDR has helped us reduce the time we spend investigating false positive alerts. I am 100 percent confident that everything that comes out of the platform is legitimate. We had a few false positives when we first started using the solution, but because Trend Micro allows us to whitelist specific items, we were able to build our policy accordingly. Sometimes, there are malicious items that we need to allow because of our environment, such as certain security tools. Trend Micro allows us to build a policy that excludes these items from alerts, so we no longer receive alerts for them.
We use the XDR automation capabilities extensively, including playbook automation for tasks like isolating computers, and API-based automation for most other tasks. For example, we are a member of the retail ISAC information-sharing platform, and we have automated scripts from that platform that pull in all malicious senders, IPs, and domains, and pool them into XDR. XDR then automatically scans all computers to see if any of these malicious entities exist. If they do, XDR generates an alert and allows us to take action, such as removing the file. We generally set XDR to allow only, so that we have visibility into all malicious activity, even if we don't take action on it.
What needs improvement?
I would like to have the capability to export the information we receive from the XDR into Microsoft Excel.
For how long have I used the solution?
I have been using Trend Micro XDR for almost four years.
What do I think about the stability of the solution?
Trend Micro XDR is stable. We have not experienced any stability issues when using the console.
What do I think about the scalability of the solution?
I do not have access to the backend, so I am not aware of the specific technical details. However, from an end-user perspective, the scalability of the system appears to be excellent.
How are customer service and support?
I reach out to technical support almost every week to address any questions I have. I also have a bi-weekly meeting with their technical team. They guide open tickets and address any concerns we may have. Additionally, we have a monthly meeting with Vision One developers where they discuss upcoming features and seek input. I know exactly who to contact for any assistance I may need. Sometimes, I can simply email them directly instead of opening a ticket. The process is always straightforward and efficient. At times, the prompt responses make me wonder if they are using AI assistance, but I hope that's acceptable. I usually receive a response within a minute or two, which suggests AI involvement. However, the signature at the end of the IT person's email confirms that an actual person is handling my request.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We had Carbon Black, but we're using it only for application control. With Trend Micro XDR we can detect and respond.
How was the initial setup?
The initial deployment was straightforward. I have extensive experience in deployments across various companies and platforms. However, Trend Micro XDR surpassed all my expectations. We had previously deployed on-premises, and all we had to do was access the designated console and click a button to migrate all on-premises agents to cloud agents. It was incredibly easy. My team of two and I handled the entire process without any involvement from the teams and properties. I right-clicked and moved everything over. A few agents remained unmovable due to their outdated versions, but we successfully migrated close to 99 percent of all agents.
What about the implementation team?
The implementation was completed in-house. Trend Micro provided a document link to help with the deployment.
What's my experience with pricing, setup cost, and licensing?
Trend Micro XDR is reasonably priced for its value, comparable to other products like VMware Carbon Black.
Which other solutions did I evaluate?
We evaluated an additional option with Carbon Black because we already had that agent in our environment. We also considered Cisco, which has its own XDR platform.
What other advice do I have?
I would rate Trend Micro XDR ten out of ten.
We tried to use the risk index feature, but I didn't have the resources to focus on it at the time. I was more focused on the actual findings that were happening. I have since hired someone who will focus on the risk index, as the primary reason I hired them is to focus on the risk element coming from Vision One, as well as from other third-party intelligence platforms that we work with or have contracts with. Now that I have someone here, we will be focusing on the risk index.
No maintenance is required.
Which deployment model are you using for this solution?
Enabled me to completely change user behavior and manage all our endpoints almost single handedly
What is our primary use case?
It's a perfect tool for monitoring infrastructure, including endpoints, servers, and potential attacks via networks. That's especially true for internet-visible hosts, which we can monitor directly from the tool.
We had problems with users not using legitimate tools, such as pendrives. We needed to protect hosts from external threats and third-party actors. That included monitoring behavior, scanning our infrastructure, and exploitation of vulnerabilities.
How has it helped my organization?
The solution has enabled us to completely reorganize our work. I was the first person using this tool in our company, and I completely changed user behavior to become more restricted. In Poland, but also in the United States, we are very strict about abnormal usage of our tools or attempts to download tools that shouldn't be on desktops, laptops, or servers. From my point of view, we are now a completely different organization than when I joined it. Trend Micro is one of the most important security tools we have implemented.
We don't need to use an external vulnerability scanner because Trend Micro XDR has a module for that, and we can save that money.
Trend Micro's Managed XDR is quite nice because I can manage more than 2,000 endpoints. I use the playbooks with particular scenarios for incident management. It's a very nice tool. It competes with anyone on the market. Sometimes, when we detect some kind of threat and we have no idea how we should investigate, troubleshoot, or mitigate the risk, we use the managed service team with Trend Micro engineers. I'm very happy with this team. They are very good professionals.
We respond much faster thanks to the intelligence used by Trend Micro. They have very good knowledge because they have many threat sources. That is why we are reacting much faster than we would if we had to dig deeper without that knowledge and this tool. It would be absolutely impossible to manage this infrastructure by a single admin or even two security admins. We are able to detect and respond about 80 percent faster. It's not only the monitoring and alerting for classic signature threats; there is also a tool for monitoring user behavior. It would be utterly impossible to find abnormal user behavior without this type of tool.
And we have mitigated most of the false positives—more than 90 percent. About one out of 10 alerts may be a false positive. In the beginning, we had to learn about Trend Micro, what was a legitimate action and what was a suspicious or malicious action. We had to learn what the right approach was.
What is most valuable?
This product is simple to use. Sometimes, especially when new features come out, I need to spend a little bit of time discovering how they work. But overall, it's simple. The interface is quite nice.
The integration is also nice because there are many external tools that we can connect to the platform, such as configuration management tools. Because the platform is integrated, I can manage almost the whole company across our global organization. I can almost manage the infrastructure alone. We have minimized the need to expand our team.
It also handles vulnerability management.
We use Trend Micro to cover endpoint protection and server protection. That's one of the key points for our company. And Trend Micro Vision One absolutely gives us centralized visibility and management. Especially when we integrate it with Active Directory, we get full visibility of our endpoint and server infrastructure. That is very important; a 10 on a scale of one to 10.
We also use the solution's Executive Dashboards. We present the findings in steering committees periodically. Sometimes, there is a repetitive alert or event. Directly from this dashboard, I can see the groups of this type of event. For me, it's quite a nice tool for presenting the results to the C level and the whole company for those who are not technically experienced.
And especially because of the new European regulation called NIST 2, we are using the solution's Risk Index feature. We calculate our risk score and we can see how it is changing in the timeline. Is it growing? Is there a new vulnerability detected? We can also compare our risk score with organizations of the same size or in the same industry and see if we are better or worse.
What needs improvement?
The area for improvement is mobile security. We have just finished a proof of concept for Zero Trust Secure Access. We withdrew from this PoC because it does not have that many points for proxy across Europe. Our organization is across Europe, and it will be nice when it is possible to have Trend Micro proxies across many more countries. At this time, they are only located in Germany and the UK. For us, it's not enough. We are waiting for them to increase the points of contact, and after that, we will return to this project.
From my experience, it was quite a nice tool, and I could manage almost all of the actions that I could not manage in a traditional way. Traditionally, I could allow or block usage of an application. But using the Zero Trust Secure Access tool, I could manage the schema of the usage. I will wait for this tool to change in the next few months.
For how long have I used the solution?
I have been using Trend Micro XDR for almost 20 months.
What do I think about the stability of the solution?
It's a stable product. We haven't detected any issues other than the false positives, but that's normal.
What do I think about the scalability of the solution?
We use it in multiple locations because our company is spread across Europe and Asia, as well as the United States and Canada. We have more than 2,000 users, and the solution covers 400 or 500 assets.
If our company were to increase over two to three months to 10,000 users, it would not be a problem. We have the ability to extend as we scale our users. It's very simple and absolutely flexible.
How are customer service and support?
Their technical support is nice. On a scale of one to 10, it's a 10. They respond fast using email, phone, and the customer service portal.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I used competitors' tools, Secureworks, as well as Carbon Black. These are nice tools, but they are very heavy to implement and heavy on daily operations. Trend Micro is much better, much more flexible, and I have much more visibility. It is a cost- and time-saving tool.
How was the initial setup?
Our deployment is a hybrid. We have advanced our implementation a lot. The first implementation was only one of the features called OfficeScan. That was a few years ago, and the implementation was in the United States. After that, we moved forward with the implementation across servers and endpoints, including Mac and Microsoft endpoints.
The whole project took about three months, with the custom discovery and the fine tuning. We had two people involved, one in Europe and one in the US.
Sometimes, maintenance is required if there is a new feature. It needs to be restarted. But this function is done by Trend Micro engineers because we are using the XDR in the cloud. We don't touch it. There is maintenance on our side for Deep Discovery because that part is an on-prem solution. But it's simple to manage.
What other advice do I have?
They are implementing new tools, like Trend Micro Apex One and DDI. They are ready for implementation on the console, and we are waiting to transition to these tools.
For the new features, I prefer doing a proof of concept, like we did for the Zero Trust Secue Access platform. That was a good move because we saved time when it came to resolving issues on the user side. We had a few users in every department, and we tried to discover what would happen if we implemented this tool. That is my approach to being safe with such products. We can do things without any technical training and can disconnect users around the world using one switch. For new features, I'm a big fan of using a proof of concept.
Simple monitoring with centralized dashboards and great visibility into vulnerabilities
What is our primary use case?
The reason we invested in Trend Micro XDR was to consolidate security operations and monitoring. On top of that, we invested in their managed detection and response service, which they can provide on top of the ETA service, which makes our lives easier. You can say that with it, we need fewer hands.
How has it helped my organization?
We're able to gather a more simple view of what was going on in our infrastructure. Before this solution, we used a SIEM system. Trend Micro XDR made monitoring more simple, and we trusted them as a security partner.
It definitely has improved our visibility of all of our ongoing items in the infrastructure. We can get a good overview of what's going on across our network and what our security looks like.
What is most valuable?
Having everything under one management console and having them monitored from one place is the most beneficial.
It saves time and we do not have to invest in a lot of products to meet all of our use case needs.
It's quite simple to monitor everything under one console. It makes life simpler for our operations team.
We have the solution everywhere, including email, network, endpoints, and cloud. This is important to have this coverage. As a former incident response analyst, having visibility everywhere is really important. Having everything correlated into one place increases visibility.
We have centralized visibility and management across our production layers. They are also improving that from month to month. It's important for us. In security operations, the fewer places you need to go to have a look around, the easier it is. Back in the day, we had to open ten different consoles. Now we just open one.
The most important thing for us as a customer is that we can spend more time in other places as it's simpler to have that overview. We have much more time for other tasks.
We use the solution's executive dashboards. We like that we can drill down from the dashboards into XDR detections. It helps the C-suite understand. However, it also helps us drill down by allowing us to choose which views we want.
We have a trial version of the Risk Index. We have a daily look at it and it gives a nice overview of our vulnerability management and what the attack surface looks like. It helps us prioritize our daily tasks.
The Managed XDR service was great. It helped quite a lot. We had to get used to working with them and they with us, however, now it's quite an easy task and the advisory and alerts we get from them have been helpful. The availability to work on other tasks has helped us improve in other areas. It's positively affected our business. Having this product means that we are improving in a lot of different areas that we also need to focus on. They can do the monitoring better than we can do it ourselves. We don't have the manpower to do it on our own so it helps a lot to have them help with management.
We use the Attack Surface Risk Management capabilities, which are also in the trial period. It's absolutely helped us to identify blind spots in our environment. It made us realize that, for example, users were using their work email for private services such as Netflix or other services that, if they had a data breach, would be an issue. With this, we can reach out to those users and explain to them how to act on the Internet, not to use your work email for private services, et cetera.
It's helped decrease our time to detect and respond to threats. It's likely 80% faster now. It's also helped us reduce the time we spend investigating false positive alerts. They do a lot of the initial work for us and come back with the actions we need to do on our part (if any). It's helped us reduce false positive investigations by 50%.
We're using some of the automation capabilities of XDR. It's helped us save time. At the moment, it's likely helped us save 20% of the time we'd normally spend on manual processes.
What needs improvement?
They should increase their potential for third-party integrations. We'd like to see integrations with other IT security vendors that are not currently there.
I'd like to see central management of all products.
For how long have I used the solution?
I've been using the solution since it came out, essentially. I've been working with it for eight or nine years.
What do I think about the stability of the solution?
The solution is quite stable.
What do I think about the scalability of the solution?
We don't have branch offices, however we have 2200 clients and 800 servers.
It is easy to scale if you are a bigger organization. We do plan to scale further in the future.
How are customer service and support?
We have Service One, which includes three-year support. It is 24/7/365 support and they are quite good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Before Trend Micro, we used Splunk. The use case and monitoring were easier with Trend Micro. We found it easier to fulfill our needs using Trend Micro.
How was the initial setup?
I was involved in the deployment process. Some of it was quite complex. Unfortunately, we had an on-prem environment that wasn't well taken care of. The migration was hard, however, that was more our fault. It could be easier to migrate, however.
It took us about nine months to fully deploy.
We already had some products in the cloud, however, we needed to migrate all of our endpoints. The on-premise agent needed to be placed in the cloud and we had some problems as some clients did not have an opening to the internet, et cera. There was some preparation we needed to do. We needed to do some upgrading before migrating.
There were two to four people performing the implementation.
The solution requires maintenance and we have a person that manages that.
What about the implementation team?
We had help from Trend Micro professional services.
What was our ROI?
We have noted an ROI. Having them monitor our IT solutions allowed us to have fewer people on the team. It's saved us in man hours.
What's my experience with pricing, setup cost, and licensing?
The solution is affordable. You do need to pay additional fees for some of the functionalities.
Which other solutions did I evaluate?
We also evaluated Microsoft's solutions.
What other advice do I have?
I'm a customer and end-user.
We realized the benefits of the solution pretty fast - within a couple of weeks. We knew the benefits beforehand which is why we chose Trend Micro. The possibility of having the solution monitored by the vendor itself was quite helpful.
I'd rate the solution nine out of ten.
I would advise others to prepare your needs beforehand. If you know those, you will know Trend Micros is the right fit for you. It's great. If there's a problem with central management or monitoring, Trend Micros is quite useful.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Has a good workbench feature and observed attack technique
What is our primary use case?
We had a SIEM in place, but we wanted to do some behavioral analysis of the files that are getting deployed. We wanted to check to ensure that it was nothing with the external registration side. We needed an EDR solution for checking and monitoring everything deployed on this target machine or our host machine site. It will check and detect if any malicious files are there or not. We are getting alerts related to that kind of thing. So we used to check those alerts on the XDR, and we used to, like, do the incident and response to that kind of thing there.
How has it helped my organization?
If you have a SIEM in place, you will only get the network logs. XDR gives you more control over what files are getting deployed, how they are being executed, and how they can potentially harm your system. XDR doesn't work like a normal antivirus solution, which uses signatures to detect and block threats. XDR detects based on behavioral analysis and blocks most things.
It reduces the investigation time because it gives you everything, including how the file was executed, which processes it called, the file name, the stemming, and the time. When we have the endpoint name, we can reach out directly to the endpoint owners and communicate with them regarding those alerts.
What is most valuable?
I like XDR's workbench feature and observed attack technique. It generates an alert once certain conditions are met. For example, let's say there's a threat called malicious.exe being deployed on your system. It will generate an alert with information like the file path, location, hash, etc. You also see a relational matrix showing how that file was executed and which processes were installed.
It's a SaaS solution that covers endpoints, email, and cloud. We have agents installed wherever data is being pushed, so it used to give us a payload. Cloud functionality is one of the most critical things because we don't generally have visibility for cloud applications. Once we install the agents, we gain visibility into all the things integrated on the cloud or any SSH attempts.
XDR offers visibility across layers. This is critical when you want to implement some policies and apply exclusions for particular parts of the system that should not get scanned. It's easy to implement those things. Let's say you want to deploy policies for multiple systems. Using Apex Central, you can directly push the policy to various systems and cover the logs of several systems at a time.
What needs improvement?
Sometimes, there are some false positives. For example, once a user had a file in their system named recovery.txt. The solution was flagging that as a ransom note, so we were confused. It isn't that serious, but it should be improved.
Also, XDR should improve its coverage of the latest IOCs. Their suspicious object management works, but the coverage should be improved. It will take one or two months to get those things covered. XDR will detect on a behavioral basis, but these databases will not get updated daily like some other solutions. If you're dealing with new ransomware or malware, it may take around a month before it's covered by Trend Micro.
For how long have I used the solution?
I have used XDR for two years.
What do I think about the stability of the solution?
Trend Micro XDR is stable. We've never had downtime.
What do I think about the scalability of the solution?
Trend Micro XDR is scalable if you can pay more for licenses.
How are customer service and support?
I rate Trend Micro support seven out of 10. Their technical support is good. They reply regarding your cases. However, if you don't reply to them properly, they may close your case if you are not reviewing that kind of thing.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I previously used Crowdstrike, which is an MDR, so it was totally managed by the Crowdstrike team. They were monitoring every alert that was generated, so it's hard to compare it to Trend Micro XDR. It was somewhat similar, but CrowdStrike is more proactive than Trend Micro, and it has greater coverage of IOCs. I have also used SentinelOne.
How was the initial setup?
It's a SaaS solution deployed across multiple locations covering 20,000 endpoints. It doesn't require any maintenance aside from updates.
What other advice do I have?
I rate Trend Micro XDR seven out of 10. If you plan to implement XDR you should be aware of the IOC coverage and follow up with the Trend Micro team. Most things are covered, but it takes time to add and deploy all that stuff.
Good threat hunting and detection with a nice interface
What is our primary use case?
I did a POC with Trend Micro on our servers. We were testing for detection capabilities. We wanted to use it for security protection.
How has it helped my organization?
Once we deployed the solution into our organization, we were able to view logs. From there, we could handle detection.
What is most valuable?
The detection was very good. It helps with threat hunting.
Its interface is good. We were able to find logs easily.
It's been working well on our organization's network. I'm satisfied with the level of coverage. The policies have been very useful and detailed.
We use the solution's executive dashboard. We actually have two or three dashboards. It helps us spot vulnerabilities.
It's helped us reduce workloads. By getting logs, we could reduce detection time. The threat hunting became easier. We're still working through a POC, so I can't speak to if it will enable us to work on other tasks. We're still testing.
The solution has helped us to decrease our time to detect and respond to threats. We can respond to threats in half an hour to an hour.
What needs improvement?
When an incident occurs, it will detect the incident within half an hour to an hour. I'd like to see alert time reduction so that they show up on the dashboard faster.
For how long have I used the solution?
I've been using the solution since 2021.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
I've never tried to scale the solution. For my purposes, it's fine. I can't speak to how scaling would go. Likely, it can scale.
How are customer service and support?
I've been satisfied with the technical support. They are very good.
How would you rate customer service and support?
Positive
How was the initial setup?
To deploy the POC takes less than one week. Implementing the cloud is fast. It's not complex to set up.
What's my experience with pricing, setup cost, and licensing?
The pricing is expensive. Most organizations cannot afford XDR.
I don't deal with the licensing directly.
Which other solutions did I evaluate?
I've looked into other solutions, like Cortex. Trend Micro offers good visibility. I prefer Trend Micro. It's good. I like the useability.
What other advice do I have?
I'm an end-user.
We have yet to use the attack surface risk management capabilities. I only downloaded the sensors and installed them on the current phones and servers. We've only done this in the last week.
I'd rate the solution nine out of ten.
Which deployment model are you using for this solution?
Gives good endpoint visibility and centralizes everything while decreasing time to detect
What is our primary use case?
We use the solution primarily for monitoring. It's for running investigations.
What is most valuable?
If we need any endpoint logs, we're able to access them. It helps us with investigations. We can see, for example, if we are investigating email, the processes running, and any anomalous activity. It detects that kind of stuff.
We are using MicroVision One and it helps us with centralized visibility and management across protection layers. Having a centralized view is very helpful. If we have everything in one place, we can see in one display all of the virtual information and attack rates, et cetera. It makes it easier for an engineer to monitor everything.
We use the risk index feature for the endpoints. It helps with the analysis of malware. It can automate scanning for day-to-day activities.
Trend Micro helped us to decrease our time to detect when responding to threats. It has also helped reduce the amount of time used to investigate false positive alerts.
What needs improvement?
The support has been delayed at times. They could improve that aspect of the solution.
For how long have I used the solution?
I've been using the solution for about six months.
What do I think about the stability of the solution?
The solution is stable. We've had a good experience.
What do I think about the scalability of the solution?
The solution can scale. I'd rate the ability to scale eight out of ten.
How are customer service and support?
The support response can be delayed during investigations.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We did not previously use any other solutions.
How was the initial setup?
We did not handle the deployment. It was handled by Trend Micro.
There is a bit of maintenance required. However, the vendor handles it.
What about the implementation team?
Trend Micros handled the initial setup for us.
What's my experience with pricing, setup cost, and licensing?
I'm on the client side. I don't deal with the licensing directly.
What other advice do I have?
We use the solution across our network.
I'd rate the solution eight out of ten.
The information you get for the solution in terms of investigation, makes things easier.
Which deployment model are you using for this solution?
Provides visibility, is proactive, and saves us time
What is our primary use case?
We use Trend Micro XDR for endpoint detection, endpoint user protection, and virtual security.
How has it helped my organization?
We have deployed Trend Micro XDR across our entire environment, which is important for our organization's threat detection capabilities.
We use Trend Vision One to monitor our environment 24/7. Centralized visibility is very important to me and my management. In addition, management wants to see centralized dashboarding. This is very important.
The centralized visibility and management across our protection layers have improved our efficiency.
The executive dashboard is important to our organization. I use the dashboard each morning and evening.
Trend Micro XDR has helped our organization improve its defenses against external and internal threats.
The Managed XDR service has positively affected our team's workload by providing 24/7 monitoring. This has saved our team 20 percent of their time to focus on other tasks.
The time to detect is under one minute.
What is most valuable?
The proactive approach is the best feature. When Trend Micro XDR detects a virus in our system, it stops it and secures our branches.
What needs improvement?
The centralized dashboard has room for improvement.
For how long have I used the solution?
I have been using Trend Micro XDR for almost two years.
What do I think about the stability of the solution?
Trend Micro XDR is stable.
What do I think about the scalability of the solution?
Trend Micro XDR is scalable.
How are customer service and support?
The technical support is good. We receive a response within ten minutes.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We switched to Trend Micro XDR from Kaspersky because it is a better product and we have not faced any issues.
How was the initial setup?
The deployment took one week and required a few people to complete.
What's my experience with pricing, setup cost, and licensing?
Trend Micro XDR is expensive.
What other advice do I have?
I would rate Trend Micro XDR ten out of ten.
We have over 100 Trend Micro XDR users.
Which deployment model are you using for this solution?
Has built-in AI, a single pane of glass, and centralized visibility
What is our primary use case?
We use Trend Micro XDR for rapid response to end-user computing and security concerns.
As a health system, one of our core challenges is ensuring full visibility into our attack surface. We have many thousands of endpoints and end users that must be properly secured and protected. Our primary use case was to improve visibility, and response time, and reduce complexity. That is why we chose Trend Micro XDR.
Trend Micro XDR is deployed on Trend Micro's private cloud.
How has it helped my organization?
We are using Trend Micro XDR on our endpoint and server infrastructure. The coverage is extremely important to our organization.
Trend Micro XDR provides us with centralized visibility and management across protection layers.
The centralized visibility and management across protection layers have helped our efficiency. The most significant advantage is that we used to manage these platforms with three or even five engineers, and now we're managing them with one.
It is extremely important to us that we can drill down from the executive dashboards into XDR detections. This provides us with the single pane of glass view that I mentioned previously. Being able to see at a high level that there may be systems that are behind on patch levels or need additional service or support, and then being able to drill down specifically to an individual machine, which may be unique in our environment, is very helpful.
We use the risk index to evaluate ourselves holistically, including our performance against best practices and security, as well as our performance against other healthcare systems around the world. This allows us to identify areas where we may have vulnerabilities or where we are particularly strong so that we can focus on improving in the areas where we need to.
Trend Micro XDR has helped us improve our resource utilization through automation, reducing manual effort and enabling faster response times. In under a week, we had tuned our environment to perform optimally.
Trend Micro's Managed XDR service has significantly reduced our team's workload by nearly 50 percent, providing a big improvement in our overall threat intelligence and endpoint security.
The Managed XDR service has enabled our team to work on other tasks. This additional availability for our staff has allowed us to reduce our need for contractors. If we are overburdened, we will hire contractors to assist in other areas of the business. However, because we have become more efficient, I have been able to hire some of those contractors and reduce the burden of contract labor.
Attack surface work management capabilities have been extremely valuable. The user and identity services provided by CREM help us to focus on and improve visibility into end-user behavior, including that of endpoints such as laptops and desktops, the network, cloud infrastructure, and applications.
The ability to detect our blind spots has significantly improved our security posture. Seeing everything clearly in a single, easy-to-understand dashboard allows us to allocate our resources directly to where they are needed most, enabling us to respond faster.
The biggest advantage of Trend Micro XDR is that it has helped decrease our time to detect and respond to threats by around 50 percent.
Trend Micro XDR has helped reduce the amount of time we spend investigating false positive alerts by 60 percent.
Trend Micro XDRs automation capabilities save us around ten hours per week.
What is most valuable?
We are very impressed with the single pane of glass visibility that Trend Micro XDR provides. It allows us to work from a single console instead of having to use four or five separate tools to maintain the same level of security. This is extremely helpful.
The manageability and artificial intelligence built into Trend Micro XDR are extremely helpful.
What needs improvement?
I've seen a lot of improvement in just the year that we've been with Trend Micro. However, I think that continued optimization of the environment towards automation and orchestration, a kind of layer that sits underneath all of the technologies, would be extremely important. When we look at the speed and sophistication of attacks today, such as ransomware, malware, and cyber threats, we need tools and technologies that can react faster. So, I think integration with automation, orchestration, and artificial intelligence will help tremendously.
For how long have I used the solution?
I have been using Trend Micro XDR for one year.
What do I think about the stability of the solution?
Trend Micro XDR is remarkably stable.
What do I think about the scalability of the solution?
Considering our growth rate of nearly 30 percent per year, Trend Micro XDR is scalable enough to keep up, so we have no concerns.
How are customer service and support?
Technical support is exceptional. They are extremely engaged and supportive of everything we have needed.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We previously used Sophos but switched to Trend Micro because of its enhanced capabilities.
How was the initial setup?
The initial deployment was straightforward. The deployment took between one and two weeks to complete.
Moving between security tools requires an analysis of the existing environment to understand the current configuration, rulesets, and architecture. This analysis is quickly followed by implementation to improve the security posture and validation to ensure that the infrastructure is not only properly protected, but better protected than before.
Three people were required for the deployment.
What was our ROI?
We have been able to reduce some labor costs and use our resources more efficiently. These savings of hours per week are definitely a return on investment.
What's my experience with pricing, setup cost, and licensing?
The solution is fairly priced.
What other advice do I have?
I would rate Trend Micro XDR ten out of ten. The solution works extremely well for us. In a healthcare environment, the types of data and the sheer size of the attack surface are somewhat extraordinary. Having the enhanced capabilities of the Trend Micro toolset has been very important to us, and I strongly recommend it.
We have 11,000 users, five acute care hospitals, and around 80 clinics.
Two people are required to maintain Trend Micro XDR for the investigation of threats and incidents. When threat intelligence comes in from Trend Micro or we receive an alert, we validate or respond to it. A lot of this process has been automated, which has helped tremendously.
I strongly recommend Trend Micro XDR and advise doing a proof of concept against any current tool on the market, as it works extremely well and a POC can clearly demonstrate this in a short period of time.