No more typing reviews! Try our Samantha, our new voice AI agent.

Microsoft Defender for Office 365 vs Trellix Collaboration Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cloudflare One
Sponsored
Ranking in Email Security
20th
Average Rating
8.6
Reviews Sentiment
6.5
Number of Reviews
23
Ranking in other categories
Secure Web Gateways (SWG) (13th), Data Loss Prevention (DLP) (20th), Cloud Access Security Brokers (CASB) (12th), Distributed Denial-of-Service (DDoS) Protection (7th), Software Defined WAN (SD-WAN) Solutions (12th), Access Management (11th), Bot Management (3rd), ZTNA as a Service (9th), ZTNA (4th), Secure Access Service Edge (SASE) (10th), Remote Browser Isolation (RBI) (3rd)
Microsoft Defender for Offi...
Ranking in Email Security
2nd
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
61
Ranking in other categories
Email Archiving (1st), Advanced Threat Protection (ATP) (2nd), Microsoft Security Suite (8th), Secure Email Gateway (SEG) (1st)
Trellix Collaboration Security
Ranking in Email Security
11th
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
20
Ranking in other categories
Instant Communications Security and Compliance (2nd), Secure Email Gateway (SEG) (6th), AI Security (11th)
 

Mindshare comparison

As of May 2026, in the Email Security category, the mindshare of Cloudflare One is 1.7%, up from 1.6% compared to the previous year. The mindshare of Microsoft Defender for Office 365 is 6.9%, down from 12.9% compared to the previous year. The mindshare of Trellix Collaboration Security is 2.2%, up from 2.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security Mindshare Distribution
ProductMindshare (%)
Microsoft Defender for Office 3656.9%
Trellix Collaboration Security2.2%
Cloudflare One1.7%
Other89.2%
Email Security
 

Featured Reviews

CV
Network Architect at IP Dimension
Cloud security has improved remote access and has reduced costs for smaller client sites
I have used Cloudflare One's Identity-Aware Proxy, and it is quite straightforward from what I have seen so far. The app registration on the Azure side integrates fully into Cloudflare, and I am very satisfied with that part because it is easy to set up. The integration of Cloudflare One's Secure Web Gateway and Zero Trust Network Access works without any issues. That part is pretty automatic, and if you complete the rest of the setup, it comes together by itself with no issues from my side. What makes it nice is that we can actually start replacing on-site firewalls at this stage for the smaller clients because it does not matter if they go to a coffee shop or work from home; they are still secured by the same connection. The hops get shorter and you get better latency. We have done testing to see if it is better. One thing that we did notice with our proof of concept with our current client is that they have people connecting from the UK. When they used their previous VPN solution, uploading CAD drawings and other files to the server took a long time. They mentioned that it is much quicker on Cloudflare One's solution. I definitely believe that is part of the improved performance, and I am satisfied with that as well. What is nice about Cloudflare One is that it makes the setup easier and also easier to train technicians to maintain it. Compared to legacy systems, we do not need to get fancy firewalls in place that are costly. That is definitely also a cost-saver with Cloudflare One.
Emeka Ndulu - PeerSpot reviewer
Cloud Solutions Architect at a tech services company with 201-500 employees
Improves threat visibility and response while reducing manual tasks and training users against phishing
I appreciate the attack simulation feature whereby I get to train users and educate them on how to identify phishing emails and spam emails, as well as the anti-spam protection. It gives me visibility into my threat environment and threat landscape to ensure that I am one step ahead of any likelihood of threats within my environment. I get to detect it and respond, so the threat intelligence is very effective. Microsoft security solutions save my time. It saves money because once I protect my environment, I don't lose money. It has decreased my detection time and my time to respond.
Felipe Antoniazzi - PeerSpot reviewer
Cyber Security Lead at Johnson and Johnson
Real-time threat response has boosted detection accuracy and reduces manual investigation work
I have had challenges in the past with Trellix Collaboration Security for implementation because of issues related to compatibility. Since we worked in a global company with different operating systems, it was necessary to create different plans and different actions to implement the product.One thing I really do not prefer in Trellix Collaboration Security is not related to the console. I am a McAfee fan since the McAfee tool, and I find the console of Trellix Collaboration Security to be very user-friendly and easy to use. However, I do not know if it is related to the architecture of the product. Of course, we have modern threats based on behaviors and zero days. We have today CrowdStrike and SentinelOne, where we have better results based on threats and behavior, where it is possible to create a simulation environment based on the file detected and based on it, confirm if it really is malicious or not. In general, I believe Trellix Collaboration Security improved the console based on the last console of McAfee, but I think it is possible to improve more. It really is a good product, but in my view, it needs to improve detection based on behaviors. Regarding automations, I have implemented Trellix Collaboration Security here at Johnson & Johnson, and I implemented it in the same situation at Santander Bank and BNP Paribas Bank, where I created automations to export data for different metrics, including malicious detections, compliance, baselines, scans, last scans based on the seven days, and checking of patterns. I export everything to CSV files. Based on that, I create Power BI dashboards, and in these Power BI dashboards, I have a more executive view for different metrics to provide to myself, my manager, or director to create an executive view based on it. Another important point we use here at Johnson & Johnson and other companies is a data hub or a SIEM solution, such as Elastic or ArcSight, where we select some logs to be sent and use it to build reports and metrics.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Cloudflare is simple to use."
"I'm very satisfied with the environment and the dashboard."
"The blocking feature is very good."
"Cloudflare Access is part of the Zero Trust philosophy."
"It's a perfect solution from my perspective; it's easy to understand and easy to configure."
"Clover is the best product globally."
"It's the endpoint exposition. We don't need to expose our VPN server to the internet and need a zero-test solution. I can apply some conditional access to the endpoint that's connecting to our network to check their security policies or the security condition of their workstation. Once the workstation is trying to connect to my internal network, then I would like to check the discrete condition of these endpoints that are trying to access my internal network. We created some conditional access. We have CrowdStrike, to check if the CrowdStrike is installed, to check if it's updated, and to check for Windows updates. We created some conditional policies to check it."
"We mostly use Cloudflare WAF, and gets basic Cloudflaire DDoS, caching as extra bonus . We like the factor these features are all integrated into 1 console, simple to manage."
"I like its investigation capabilities, as that is what is most important to me. It is fairly simple with a user-friendly interface."
"At the moment we are satisfied with this product. It's a stable, scalable, and resilient solution for us."
"Technical support is very good. They are knowledgeable and respond quickly."
"The risk level notifications are most valuable. We get to know what kind of intrusion or attack is there, and we can fix a problem on time."
"I would say that 90% of the spam and phishing attack emails get blocked right off the bat."
"One of our clients didn't have the budget to invest in a SOC team, but we deployed the solution for them, and they now run a SOC with only one analyst."
"We use Microsoft Defender for its ability to integrate with existing business technologies, which is beneficial for protecting business areas."
"The feature of Microsoft Defender for Office 365 that I like the most is probably the email features specifically, because those are the ones that a typical end user will accidentally click on a link not knowing what it is, and it'll catch it, and then it'll feed it over to Defender and stop the attack from happening before it actually can."
"A specific example of how I have used Trellix Collaboration Security in my consulting work is in my current work environment, where I manage over 130,000 endpoints, allowing me to protect each endpoint with a firewall, which makes a significant difference because the entire network is not protected by a network firewall alone."
"In my experience, the best features related to Trellix Collaboration Security concern the protection against threats."
"What I find most valuable with the solution is that it can integrate with cloud solutions, such as Google and Microsoft. Additionally, the solution is easy to use."
"I like FireEye's filtering, spam digests, and its advanced threat review of email flow."
"The auto-remediation feature is valuable."
"After implementing Trellix Collaboration Security, we have not encountered any incidents related to ransomware."
"What I find most valuable with the solution is that it can integrate with cloud solutions, such as Google and Microsoft, and the solution is easy to use."
"FireEye is good for malware depicting and security."
 

Cons

"For the topic of improvement, providing some training material is one of my suggestions."
"Lacks a VPN feature to provide a secure connection to the data center."
"There are premium tier live service and lower tier live service, so we opted for the lower tier. But there is no medium tier where we pay a little extra and get a bit more service. So if that can be improved."
"Cloudflare DDoS has poor technical support."
"The free plan has limitations. For example, I can only set up three rules, and the application firewall is unavailable."
"Cloudflare One is not very powerful, but for what we require, it is basic and sufficient."
"The response time for support must be reduced."
"The tool should provide on-premise versions. Currently, all versions are cloud-based."
"I was looking for some advanced features, like if I would receive an email that contains a legitimate file type, but the content is malicious, how I can protect against that?"
"The changes to customer service, specifically the new model for support agreements, are not favorable."
"This product's effectiveness could be improved, in terms of detecting unwanted spam or even malware between the emails, compared to other products."
"Microsoft Defender for Office 365 is not up to the mark in comparison with Wiz or Palo Alto."
"The GUI is sometimes slow to fetch the device report and could be improved."
"I'd like some additional features any product can give me to protect our environment in a better way."
"They have moved features from one console to another. Things have been moved around in the interface and it takes me time to find where certain features are."
"In some situations, it has not been able to pick impersonated emails having no attachments. Technical support definitely has a scope for improvement."
"There is a need for improved integration with totally different products, such as a rapid server."
"I would like the solution to be able to automatically quarantine the malicious emails before getting to the user's mailbox and continue with regular email operations. This could result in the user clicking the email before the purge operation is completed."
"We're not really that satisfied with technical support. They are too slow to respond."
"FireEye needs single sign-on. They say it's on their roadmap. They should also implement support for Microsoft Authenticator app for 2FA."
"It really is a good product, but in my view, it needs to improve detection based on behaviors."
"I chose a nine out of ten because some improvements are required, especially concerning East-West traffic or zero-day vulnerabilities."
"The reporting aspect of the solution needs improvement."
"If they want to be the primary or best solution, they need to have better email management features."
 

Pricing and Cost Advice

"My company has to make yearly payments towards the licensing costs attached to the solution. There are no hidden charges apart from the licensing costs of the solution."
"The pricing of the solution is cheap. The licensing cost is also very low. I rate the cost and pricing a three out of ten."
"The prices are slightly expensive."
"Cloudflare Zero Trust Platform's pricing is good."
"The solution is not that expensive."
"The pricing is somewhere in the middle. I would rate the pricing a seven out of ten."
"The solution's pricing lacks transparency."
"The price tag is no longer $200,000, but rather $300,000 to $400,000. It's twice."
"The pricing has become expensive."
"Microsoft Defender for Office 365 is an add-on to the Office license. Many customers are purchasing this solution."
"For large enterprise organizations, they can definitely afford it, but for small and medium organizations, they might struggle to cover the expenses."
"Defender for 365 comes in various plans and licenses, along with other Microsoft security solutions. Purchasing this kind of package or security bundle gives good value for money, and that's what I recommend."
"Compared to other brands, Microsoft Defender for Office 365's pricing is competitive."
"The license is expensive because the cost is based on the number of users."
"It's a user-base subscription."
"The solution could be better by simplifying the business model of their licensing. It was hard to figure out how to get the licensing done for the environment, initially."
"The solution requires a license to be purchased for every user."
"I rate the product price as nine out of ten, where ten is the most expensive, and one is the cheapest. There is no need to pay any extra charges apart from the licensing costs."
"The licensing is on a yearly basis."
"The cost is very high."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
895,990 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Construction Company
20%
Comms Service Provider
11%
Financial Services Firm
9%
Manufacturing Company
6%
Computer Software Company
12%
Financial Services Firm
9%
Manufacturing Company
8%
Comms Service Provider
7%
Healthcare Company
14%
Manufacturing Company
13%
Construction Company
12%
Comms Service Provider
11%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business10
Midsize Enterprise1
Large Enterprise12
By reviewers
Company SizeCount
Small Business24
Midsize Enterprise12
Large Enterprise32
By reviewers
Company SizeCount
Small Business10
Midsize Enterprise4
Large Enterprise13
 

Questions from the Community

What needs improvement with Cloudflare Access?
Cloudflare Access has strong integration with Microsoft, among other platforms. However, when it comes to Kaspersky, ...
What is your primary use case for Cloudflare Access?
Cloudflare Access provides secure access to internal applications for employees, external members of the organization...
What advice do you have for others considering Cloudflare Access?
Cloudflare Access is one of the best integrations available. While about two hundred vendors offer similar services, ...
What is your experience regarding pricing and costs for Microsoft Defender for Office 365?
My experience with pricing, setup, and licensing is that it's actually quite reasonable even on the licensing side as...
What needs improvement with Microsoft Defender for Office 365?
I think Microsoft Defender for Office 365 can be improved by creating more educational pieces about not just looking ...
What is your primary use case for Microsoft Defender for Office 365?
My main use cases for Microsoft Defender for Office 365 include email hygiene.
What do you like most about FireEye Email Security?
One of the valuable features of the product stems from the fact that it is easy to implement the tool in our environm...
What needs improvement with FireEye Email Security?
I have had challenges in the past with Trellix Collaboration Security for implementation because of issues related to...
What is your primary use case for FireEye Email Security?
In my field, I have been in the information security area for 17 years, and I am currently working in my position for...
 

Also Known As

Cloudflare Area 1 Email Security, Cloudflare Bot Management, Cloudflare Gateway, Cloudflare Zero Trust Platform, Cloudflare DDoS, Cloudflare SASE & SSE Platform
MS Defender for Office 365
FireEye Email Security
 

Overview

 

Sample Customers

23andMe
Microsoft Defender for Office 365 is trusted by companies such as Ithaca College.
Northshore Utility District, Luz Technologies, Air Academy Federal Credit Union, Bank Gutmann, Bank of Thailand, Penn State Health Milton S. Hershey Medical Center, State of Missouri, City and County of San Francisco, Denver Public Schools, Vodafone, Go Auto, Stater Bros. Market
Find out what your peers are saying about Microsoft Defender for Office 365 vs. Trellix Collaboration Security and other solutions. Updated: May 2026.
895,990 professionals have used our research since 2012.