We performed a comparison between Google Kubernetes Engine and Trend Micro Deep Security based on real PeerSpot user reviews.
Find out in this report how the two Container Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The feature that I like the most is the ease of use as compared to AWS. Its ease of use is very high, and I can quickly deploy clusters with a simple template."
"The main advantage of GKE is that it is a managed service. This means that Google is responsible for managing the master node in the Kubernetes cluster system. As a result, we can focus on deploying applications to the slaves, while Google handles any updates and security patches. The fact that GKE is fully integrated into the Google ecosystem, including solutions such as BigQuery and VertexAI. This makes it easier for us to integrate these tools into our process. This integration ultimately speeds up our time to market and reduces the time and effort spent on managing infrastructure. The managed aspect of GKE allows us to simply deploy and utilize it without having to worry about the technicalities of infrastructure management."
"The logs are important for detecting problems in our clusters."
"It's easy to manage and deploy. It's the best."
"Stability-wise, this solution is really good."
"Google Kubernetes Engine is used for orchestrating Docker containers. We have 30 or 40 customers working with this solution now. We'll probably see 10 to 15 percent growth in the number of customers using Google Kubernetes Engine in the future."
"The product has no downtime."
"I am satisfied with the stability offered by the solution."
"Trend Micro gave our security teams a certain degree of comfort by just having it in the background, as they have familiarity with the product."
"The most valuable feature of the product is vulnerability detection."
"The traceback feature in XDR is amazing. You can trace back an attack. You can playback where an attack actually occurred and see how the attacker moved. We can easily show this to management, and it makes it easy to make them understand and convince them, which is the best thing."
"It provides security and protection. The endpoint firewall is valuable."
"Some of the main features of this solution are it is reliable and can be used in small to large size businesses."
"The solution's endpoint protection is the most valuable feature."
"It helps with virtual patching and IDS fetching."
"The VPN is the most prized characteristic of Trend Micro Deep Security, which in addition addresses all zero-day vulnerabilities. This allows us to confidently transfer our system physically, as it presents to the external world, whether it be an intruder or a hacker, that our system is completely secure without any weak spots. Even if the latest security patches have not been installed or updated, the software virtually covers them for you."
"The network configuration has to be simplified."
"The product could be cheaper."
"The product’s visible allocation feature needs improvement."
"The solution does not have a visual interface."
"I use the Firebase tool with GKE and it would be helpful if the solution can give notifications when we reach the budget limit."
"We would like to see some improvement in the ease of integration with this solution."
"There is room for improvement in the cluster updates process. Specifically, when managing both non-production and production clusters, we need a sequential functionality."
"There is a limitation for our infrastructure. It's very complex to see in one dashboard all the components and all the behavior on performance. I am looking for some additional tools for that. If I want to check the disk or file storage, it gets complex. There should be an integrated dashboard so that we can manage everything through a single pane."
"The support for email protection can be improved."
"The situation with the currency in Turkey makes this solution a little bit on the expensive side, and if it were lowered then it would be more competitive."
"I think more work could be done on Deep Security's ability to handle dynamic threat scenarios."
"We have had some issues when it drains some of the resources of the server."
"Trend Micro Deep Security security and scalability could be improved."
"It should have XDR and EDR integration. It would be nice if they can tie it up with an XDR or EDR."
"Some of the reporting and integrations could be more robust."
"There should be more tools to trace back. Some sort of module needs to be included to attach all the things. It should be more stable, and the traceback feature should be improved. There were cases when we got virtual analyzer or CMC errors. We got false-positive malware notifications, but we couldn't trace them. I raised a case with Trend Micro two or three times, but they couldn't resolve it. Their support should be improved in terms of technical abilities to troubleshoot complex issues. They should be more knowledgeable."
Google Kubernetes Engine is ranked 9th in Container Management with 32 reviews while Trend Micro Deep Security is ranked 1st in Virtualization Security with 81 reviews. Google Kubernetes Engine is rated 8.0, while Trend Micro Deep Security is rated 8.6. The top reviewer of Google Kubernetes Engine writes "The auto-scaling feature helps during peak hours, but the support is not great". On the other hand, the top reviewer of Trend Micro Deep Security writes "High availability, effective VPM, and responsive support". Google Kubernetes Engine is most compared with Linode, Kubernetes, Rancher Labs, Red Hat OpenShift Container Platform and Nutanix Kubernetes Engine NKE, whereas Trend Micro Deep Security is most compared with Trend Vision One Endpoint Security, CrowdStrike Falcon, Microsoft Defender for Endpoint, Symantec Endpoint Security and Trellix Endpoint Security. See our Google Kubernetes Engine vs. Trend Micro Deep Security report.
We monitor all Container Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.