Show rating breakdown
Save to My Lists
Unclaimed
Unclaimed

Top Rated Deep Security Smart Check Alternatives

Deep Security Smart Check Reviews & Product Details

PS
Solutions Engineer
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Deep Security Smart Check?

It was very easy to install. It is compatible to all server types so didn't need to purchase separate licneses. Review collected by and hosted on G2.com.

What do you dislike about Deep Security Smart Check?

Reports have very limited options and can be improved. Review collected by and hosted on G2.com.

What problems is Deep Security Smart Check solving and how is that benefiting you?

It protects our servers, pc and mobile devices from ransomware, malware and viruses. In this day and age, protecting not only devices but your customers data is top priority. We are quite happy with this product. Review collected by and hosted on G2.com.

Deep Security Smart Check Overview

What is Deep Security Smart Check?

Deep Security Smart Check – Container Image Security Protect your container images sooner with automated scanning for advanced security within your CI/CD pipeline

Deep Security Smart Check Details
Show LessShow More
Product Description

Deep Security Smart Check – Container Image Security Protect your container images sooner with automated scanning for advanced security within your CI/CD pipeline


Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
113,678 Twitter followers
LinkedIn® Page
www.linkedin.com
7,572 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
Total Revenue (USD mm)
$1,515
Description

Trend Micro, a global leader in security software and solutions, strives to make the world safe for exchanging digital information. For the past 25 years, its employees have been inspired to protect individuals, families, businesses and governments as they look to harness the potential of emerging technologies and new ways of sharing information. In today’s organizations, information has become the most strategic asset, embodying competitive advantage and powering operational excellence. With the explosion of mobile, social and cloud technologies, protecting this information has become more challenging than ever. Organizations need a smart protection strategy. Trend Micro enables the smart protection of information, with innovative security solutions that are simple to deploy and manage, and fits an evolving ecosystem. Trend Micro solutions provide layered content security for mobile devices, endpoints, gateways, servers and the cloud. Leveraging these solutions, organizations can protect their end users, their evolving data center and cloud resources, and their information threatened by sophisticated targeted attacks.

Recent Deep Security Smart Check Reviews

Verified User
A
Verified UserMid-Market (51-1000 emp.)
4.0 out of 5
"Strong program for daily use"
I had to use this in my previous position as an information security analyst. I was tasked to manage numerous companies daily security activities a...
PS
Praveen S.Small-Business (50 or fewer emp.)
5.0 out of 5
"Very wonderful product and service!"
It was very easy to install. It is compatible to all server types so didn't need to purchase separate licneses.
A K.
AK
A K.Enterprise (> 1000 emp.)
5.0 out of 5
"Deep Security Smart Check is a security vulnerability assessment service provided by Trend Micro"
It uses advanced machine learning algorithms to identify and prioritize vulnerabilities in your environment, making it easier for you to focus on f...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Deep Security Smart Check Media

Answer a few questions to help the Deep Security Smart Check community
Have you used Deep Security Smart Check before?
Yes

2 out of 3 Total Reviews for Deep Security Smart Check

4.7 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.

Deep Security Smart Check Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
G2 reviews are authentic and verified.
Verified User in Information Technology and Services
AI
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Deep Security Smart Check?

I had to use this in my previous position as an information security analyst. I was tasked to manage numerous companies daily security activities and found this to be a very helpful and intuitive program to use during my daily tasks. Review collected by and hosted on G2.com.

What do you dislike about Deep Security Smart Check?

While using it during my job, I had so,e issues running into failed vulnerability scans and smart checks. However, I couldn't tell if these were caused by myself and my coworkers. These issues would go away after brief periods of time. Nonetheless, they could be quite annoying at times for myself and my coworkers. Review collected by and hosted on G2.com.

What problems is Deep Security Smart Check solving and how is that benefiting you?

This product helped me complete my job tasks required to protects endpoints and consoles found at my company and companies that outsource to the company I worked at. Using it strongly benefits my peace of mind due to its usefulness and unintuitive UI. Review collected by and hosted on G2.com.

A K.
AK
Principal Consultant
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
(Original )Information
What do you like best about Deep Security Smart Check?

It uses advanced machine learning algorithms to identify and prioritize vulnerabilities in your environment, making it easier for you to focus on fixing the most critical security risks Review collected by and hosted on G2.com.

What do you dislike about Deep Security Smart Check?

More frequent updates: As new vulnerabilities and threats emerge, it's important for Deep Security Smart Check to be updated frequently to ensure it remains effective in identifying these new risks Review collected by and hosted on G2.com.

What problems is Deep Security Smart Check solving and how is that benefiting you?

Deep Security integrates well withSmart Check provides detailed information on the vulnerabilities it finds, along with recommendations on how to resolve them. This helps to ensure that your systems and applications are protected against cyber attacks, data breaches, and other security threats. Review collected by and hosted on G2.com.

There are not enough reviews of Deep Security Smart Check for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Wiz Logo
Wiz
4.7
(698)
Wiz is a CNAPP that consolidates CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, and container and Kubernetes security into a single platform.
2
Lacework Logo
Lacework
4.3
(381)
Lacework offers the data-driven security platform for the cloud, and is the leading cloud-native application protection platform (CNAPP) solution. The Polygraph Data Platform is purpose-built with a single detection engine, user interface, and API framework. With the Platform, your team only needs to learn one system for all of your cloud and workload protections, leading to tool consolidation, greater organizational efficiencies, and cost savings. Only Lacework can collect, analyze, and accurately correlate data — without requiring manually written rules — across your organizations' AWS, Azure, Google Cloud, and Kubernetes environments, and narrow it down to the handful of security events that matter. By taking a data-driven approach to security, the more data you put in, the smarter the Platform gets. This automated intelligence drives better efficacy and a higher return on your investment. Security and DevOps teams around the world trust Lacework to secure cloud-native applications across the full lifecycle from code to cloud.
3
Microsoft Defender for Cloud Logo
Microsoft Defender for Cloud
4.4
(302)
Azure Security Center provides security management and threat protection across your hybrid cloud workloads. It allows you to prevent, detect, and respond to security threats with increased visibility.
4
Orca Security Logo
Orca Security
4.6
(216)
Get workload-level visibility into AWS, Azure, and GCP without the operational costs of agents. You could buy three tools instead… but why? Orca replaces legacy vulnerability assessment tools, CSPM, and CWPP. Deploys in minutes, not months.
5
AlgoSec Logo
AlgoSec
4.5
(189)
AlgoSec is a business-driven security management solution.
6
Qualys VMDR Logo
Qualys VMDR
4.4
(166)
Discover, assess, prioritize, and patch critical vulnerabilities in real time and across your global hybrid-IT landscape — all from a single solution.
7
Check Point CloudGuard CNAPP Logo
Check Point CloudGuard CNAPP
4.5
(155)
Check Point CloudGuard CNAPP provides you with more context to drive actionable security and smarter prevention, from code-to-cloud, across the application lifecycle. CloudGuard’s prevention-first approach protects applications and workloads throughout the software development lifecycle, and includes an effective risk management engine, with automated remediation prioritization, to allow users to focus on the security risks that matter.
8
Snyk Logo
Snyk
4.5
(122)
Snyk is a security solution designed to find and fix vulnerabilities in Node.js and Ruby apps.
9
Mend.io Logo
Mend.io
4.3
(112)
Integrated application security that identifies and automatically remediates vulnerabilities in open source and custom code.
10
SentinelOne Singularity Cloud Security Logo
SentinelOne Singularity Cloud Security
4.9
(107)
Singularity Cloud Workload Security is runtime security and your workloads' flight data recorder. It works alongside other security layers to stop what they do not: runtime threats, like ransomware and zero-days. Whether on-prem or public cloud, in VMs, containers, or Kubernetes, SentinelOne stops machine-speed evil in real-time, to help keep your cloud business operating swiftly and securely.
Show More