Elastic Security vs Trellix Endpoint Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Microsoft Defender XDR
Sponsored
Ranking in Extended Detection and Response (XDR)
5th
Average Rating
8.4
Number of Reviews
82
Ranking in other categories
Endpoint Detection and Response (EDR) (7th), Microsoft Security Suite (1st)
Elastic Security
Ranking in Extended Detection and Response (XDR)
7th
Average Rating
7.6
Number of Reviews
58
Ranking in other categories
Log Management (5th), Security Information and Event Management (SIEM) (5th), Endpoint Detection and Response (EDR) (16th), Security Orchestration Automation and Response (SOAR) (6th)
Trellix Endpoint Security
Ranking in Extended Detection and Response (XDR)
10th
Average Rating
8.0
Number of Reviews
96
Ranking in other categories
Endpoint Protection Platform (EPP) (11th)
 

Market share comparison

As of June 2024, in the Extended Detection and Response (XDR) category, the market share of Microsoft Defender XDR is 23.3% and it increased by 248.9% compared to the previous year. The market share of Elastic Security is 4.8% and it increased by 23.9% compared to the previous year. The market share of Trellix Endpoint Security is 4.1% and it decreased by 30.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Extended Detection and Response (XDR)
Unique Categories:
Endpoint Detection and Response (EDR)
8.4%
Microsoft Security Suite
4.9%
Log Management
11.2%
Security Information and Event Management (SIEM)
5.3%
Endpoint Protection Platform (EPP)
4.5%
 

Featured Reviews

RT
May 9, 2024
Enables users to access any application and system within the organization
The best feature is probably the alert generation. When I do a security reset, the other session triggers instantly from the Defender console, and I can work on it. The policies are three times, but they are also ready to install it. The identity management feature is something we need for our use case. It wraps up the access management and XDR components, so it's not just Defender. It works well with Azure AD for access management. I didn't think I needed identity and access management in the past, but it's nice to have if you're performing a significant migration on a tight schedule. Defender XDR's coverage extends beyond Microsoft technologies. It covers all the endpoints of users in the organization. I can manage access to any application and system within the organization.
RJ
Apr 6, 2023
Easy to use across different use cases but stability depends on your design of implementation
The initial setup depends on what you were expecting, but since we have experience with it and know what it's good for, it's an eight out of ten. The initial deployment typically takes about a day. Then there's an initial stage of the project to integrate some of the client's specific requirements, which can take additional time depending on the complexity of their environment. When it comes to maintenance, it depends on the project, and sometimes one person can support all roles. Usually, it's enough to have one engineer with deep technical knowledge of the operating system and the deployment and configuration of the system. The other role is an analytical role with project management and coordination skills to communicate with customers and drive delivery.
AV
May 2, 2023
Useful for containment and taking a triage image
We build our own use cases and those provided by the vendor for specific upcoming attack scenarios. Configuring the rule set using Trellix Endpoint Security is very much flexible based on the IOCs Trellix Endpoint Security is good for doing containment immediately. We can get visibility of…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Its most significant advantage lies in its affordability."
"The EDR and the way it automatically responds to ransomware and other attacks are valuable features."
"The most valuable feature is the DLP because that's where we can have an added data protection layer and extend it not just to emails but to the documents that users are working on. We can make sure that sensitive data is tagged and flagged if unauthorized parties are using it."
"Microsoft Defender is stable."
"The integration between all the Defender products is the most valuable feature."
"Email protection is the most valuable feature of Microsoft Defender XDR."
"Microsoft 365 Defender is a good solution and easy to use."
"The most valuable features are spam filtering, attachment filtering, and antivirus protection."
"It is an extremely stable solution. Stability-wise, I rate the solution a ten out of ten."
"The stability of the solution is good."
"The most valuable features are the speed, detail, and visualization. It has the latest standards."
"It is very quick to react. I can set it to check anomalies or suspicious behavior every 30 seconds. It is very fast."
"The most valuable feature is the search function, which allows me to go directly to the target to see the specific line a customer is searching for."
"It's open-source and free to use."
"The performance is good and it is faster than IBM QRadar."
"The most valuable feature is the machine learning capability."
"The thing that I like is that they have gathered almost all the products in one management server, the ePolicy Orchestrator."
"The initial setup is straightforward, not complex."
"The most valuable feature of Trellix Endpoint Security is containment, which takes less than a minute."
"It also allows multifunctionality within a single platform."
"It has been protecting us for many years, and we hope it will continue to do so for many years to come."
"The solution is stable."
"The product helps us by contacting us if there are any virus attacks on our system."
"Their malware detection rate is excellent for all type of devices and the anti-theft products are good and easy to use."
 

Cons

"Microsoft Defender XDR is not a full-fledged EDR or XDR."
"There could be a way to proactively monitor unusual activity ."
"The only problem I find is that the use cases are built-in. There is no template available that you can modify according to your organization's standards. What they give is very generic, the market standard, but that might not be applicable to every organization."
"Improving scalability, especially for very large tenants, could be beneficial for Microsoft Defender XDR."
"The mobile app support for Android and iOS is difficult and needs improvement."
"Correctly updated records are the most significant area for improvement. There have been times when we were notified of a required fix; we would carry out the fix and confirm it but still get the same notification a week later. This seems to be a delay in records being updated and leads to false reporting, which is something that needs to be fixed."
"I would like more of the features in Defender for 365 to be included in the smaller licenses. Even if I buy a small license and don't need everything, security shouldn't be a question. Security is one of the main aspects of all projects from our side, so it would be nice to have more features in the smaller licenses."
"The interface could be improved. For example, if you want to do a phishing simulation for your employees, it can take a while to figure out what to do. The interface is a bit messy and could be updated. It isn't too bad, but doing some things can be a long process."
"The solution needs to be more reactive to investigations. We need to be able to detect and prevent any attacks before it can damage our infrastructure. Currently, this solution doesn't offer that."
"The tool should improve its scalability."
"If the documentation were improved and made more clear for beginners, or even professionals, then we would be more attracted to this solution."
"There is an area of improvement in the Logs list. The load list may need to be paginated as there are limits."
"Elastic Security has a steep learning curve, so it takes some time to tune it and set it up for your environment. There are some costs associated with logging things that don't have value. So you need to be cautious to only log things that make sense and keep them around for as long as you need. You shouldn't hold onto things just because you think you might need them."
"I would like more ways to manage permissions and restrict access to certain users."
"I think because we are a cybersecurity company, the thing that can be improved is the prebuilt tools, especially quality. Compared to its competitor, they still have fewer prebuilt security rules. Elastic Security, in terms of generating alerts, cannot group the same products into one another. Even though the alerts are the same, they still generate them one by one. So, it is very noisy in our dashboard. I would like the Elastic Security admin to group all the same alarms into one alarm so that our dashboard is not noisy."
"The training that is offered for Elastic is in need of improvement because there is no depth to it."
"The tool could provide more advanced protection."
"The security of this solution needs improvement."
"I've encountered minor challenges related to encryption."
"It would be a lot easier if I could add multiple user accounts within a single device."
"It would be helpful if the controlling of connections coming to the PC could be done from McAfee's side so that we can block those connections."
"We have a lot of problems with the user experience and it's difficult to implement. MacAfee's better than the ancient anti-virus solutions but it's a little slow to resolve. Many files with malware were destroyed through the network, and MacAfee doesn't detect anything."
"Users can just install software into their computers. We need some sort of application control system that, if there are any pieces of software that are not whitelisted, then the solution could flag it or maybe alert the administers. That would be very helpful."
"Trellix lacked email protection when it was a McAfee product. They added this feature during the merger with FireEye, but it hasn't been fully integrated. The core features will be integrated into the next release. FireEye has several solutions for EDR and sandboxing."
 

Pricing and Cost Advice

"On average, we pay around 55 euros per user for the services and features we receive."
"Sometimes 365 Defender is expensive, but it can be moderate, depending on the organization's size and the license type. We're satisfied with the cost because it gives us a product that protects our entire environment with DLP. To compromise some cost, of course, we are to complete the most secure environment."
"For Defender, they have Endpoint Plan 1 and Endpoint Plan 2, but I don't know on what basis they have classified Endpoint Plan 1 and Plan 2, but it has given me enough pain to pick and design Endpoint Plan 1 or Endpoint Plan 2 for my organization. In fact, we are still struggling with it. Too many SKUs are confusing. There should not be too many SKUs, and they shouldn't charge for every new feature."
"The functionality is fantastic, but for medium and small-sized companies it's overpriced. It would be better if it were a little bit cheaper."
"Microsoft Defender XDR is included in our license."
"While the standalone price of Defender XDR might seem high, its value becomes clear when considering the ease of implementation and smooth integration with our existing Microsoft infrastructure, especially when bundled with other Microsoft products."
"Understanding the subscription model has been a bit challenging, as every feature or requirement comes with an additional cost."
"While Microsoft Defender XDR carries a higher cost, its ease of use compared to Defender may justify the investment."
"It's a monthly cost with Elastic SIEM, but I am not sure of the exact cost."
"The base product is open-source but if you need advanced security features then you need to pay for the subscription. Elastic Security's price is reasonable in some cases and in other cases it's not."
"The solution is free."
"It is easy to deploy, easy to use, and you get everything you need to become operational with it, and have nothing further to pay unless you want the OLED plugin."
"There is no charge for using the open-source version."
"The tool's pricing is flexible and comes at unit cost. You don't have to pay for everything."
"This is an open-source product, so there are no costs."
"Affordable but with additional costs"
"It is not that expensive. There is no additional cost. We got the entire bundle together."
"It is reasonably priced."
"No comment."
"The pricing is more or less the same as the other tools in the market."
"The tool is affordable"
"The price of McAfee is pretty similar to Symantec, and there are no costs in addition to the standard licensing fees."
"There are some extra expenses for using the product, in addition to licensing related to the maintenance of the product."
"When comparing the solution to others it is a bit expensive. We are on a monthly license."
report
Use our free recommendation engine to learn which Extended Detection and Response (XDR) solutions are best for your needs.
787,061 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Financial Services Firm
10%
Government
8%
Manufacturing Company
8%
Computer Software Company
17%
Financial Services Firm
10%
Government
9%
Comms Service Provider
6%
Educational Organization
37%
Government
9%
Computer Software Company
8%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Microsoft 365 Defender?
Microsoft Defender XDR provides strong identity protection with comprehensive insights into risky user behavior and p...
What is your experience regarding pricing and costs for Microsoft 365 Defender?
Microsoft Defender XDR is expensive, especially for the full suite functionality. However, when compared to buying mu...
What needs improvement with Microsoft 365 Defender?
Improving scalability, especially for very large tenants, could be beneficial for Microsoft Defender XDR. Additionall...
Datadog vs ELK: which one is good in terms of performance, cost and efficiency?
With Datadog, we have near-live visibility across our entire platform. We have seen APM metrics impacted several time...
What do you like most about Elastic Security?
Elastic provides the capability to index quickly due to the reverse indexes it offers. This data is crucial as it con...
What is your experience regarding pricing and costs for Elastic Security?
Elastic Security is open-source. Unlike many older solutions where you must pay for data ingestion, Elastic allows yo...
How does McAfee Endpoint Security compare with MVISION?
The flexible manageability of McAfee Endpoint Security is one of our favorite aspects of this solution. You can deplo...
What do you like most about McAfee Endpoint Security?
It provides a robust defense against cybersecurity threats while offering user-friendly features like notifications a...
What is your experience regarding pricing and costs for McAfee Endpoint Security?
Trellix Endpoint Security is an affordable tool. Its renewal price is also quite low. The product is available as a s...
 

Also Known As

Microsoft 365 Defender, Microsoft Threat Protection, MS 365 Defender
Elastic SIEM, ELK Logstash
McAfee Endpoint Security, McAfee Complete Endpoint Protection, McAfee Endpoint Protection, Total Protection for Endpoint, Intel Security Total Protection for Endpoint, MCAFEE Complete Endpoint Protection
 

Overview

 

Sample Customers

Accenture, Deloitte, ExxonMobil, General Electric, IBM, Johnson & Johnson and many others.
Texas A&M, U.S. Air Force, NuScale Power, Martin's Point Health Care
inHouseIT, Seagate Technology
Find out what your peers are saying about Elastic Security vs. Trellix Endpoint Security and other solutions. Updated: May 2024.
787,061 professionals have used our research since 2012.