Trellix Endpoint Security and ExtraHop Reveal(x) 360 compete in the cybersecurity protection category. Trellix seems to have the upper hand in protection capabilities and pricing, while ExtraHop excels in network visibility and analytics.
Features: Trellix Endpoint Security includes robust threat detection, integration capability with operating systems, and flexible pricing. ExtraHop Reveal(x) 360 offers advanced network monitoring, real-time analytics, and proactive threat detection through superior visibility.
Room For Improvement: Trellix Endpoint Security needs better reporting, streamlined update processes, and improved integration with third-party tools. ExtraHop Reveal(x) 360 requires enhancements in third-party integration, a reduction in its learning curve, and process improvements for network analytics.
Ease of Deployment and Customer Service: Trellix Endpoint Security offers straightforward deployment and responsive customer service. ExtraHop Reveal(x) 360 provides comprehensive deployment documentation but presents a learning curve. Customer service is positive for both, with Trellix favored for faster responses.
Pricing and ROI: Trellix Endpoint Security is competitively priced and offers a good return on investment with flexible pricing models. Although ExtraHop Reveal(x) 360 has a higher price point, users perceive substantial ROI due to its advanced features.
Cloud is where your business operates, where it innovates, how it enables employees, and how it connects with customers. Adversaries know this, and that's why attacks against cloud assets in IaaS, PaaS, and SaaS environments are increasing. With Reveal(x) 360, you can mitigate the blast radius of advanced threats like ransomware and supply chain attacks with unified security across multicloud and hybrid environments in a single management pane.
Trellix Endpoint Security provides aggressive robust protection for every endpoint in an enterprise organization. Trellix uses dynamic threat intelligence and mounts a superb defense across the complete threat lifecycle. This solution will keep your organization more secure and resistant to any possible threat of risks. Trellix offers an amalgamated suite of next-generation endpoint security tools. These tools give users the benefit of machine learning, intuitive intelligence, and greater assistance to ensure their networks are being protected non-stop against threats - potential or realized - and can stop attacks before they happen. Trellix uses MDR (managed detection and response) and XDR (extended detection and response) to give users a comprehensive endpoint security solution.
Trellix Endpoint Security Benefits
Trellix Endpoint Security Top Features
Reviews from Real Users
“It has a great console. We can manage everything from the central console and it is very easy. Every year we are getting the benefits of legacy also. It's easy to set up.” - S Fazlul H., IT Lead Engineer, Information Technology at Banglalink
“There is a new feature where you can set thresholds for all the CPU consumption allowing for no consumption on the servers when the scans happen. It is a separate plugin or addon, and if we have it on all the virtual machines it automatically checks the resources, and based on that, it will schedule the scans. That is something that I have not seen in other antivirus solutions, such as Symantec.” - Sabari K. Senior Engineer at a comms service provider
We monitor all Extended Detection and Response (XDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.