Try our new research platform with insights from 80,000+ expert users

Elastic Security vs Trellix Endpoint Security (ENS) comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2024
 

Categories and Ranking

Elastic Security
Ranking in Endpoint Detection and Response (EDR)
16th
Average Rating
7.6
Reviews Sentiment
8.2
Number of Reviews
61
Ranking in other categories
Log Management (5th), Security Information and Event Management (SIEM) (5th), Security Orchestration Automation and Response (SOAR) (6th), Extended Detection and Response (XDR) (8th)
Trellix Endpoint Security (...
Ranking in Endpoint Detection and Response (EDR)
17th
Average Rating
7.6
Reviews Sentiment
7.0
Number of Reviews
53
Ranking in other categories
Endpoint Protection Platform (EPP) (22nd)
 

Mindshare comparison

As of November 2024, in the Endpoint Detection and Response (EDR) category, the mindshare of Elastic Security is 2.8%, up from 2.4% compared to the previous year. The mindshare of Trellix Endpoint Security (ENS) is 2.1%, down from 2.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Detection and Response (EDR)
 

Featured Reviews

Gajewski Marek - PeerSpot reviewer
Provides good anomaly detection and connectivity reporting
We previously used Splunk but switched to Elastic Security because Splunk was more expensive. Feature-wise, both tools are pretty much the same. They have almost the same functions. Elastic Security has a much better AI assistant that allows you to ask questions like a normal person. With Elastic Security, I can also predict the price and how much it will cost. Splunks's pricing depends on how much data we use and the different add-ons I have to add. The pricing is much better with Elastic Security.
Venugopal Potumudi - PeerSpot reviewer
Reliable with good independent modules and a straightforward setup
I'd rate the solution seven out of ten. Having used Trend Micro as well, I would rate Trend Micro higher. However, I would still choose this product as a second option. When we recommend a product, we would recommend something based on the fit of the product and customer requirements. We worked with Defender, we worked with Trend Micro, and we worked with McAfee. All of them almost overlap in multiple use cases. That said, we do see the customer IT strategy and where they're going, and they are adopting Azure more. We know there are certain limitations in their landscape where there may be some old legacy systems, and in that case, then we would either switch back to McAfee or Trend Micro instead of Defender.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The visualization is very good."
"The tool's functionality is good for overall security and incident response times."
"I use the stack every morning to check the errors and it's just so clear. I don't see any disadvantage to using Logstash."
"ELK Logstash is easy and fast, at least for the initial setup with the out of box uses."
"I can look at events from more than one source across multiple different locations and find patterns or anomalies. The machine learning capabilities are helpful, and I can create rules for notifications to be more proactive rather than responding after something has gone wrong."
"The most valuable features are the speed, detail, and visualization. It has the latest standards."
"Elastic Security is very easy to adapt."
"The stability of the solution is good."
"I have not received any complaints about the performance."
"FireEye Endpoint Security's scalability is awesome. I think it is one of the best on that front."
"The extendability is great."
"I found the initial setup to be easy."
"If the network has seen something, we can use that to put a block to all the endpoints."
"The threat scanning is excellent. It uses predictive technology and I can utilize attack data to help us fine-tune our systems and network infrastructure. This protects us against current and future attacks."
"HIPS protects server files from being modified or deleted by unauthorized users. It's primarily deployed in the web tier."
"Technical support is excellent."
 

Cons

"We're using the open-source edition, for now, I think maybe they can allow their OLED plugin to be open source, as at the moment it is commercialised."
"The biggest challenge has been related to the implementation."
"Authentication is not a default in Kibana. We need to have another tool to have authentication and authorization. These two should be part of Kibana."
"I think because we are a cybersecurity company, the thing that can be improved is the prebuilt tools, especially quality. Compared to its competitor, they still have fewer prebuilt security rules. Elastic Security, in terms of generating alerts, cannot group the same products into one another. Even though the alerts are the same, they still generate them one by one. So, it is very noisy in our dashboard. I would like the Elastic Security admin to group all the same alarms into one alarm so that our dashboard is not noisy."
"We'd like to see some more artificial intelligence capabilities."
"If you compare this with CrowdStrike or Carbon Black, they can improve."
"The training that is offered for Elastic is in need of improvement because there is no depth to it."
"I want to find an automatic security system in the tool, like a SOAR solution. I am looking forward to seeing a SOAR system in the tool."
"The way that signatures work when using this solution could be improved. They could be more user friendly. We would like the ability to select a client's signature from a menu or file share to save time."
"The performance could be better. I noticed that it slows down a bit."
"From an improvement perspective, I want everything in the solution to be free."
"The customization capabilities of the solution are an area where it lacks, so it would be great if our company could customize the solution to meet the demands of our customers."
"The complexity of advanced modules can be improved."
"The initial setup can be a bit complicated for those unfamiliar with the product."
"One suggestion is they should reduce the constant notifications. Whenever I open my laptop, there are too many notifications from McAfee, and it gets annoying."
"Intrusion detection and intervention seem to be falling behind the competition."
 

Pricing and Cost Advice

"The solution is not expensive and costs around ten dollars a month."
"We use the open-source version, so there is no charge for this solution."
"It's a monthly cost with Elastic SIEM, but I am not sure of the exact cost."
"Affordable but with additional costs"
"Elastic Security is free to use."
"The tool's pricing is flexible and comes at unit cost. You don't have to pay for everything."
"Compared to other products such as Dynatrace, this is one of the cheaper options."
"We are using the free, open-source version of this solution."
"The pricing is mid-ranged and quite reasonable compared to other similar products."
"The price of the product is similar to the ones in the market that offer the same features."
"Microsoft Defender is not cheap and from a cost perspective, Trellix Endpoint Security (ENS) is a better option."
"It is based on an annual subscription."
"Trellix Endpoint Security (ENS) has a reasonable price."
"They should reduce the cost or make it free, open-source software."
"Licensing fees are billed on a yearly basis."
"Trellix Endpoint Security (ENS) is not a cheap solution...I don't think any costs are involved in the maintenance of the solution."
report
Use our free recommendation engine to learn which Endpoint Detection and Response (EDR) solutions are best for your needs.
816,406 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Financial Services Firm
10%
Government
10%
University
7%
Computer Software Company
15%
Government
12%
Manufacturing Company
11%
Financial Services Firm
10%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Datadog vs ELK: which one is good in terms of performance, cost and efficiency?
With Datadog, we have near-live visibility across our entire platform. We have seen APM metrics impacted several times lately using the dashboards we have created with Datadog; they are very good c...
What do you like most about Elastic Security?
Elastic provides the capability to index quickly due to the reverse indexes it offers. This data is crucial as it contains critical information. The reverse index allows fast data indexing because ...
What is your experience regarding pricing and costs for Elastic Security?
Compared to other tools, Elastic Security is a cheaper solution.
How does McAfee Endpoint Security compare with MVISION?
The flexible manageability of McAfee Endpoint Security is one of our favorite aspects of this solution. You can deploy various components as desired with McAfee Endpoint Security, whereas many othe...
How does Crowdstrike Falcon compare with FireEye Endpoint Security?
The Crowdstrike Falcon program has a simple to use user interface, making it both an easy to use as well as an effective program. Its graphical design is such that it makes an extremely useful too...
What do you like most about McAfee MVISION Endpoint?
The product's initial setup phase was straightforward.
 

Also Known As

Elastic SIEM, ELK Logstash
McAfee MVISION Endpoint, Trellix Endpoint Security (HX)
 

Learn More

 

Overview

 

Sample Customers

Texas A&M, U.S. Air Force, NuScale Power, Martin's Point Health Care
Tech Resources Limited, Globe Telecom, Rizal Commercial Banking Corporation
Find out what your peers are saying about Elastic Security vs. Trellix Endpoint Security (ENS) and other solutions. Updated: October 2024.
816,406 professionals have used our research since 2012.