Overview
Product Information on Trend Vision One - Endpoint Security
What is Trend Vision One - Endpoint Security?
Trend Vision One - Endpoint Security Pricing
Overall experience with Trend Vision One - Endpoint Security
“Agente permite adaptar controles de fuga de datos según canales y patrones definidos”
“Visibilidad centralizada frente a limitaciones en personalización e información técnica”
About Company
Company Description
Trend Micro is a global company specializing in cybersecurity. With comprehensive experience and global threat research, the principal business issue the company addresses is digital safety. Its cybersecurity platform is designed to protect numerous organizations and individuals across diverse clouds, networks, devices, and endpoints. The primary area of operation is in cloud and enterprise cybersecurity distinctive for providing advanced threat defense techniques suitable for various platforms. Additionally, the company offers central visibility for swift and improved detection and response. The threat research team of the company supplies essential intelligence and insights, thereby augmenting the effectiveness of the cybersecurity platform and assisting worldwide organizations in combating cyber threats. With a team of 7,000 employees spread across 65 countries, the primary aim of the company is to assist organizations in securing their connected world.
Company Details
Key Insights
A Snapshot of What Matters - Based on Validated User Reviews
User Sentiment About Trend Vision One - Endpoint Security
Reviewer Insights for: Trend Vision One - Endpoint Security
Performance of Trend Vision One - Endpoint Security Across Market Features
Trend Vision One - Endpoint Security Likes & Dislikes
Lo mas valido es que como el log es exportable a un SIEM (como es nuestro caso) o aunque no lo sea te da una informacion muy real de que canal de comunicacion de ha utilizado para esa fuga de informacion (sea cloud, a traves de un USB, etc), lo que facilita aplicar una politica de DLP robusta al configurar la seguridad del propio agente. En adicional facil de desplegar porque tiene plantillas basicas facilmente customizables para adaptarlas a tus necesidades. Tiene capacides para buscar dentro de los canales que le indiques informacion sensible muchas veces en base a patrones que tu mismo puedes proponer.
Read Full ReviewSu visibilidad completa y robusta en múltiples capas de protección, además de su plataforma centralizada para la gestión y manejo de la herramienta.
Read Full ReviewWhen something is detected, it doesn't just say blocked. It shows where it came from, what it tried to do, and what other machines might have been impacted. That context saves me from playing detective. Being able to look back at threat history and spot patterns has been surprisingly useful. It helps us see if something is a one-off or part of a bigger issue. I really like how it links a detection on one endpoint to related activity across others. Makes it way easier to see the bigger picture instead of treating each incident in isolation.
Read Full ReviewNo hemos sido capaces (y lo hemos testeado en laboratorio) que sea capaz de analizar archivos comprimidos, algo que desgraciamente se está poniendo de modo para exfiltrar informacion menuda en poco espacio, salvando las barreras configuradas o obligandote a tener otras adicionales. Impacta y penaliza enormemente el rendimiento en las maquinas. Nos hemos encontrado con varios casos en lo que ha sido mas facil desinstalar el agente y volver a instalarlo que tratar de solventar el rendimiento causado en el equipo. Es muy util en ese sentido proponer que no almacene logs en el servidor local porque en días (en funcion de lo que pidas coteje) llega el disco del dispositivo. No es un DLP al uso y esta claro que tiene carencias a la hora del analisis, como no puede ser de otra forma, por lo que segun que cliente no es suficiente.
Read Full ReviewDonde se encuentran sus puntos débiles es en su escasa documentación mas aun identificando las capacidades de la herramienta, de igual forma sus reportes poco personalizables vuelven complicado presentar la información de forma individual.
Read Full ReviewSome of the alerts and reports feel written for security specialists only. When I share results with managers, I have to translate them into plain English. The cloud console logs me out pretty quickly if I step away. It's a small thing, but when you are juggling multiple tasks, it gets annoying. In a few cases, i have noticed alerts showing up with a delay. It's not critical, but in fast moving incidents, even a short lag can make you feel one step behind. While the product surfaces alerts well, the threat hunting functionality feels a bit shallow compared to a full XDR. If you want to really dig into unusual endpoint behavior, you often have to export data or rely on another tool.
Read Full ReviewTop Trend Vision One - Endpoint Security Alternatives
Peer Discussions
Trend Vision One - Endpoint Security Reviews and Ratings
- MANAGER, CUSTOMER SERVICE AND SUPPORT<50M USDTelecommunicationReview Source
Agente permite adaptar controles de fuga de datos según canales y patrones definidos
Sin ser un DLP al uso, he de decir que como modulo de seguridad integrado dentro de un agente del seguridad, las politicas de proteccion de datos del agente proporcionan capacidades elevadas y en muchos casos (cliente medio) hacen que el cliente no tenga que adquirir otro producto de este u otro fabricante para complementar su seguridad en ese sentido. En el mismo agente puede configurar la seguridad ante amenazas avanzadas y protegerse de fugas de informacion. Muy acertado. - CYBER SECURITY ANALYST50M-1B USDIT ServicesReview Source
Detailed Threat Context and Seamless Operation Enhance Security Monitoring Experience
My overall experience has been pretty smooth. What I noticed most is that it runs quietly in the background without slowing things down or spamming me with pop-ups. Most security tools I have used in the past made me feel like I was fighting the product as much as the threats, but this one feels more like it just gets out of the way and lets me work. - Cyber Security Engineer<50M USDIT ServicesReview Source
Powerful and Comprehensive Endpoint Security, But Requires Time to Fully Optimize.
Trend Vision One - Endpoint Security has been a solid solution for our organization. The centralized dashboard makes it easy to mointor and manage threats across all endpoints, and the detection capabilities are impressive. It offers strong integration with other security layers, providing good visibility and faster response times. However, the initial setup was a bit complex, and tuning the alerts took some efforts to avoid noise. Performance an older machines can lag a bit due to high resource usage. - CYBERSECURITY ENGINEER50M-1B USDBankingReview Source
Centralized Orchestration Provides Visibility, Integration and Automatic Response Across Platforms with the help of Trendmicro in every step.
Visibility, Automation and Integration all in one Solution - IT Services Associate50M-1B USDIT ServicesReview Source
Visibilidad centralizada frente a limitaciones en personalización e información técnica
Brinda detección y respuesta optimizada lo cual permite investigar a profundidad amenazas en diferentes SO realizando búsquedas proactivas en los equipos. Sus modelos de protección integrado contra diferentes tipos de amenazas, sumado con sus posibilidades de aprendizaje automático brinda protección en tiempo real con la posibilidad de automatizar flujos de trabajos en los procesos de ciberseguridad.



