


Trellix ESM and AWS Security Hub are both prominent digital security solutions with distinct offerings. User reviews suggest that Trellix ESM has the upper hand in comprehensive security features, while AWS Security Hub is favored for its integration within the AWS ecosystem.
Features: Trellix ESM is noted for its robust threat detection, detailed reporting, and in-depth security analytics. AWS Security Hub offers seamless integration with other AWS services, automated compliance checks, and a centralized view of security alerts across AWS accounts.
Room for Improvement: Trellix ESM could enhance scalability, reduce system complexity, and streamline its interface. AWS Security Hub could benefit from better alert customization, improved support for third-party integrations, and more granular configuration options.
Ease of Deployment and Customer Service: Trellix ESM deployment is straightforward but can be resource-intensive, with commendable customer service support. AWS Security Hub is generally easier to deploy, benefiting from AWS’s integrated environment and offering extensive documentation. Trellix ESM excels in customer support, while AWS Security Hub is superior in ease of deployment.
Pricing and ROI: Trellix ESM's pricing is slightly higher but justified by its comprehensive feature set and high ROI. AWS Security Hub is more cost-effective, especially for existing AWS users, providing good ROI through its integrated ecosystem. Trellix ESM is viewed as a premium service, while AWS Security Hub offers better cost-effectiveness in an AWS-centric environment.
| Product | Mindshare (%) |
|---|---|
| AWS Security Hub | 2.8% |
| Wiz | 11.4% |
| Prisma Cloud by Palo Alto Networks | 8.3% |
| Other | 77.5% |
| Product | Mindshare (%) |
|---|---|
| Trellix ESM | 1.2% |
| Splunk Enterprise Security | 7.1% |
| IBM Security QRadar | 5.2% |
| Other | 86.5% |

| Company Size | Count |
|---|---|
| Small Business | 10 |
| Midsize Enterprise | 3 |
| Large Enterprise | 28 |
| Company Size | Count |
|---|---|
| Small Business | 9 |
| Midsize Enterprise | 5 |
| Large Enterprise | 14 |
| Company Size | Count |
|---|---|
| Small Business | 15 |
| Midsize Enterprise | 6 |
| Large Enterprise | 25 |
Qualys TotalCloud enhances security posture across cloud environments with continuous monitoring, vulnerability management, and risk visualization, ensuring efficient threat assessment and automated remediation for improved cyber risk reduction.
Qualys TotalCloud offers a robust suite of security tools essential for organizations managing multi-cloud infrastructures. By integrating cloud accounts and automating workflows, it supports AWS, Azure, and GCP, offering comprehensive vulnerability management and zero-day detection. The platform's user-friendly design, combined with its extensive risk management and unified threat assessment capabilities, enables organizations to prioritize and remediate vulnerabilities effectively. TruRisk Insights provides clear insights on cyber risks, while the automation options streamline patch management and scanning processes. API integration across IaaS and SaaS environments further enhances resource allocation efficiency and saves time, addressing misconfigurations across cloud environments.
What are the most important features of Qualys TotalCloud?Qualys TotalCloud is deployed in sectors needing rigorous vulnerability management, such as finance and healthcare. Companies utilize it to secure multi-cloud environments like AWS, Azure, and GCP, focus on compliance, and integrate security into CI/CD pipelines to detect and remedy threats pre-deployment.
AWS Security Hub provides multi-account management and compliance checks alongside integrations with AWS services and third-party tools. It centralizes vulnerability tracking and risk prioritization, delivering real-time alerts for proactive security management.
AWS Security Hub enhances cloud security management through a centralized dashboard that monitors infrastructure resources and compliance scores, ensuring adherence to AWS standards. With integrations for vulnerability detection and security posture management, users can streamline security operations. While the platform offers notable benefits, areas for improvement include customization options for findings suppression and integration with multi-cloud environments.
What are the key features of AWS Security Hub?Industries implementing AWS Security Hub leverage its capabilities for comprehensive security across multiple accounts and regions. Health, finance, and retail sectors benefit by automating compliance checks and monitoring security infrastructures. This service aids in identifying misconfigurations, tracking alerts, and ensuring infrastructure integrity during cyber incidents.
Trellix ESM is an innovative tool designed to enhance security management through its seamless integration, user-friendly deployment, customizable dashboards, and robust threat detection capabilities.
Trellix ESM is essential for comprehensive security management, ensuring effective threat detection and analysis. It integrates seamlessly with third-party systems and provides advanced correlation and security visualization. Capable of managing logs and monitoring network traffic, it enhances security across diverse environments, making it indispensable for security operations. Despite needing improved SaaS integration, API documentation, and addressing stability issues, it remains crucial for user-friendly deployment and incident analysis. Its benefits are complemented by comprehensive reporting and real-time malware protection.
What Are Trellix ESM's Most Important Features?In diverse industries, Trellix ESM is deployed for central log management and security operations, monitoring servers, virtual machines, and hybrid-cloud environments. Companies use it for managed security services and threat detection, analyzing logs and securing data. It finds great use in monitoring network vulnerabilities and event correlation, enabling service providers and MSSPs to effectively manage endpoints and hybrid-cloud setups as well as gather logs from servers and firewalls, offering abundant transparency into security threats and network activities.
We monitor all Cloud Security Posture Management (CSPM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.