Trellix Endpoint Security provides aggressive robust protection for every endpoint in an enterprise organization. Trellix uses dynamic threat intelligence and mounts a superb defense across the complete threat lifecycle. This solution will keep your organization more secure and resistant to any possible threat of risks. Trellix offers an amalgamated suite of next-generation endpoint security tools. These tools give users the benefit of machine learning, intuitive intelligence, and greater assistance to ensure their networks are being protected non-stop against threats - potential or realized - and can stop attacks before they happen. Trellix uses MDR (managed detection and response) and XDR (extended detection and response) to give users a comprehensive endpoint security solution.
The most valuable features of Trellix Endpoint Security are:
- Endpoint security, antivirus, and firewall
- Containment feature with dual containment option
- Trap prevention DNS and threat prevention
- Good combination of signature and signature-less detection
- Powerful central management console
- User behavioral analysis features
- Quick deployment and scalability
- Informative dashboard with immediate reporting
- Easy management from a central console
- Ease-of-use and policy creation
- Does not hang machines or heavily impact end-users
- Single- coverage for multiple units
- Good firewall features and host control and threat protection
- Unique feature of setting thresholds for CPU consumption during scans
- Faster performance and uses fewer computer resources compared to competitors
- Package of comprehensive protection including antivirus, malware protection, VPN, and more
- Easy integration and good performance
- Valuable DLP and user interface
- Stable and reliable with scalability
- All-in-one management server for multiple products -
Flexibility in administering programs from one console
- Integrated solution for data loss prevention
- Availability of technical support
- High detection rate and continuous improvement in detection quality
Improvements needed for Trellix Endpoint Security include:
- Simplifying the configuration and maintenance process, as it currently requires a dedicated person and is complex to change policies.
- Enhancing the ability to give exceptions on specific computers and providing an easier way to uninstall the software on specific stations.
- Adding support for finding running mutexes and integrating multiple output formats for triage images, such as Mandiant format.
- Allowing more control over deployment by enabling pilot groups for deploying agents.
- Completing integrations with McAfee and FireEye for improved functionality.
- Improving the user experience of the administration console and offering a single package for endpoint protection and EDR software.
- Moving away from the signature model for antivirus and malware blocking to a more kernel or architecture-based model.
- Reducing the consumption of end-user memory and CPU resources to prevent slowdowns.
- Simplifying the configuration process and focusing more on anti-malware capabilities.
- Ensuring older agents on active computers communicate properly and providing timely notifications when an agent stops working.
- Enhancing stability, consistency, and effectiveness in addressing zero-day threats.
- Improving software download and job hosting features.
- Enhancing the user interface to make it more user-friendly and easier to manage multiple products from a single place.
- Reducing the resources needed to run the solution, such as hard drive space and CPU processing.
- Making it easier to unblock applications that are mistakenly blocked by the solution.
- Offering on-premises management in addition to on-cloud management.
- Improving stability and preventing resource exhaustion during data processing.
- Providing better technical support and improving resource consumption.
- Consolidation of different products into one agent for easier management
Users have experienced positive outcomes with Trellix Endpoint Security in terms of time efficiency and value for organizations seeking its offerings.
The pricing for Trellix Endpoint Security is generally considered to be on the higher side compared to other solutions. However, some reviewers find the price to be reasonable considering that it includes Data Loss Prevention (DLP) features. The licensing cost varies depending on the number of users. There are no additional costs for maintenance.
Licensing is typically paid yearly, and there are no additional costs mentioned.
Trellix Endpoint Security is primarily used for drive encryption, policy orchestration, pattern-based scanning, behavior-based adaptive threat prevention, AV and malware security, network security, and protecting endpoint devices and the cloud.
It is commonly used in enterprise environments with a large number of endpoints and managed through a central ePO. The solution is known for its dynamic development and integration capabilities with various clients. It is also used for workstations, laptops, and system nodes running Windows 7 and Windows 10.
The latest version of Trellix Endpoint Security offers good detection and prevention features, especially when integrated with ATP for ransomware protection.
Some customers have had positive experiences with Trellix, noting that the technical support is good and helpful. They appreciate that the support team can communicate in their native language. However, there are also customers who feel that the technical support could be improved. They mention issues such as coordination and deployment problems.
The initial setup for Trellix Endpoint Security varies depending on the environment and the number of endpoints. It can be quite simple and straightforward, especially if users are familiar with McAfee products. The deployment time can range from a few hours to one week, with the assistance of professional help if needed.
The installation process itself is not overly complex, however, there may be a learning curve when it comes to configuring the solution and setting up rules.
Trellix Endpoint Security is highly scalable. It is being used by various organizations and is able to handle a large number of users. It can easily scale to accommodate more endpoints if needed. The solution is cloud-based, making it easy to scale.
The stability of Trellix Endpoint Security is generally rated positively by users. They describe it as quite stable and reliable. Some users have not experienced any issues with stability, while others mention occasional crashes and the need for maintenance. Stability can also depend on the version, with newer versions being more stable. The solution is said to be mature and continuously updated. The only concern raised is regarding the rapid changes and obsolescence of versions, which creates maintenance issues.
Trellix Endpoint Security Benefits
Trellix Endpoint Security Top Features
Reviews from Real Users
“It has a great console. We can manage everything from the central console and it is very easy. Every year we are getting the benefits of legacy also. It's easy to set up.” - S Fazlul H., IT Lead Engineer, Information Technology at Banglalink
“There is a new feature where you can set thresholds for all the CPU consumption allowing for no consumption on the servers when the scans happen. It is a separate plugin or addon, and if we have it on all the virtual machines it automatically checks the resources, and based on that, it will schedule the scans. That is something that I have not seen in other antivirus solutions, such as Symantec.” - Sabari K. Senior Engineer at a comms service provider
Trellix Endpoint Security was previously known as McAfee Endpoint Security, McAfee Complete Endpoint Protection, McAfee Endpoint Protection, Total Protection for Endpoint, Intel Security Total Protection for Endpoint, MCAFEE Complete Endpoint Protection.
inHouseIT, Seagate Technology