Try our new research platform with insights from 80,000+ expert users

Change Tracker Gen7 R2 vs KerioControl vs Trellix Intrusion Prevention System comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Mindshare comparison

As of April 2025, in the Intrusion Detection and Prevention Software (IDPS) category, the mindshare of Change Tracker Gen7 R2 is 0.6%, up from 0.3% compared to the previous year. The mindshare of KerioControl is 1.6%, up from 1.2% compared to the previous year. The mindshare of Trellix Intrusion Prevention System is 3.3%, up from 3.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Intrusion Detection and Prevention Software (IDPS)
 

Featured Reviews

reviewer2322963 - PeerSpot reviewer
A stable solution that can be used for secure configuration management and file integrity monitoring
We use Change Tracker Gen7 R2 for secure configuration management and file integrity monitoring Whitelisting services are the most valuable feature of Change Tracker Gen7 R2. The solution could include more integrations. Change Tracker Gen7 R2 is a stable solution. The solution's initial setup…
Constantnos Achilleos - PeerSpot reviewer
Leveraging geo-tagging and web filtering for enhanced network security
The solution is used for site-to-site VPN connections and it is valued for its cost efficiency and easy connectivity. It is especially beneficial for multi-site VPNs and is used in about fifteen different components KerioControl has provided a financial benefit as it allows purchasing one license…
Juan Muriel - PeerSpot reviewer
Protects from attacks in real-time and provides accurate threat intelligence updates
I rate the ease of setup a seven or eight out of ten. The platform functions very well. We need technical support to make improvements to the platform. The deployment takes eight months. We need two or three system engineers and one electronic engineer specialized in Trellix platforms to deploy the tool. We need only one system engineer to maintain the product.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Whitelisting services are the most valuable feature of Change Tracker Gen7 R2."
"I have contacted the support once and the experience was good, I was satisfied."
"Its support is very good, and it is stable product.​"
"Technical support is good. They respond right away."
"The solution is user-friendly."
"The statistic feature enables us to better use bandwidth management. We monitored the use by mobile, type of application, department, and by users. The bandwidth was solid. Our internet speed is optimized for our research."
"It has helped our organization with testing."
"The traffic insight page or the administrative portal is really helpful because you can see all the internet usage down to the point where you can see if it's big files or streams. It gives us a good view of what the internet usage is of users who are coupled to an IP address. That way, if there are problems with, for example, a lot of data usage or problems with the connection, we can narrow it down to a single user or server and address the problem. It's really helpful for diagnostic data."
"The stability of Kerio Control is good."
"One very good thing about the Kerio device is its authentication. I don't have a Windows domain for authentication. Instead, I use the Kerio product because it can separate users by Mac addresses and give them IP addresses based on their usernames, automatically logging them in. This makes for a very simple authentication system."
"There's a good dashboard you can drill down into. It helps you easily locate intrusions and the source of attacks."
"It has a lot of functions, such as firewall. We are administrators, and we create some rules to protect our network. We also monitor the traffic in and out and have disk encryption on-premises. When we detect malware, we scan for the virus on the PC. We can then delete or block the malware."
"The most valuable features are the customization of the signature and the unlimited amount of signatures in IPS."
"The most valuable features of the solution stem from the fact that it is a good product for dealing with DDoS attacks and for the inspection of network traffic."
"McAfee NSP is much more stable than Cisco."
"Overall the solution is very good. It offers great protection and gives us a good overview of what is on the network."
"The most valuable features in Trellix for me are the automated signature updates. It is a great and convenient feature."
"The initial setup is straightforward."
 

Cons

"The solution could improve by being more secure and have better integration."
"The solution could include more integrations."
"Kerio Control could improve content filtering."
"The overall speed needs improvement. Internet connectivity speed needs to be improved somehow."
"The Kerio hardware devices look cheap and could be improved. Some of our clients are switching to Sophos because their hardware has a more sleek design."
"I find it a bit costly to pay for the products that I am not using. They need to change their model in such a way that you don't have to pay for the products that you are not using. Its local support and scalability are also not good. I am looking forward to a more scalable product that will be able to grow with time and technology."
"I would like for them to add more security features."
"We'd like to have more integrations Kerio Operator."
"I would like the customer statistics to be more user-friendly. It should explain more what users have been doing throughout the day. Sometimes, it'll just say they downloaded a big file. Meanwhile, they were connected through a VPN."
"They should add wireless features."
"We would like to have a simpler version. Some settings and functions on the McAfee console are complex and complicated. I want the management console to be simpler."
"Some of the documentation is not as straightforward as it could be."
"The solution needs to improve the graphical interface. And they had a limitation in some of the sensor modems as well."
"The technical support must be improved."
"There are limited resources for configuration guidance."
"The platform’s GUI could be the latest."
"The management component could be simplified."
"The area of concern where the tool needs improvement is how the product prompts users at a network level that helps prevent any wireless network attacks through alerts and notifications."
 

Pricing and Cost Advice

"There is a license required for this solution."
"Search and compare."
"The price is inexpensive."
"Its licensing is yearly. You renew every year. Its price is all-inclusive."
"We have to pay approximately EUR 175 for the product."
"It gets expensive pretty quickly if you need to purchase license packs."
"The price of Kerio Control could be better, it is a bit overpriced compared to other solutions."
"I think it is a bit on the pricey side, but it's okay. I've got 50 licenses which I think is $250 a year or something like that."
"On the low-end device that I use, it has unlimited IP addresses. So, they have a subscription model where, on the higher models, you pay X dollars for 10 IP addresses. Then, if you want any more, you have to pay more on the model. On the low-end model, it has unlimited IP addresses, because if you have too many users, the thing will just slow you down and stop working. At some point, you need to say, "Okay, I've grown to a point where performance is impacted. I need to get some bigger hardware." If I get to that stage, I will possibly look at using one of the virtual appliances and putting it on some bigger hardware."
"I rate the product’s pricing an eight out of ten."
"The tool is competitively priced."
report
Use our free recommendation engine to learn which Intrusion Detection and Prevention Software (IDPS) solutions are best for your needs.
842,767 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Computer Software Company
22%
Financial Services Firm
9%
Comms Service Provider
8%
Media Company
8%
Financial Services Firm
14%
Computer Software Company
11%
Manufacturing Company
11%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about Change Tracker Gen7 R2?
Whitelisting services are the most valuable feature of Change Tracker Gen7 R2.
What needs improvement with Change Tracker Gen7 R2?
The solution could include more integrations.
What is your primary use case for Change Tracker Gen7 R2?
We use Change Tracker Gen7 R2 for secure configuration management and file integrity monitoring.
What do you like most about KerioControl?
The solution provides feasibility regarding cyber privacy.
What is your experience regarding pricing and costs for KerioControl?
KerioControl offers good pricing as one license covers all features needed without extra payment. The price for the p...
What needs improvement with KerioControl?
The logs could be improved for better clarity. It is difficult to understand when there is a threat attack, and handl...
What do you like most about McAfee Network Security Platform?
The threat intelligence updates are very accurate.
What is your experience regarding pricing and costs for McAfee Network Security Platform?
The tool is competitively priced. I rate the pricing a six out of ten.
What needs improvement with McAfee Network Security Platform?
Network Threat Behavior Analysis must be improved. The technical support must be improved. The support team must prov...
 

Also Known As

NNT Change Tracker Enterprise
No data available
McAfee Network Security Platform, McAfee NSP, IntruShield Network Intrusion Prevention System, IntruShield Network IPS
 

Overview

 

Sample Customers

US Army, Xerox, Hewlett Packard, LiveTV, Universal Studios, Guadalupe Valley Electric Cooperative, ACAS, Chanel, Live Nation, Union Bank, Ohio Valley Electric Corporation, Bank of China, Cornell University, Jetblue, Royal Albert Hall, Chaparral Energy, RyanAir
Triton Technical, McDonald's
Desjardins Group, HollyFrontier, Nubia, Agbar, WNS Global Services, INAIL, Universidad de Las Américas Puebla (UDLAP), Cook County, China Pacific Insurance, Bank Central Asia, California Department of Corrections and Rehabilitation, City of Chicago, Macquarie Telecom, Sutherland Global Services, Texas Tech University Health Sciences Center, United Automotive Electronic Systems
Find out what your peers are saying about Darktrace, Check Point Software Technologies, Vectra AI and others in Intrusion Detection and Prevention Software (IDPS). Updated: March 2025.
842,767 professionals have used our research since 2012.