Try our new research platform with insights from 80,000+ expert users

Meraki MX vs Trellix Network Detection and Response comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

Meraki MX
Average Rating
8.2
Number of Reviews
62
Ranking in other categories
Unified Threat Management (UTM) (2nd)
Trellix Network Detection a...
Average Rating
8.4
Number of Reviews
38
Ranking in other categories
Advanced Threat Protection (ATP) (15th), Network Detection and Response (NDR) (12th)
 

Mindshare comparison

While both are Network Security Systems solutions, they serve different purposes. Meraki MX is designed for Unified Threat Management (UTM) and holds a mindshare of 19.5%, down 19.7% compared to last year.
Trellix Network Detection and Response, on the other hand, focuses on Advanced Threat Protection (ATP), holds 5.1% mindshare, down 6.1% since last year.
Unified Threat Management (UTM)
Advanced Threat Protection (ATP)
 

Featured Reviews

Spencer Malmad - PeerSpot reviewer
Nov 22, 2022
Very easy to deploy with a simple configuration; stable and scalable with great support
The Cisco supply chain is problematic although that may not be all their fault. What I really want is to be able to sell the solution and deploy it for my clients. They are very cagey about the availability of their product and they definitely take better care of their larger clients, pricing out mid-sized organizations. I'd like their policy rules to be closer to those of some of the other vendors. They're very complacent and I find the rule set to be a little arcane. There's no company ou there that does the combination of hardware quality, reliability of service, and most importantly, the quality of the interface.
BiswabhanuPanda - PeerSpot reviewer
Apr 4, 2024
Offers in-depth investigation capabilities, integrates well and smoothly transitioned from a lower-capacity appliance to a higher one
The in-depth investigation capabilities are a major advantage. When the system flags something as malicious, it provides a packet capture of that activity within the environment. That helps my team quickly identify additional context that most other tools wouldn't offer – like source IP or base64 encoded data. We can also see DNS requests and other details that aren't readily available in solutions like Check Point or others that we've tried. The detection itself is solid, and their sandboxing is powerful. There's a learning curve – you need a strong grasp of OS-level changes, process forking, registry changes, and the potential impact of those. But with that knowledge, the level of information Trellix provides is far greater than what we've seen elsewhere. The real-time response capability of Trellix has been quite effective, although it's not very fast. The key is this solution's concept of 'preference zero.' They don't immediately act on a zero-day. For example, the solution has seen a piece of malware for the first time. It'll let it in, then do sandboxing. Maybe after four or five minutes, it identifies that specific file's DNX Secure Store as malicious. At that point, they update the static analysis engine, and it gets detected if anything else tries to download the same file. There is that initial 'preference zero' concept, like with Panda. You may not hold traffic in the network. That's standard in the industry; we don't do much about it. To address that, we also have endpoint solutions. We use SentinelOne in our environment, which helps us identify threats like Western Bureaus and others.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"When you try to create an IP or when you have an alert about when a website is banned, these features are helpful."
"It's flexible, easy to configure, and easy to manage."
"I am happy with the technical support for the solution. I rate the technical support a ten out of ten."
"It is a robust SD-WAN solution."
"The technical support people from Meraki are brilliant."
"Its ease of configuration and management is very useful for us and for other companies that don't have an onsite IT person. It is easy to configure and easy to manage. It is easy to configure the VPN with the Auto VPN feature."
"The cloud management system is really valuable."
"In a week, we can make new policy and view what all our users did.​"
"If we are receiving spam emails, or other types of malicious email coming from a particular email ID, then we are able to block them using this solution."
"I also like its logging method. Its logging is very powerful and useful for forensic purposes. You can see the traffic or a specific activity or how something entered your network and where it went."
"Very functional and good for detecting malicious traffic."
"Support is very helpful and responsive."
"The most valuable feature is the network security module."
"The most valuable feature is the view into the application."
"Improved our systems and our customers' by providing better malware protection, defense against zero-day threats, and improved network security."
"The most valuable feature of the solution stems from how it allows users to do the investigation part. Another important part of the product that is valuable is associated with how it gives information to users in the form of a storyline."
 

Cons

"MX can only be managed via a web interface, but I'm accustomed to using a CLI or a graphical interface. I would also like to see more reporting features. It doesn't provide enough information for me to know precisely about some clients."
"We have been having a problem with the VPN. When the energy goes down and is back again, the VPN link doesn't get established. We have to manually turn off the modems and other pieces of equipment and manually establish the VPN. It has been around one month since we have been having this problem, and we don't have enough support from Meraki to solve the problem."
"They need to improve the link between Meraki and Active Directory."
"We can’t access GUI management and CLI opening features when the Internet is unavailable."
"The IPS, the Intrusion Prevention System, can be improved."
"You can only have one tunnel in the whole infrastructure — one tunnel with one device."
"It would be nice if the different services, including the SIEM SOC and endpoint detection and response (EDR) were integrated into one, so that I don't have to go to different vendors for different services."
"You cannot use switching behaviors as you see on the Meraki switch."
"As far as future inclusions, it would be useful to display more threat intelligence, such as the actual area of the threat and the origin of the web crawling (Tor and Dark Web)."
"Cybersecurity posture has room for improvement."
"Stability issues manifested in terms of throughput maximization."
"A better depth of view, being able to see deeper into the management process, is what I'd like to see."
"Improvements could be achieved through greater integration capabilities with different firewall solutions. Integrating with the dashboard itself for different firewalls so users can also pull tags into their firewall dashboard."
"Based on what we deployed, they should emphasize the application filtering and the web center. We need to look deeper into the SSM inspection. If we get the full solution with that module, we don't need to get the SSM database from another supplier."
"It doesn't connect with the cloud, advanced machine learning is not there. A known threat can be coming into the network and we would want the cloud to look up the problem. I would also like to see them develop more file replication and machine learning."
"It would be great if we could create granular reports based on the protocols, types of attacks, regions of attack, etc. Also we would like to easily be able to add exceptions to rules in cases of false positives."
 

Pricing and Cost Advice

"Our customers pay for the solution on a monthly basis."
"The solution is expensive compared to other vendors but you can get good discounts if you know the account manager. The product is less expensive than a normal Cisco subscription. The tool's hardware warranty is a lifetime but you need to purchase support which comes in three, five, and seven years subscriptions."
"The pricing could always be improved — especially with the shape the economy is in at the moment."
"Meraki MX's pricing is cheaper as compared to Cisco's standalone products."
"The Meraki UTM is excellent when you buy the Advanced Security license. If you buy a different license you lost all the valuable functions."
"The price varies depending on the hardware platform as well as the type of license and whether you're adding security or not."
"Its licensing cost could be better."
"Meraki is also expensive, but it's a little bit less expensive and it's easier to configure than Cisco ASA."
"When you purchase FireEye Network Security NX, will need to purchase a megabit per second package. You must know your needs from day one."
"When I compare this solution to its competitors in the market, I find that it is a little expensive."
"The pricing is a little high."
"Its price is a bit high. A small customer cannot buy it. Its licensing is on a yearly basis."
"Because of what the FireEye product does, it has significantly decreased our mean time in being able to identify and detect malicious threats. The company that I work with is a very mature organization, and we have seen the meantime to analysis decrease by at least tenfold."
"There are some additional services that I understand the vendor provides, but our approach was to package all of the features that we were looking to use into the product."
"We're partners with Cisco so we get a reasonable price. It's cheaper than Palo Alto in terms of licensing."
"Pricing and licensing are reasonable compared to competitors."
report
Use our free recommendation engine to learn which Unified Threat Management (UTM) solutions are best for your needs.
814,649 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
26%
Computer Software Company
15%
Manufacturing Company
5%
Government
4%
Financial Services Firm
19%
Comms Service Provider
9%
Manufacturing Company
9%
Computer Software Company
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Fortigate 60d vs. Meraki MX67 for a small company without a dedicated IT Department
We have Meraki Mx devices now, we are looking to replace them. But that is because the Meraki MX platform lacks SSL Inspection, Granular Firewall rules (Block only, no allow setting), client vpn re...
Which is better - Meraki MX or Cisco ASA Firewall?
Cisco Adaptive Security Appliance (ASA) software is the operating software for the Cisco ASA suite. It supports network security and firewall options. We researched both Meraki and ASA. We liked t...
What do you like most about Meraki MX?
I am happy with the technical support for the solution. I rate the technical support a ten out of ten.
What do you like most about FireEye Network Security?
We wanted to cross-reference that activity with the network traffic just to be sure there was no lateral movement. With Trellix, we easily confirmed that there was no lateral network involvement an...
What is your experience regarding pricing and costs for FireEye Network Security?
The pricing is fair, a little expensive, but fair. We've evaluated other products, and they're similarly priced. It's a bit on the expensive side, but we don't want to compromise with cheap, less r...
What needs improvement with FireEye Network Security?
The solution's support needs to improve their support.
 

Also Known As

MX64, MX64W, MX84, MX100, MX400, MX600
FireEye Network Security, FireEye
 

Learn More

Video not available
Video not available
 

Overview

 

Sample Customers

Hyatt, ONS
FFRDC, Finansbank, Japan Advanced Institute of Science and Technology, Investis, Kelsey-Seybold Clinic, Bank of Thailand, City of Miramar, Citizens National Bank, D-Wave Systems
Find out what your peers are saying about Check Point Software Technologies, Cisco, Sophos and others in Unified Threat Management (UTM). Updated: October 2024.
814,649 professionals have used our research since 2012.