We performed a comparison between Elastic Security and Trend Micro Apex One based on real PeerSpot user reviews.
Find out in this report how the two Endpoint Detection and Response (EDR) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The price is low and quite competitive with others."
"The solution was relatively easy to deploy."
"Fortinet FortiEDR made our clients feel secure and more at ease, knowing that they had an EDR solution that would close the gap in their security posture."
"The ease of deployment and configuration is valuable. It's very easy compared to other vendors like Sophos. Sophos' configuration is complex. Fortinet is a lot easier to understand. You don't need a lot of admin knowledge to do the configuration."
"The features that I have found most valuable are the ability to customize it and to reduce its size. It lets you run in a very small window in terms of memory and resources on legacy cash registers."
"Fortinet is very user-friendly for customers."
"Additionally, when it comes to EDR, there are more tools available to assist with client work."
"Forensics is a valuable feature of Fortinet FortiEDR."
"Elastic provides the capability to index quickly due to the reverse indexes it offers. This data is crucial as it contains critical information. The reverse index allows fast data indexing because of Elastic's efficient search engine."
"The most valuable feature is the search function, which allows me to go directly to the target to see the specific line a customer is searching for."
"The most valuable feature of Elastic Security is that you can install agents, and they are not separately licensed."
"The most valuable feature for me is Discover."
"The performance is good and it is faster than IBM QRadar."
"The most valuable feature is the scalability. We are in Indonesia, more engineers understand Elastic Security here. So it is easier to scale and also develop. In features, the discovery to query all the logs is very important to us. It is very easy, especially with the query function and the feature to generate alerts and create tools. Sometimes we use the alert security dashboard to monitor our clients."
"The most valuable feature is the machine learning capability."
"It is the best open-source product for people working in SO, managing and analyzing logs."
"The most valuable aspect is achieving zero attacks and zero data compromise."
"Its threat-hunting capabilities and the information about the known threats are the most available features. It can easily catch any threat in our environment."
"The end user perspective is very good because the solution isn't complex to learn and support is readily available."
"This solution protects us from virus attacks before they affect the organization."
"We've found the technical support to be very helpful overall."
"The product has proven to be very flexible over the years that we have had it."
"Using the product as a service on the cloud has helped reduced employee workloads."
"There's excellent data loss prevention to help prevent purposeful or accidental loss of data."
"Once, we had an event that was locked and blocked, but information about it came to us two or three days later."
"The only minor concern is occasional interference with desired programs."
"Making the portal mobile friendly would be helpful when I am out of office."
"The solution's installation from a central installation server could be improved because the engineers had a little bit of trouble getting it installed from a central location."
"I think cloud security and SASE are areas of concern in the product where improvements are required. The tool's cloud version has to be improved in terms of the security it offers."
"We've had a lot of false positives; things incorrectly flagged that require manual configuration to allow. Even worse, after we allow a legitimate program, it sometimes gets flagged again after an update. This has caused a lot of extra work for my team."
"Integration with Azure and SaaS provisioning tools could improve Fortinet FortiEDR."
"I would like the solution to extend beyond endpoint protection and include other attack surfaces such as other network components."
"If the documentation were improved and made more clear for beginners, or even professionals, then we would be more attracted to this solution."
"Elastic Security's maintenance is hard and its scalability is a challenge. There are complications in scaling and upgrading. The solution needs to also provide periodic upgrade checks."
"I would like more ways to manage permissions and restrict access to certain users."
"The training that is offered for Elastic is in need of improvement because there is no depth to it."
"We'd like to see some more artificial intelligence capabilities."
"If you compare this with CrowdStrike or Carbon Black, they can improve."
"The setup process is complex. You need a solid working knowledge of networking, operating systems, and a little programming."
"Sometimes, the solution isn't the easiest to use."
"The console can be better in terms of management and viewing the hierarchy of devices. Currently, setting up the hierarchy OU-wise is a bit cumbersome. It can be made a bit easier. If that can be more user-friendly and easier to manage, it would be great."
"The menus can be more user-friendly or easier. For example, if we want to enable access to the USB ports, it should be more user-friendly. It is not easy. We need to navigate through several menus to be able to give access."
"Trend Micro Apex One could include more in-depth endpoint protection."
"Technical support is very very slow. There is no French support. Only English. The experts are in England, the United States, or Japan, I don't know where. So the support is really lacking."
"The price is the main concern of the clients."
"It would be ideal if the solution could be simplified a bit."
"I'd like to see the different interface components combined into one, or be allowed to get to the agent management portion without having to log into the main console."
"The time required for Apex One to notify us of detection in the central console should be reduced."
Elastic Security is ranked 16th in Endpoint Detection and Response (EDR) with 59 reviews while Trend Micro Apex One is ranked 6th in Endpoint Detection and Response (EDR) with 125 reviews. Elastic Security is rated 7.6, while Trend Micro Apex One is rated 8.2. The top reviewer of Elastic Security writes "A stable and scalable tool that provides visibility along with the consolidation of logs to its users". On the other hand, the top reviewer of Trend Micro Apex One writes "We can get consolidated logs of suspicious objects and malware attacks in a single console". Elastic Security is most compared with Wazuh, Splunk Enterprise Security, Microsoft Sentinel, IBM Security QRadar and Microsoft Defender for Endpoint, whereas Trend Micro Apex One is most compared with Trend Micro Deep Security, Microsoft Defender for Endpoint, Cortex XDR by Palo Alto Networks, CrowdStrike Falcon and Trend Micro Smart Protection. See our Elastic Security vs. Trend Micro Apex One report.
See our list of best Endpoint Detection and Response (EDR) vendors.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.