Trellix Endpoint Security (ENS) is a comprehensive solution designed to protect organizations from advanced cyber threats. With its advanced threat detection capabilities, ENS provides real-time visibility into endpoint activities, enabling proactive threat hunting and response.
The most valuable features of Trellix Endpoint Security are its integration with SIEM and data classification solutions, its endpoint security protection against malware, and its positive experience, good pricing, reliability, centralized management, scalability, stability, and easy initial setup.
It also offers more plugins for endpoints, extendability, and scalability. Additionally, the independent modules, simple setup and deployment, advanced threat protection, web filtering, removable storage devices in the DLP, seamless deployment, good mobile device protection, compatibility, and cloud-based instance deployment are highly valued.
Users appreciate the user-friendly interface, ability to respond to threats better, ePolicy orchestrator for single management, containment feature, strong performance, response capabilities, containment and triage abilities, ease of use, stability, good performance, scalability, reduced false positives, good ransomware detection, deployment across mobile devices, managed service push deployment, flexibility, minimal effect on performance, and excellent technical support.
Improvements needed for Trellix Endpoint Security (ENS) include limited access to features on the web interface, challenges with sales support leading to potential missed opportunities, lack of documentation on custom features, absence of database activity monitoring, and a clearer roadmap for integrating critical solutions. Users also reported a negative impact on server performance, a desire for a simplified and improved user interface on the management screen, and difficulty in upgrading to new versions.
Users have noted subpar tamper protection compared to other solutions. Additionally, users mentioned high memory consumption, the need for easier deployment of advanced modules, and the desire for more features or ATP in advanced modules.
Other suggestions included overall simplification, better dashboard quality and central monitoring, extended mobile connection, improved stability, device control, and cost reduction.
Users also expressed the need for automation, enhanced reporting, improved GUI aesthetics, better email protection with DLP features, user-friendly searches, improved integration between ePolicy Orchestrator and FireEye console, and better security measures. Some users highlighted inaccuracies in detection and false positive detections, as well as the need for improved signature functionality and local integration.
Some users have experienced a positive return on investment.
Trellix Endpoint Security (ENS) offers a transparent pricing structure with typically no setup costs, facilitating a smooth onboarding experience for users. Pricing methods are commonly based on a per-endpoint subscription, providing flexibility to scale according to organizational needs. Costs vary depending on the number of endpoints, catering to businesses of various sizes.
The primary use case of Trellix Endpoint Security (ENS) is drive encryption, malware prevention, centralized control, and policy management. It is also used as an antivirus and firewall solution for endpoint protection. Additionally, it is utilized for managed defense, endpoint enforcement, and as cover for mobile devices. It has been deployed for compromise assessments to identify and prevent advanced persistent threats.
The solution is used to monitor endpoints, protect files and networks against viruses and malware, and detect threats and cyber attacks. It is used across different platforms, including mobile and desktop users. It is also offered as a managed service for customers.
The customer service and support of Trellix Endpoint Security (ENS) have received mixed feedback. Some users have praised the promptness and excellence of FireEye's support, while others have found the technical support to be average or not fantastic.
The initial setup for Trellix Endpoint Security (ENS) can vary depending on the size and complexity of the environment. Some customers find it easy to deploy if they have sufficient skills, while others struggle with misconfigurations and license renewals.
There may be some challenges when working with advanced modules or policies, however, once familiar with the system, it becomes easier over time. The agent installation is generally okay, yet there can be challenges on the network side. Despite these initial complexities, once set up, the solution is easy to manage and doesn't require a lot of manpower. It can be deployed remotely from a central location.
The reviews suggest that the scalability of Trellix Endpoint Security (ENS) is generally positive. Some reviewers recommend it specifically for small or medium-sized businesses, while others mention that it can be easily expanded as needed.
Users consistently mention that Trellix Endpoint Security (ENS) is stable and reliable. They highlight that it doesn't crash or freeze, and there are no bugs or glitches. The solution's performance is generally good, although some users believe there is room for improvement and development. It is also mentioned that the stability of the solution depends on the interaction with Microsoft patches.
It leverages machine learning algorithms to identify and block sophisticated malware, ransomware, and zero-day attacks. ENS also offers robust data loss prevention (DLP) features, preventing sensitive information from being leaked or stolen. With its centralized management console, ENS allows administrators to easily deploy, monitor, and manage security policies across all endpoints.
ENS provides seamless integration with existing security infrastructure, ensuring a layered defense approach. With Trellix ENS, organizations can enhance their security posture and safeguard their critical assets from evolving cyber threats.
Trellix Endpoint Security (ENS) was previously known as McAfee MVISION Endpoint, Trellix Endpoint Security (HX).
Tech Resources Limited, Globe Telecom, Rizal Commercial Banking Corporation