Trellix Endpoint Detection and Response (EDR) and Microsoft Defender XDR offer distinct approaches to advanced threat detection and response. Microsoft Defender XDR is often preferred due to its comprehensive features and value, while Trellix EDR is recognized for its affordability and customer support.
Features: Trellix EDR users highlight its effective threat detection, real-time monitoring, and customizable alerts. Microsoft Defender XDR is noted for its integration capabilities, incident response automation, and extensive threat intelligence.
Room for Improvement: Trellix EDR users suggest improvements in scalability and integration with third-party tools. Microsoft Defender XDR users point out the need for improvements in its configuration complexity and occasional false positives.
Ease of Deployment and Customer Service: Trellix EDR is noted for its straightforward deployment and responsive customer support. Microsoft Defender XDR, while slightly more complex to deploy, is known for its comprehensive support resources and thorough documentation.
Pricing and ROI: Trellix EDR is recognized for its cost-effectiveness, offering a strong ROI given its lower setup costs. Microsoft Defender XDR has higher initial setup costs but is seen as providing substantial ROI through advanced feature sets and integration capabilities.
Ever since we turned on the M5 feature set back in June, we have seen a reduced number of potentially malicious clicks and faster alerting when incidents occur.
It's critical to escalate SEV B issues immediately to a domestic engineer.
You get stuck in low-level support for way longer than you should, instead of them escalating the issue up the chain.
The customer service is good, and they supported us well.
I have contracted support and also have an operating control so I can get various types of support.
Microsoft Defender XDR shows tremendous scalability, much more so than on-premises solutions.
It is suitable for enterprise-level deployment but has room for improvement.
The services within our ecosystem have been reliable, meeting their SLAs.
The service has remained consistently online, with any issues isolated to specific components, suggesting a well-designed and modular architecture.
Improvements are needed in automated response capabilities.
The licensing process needs improvement and clarification.
Some inconsistencies exist between blades, which could be improved for a more seamless user and UI experience.
I am seeing, for workflows, some sort of ethical hacking to test our environment.
I would rate the pricing as eight out of ten, indicating it is a reasonable cost for the product.
Microsoft purposefully obfuscates this through marketing ploys to hide costs.
The pricing is a little high, however, it is on par with other competitive tools in the market.
With Microsoft threat intelligence information, it detects various types of threats, including insider attacks, malicious content, and data exfiltration.
This allows us to secure our systems in advance and proactively improve security, rather than waiting for incidents to occur.
It's because endpoint management is my primary focus, and this feature integrates well with my other skills.
I have spent efforts on training our managers and others - what can software do if the knowledge base is low?
Microsoft Defender XDR is a comprehensive security solution designed to protect against threats in the Microsoft 365 environment.
It offers robust security measures, comprehensive threat detection capabilities, and an efficient incident response system. With seamless integration with other Microsoft products and a user-friendly interface, it simplifies security management tasks.
Users have found it effective in detecting and preventing various types of attacks, such as phishing attempts, malware infections, and data breaches.
Watch the Microsoft demo video here: Microsoft Defender XDR demo video.
Reduce the time to detect and respond to threats. Trellix EDR helps security analysts quickly prioritize threats and minimize potential disruption.
Guided investigation automatically asks and answers questions while gathering, summarizing, and visualizing evidence from multiple sources—reducing the need for more SOC resources.
Cloud-based deployment and analytics enables your skilled security analysts to focus on strategic defense, instead of tool maintenance. Benefit from implementing the right solution for you.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.