Try our new research platform with insights from 80,000+ expert users

Dell Data Protection - Endpoint Security Suite [EOL] vs Trellix Endpoint Security Platform comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 14, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
108
Ranking in other categories
Endpoint Protection Platform (EPP) (5th), Endpoint Detection and Response (EDR) (7th), Extended Detection and Response (XDR) (6th), Ransomware Protection (2nd), AI-Powered Cybersecurity Platforms (2nd)
Dell Data Protection - Endp...
Average Rating
8.0
Reviews Sentiment
3.9
Number of Reviews
6
Ranking in other categories
No ranking in other categories
Trellix Endpoint Security P...
Average Rating
7.8
Reviews Sentiment
7.1
Number of Reviews
160
Ranking in other categories
Endpoint Protection Platform (EPP) (7th), Endpoint Detection and Response (EDR) (11th), Extended Detection and Response (XDR) (10th)
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
Alexander Zhuravel - PeerSpot reviewer
Head of Network and Server infrastructure department at JSC Alfa Bank Ukraine
A highly scalable tool that ensures its users face no problems while using it as a backup system
The tool is scalable and is currently being used on over 2,000 nodes. So, our company doesn't count the number of clients we have, but we do count the number of nodes, specifically referring to file system nodes, backup nodes, database nodes, virtual machine nodes, and blockchain nodes, which we use for file-based applications. According to the traffic, a backup of five petabytes of data can be done for a month.
PankajKumar24 - PeerSpot reviewer
IT Manager at Gigabit Technologies Pvt Ltd
Advanced threat prevention has strengthened incident response and customized security workflows
The biggest advantage of Trellix Endpoint Security Platform is the ATP solution, which provides advanced threat prevention. Machine learning algorithms are available in the product as part of the threat anti-malware, including predictive machine learning and behavioral analysis, which are integral to the anti-malware module of EPP. In terms of my experience with the machine learning algorithms for analysis and threat detection, we are analyzing logs provided by Trellix, but we are not able to conduct specific machine learning analysis on those logs. The automated response mechanisms in the products help with incident management because we have to create playbooks in Trellix console for automation, which we need to enable. The customizable dashboard of Trellix Endpoint Security Platform definitely contributes to the decision-making process, as we customize the dashboard according to customer requirements. When it comes to integration aspects, we are able to integrate Trellix Endpoint Security Platform with SIEM or SOAR solutions using the ePO console, which enhances threat detection capabilities. Reporting and analytics aspects have an impact on security posture assessment, as we are able to fetch reports in the ePO console customized according to customer requirements for downloading and sending via email.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It is easy to use."
"If the user leaves our premises or network, Palo Alto Traps will still be on that endpoint and will still apply our policies."
"Being a cloud solution it is very flexible in serving internal and external connections and a broad range of devices."
"It is an easy-to-use tool."
"Cortex XDR by Palo Alto Networks should be a stable solution."
"Cortex Xnor's playbooks predefine the workflow of the automation, such as response processes, alert triggering, and enriching the context, collecting relevant indicators such as hashes, IP addresses, or domains efficiently and can detect and block malicious attacks with firewalls."
"From a single pane of glass, you can easily manage all of your endpoints."
"Cortex XDR by Palo Alto Networks has helped lighten the load of our security analysts because it was the major tool that we were using and the one we utilized most."
"It is a stable solution. Our company faces no problems with the backup system…The initial setup wasn't complex."
"It is a stable solution."
"There's a really they have a really nice way to test it first. Before you adopt it. And so I would suggest trying to they they create a test site for you, and they give you a link to it, and you can basically try out all the features on your own for I think we did it for a month."
"Dell Data Protection has a decent service and integrates well with users' active directories."
"The security engine is effective at catching potential threats."
"The most valuable features of the solution are its speed, backup speed, and restore speed."
"The backup speed and deduplication are the most valuable features."
"The endpoint protection and disk encryption features are the most valuable."
"The solution is a reliable and mature product. Its reporting function is robust, and the user interface is easy to use. End users can create customized reports with detailed reporting for any computer and export them in PDF or other formats. This reporting capability is very robust."
"It provides a lot of information and great visibility, with really great options for managing the environment."
"The stability has been great."
"The product’s stability and security features enhance user protection and organizational security."
"Dynamic Application Containment."
"What I like best is the integrated end-to-end security that works with the security information and events manager."
"I recommend Trellix Endpoint Security to others as it seems like one of the industry standards and is fairly stable."
 

Cons

"Cortex XDR should have a lightweight agent, and the agent size should not be heavy."
"Currently, we are monitoring all USB drives and ports but we would like to improve our device control capabilities."
"The playbooks could be improved to include more functionalities or actions."
"It tends to do 99.9% of things. The only thing I'd like is single sign-on authentication into their cloud platform so that my users can be properly authenticated against it."
"Cortex XDR could improve its sales support team, including better commission structures and referral programs."
"The solution should offer more dashboards and they should be better customized."
"However, if you do not have Palo Alto in your environment, you are paying these additional services just for Cortex XDR by Palo Alto Networks, so it is not a cost-effective solution."
"It should support more mobile operating systems. That is one of the cons of their infrastructure right now."
"Implementation in a beta environment is necessary before rollout to the larger community."
"I consider the product pretty expensive, so from an improvement perspective, I would like the pricing to be better."
"The solution could be more user-friendly."
"The solution’s user interface should be made more user-friendly."
"The backup speed and deduplication are the most valuable features."
"Whenever we talk about reporting, I have a chance to look at the reporting, and in my opinion, it's not user-friendly."
"I hope the solution can be used in cloud systems going forward."
"The product could do more to keep administration alerted to detected threats on endpoints."
"The solution needs to work on memory consumption. It is too high."
"The integration and display of the dashboards have to be done better."
"Trellix Endpoint Security needs some improvement in the dashboards. Artificial intelligence also requires improvement to further enhance the product."
"The detection and response capabilities need to be improved."
"The solution should provide a more easy way to uninstall it on specific stations."
"The Linux support is very poor. I use base detection. Currently, they are providing malware protection and logon track features in Windows and Mac. These features aren't available in Linux. It will be helpful to extend these capabilities to Linux. We would also like assets grouping and device lock protection features, which are included in their roadmap."
 

Pricing and Cost Advice

"It is "expensive" and flexible."
"Traps pays for itself within the first 16 months of a three-year subscription. This is attributed to OPEX savings, as security teams spent less time trying to identify and isolate malware for analysis as a result of a reduction in malware incidents, false positives, and breach avoidance."
"It's the most expensive solution, but features-wise, it's quite strong. It's very good for protection, so the results are very good in the case of protection. I would rate it a two out of ten in terms of pricing."
"We pay about $50,000 USD per year for a bundle that includes Cortex XDR."
"I don't have any issues with the pricing. We are satisfied with the price."
"The price of the solution could be reduced. I have customers that have voiced that the solution is good for the value but if I want to sell more of the solution the price reduction would help."
"The pricing is a little bit on the expensive side."
"Cortex XDR by Palo Alto Networks is quite an expensive solution."
"You'll need to pay more than the product's original price for the support."
"It is an expensive solution."
"It is more expensive than one of its competitors."
"It is based on an annual subscription."
"Pricing is reasonable and runs at a cost per user per year."
"I think Trellix is more on the higher side of the market, just on a general scale, but I also think it depends on what particular package you choose."
"Licensing is paid yearly."
"The solution is not an expensive tool. Compared to other options, it's mostly average-priced. I've deployed it for customers ranging from 100 nodes to over 5,000 nodes. Its renewal prices are very low, and it offers both perpetual and subscription licenses. With a perpetual license, the product will keep working as long as it's not end-of-life, which benefits companies."
"I do licensing on an annual basis and this is what I always recommend to my clients over the monthly option."
"Compared to Bitdefender, Trellix Endpoint Security is more expensive, but considering it comes with DLP, the solution's price is fine."
"Trellix Endpoint Security is neither a cheap nor an expensive solution."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
884,371 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
10%
Financial Services Firm
9%
Manufacturing Company
9%
Comms Service Provider
7%
No data available
Manufacturing Company
13%
Government
11%
Financial Services Firm
8%
Computer Software Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business44
Midsize Enterprise20
Large Enterprise47
By reviewers
Company SizeCount
Small Business5
Midsize Enterprise1
Large Enterprise2
By reviewers
Company SizeCount
Small Business68
Midsize Enterprise36
Large Enterprise62
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
Ask a question
Earn 20 points
How does McAfee Endpoint Security compare with MVISION?
The flexible manageability of McAfee Endpoint Security is one of our favorite aspects of this solution. You can deplo...
How does Crowdstrike Falcon compare with FireEye Endpoint Security?
The Crowdstrike Falcon program has a simple to use user interface, making it both an easy to use as well as an effec...
What is your experience regarding pricing and costs for McAfee Endpoint Security?
I don't have visibility on pricing because it is negotiated by a different team, as I look after the technical side.
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
DDP, ESS
McAfee Endpoint Security, McAfee Endpoint Protection, Intel Security Total Protection for Endpoint, McAfee Complete Endpoint Protection, Trellix Endpoint Security (ENS)
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
MEIZU, TBG West, Ackerman Charter School District, Church of the Highlands
inHouseIT, Seagate Technology
Find out what your peers are saying about CrowdStrike, Microsoft, SentinelOne and others in Endpoint Protection Platform (EPP). Updated: February 2026.
884,371 professionals have used our research since 2012.