Try our new research platform with insights from 80,000+ expert users

KerioControl vs Trellix Intrusion Prevention System comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 19, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

KerioControl
Ranking in Intrusion Detection and Prevention Software (IDPS)
15th
Average Rating
8.2
Reviews Sentiment
6.9
Number of Reviews
58
Ranking in other categories
Firewalls (28th), Unified Threat Management (UTM) (10th)
Trellix Intrusion Preventio...
Ranking in Intrusion Detection and Prevention Software (IDPS)
13th
Average Rating
8.4
Reviews Sentiment
6.6
Number of Reviews
16
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of March 2026, in the Intrusion Detection and Prevention Software (IDPS) category, the mindshare of KerioControl is 2.6%, down from 3.7% compared to the previous year. The mindshare of Trellix Intrusion Prevention System is 2.9%, up from 2.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Intrusion Detection and Prevention Software (IDPS) Mindshare Distribution
ProductMindshare (%)
Trellix Intrusion Prevention System2.9%
KerioControl2.6%
Other94.5%
Intrusion Detection and Prevention Software (IDPS)
 

Featured Reviews

Constantnos Achilleos - PeerSpot reviewer
Product manger at Asbis Mediteranean
Leveraging geo-tagging and web filtering for enhanced network security
The solution is used for site-to-site VPN connections and it is valued for its cost efficiency and easy connectivity. It is especially beneficial for multi-site VPNs and is used in about fifteen different components KerioControl has provided a financial benefit as it allows purchasing one license…
BS
Large account Manager at Softcell Technologies Limited
Has offered reliable threat protection and detailed network insights but could expand features beyond existing capabilities
The best features of Trellix Intrusion Prevention System include advanced ATP (Advanced Threat Protection), which uses signatures, behavior analysis, and machine learning to stop zero-day exploits and malware advanced persistent threats (APTs). They track and collect data from APTs, which allows them to track malicious files entering the environment. The system offers inline prevention and real-time automatic blocking of malicious packets before they reach the network. It integrates with the Trellix ecosystem and provides application visibility and control. The solution provides deep insight into network traffic, applications, and protocols for better information. All packets coming through the application are analyzed and reported. They share intelligence updates regularly to protect from different malicious files and sector-specific threats. It supports both on-premise and cloud environments.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The installation is straightforward."
"The ease of use in the GUI itself is the most valuable feature. The GUI is really the best part of it. We like the traffic rules so we can control who can get to what. It's easy to determine the flow of the traffic itself so we aren't having to guess through command lines and reading out basically command-driven output. It's just a very easy-to-use interface. The interface is the best part of the product."
"The routing of the multiple internet physical routers I have is the most valuable feature of this solution. Instead of me physically unplugging a cable from one router to the server, if one connection goes down, it automatically switches for me. So I can have all three of them plugged in. If one goes down, it just picks up the other one automatically. There's no physical cable swapping."
"The initial setup is a breeze."
"The most valuable feature is to provide users with the ability to log in to the portal page, keep track of their data usage and perform bandwidth management."
"Kerio Control can be scaled easily."
"I want to have access to my computer from the outside and Kerio Control plays a role because it has a VPN... It is more reliable because it's a smaller group of computers to target for hackers and the like. The VPN works very well. I use it to work remotely very easily and exchange information, both to and from the location where it's deployed, and there have been no problems there."
"It has helped our organization with testing."
"The most valuable features of the solution stem from the fact that it is a good product for dealing with DDoS attacks and for the inspection of network traffic."
"The ability to centrally manage all the IPS sensors, track the different security events generated by it, and customize the different policies, depending on their location."
"Overall the solution is very good. It offers great protection and gives us a good overview of what is on the network."
"There's a good dashboard you can drill down into. It helps you easily locate intrusions and the source of attacks."
"The product is worth the investment."
"The most valuable features in Trellix for me are the automated signature updates. It is a great and convenient feature."
"The threat intelligence updates are very accurate."
"McAfee NSP is much more stable than Cisco."
 

Cons

"When it comes to dealing with updates, there are often bugs on the solution. They should do a lot more testing before they release new versions."
"There isn't a lot to be improved. It works well as it is, but they can maybe improve the reporting side."
"They don't provide content filtering when it comes to search engine results. We had an incident on the network where a blocked site was showing up in search results. We are in a school environment, so we have blocked a site with some of the explicit content so that kids wouldn't see it. When one of them did a search, the results came on the search engine part. When you try to drill down to the website, it blocks, but when you search by image, it brings up all the images. That's one of the reasons why we are looking at Juniper."
"Filtering of pages and greater personalization in services need improvement."
"I would like to be able to inspect https packets for the purpose of virus scanning."
"They should improve the remote connectivity feature for users."
"I would like to see a little improvement in their technical support when you have a problem. I may be a little jaded because I came from Kerio when we could call and get a person on the phone who worked on the product. Every tech had their own demo setup. They had instant messaging capability with the developers. If we found a problem, then we could get a result for it quickly. Now, the product seems to be 24 hours. They have also gone to the model that if you need quicker support, then they now charge you additional for the exact same level of support that they used to give. I am assuming it's the exact same level of support that they say it is. I'm not paying extra for it. That's the biggest flaw with the product."
"If I would suggest anything, it would be to expand on its multifactor authentication to be a little bit more user-friendly. They should do multifactor authentications for the client itself perhaps, rather than served on a webpage, in a page hijack, that might be more user-friendly, but I don't have a lot of complaints about it. It's doing its job. You have to have a certain amount of skills to configure these things anyway, the ones that we use on-site doing point-to-point, and we've been tricked up a few times with their interfaces."
"The technical support has room for improvement."
"The Network Security Managers could be more stable, agile, and work faster. When it comes to instability, there is room for improvement."
"The management component could be simplified."
"The solution could improve some aspects of detection."
"We would like to have a simpler version. Some settings and functions on the McAfee console are complex and complicated. I want the management console to be simpler."
"Integration with Global Thereat Intelligence could be better. Also, I think management solutions are end of life now at McAfee. Network threat analyzer may be used for endpoint quarantines. Integration between these sides, as well as endpoint APO, will help you quarantine the risky endpoints."
"The technical support must be improved."
"There are limited resources for configuration guidance."
 

Pricing and Cost Advice

"There is a yearly upkeep fee."
"It's too expensive. The license, in the last year or so, has gone up by over a £100. We're almost being out-priced by the annual license at the minute."
"The price is fine."
"I pay approximately $50 for the solution on an annual basis."
"I am living in Iran and we cannot buy the product from Kerio because of sanctions."
"We have to pay approximately EUR 175 for the product."
"My advice is to use your own hardware, and do not use theirs."
"The yearly maintenance fee is a bit high for the Kerio Control Boxes. The end of life for the devices is kind of short. It seems like they're making you upgrade within a short period of time. They should at least allow five years, but it seems like they are changing their end of life to be shorter to generate revenue."
"The tool is competitively priced."
"I rate the product’s pricing an eight out of ten."
report
Use our free recommendation engine to learn which Intrusion Detection and Prevention Software (IDPS) solutions are best for your needs.
884,371 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
18%
Comms Service Provider
9%
Manufacturing Company
7%
Media Company
6%
Manufacturing Company
13%
Comms Service Provider
11%
Computer Software Company
8%
Financial Services Firm
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business44
Midsize Enterprise9
Large Enterprise3
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise6
Large Enterprise6
 

Questions from the Community

What is your experience regarding pricing and costs for KerioControl?
KerioControl offers good pricing as one license covers all features needed without extra payment. The price for the product is rated as ten out of ten.
What needs improvement with KerioControl?
Regarding KerioControl's application awareness and control feature, I have not used it much.
What is your primary use case for KerioControl?
With KerioControl, we usually use them for site-to-site VPNs for most of our clients. With multiple offices, we use KerioControl as our solution.
What needs improvement with McAfee Network Security Platform?
Trellix Intrusion Prevention System does not provide virtual patching. Patching involves updates on the OS side to address vulnerabilities, which is a different functionality. Trellix Intrusion Pre...
What is your primary use case for McAfee Network Security Platform?
We do not use Trellix Intrusion Prevention System; rather, we sell the Trellix Intrusion Prevention System solution. The typical use case for our clients is to find out what vulnerable files exist....
What advice do you have for others considering McAfee Network Security Platform?
I have experience working with other tools, specifically Trellix solutions such as DLP, EDR, and MDR, as well as with other Imperva tools. My team has worked with Trellix Intrusion Prevention Syste...
 

Also Known As

No data available
McAfee Network Security Platform, McAfee NSP, IntruShield Network Intrusion Prevention System, IntruShield Network IPS
 

Overview

 

Sample Customers

Triton Technical, McDonald's
Desjardins Group, HollyFrontier, Nubia, Agbar, WNS Global Services, INAIL, Universidad de Las Américas Puebla (UDLAP), Cook County, China Pacific Insurance, Bank Central Asia, California Department of Corrections and Rehabilitation, City of Chicago, Macquarie Telecom, Sutherland Global Services, Texas Tech University Health Sciences Center, United Automotive Electronic Systems
Find out what your peers are saying about KerioControl vs. Trellix Intrusion Prevention System and other solutions. Updated: March 2026.
884,371 professionals have used our research since 2012.