Try our new research platform with insights from 80,000+ expert users

Bitdefender Sandbox Analyzer vs Trellix Network Detection and Response comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 1, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Bitdefender Sandbox Analyzer
Ranking in Advanced Threat Protection (ATP)
27th
Average Rating
9.0
Reviews Sentiment
7.4
Number of Reviews
5
Ranking in other categories
No ranking in other categories
Trellix Network Detection a...
Ranking in Advanced Threat Protection (ATP)
14th
Average Rating
8.4
Reviews Sentiment
7.3
Number of Reviews
39
Ranking in other categories
Network Detection and Response (NDR) (12th)
 

Mindshare comparison

As of April 2025, in the Advanced Threat Protection (ATP) category, the mindshare of Bitdefender Sandbox Analyzer is 0.9%, down from 2.0% compared to the previous year. The mindshare of Trellix Network Detection and Response is 4.8%, down from 4.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Advanced Threat Protection (ATP)
 

Featured Reviews

Basawaraj  Vastrad - PeerSpot reviewer
Automated and manual threat analysis provides deep insights for potential threat remediation
The most valuable features of Bitdefender Sandbox Analyzer ( /products/bitdefender-sandbox-analyzer-reviews ) include manual and auto-submission. The sandbox analyzer provides a combination of technologies including machine learning-based technologies. Network analytics is performed, and the tool analyzes using threat feeds. Manual and automated submissions allow suspicious files or URLs to be analyzed thoroughly, providing deep insights for further investigation. This information is crucial for making informed decisions on remediating potential threats.
BiswabhanuPanda - PeerSpot reviewer
Offers in-depth investigation capabilities, integrates well and smoothly transitioned from a lower-capacity appliance to a higher one
The in-depth investigation capabilities are a major advantage. When the system flags something as malicious, it provides a packet capture of that activity within the environment. That helps my team quickly identify additional context that most other tools wouldn't offer – like source IP or base64 encoded data. We can also see DNS requests and other details that aren't readily available in solutions like Check Point or others that we've tried. The detection itself is solid, and their sandboxing is powerful. There's a learning curve – you need a strong grasp of OS-level changes, process forking, registry changes, and the potential impact of those. But with that knowledge, the level of information Trellix provides is far greater than what we've seen elsewhere. The real-time response capability of Trellix has been quite effective, although it's not very fast. The key is this solution's concept of 'preference zero.' They don't immediately act on a zero-day. For example, the solution has seen a piece of malware for the first time. It'll let it in, then do sandboxing. Maybe after four or five minutes, it identifies that specific file's DNX Secure Store as malicious. At that point, they update the static analysis engine, and it gets detected if anything else tries to download the same file. There is that initial 'preference zero' concept, like with Panda. You may not hold traffic in the network. That's standard in the industry; we don't do much about it. To address that, we also have endpoint solutions. We use SentinelOne in our environment, which helps us identify threats like Western Bureaus and others.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Bitdefender has shown fantastic stability over the past eight years with no major incidents reported."
"The solution is useful in the event of a gray file or grayware, as there are certain files users may download of which we know little about."
"I like the fact that it works pretty well. It can be a little aggressive at times, but I'd rather have it be a little bit aggressive than not catch what it's supposed to catch. We've been running that platform for about five years, and we've not really had any viruses or malware get through. It's also easy to set up, and it's easy to manage."
"It is easy to use, and there is a lot of automation. So, users don't need to worry about that."
"Sandbox Analyzer is easy to use. It's simple to drill down into the data. In a lot of the competing products, an extremely informed end-user can do battle with the tools provided, but in today's market, end-users have less and less time to try and keep up. The CSAW alerts come out every day, and they're huge. Adobe did a master patch last Thursday and another one a few days later."
"The features that I find most valuable are the MIR (Mandiant Incident Response) for checks on our inbound security."
"Trellix NDR provides an essential defense by automatically responding to network incidents that firewalls may not catch."
"Application categorization is the most valuable feature for us. Application filtering is very interesting because other products don't give you full application filtering capabilities."
"The most valuable feature is the view into the application."
"The installation phase was easy."
"The server appliance is good."
"The product has helped improve our organization by being easy to use and integrate. This saves time, trouble and money."
"The scalability has not been a problem. We have deployed the product in very high bandwidth networks. We have never had a problem with the FireEye product causing latency issues within our networks."
 

Cons

"One area that needs improvement in Bitdefender Sandbox Analyzer is the addition of an asset management feature."
"It would be better if there were real-time alerts. The whole suite, unlike most anti-virus consoles that just ping you when there's an infection or something, for some inexplicable reason, Bitdefender doesn't do that. The most you could do is get an hourly email, or maybe if there's an outbreak that affects 30% of our machines, it sends me an email. There's no real-time alert to say, "Hey, so-and-so literally 30 seconds ago just had this happen on their machine." Real-time reporting would be a huge improvement. All in all, it's a pretty nice product, generally speaking. They do a pretty good job. They can pretty much go toe to toe with just about anybody. But it's that kind of real-time nature. I've not had occasion to use the EDR portion to actually try and do any kind of custom scripting to drill into things that are going on at the endpoints. But my understanding from reading comments of others is that it's not particularly flexible in that regard to be able to do things like that."
"We would like to see the time it takes for the sandbox to analyze a file reduced from its ten or fifteen minute duration to five."
"It does everything we need. We haven't been able to throw anything at it that it couldn't handle."
"We propose the on-premises solution to most of our customers, for which we must provide a license, although no such request accompanies customers who want a cloud-based solution."
"It should be more secure. There should be more protection, especially for non-signature-based malware. It works fine for non-signature-based malware, but I expect it to become a bit more advanced to be able to cope with future or upcoming environments."
"There is a lot of room for Improvement in the offering, from cost to functionality. It is pretty straightforward to implement which is an advantage. However, it falls short in pricing, detection capabilities, and, most importantly, reporting and policy management."
"The product's integration capabilities are an area of concern where improvements are required."
"A better depth of view, being able to see deeper into the management process, is what I'd like to see."
"It is an expensive solution."
"Based on what we deployed, they should emphasize the application filtering and the web center. We need to look deeper into the SSM inspection. If we get the full solution with that module, we don't need to get the SSM database from another supplier."
"If you want to search the hashes in the environment, you need to put in IOCs one by one, making it a very hectic job."
"Improvements could be achieved through greater integration capabilities with different firewall solutions. Integrating with the dashboard itself for different firewalls so users can also pull tags into their firewall dashboard."
"It would be very helpful if there were better integration with other solutions from other vendors, such as Fortinet and Palo Alto."
 

Pricing and Cost Advice

"I think it's probably less expensive than something like CrowdStrike. We got a really good deal because it was literally their year-end, and they were trying to close all the sales for the week. So we bought a three-year contract from them. It roughly ended up costing me somewhere around $17 for an endpoint per year. It was really quite a nice pricing. I've talked to other folks where they got CrowdStrike, and it's like $60 for an endpoint for a year. It does, and they can be pretty aggressive if you're dealing with them directly, and I have. So no complaints there."
"You need a license to a certain extent. You need to pay for advanced features. For corporate accounts, it isn't is really a problem, but pricing is an important thing for many companies."
"The pricing is a little high."
"The tool is a bit pricey."
"FireEye is comparable to other products, such as HX, but seems expensive. It may cause us to look at other products in the market."
"We're partners with Cisco so we get a reasonable price. It's cheaper than Palo Alto in terms of licensing."
"Because of what the FireEye product does, it has significantly decreased our mean time in being able to identify and detect malicious threats. The company that I work with is a very mature organization, and we have seen the meantime to analysis decrease by at least tenfold."
"The user fee is not as high but the maintenance fee is expensive."
"When I compare this solution to its competitors in the market, I find that it is a little expensive."
"Pricing and licensing are reasonable compared to competitors."
report
Use our free recommendation engine to learn which Advanced Threat Protection (ATP) solutions are best for your needs.
846,617 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
18%
Financial Services Firm
10%
University
9%
Healthcare Company
7%
Financial Services Firm
17%
Comms Service Provider
11%
Computer Software Company
10%
Manufacturing Company
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

Ask a question
Earn 20 points
What do you like most about FireEye Network Security?
We wanted to cross-reference that activity with the network traffic just to be sure there was no lateral movement. With Trellix, we easily confirmed that there was no lateral network involvement an...
What is your experience regarding pricing and costs for FireEye Network Security?
While I do not handle pricing directly, it is known that there is a variety of customers with different licensing needs, which depends on the organization's size and policy.
What needs improvement with FireEye Network Security?
The Trellix solution could be improved by enhancing the Central Management Console for faster visibility, which would help in network detection response. Networking often involves complexity that c...
 

Also Known As

No data available
FireEye Network Security, FireEye
 

Overview

 

Sample Customers

Archdiocese, Northstar, SeSa, W&W Informatik, Yamaha Motor Europe
FFRDC, Finansbank, Japan Advanced Institute of Science and Technology, Investis, Kelsey-Seybold Clinic, Bank of Thailand, City of Miramar, Citizens National Bank, D-Wave Systems
Find out what your peers are saying about Bitdefender Sandbox Analyzer vs. Trellix Network Detection and Response and other solutions. Updated: March 2025.
846,617 professionals have used our research since 2012.