Try our new research platform with insights from 80,000+ expert users

Microsoft Defender for Endpoint vs Trellix Network Detection and Response comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 1, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.2
Microsoft Defender for Endpoint offers cost savings, enhanced protection, and efficient threat management, with anticipated future benefits.
Sentiment score
8.5
Trellix Network Detection and Response exceeded expectations by improving threat prevention and detection, boosting productivity and reducing response times.
The return on investment is primarily in time savings and better observability of what's happening.
 

Customer Service

Sentiment score
6.5
Support for Microsoft Defender for Endpoint varies, with premium tiers offering quicker responses, while basic support can be slow.
Sentiment score
6.8
Trellix's support is praised for responsiveness, but improvements in expertise and incident response promptness are suggested by some.
Due to our size, we don't have access to direct technical support, but the knowledge base, Microsoft Learn, and the articles available are really good.
I rate Microsoft support 10 out of 10.
The level-one support seems disconnected from subject matter experts.
Technical support needs improvement as sometimes engineers are not available promptly, especially during high-severity incidents.
 

Scalability Issues

Sentiment score
7.7
Microsoft Defender for Endpoint is a scalable solution integrating smoothly with Microsoft, ideal for diverse organizational needs and configurations.
Sentiment score
7.8
Trellix Network Detection and Response scales effectively in various industries, performing well in large enterprises without latency issues.
Microsoft Defender for Endpoint is scalable enough to handle various devices across environments, whether they are laptops, Android devices, or operating in hybrid environments.
We managed to scale it out in a short amount of time, with two months of planning and three months of implementation on 10,000 computers.
Defender's scalability is phenomenal, and it's going to be one of the keys to resolving issues for the SOC.
 

Stability Issues

Sentiment score
7.9
Microsoft Defender for Endpoint is stable and reliable, with integration ease, despite occasional lags and minor update bugs.
Sentiment score
7.7
Trellix Network Detection and Response is stable and reliable, with consistent performance and high user satisfaction despite occasional minor issues.
Defender for Endpoint is extremely stable.
I haven't seen any outages with Microsoft.
I rate Defender 10 out of 10 for stability.
 

Room For Improvement

Microsoft Defender for Endpoint needs frequent updates, improved integration, user-friendly interface, enhanced analytics, and better support documentation.
Trellix Network Detection needs improved customization, integration, AI capabilities, support services, and a more user-friendly interface at reduced pricing.
Repeated interactions are necessary due to Level One's lack of tools and knowledge, hindering efficient problem-solving and negatively impacting our experience with Microsoft support.
We have multiple endpoints, and we want to look for signals across tenants.
Providing more detailed information on how Microsoft Defender for Endpoint detects vulnerabilities.
There should be improvements in AI intelligence, faster decision-making, and a more responsive technical support team.
 

Setup Cost

Microsoft Defender for Endpoint is cost-effective with bundled licenses, but advanced features may incur additional fees.
Trellix Network Detection is costly but effective, with yearly licensing, discounts, and competitive pricing against some competitors like Palo Alto.
It costs $15 per VM for the P2 plan, which is seen as affordable for customers.
Given our extensive Microsoft licensing, transitioning to Defender for Endpoint did not affect licensing costs.
The pricing, setup, and licensing were very easy and simple.
 

Valuable Features

Microsoft Defender for Endpoint offers seamless integration, real-time threat detection, and efficient management, enhancing security with minimal system impact.
Trellix excels in threat protection with AI-driven analysis, automation, and enhanced visibility, benefiting security operations and incident management.
Microsoft Defender for Endpoint provides a unified management interface allowing customers to manage their on-premises and hybrid infrastructures from a single pane.
Defender for Endpoint's coverage across different platforms in our environment is pretty good. We have devices running Linux, Mac OS, Windows, iOS, and Android. It covers all of them.
Attack surface reduction and limiting attack surface vectors are valuable features.
Trellix NDR provides an essential defense by automatically responding to network incidents that firewalls may not catch.
 

Categories and Ranking

Microsoft Defender for Endp...
Ranking in Advanced Threat Protection (ATP)
2nd
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
192
Ranking in other categories
Endpoint Protection Platform (EPP) (1st), Anti-Malware Tools (1st), Endpoint Detection and Response (EDR) (3rd), Microsoft Security Suite (5th)
Trellix Network Detection a...
Ranking in Advanced Threat Protection (ATP)
14th
Average Rating
8.4
Reviews Sentiment
7.3
Number of Reviews
39
Ranking in other categories
Network Detection and Response (NDR) (12th)
 

Mindshare comparison

As of April 2025, in the Advanced Threat Protection (ATP) category, the mindshare of Microsoft Defender for Endpoint is 9.1%, down from 11.4% compared to the previous year. The mindshare of Trellix Network Detection and Response is 4.8%, down from 4.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Advanced Threat Protection (ATP)
 

Featured Reviews

AnuragSrivastava - PeerSpot reviewer
Provides detailed visibility into threats but the ability to add exceptions needs improvement
One major item for improvement is the ability to add exceptions. We can add some exceptions, but not at the level we need to. The second major area for improvement involves enhanced capabilities for different operating systems or platforms. That is, even though we have coverage for different operating systems or platforms such as Linux, we don't get all of the controls and enhanced capabilities that are available with Windows devices. Reporting could also be improved because, at present, we get limited results at times. For example, in an environment with more than 100,000 devices, you may just get 10,000 results when you run a report.
BiswabhanuPanda - PeerSpot reviewer
Offers in-depth investigation capabilities, integrates well and smoothly transitioned from a lower-capacity appliance to a higher one
The in-depth investigation capabilities are a major advantage. When the system flags something as malicious, it provides a packet capture of that activity within the environment. That helps my team quickly identify additional context that most other tools wouldn't offer – like source IP or base64 encoded data. We can also see DNS requests and other details that aren't readily available in solutions like Check Point or others that we've tried. The detection itself is solid, and their sandboxing is powerful. There's a learning curve – you need a strong grasp of OS-level changes, process forking, registry changes, and the potential impact of those. But with that knowledge, the level of information Trellix provides is far greater than what we've seen elsewhere. The real-time response capability of Trellix has been quite effective, although it's not very fast. The key is this solution's concept of 'preference zero.' They don't immediately act on a zero-day. For example, the solution has seen a piece of malware for the first time. It'll let it in, then do sandboxing. Maybe after four or five minutes, it identifies that specific file's DNX Secure Store as malicious. At that point, they update the static analysis engine, and it gets detected if anything else tries to download the same file. There is that initial 'preference zero' concept, like with Panda. You may not hold traffic in the network. That's standard in the industry; we don't do much about it. To address that, we also have endpoint solutions. We use SentinelOne in our environment, which helps us identify threats like Western Bureaus and others.
report
Use our free recommendation engine to learn which Advanced Threat Protection (ATP) solutions are best for your needs.
847,862 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Educational Organization
26%
Computer Software Company
11%
Government
7%
Financial Services Firm
7%
Financial Services Firm
16%
Comms Service Provider
11%
Computer Software Company
10%
Manufacturing Company
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface, applies behavioral-based endpoint protection and response, and includes risk-ba...
Which offers better endpoint security - Symantec or Microsoft Defender?
We use Symantec because we do not use MS Enterprise products, but in my opinion, Microsoft Defender is a superior solution. Microsoft Defender for Endpoint is a cloud-delivered endpoint security s...
How does Microsoft Defender for Endpoint compare with Crowdstrike Falcon?
The CrowdStrike solution delivers a lot of information about incidents. It has a very light sensor that will never push your machine hardware to "test", you don't have the usual "scan now" feature ...
What do you like most about FireEye Network Security?
We wanted to cross-reference that activity with the network traffic just to be sure there was no lateral movement. With Trellix, we easily confirmed that there was no lateral network involvement an...
What is your experience regarding pricing and costs for FireEye Network Security?
While I do not handle pricing directly, it is known that there is a variety of customers with different licensing needs, which depends on the organization's size and policy.
What needs improvement with FireEye Network Security?
The Trellix solution could be improved by enhancing the Central Management Console for faster visibility, which would help in network detection response. Networking often involves complexity that c...
 

Also Known As

Microsoft Defender ATP, Microsoft Defender Advanced Threat Protection, MS Defender for Endpoint, Microsoft Defender Antivirus
FireEye Network Security, FireEye
 

Interactive Demo

Demo not available
 

Overview

 

Sample Customers

Petrofrac, Metro CSG, Christus Health
FFRDC, Finansbank, Japan Advanced Institute of Science and Technology, Investis, Kelsey-Seybold Clinic, Bank of Thailand, City of Miramar, Citizens National Bank, D-Wave Systems
Find out what your peers are saying about Microsoft Defender for Endpoint vs. Trellix Network Detection and Response and other solutions. Updated: March 2025.
847,862 professionals have used our research since 2012.