Try our new research platform with insights from 80,000+ expert users

LogRhythm UEBA vs Trellix Endpoint Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 8, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

LogRhythm UEBA
Ranking in Extended Detection and Response (XDR)
25th
Average Rating
7.0
Reviews Sentiment
6.7
Number of Reviews
11
Ranking in other categories
User Entity Behavior Analytics (UEBA) (11th)
Trellix Endpoint Security
Ranking in Extended Detection and Response (XDR)
13th
Average Rating
8.0
Reviews Sentiment
7.4
Number of Reviews
101
Ranking in other categories
Endpoint Protection Platform (EPP) (10th)
 

Mindshare comparison

As of April 2025, in the Extended Detection and Response (XDR) category, the mindshare of LogRhythm UEBA is 1.1%, up from 1.0% compared to the previous year. The mindshare of Trellix Endpoint Security is 1.8%, down from 2.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Extended Detection and Response (XDR)
 

Featured Reviews

Sheikh Abu Ayub Azad - PeerSpot reviewer
Great at managing cyber incidents; the technical support could be improved
The initial setup is easy, partly because LogRhythm is primarily based on the Windows platform. It's good to have two engineers for deployment but it can be done with one. It's more about the knowledge. Deployment is typically done in two or three different phases. It usually takes up to three full months to get good deployment. There's the initial onboarding of all the log sources, then collecting data in the data lake, followed a couple of weeks later with some minor tuning before the final tuneup.
Abdullah Al Hadi - PeerSpot reviewer
Customization capabilities allow clients to autonomously deploy policies
There are a few areas where Trellix Endpoint Security ( /categories/endpoint-protection-platform-epp ) can improve. Firstly, the high CPU utilization when agents are installed can negatively impact client systems. Another issue is with end-users outside the network, where the agent handler sometimes fails to deploy the product properly. Improvements are needed in forensic analytics to detect specific vulnerabilities. It would also help if detection specifics were identified more quickly and the problem-solving process accelerated, especially to meet larger clients' expectations.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Good capability pinpointing specific cyber incidents."
"LogRhythm UEBA’s best feature is the dashboard. It provides several graphs, charts, and event logs."
"It is easy to monitor users and that is how the solution is adding value to our firm."
"What I like most about LogRhythm UEBA is that it allows you to identify and analyze end-user behaviors and suspicious activities within the systems."
"The most valuable features are file activity monitoring and registry activity monitoring."
"I can investigate attacks more quickly using machine learning tools."
"I typically use the product for reducing cyber risk, and I can investigate attacks more quickly using machine learning tools."
"The solution is useful for privilege accounts and super admin accounts. It is beneficial from a security perspective. The tool uses machine learning rather than threshold-based alerts. For instance, it can detect unusual user logins, such as a user logging in from a new browser or location."
"When Intel acquired McAfee they worked on the protocol so that all vendors can work on the same platform. It's a very big improvement in McAfee. All McAfee products talk to each other. Other vendor's products can join this platform as well so it makes it more powerful on the enterprise side for McAfee."
"It is a stable solution...The solution's technical support is good."
"The solution is reliable."
"McAfee Complete Endpoint Protection is stable. We don't have any bugs being reported."
"The most valuable features are the adaptive tech on McAfee."
"The product has a robust reporting feature"
"The solution scales well."
"The central management console is powerful. You can manage endpoints, DLP, encryption, and all the other features from a single console."
 

Cons

"In general, if something needs to be improved in the algorithm, it would be the dashboards."
"The UI could be improved a little bit."
"The on-premises LogRhythm is not very scalable. When considering packets per second or the MPS needed for additional logs such as web application logs, scalability is usually found in cloud products."
"The cloud version is lacking and not up to par."
"The product should improve its dashboards. Splunk has neat dashboards. Additionally, we would like to enhance the use cases provided by LogRhythm as its use case library is not as extensive as other tools. Its machine-learning capabilities need to improve when compared to other solutions. It lacks risk quantification in a single, transparent view for individuals such as CSOs."
"It should have better mitigation with other solutions and be tightly integrated with other solutions. It has to be improved."
"What needs improvement in LogRhythm UEBA is the pricing. Here in Asia, for example, in Sri Lanka, pricing is the primary concern, and this is the only area for improvement I see in the product."
"LogRhythm UEBA's data aggregation needs to be improved. Open-source users do not have much documentation available. Documentation is available only for enterprise users."
"Trellix Endpoint Security needs some improvement in the dashboards. Artificial intelligence also requires improvement to further enhance the product."
"Recently, Trellix has introduced a CDR, which involves more manual response than automatic. I believe they should enhance the system by adding features like automated response and the ability to create custom playbooks. This is crucial for an EDR solution, and currently, Trellix lacks this feature while other products offer it."
"Tech support is not as helpful as they were in the past."
"The solution needs to offer better local technical support."
"Support-wise they need to be better."
"It can be quite complicated to learn McAfee Endpoint Security and to feel comfortable with the environment."
"The initial setup is complex. It is a very complex product. You must have experience with it."
"We know that McAfee isn't the best antivirus and it can't protect us 100%, although we are okay with the level of protection that it gives us."
 

Pricing and Cost Advice

"LogRhythm UEBA's pricing is affordable for small and medium businesses."
"I rate the product's pricing a three out of ten. However, the cloud version is expensive. You need to hire professional services for deployment and migrations, which can be expensive."
"The pricing is nice when compared to other products in the industry."
"As LogRhythm UEBA is pretty expensive, I'd give its pricing a seven out of ten."
"Licensing is on a yearly basis. It's not expensive compared to its competitors."
"It is quite a budget-friendly product."
"For each computer that is connected to the server McAfee charges us for each computer based on our license agreement."
"The pricing is more or less the same as the other tools in the market."
"The initial price is very good as they give good initial discounts, but it seems a little expensive once you renew the license."
"I do licensing on an annual basis and this is what I always recommend to my clients over the monthly option."
"There is a one-year and a three-year license available for this solution, we are currently on a three-year license."
"The price of this product is good."
"Pricing is fair."
"It provides good value by striking a balance between cost-effectiveness and feature richness."
report
Use our free recommendation engine to learn which Extended Detection and Response (XDR) solutions are best for your needs.
849,210 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
19%
Financial Services Firm
11%
Manufacturing Company
9%
Real Estate/Law Firm
7%
Educational Organization
43%
Government
9%
Manufacturing Company
7%
Computer Software Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about LogRhythm UserXDR?
The solution is useful for privilege accounts and super admin accounts. It is beneficial from a security perspective. The tool uses machine learning rather than threshold-based alerts. For instance...
What is your experience regarding pricing and costs for LogRhythm UserXDR?
I rate the product's pricing a three out of ten. However, the cloud version is expensive. You need to hire professional services for deployment and migrations, which can be expensive.
What needs improvement with LogRhythm UserXDR?
In general, if something needs to be improved in the algorithm, it would be the dashboards. The dashboards with solutions such as Splunk are very neat and clean. I would also like to improve the us...
How does McAfee Endpoint Security compare with MVISION?
The flexible manageability of McAfee Endpoint Security is one of our favorite aspects of this solution. You can deploy various components as desired with McAfee Endpoint Security, whereas many othe...
What do you like most about McAfee Endpoint Security?
It provides a robust defense against cybersecurity threats while offering user-friendly features like notifications and approval prompts.
What is your experience regarding pricing and costs for McAfee Endpoint Security?
Trellix Endpoint Security is cost-effective and provides excellent value for money, with no need for extra expenses for premium support.
 

Also Known As

LogRhythm UserXDR, LogRhythm Enterprise UEBA
McAfee Endpoint Security, McAfee Endpoint Protection, Intel Security Total Protection for Endpoint, McAfee Complete Endpoint Protection
 

Overview

 

Sample Customers

Information Not Available
inHouseIT, Seagate Technology
Find out what your peers are saying about LogRhythm UEBA vs. Trellix Endpoint Security and other solutions. Updated: April 2025.
849,210 professionals have used our research since 2012.