Based on user reviews, Trellix Active Response is a superior product due to its robust features, despite users being happier with the pricing and support of Code42 Incydr.
Features: Code42 Incydr offers strong data loss prevention capabilities, endpoint protection, and insider threat detection. Trellix Active Response provides advanced threat detection, automated response features, and a more comprehensive feature set which users find particularly valuable.
Room for Improvement: Users of Code42 Incydr suggest enhancements in cross-platform support, real-time alert capabilities, and additional integrations. For Trellix Active Response, feedback points to the need for a more intuitive setup process, enhanced integration with other security tools, and improved dashboard usability.
Ease of Deployment and Customer Service: Code42 Incydr is noted for its straightforward deployment process and responsive customer service. Trellix Active Response, while powerful in defense mechanisms, has a more complex deployment and less satisfactory customer service.
Pricing and ROI: Users find Code42 Incydr's pricing more attractive and aligned with its offerings, highlighting a favorable ROI. Trellix Active Response, although higher in price, is seen as worth the investment due to its superior feature set. Pricing specifics were not disclosed in the reviews.
While we haven't yet quantified the financial benefits, we recognize that there has been a return on investment, particularly with operational efficiencies provided by the alerts.
The scalability of Active Response is satisfactory.
We would like Trellix to optimize the technology for these systems similarly to how it is deployed for normal endpoints.
They notify us immediately of any vulnerabilities on the endpoints, allowing us to deploy a response quickly.
Detect file exfiltration via web browsers, USB, cloud apps, email, file link sharing, Airdrop, and more. See how files are moved and shared across your entire organization – without the need for policies, proxies or plugins. Incydr automatically identifies when files move outside your trusted environment, allowing you to easily detect when files are sent to personal accounts and unmanaged devices.
Incydr prioritizes file activity based on 120+ contextual Incydr Risk Indicators (IRIs). This prioritization works on day 1 without any configuration. Incydr’s risk scoring logic is use case-driven and transparent to administrators. Incydr uses Watchlists to programmatically protect data from employees who are most likely to leak or steal files, such as departing employees.
Take action with appropriate responses to contain, resolve and educate on detected risk. Use Incydr Flows or SOAR integrations to initiate response controls that are proportionate to an activity’s risk severity. You’ll stop data leaks without getting in the way of employee collaboration and sanctioned file activity.
Improving your Insider Risk posture requires a change in employee behavior. Code42 Instructor provides bite-sized training to employees, delivered when they need it. Use Instructor in tandem with Incydr to send responsive video lessons when employees put data at risk. You’ll ensure appropriate data governance and compliance with security standards and corporate policies as well as report on the positive impact of your Insider Risk Management program.
Founded in 2001, the company is headquartered in Minneapolis, Minnesota, and backed by Accel Partners, JMI Equity, NEA, and Split Rock Partners. For more information, visit code42.com.
Continuous Visibility into Your Endpoints:
Capture and monitor events, files, host flows, process objects, context, and system state changes that may be indicators of attack or dormant attack components.
Identify and Remediate Breaches Faster:
Access tools you need to quickly correct security issues. Send intelligence to analytics, operations, and forensic teams.
Target Critical Threats:
Get preconfigured and customizable actions when triggered, so you can target and eliminate threats.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.