Try our new research platform with insights from 80,000+ expert users

Trellix Advanced Threat Defense vs Trellix Network Detection and Response comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 1, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Trellix Advanced Threat Def...
Ranking in Advanced Threat Protection (ATP)
23rd
Average Rating
7.8
Reviews Sentiment
6.6
Number of Reviews
8
Ranking in other categories
No ranking in other categories
Trellix Network Detection a...
Ranking in Advanced Threat Protection (ATP)
13th
Average Rating
8.4
Reviews Sentiment
7.3
Number of Reviews
39
Ranking in other categories
Network Detection and Response (NDR) (12th)
 

Mindshare comparison

As of March 2025, in the Advanced Threat Protection (ATP) category, the mindshare of Trellix Advanced Threat Defense is 1.6%, down from 1.7% compared to the previous year. The mindshare of Trellix Network Detection and Response is 4.8%, down from 5.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Advanced Threat Protection (ATP)
 

Featured Reviews

HS
Easy to set up and use with a nice interface
The scalability could be better. We'd like them to be better at dealing with script threats. In sandboxing, the time to respond is slower than we would like. We'd like them to be able to process faster. For example, Fortinet, they are doing 18,000 files per hour. For Wildfire, it is elastic. It can support as many files as you get. McAfee doesn't react like that. It does not support interfaces with HTTPS.
BiswabhanuPanda - PeerSpot reviewer
Offers in-depth investigation capabilities, integrates well and smoothly transitioned from a lower-capacity appliance to a higher one
The in-depth investigation capabilities are a major advantage. When the system flags something as malicious, it provides a packet capture of that activity within the environment. That helps my team quickly identify additional context that most other tools wouldn't offer – like source IP or base64 encoded data. We can also see DNS requests and other details that aren't readily available in solutions like Check Point or others that we've tried. The detection itself is solid, and their sandboxing is powerful. There's a learning curve – you need a strong grasp of OS-level changes, process forking, registry changes, and the potential impact of those. But with that knowledge, the level of information Trellix provides is far greater than what we've seen elsewhere. The real-time response capability of Trellix has been quite effective, although it's not very fast. The key is this solution's concept of 'preference zero.' They don't immediately act on a zero-day. For example, the solution has seen a piece of malware for the first time. It'll let it in, then do sandboxing. Maybe after four or five minutes, it identifies that specific file's DNX Secure Store as malicious. At that point, they update the static analysis engine, and it gets detected if anything else tries to download the same file. There is that initial 'preference zero' concept, like with Panda. You may not hold traffic in the network. That's standard in the industry; we don't do much about it. To address that, we also have endpoint solutions. We use SentinelOne in our environment, which helps us identify threats like Western Bureaus and others.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I recommend this solution because of its ease of use."
"It is stable and reliable."
"It stops in excess of twenty-five malware events per month, all of which could be critical to the business."
"Provides good exfiltration, and is an all-in-one product."
"Its greatest strength is the DXL client which can rapidly disseminate attack information to all clients via the McAfee Agent instead of going through the ePO server."
"It is very scalable."
"The most valuable features are the administration console and its detection and response module."
"The sandbox feature of FireEye Network Security is very good. The operating system itself has many features and it supports our design."
"The product is very easy to configure."
"The features that I find most valuable are the MIR (Mandiant Incident Response) for checks on our inbound security."
"Application categorization is the most valuable feature for us. Application filtering is very interesting because other products don't give you full application filtering capabilities."
"Trellix NDR provides an essential defense by automatically responding to network incidents that firewalls may not catch."
"The most valuable feature is the view into the application."
"It is stable and quite protective. It has a lot of features to scan a lot of malicious things and vulnerabilities."
"The product has helped improve our organization by being easy to use and integrate. This saves time, trouble and money."
 

Cons

"The initial setup was industry standard complex. It takes awhile and has a lot of planning involved. It could be simplified with product redesign."
"Make the ATD system a part of the whole product and take the whole thing onto the cloud. While it is there already, it is not to the same level as the on-premise version."
"This solution needs to be made "cloud ready"."
"We'd like them to be better at dealing with script threats."
"There could be a tool that automatically updates all-new Microsoft IPs, which are available for free to connect to the client."
"Lacks remote capabilities not dependent on the internet."
"I would like to see future versions of the solution incorporate artificial intelligence technology."
"The initial setup was complex because of the nature of our environment. When it comes to the type of applications and functions which we were looking at in terms of identifying malicious threats, there would be some level of complexity, if we were doing it right."
"Cybersecurity posture has room for improvement."
"It would be great if we could create granular reports based on the protocols, types of attacks, regions of attack, etc. Also we would like to easily be able to add exceptions to rules in cases of false positives."
"They can maybe consider supporting some compliance standards. When we are configuring rules and policies, it can guide whether they are compliant with a particular compliance authority. In addition, if I have configured some rules that have not been used, it should give a report saying that these rules have not been used in the last three months or six months so that I disable or delete those rules."
"The world is currently shifting to AI, but FIreEye is not following suit."
"Improvements could be achieved through greater integration capabilities with different firewall solutions. Integrating with the dashboard itself for different firewalls so users can also pull tags into their firewall dashboard."
"It doesn't connect with the cloud, advanced machine learning is not there. A known threat can be coming into the network and we would want the cloud to look up the problem. I would also like to see them develop more file replication and machine learning."
"If you want to search the hashes in the environment, you need to put in IOCs one by one, making it a very hectic job."
 

Pricing and Cost Advice

"Our licensing fees for this solution are approximately one million dollars per year."
"The product is expensive, but it is better than the rest of them in the industry."
"When you purchase FireEye Network Security NX, will need to purchase a megabit per second package. You must know your needs from day one."
"The pricing is a little high."
"The tool is a bit pricey."
"FireEye is comparable to other products, such as HX, but seems expensive. It may cause us to look at other products in the market."
"Its price is a bit high. A small customer cannot buy it. Its licensing is on a yearly basis."
"When I compare this solution to its competitors in the market, I find that it is a little expensive."
"Pricing and licensing are reasonable compared to competitors."
"There are some additional services that I understand the vendor provides, but our approach was to package all of the features that we were looking to use into the product."
report
Use our free recommendation engine to learn which Advanced Threat Protection (ATP) solutions are best for your needs.
842,672 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
17%
Government
15%
Computer Software Company
13%
Manufacturing Company
13%
Financial Services Firm
17%
Comms Service Provider
11%
Computer Software Company
9%
Manufacturing Company
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about McAfee Advanced Threat Defense?
I recommend this solution because of its ease of use.
What needs improvement with McAfee Advanced Threat Defense?
There could be a tool that automatically updates all-new Microsoft IPs, which are available for free to connect to the client.
What is your primary use case for McAfee Advanced Threat Defense?
We use the solution for client management and security. We used the whole suite for client Firewall, antivirus, and everything provided by Trellix.
What do you like most about FireEye Network Security?
We wanted to cross-reference that activity with the network traffic just to be sure there was no lateral movement. With Trellix, we easily confirmed that there was no lateral network involvement an...
What is your experience regarding pricing and costs for FireEye Network Security?
While I do not handle pricing directly, it is known that there is a variety of customers with different licensing needs, which depends on the organization's size and policy.
What needs improvement with FireEye Network Security?
The Trellix solution could be improved by enhancing the Central Management Console for faster visibility, which would help in network detection response. Networking often involves complexity that c...
 

Also Known As

McAfee Advanced Threat Defense
FireEye Network Security, FireEye
 

Overview

 

Sample Customers

The Radicati Group, Florida International University, MGM Resorts International, County Durham andDarlington NHS Foundation Trust
FFRDC, Finansbank, Japan Advanced Institute of Science and Technology, Investis, Kelsey-Seybold Clinic, Bank of Thailand, City of Miramar, Citizens National Bank, D-Wave Systems
Find out what your peers are saying about Trellix Advanced Threat Defense vs. Trellix Network Detection and Response and other solutions. Updated: March 2025.
842,672 professionals have used our research since 2012.