Trellix Endpoint Security and Elastic Security compete in the endpoint protection category. Trellix leads in support and pricing satisfaction, while Elastic Security is favored for its comprehensive features, making it a noteworthy investment for its price.
Features: Trellix offers strong malware detection, behavior analysis, and easy integration. Elastic provides robust threat intelligence, scalability, and customizable dashboards with advanced analytics.
Room for Improvement: Trellix users wish for better performance speed, enhanced reporting, and speed enhancements. Elastic users seek improvements in the setup process, more intuitive navigation, and simplifying initial configurations.
Ease of Deployment and Customer Service: Trellix is noted for its seamless deployment and responsive support, making it user-friendly for various environments. Elastic, while powerful, has a steeper learning curve but benefits from highly regarded documentation. Trellix deployment is straightforward, supported well by customer service. Elastic requires more expertise, but users commend its detailed guides.
Pricing and ROI: Trellix is considered cost-effective, offering good ROI with competitive setup costs. Elastic's pricing is higher, reflecting its extensive capabilities, but users report a worthwhile ROI due to enhanced security outcomes. Trellix provides affordability with satisfactory returns, while Elastic justifies its higher initial investment with long-term performance benefits.
It does not require hefty security budgets and can be deployed for enterprise security effectively.
We have observed tremendous return on investment after implementing Trellix Endpoint Security as it is a more cost-effective solution compared to other products.
Providing necessary assistance efficiently.
Most of the time when my team encounters issues, they receive responses within 24 hours.
I would rate their customer service nine out of ten.
The response time is a notable issue.
It allows us to think about specific use cases, such as gathering malicious IPs in a single view and analyzing threats based on geolocation.
I would rate the scalability of the solution as a six out of ten, indicating some challenges due to downtime requirements.
Trellix Endpoint Security is scalable.
In terms of stability, I would rate Elastic a solid eight out of ten.
I would rate its stability as nine out of ten.
CrowdStrike and Defender have more established threat intelligence integration due to having a larger client base.
My security testing team continuously reports vulnerabilities, and we have to fix and update the versions frequently.
Elastic Security consumes a lot of resources, requiring a substantial deployment setup.
What needs improvement in Trellix Endpoint Security is the reduction of resource consumption by the scanning feature.
Artificial intelligence also requires improvement to further enhance the product.
The pricing is reasonable, especially for Small Medium Enterprises (SMEs), making it a viable option for businesses building their security infrastructure.
This is beneficial for SMEs as they do not need extensive budgets for security solutions.
Elastic Security is considered cost-effective, especially at lower EPS levels.
Trellix Endpoint Security is cost-effective and provides excellent value for money.
The license costs are very reasonable, around 1,000 to 1,200 rupees per year.
The platform provides more visibility and requires less effort in monitoring.
Elastic Security is as flexible and configurable as Microsoft Sentinel.
We require rapid processing speed for alerts and event data, and Elastic Security is very efficient at handling this level of data.
Trellix Endpoint Security is a proven, robust, and cost-effective solution that protects the organization from different types of ransomware and attacks.
The most valuable features of Trellix Endpoint Security include its protection capabilities such as DNS and endpoint security, DNS threat prevention, as well as advanced threat prevention.
Elastic Security combines the features of a security information and event management (SIEM) system with endpoint protection, allowing organizations to detect, investigate, and respond to threats in real time. This unified approach helps reduce complexity and improve the efficiency of security operations.
Additional offerings and benefits:
Finally, Elastic Security benefits from a global community of users who contribute to its threat intelligence, helping to enhance its detection capabilities. This collaborative approach ensures that the solution remains on the cutting edge of cybersecurity, with up-to-date information on the latest threats and vulnerabilities.
Trellix Endpoint Security provides aggressive robust protection for every endpoint in an enterprise organization. Trellix uses dynamic threat intelligence and mounts a superb defense across the complete threat lifecycle. This solution will keep your organization more secure and resistant to any possible threat of risks. Trellix offers an amalgamated suite of next-generation endpoint security tools. These tools give users the benefit of machine learning, intuitive intelligence, and greater assistance to ensure their networks are being protected non-stop against threats - potential or realized - and can stop attacks before they happen. Trellix uses MDR (managed detection and response) and XDR (extended detection and response) to give users a comprehensive endpoint security solution.
Trellix Endpoint Security Benefits
Trellix Endpoint Security Top Features
Reviews from Real Users
“It has a great console. We can manage everything from the central console and it is very easy. Every year we are getting the benefits of legacy also. It's easy to set up.” - S Fazlul H., IT Lead Engineer, Information Technology at Banglalink
“There is a new feature where you can set thresholds for all the CPU consumption allowing for no consumption on the servers when the scans happen. It is a separate plugin or addon, and if we have it on all the virtual machines it automatically checks the resources, and based on that, it will schedule the scans. That is something that I have not seen in other antivirus solutions, such as Symantec.” - Sabari K. Senior Engineer at a comms service provider
We monitor all Extended Detection and Response (XDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.