Trellix Endpoint Security and Microsoft Defender XDR are key players in the endpoint security space, both offering comprehensive protection features tailored to meet modern cybersecurity demands. While Trellix focuses on integration and specialized security capabilities, Microsoft Defender XDR is renowned for its ease of integration within the Microsoft ecosystem, making it an optimal choice for businesses heavily invested in Microsoft infrastructure.
Features: Trellix Endpoint Security is equipped with vital features such as centralized management, Antivirus protection, and Data Loss Prevention (DLP). It also excels in device control, enhancing endpoint security. Microsoft Defender XDR, on the other hand, integrates seamlessly with Microsoft applications, enabling user-specific customization. Its endpoints are secured through advanced threat detection, offering comprehensive protection that benefits from Microsoft’s extensive ecosystem.
Room for Improvement: Trellix Endpoint Security could enhance configuration processes, improve visualization, and speed up technical support response. Greater integration of existing capabilities is also desired. Microsoft Defender XDR would benefit from more intuitive dashboards and improved threat detection capabilities, particularly in non-Microsoft environments. Simpler licensing processes and better integration across various Microsoft and third-party services are also essential improvements users have requested.
Ease of Deployment and Customer Service: Trellix is suited for on-premises and hybrid clouds but experiences mixed reviews about its technical support, which, while knowledgeable, can be slow. Microsoft Defender XDR supports public cloud environments extensively and is praised for its efficient and quick customer service, making it more appealing for companies entrenched in Microsoft systems.
Pricing and ROI: Trellix Endpoint Security is moderately priced, but users note the higher associated maintenance and support costs. Its security features, however, deliver a solid ROI by reducing potential recovery expenses. Microsoft Defender XDR is frequently cited as expensive, especially in licensing, yet its robust integration within the Microsoft suite assures businesses of comprehensive security features, justifying the overall investment.
Ever since we turned on the M5 feature set back in June, we have seen a reduced number of potentially malicious clicks and faster alerting when incidents occur.
Previously, identifying and containing threats took a long time, but now, with Microsoft Defender XDR, it takes just a few minutes.
We have observed tremendous return on investment after implementing Trellix Endpoint Security as it is a more cost-effective solution compared to other products.
Clients appreciate the solution’s customization capabilities and ongoing product improvements.
You get stuck in low-level support for way longer than you should, instead of them escalating the issue up the chain.
It's critical to escalate SEV B issues immediately to a domestic engineer.
Once issues are escalated to the second or third layer, the support is much better.
The response time is a notable issue.
I would rate their customer service nine out of ten.
Some engineers are knowledgeable.
Microsoft Defender XDR shows tremendous scalability, much more so than on-premises solutions.
It is suitable for enterprise-level deployment but has room for improvement.
I would rate the scalability of the solution as a six out of ten, indicating some challenges due to downtime requirements.
Trellix Endpoint Security is scalable.
The service has remained consistently online, with any issues isolated to specific components, suggesting a well-designed and modular architecture.
The services within our ecosystem have been reliable, meeting their SLAs.
I would rate its stability as nine out of ten.
I would rate the stability of Trellix Endpoint Security as near perfect, close to ten out of ten.
The licensing process needs improvement and clarification.
Improvements are needed in automated response capabilities.
Some inconsistencies exist between blades, which could be improved for a more seamless user and UI experience.
What needs improvement in Trellix Endpoint Security is the reduction of resource consumption by the scanning feature.
Improvements are needed in forensic analytics to detect specific vulnerabilities.
The product does not seem to be cloud-native.
I would rate the pricing as eight out of ten, indicating it is a reasonable cost for the product.
Microsoft purposefully obfuscates this through marketing ploys to hide costs.
There are no issues with pricing, but sometimes, the clarity in licensing is a concern.
The license costs are very reasonable, around 1,000 to 1,200 rupees per year.
Trellix Endpoint Security is cost-effective and provides excellent value for money.
With Microsoft threat intelligence information, it detects various types of threats, including insider attacks, malicious content, and data exfiltration.
This allows us to secure our systems in advance and proactively improve security, rather than waiting for incidents to occur.
It's because endpoint management is my primary focus, and this feature integrates well with my other skills.
Trellix Endpoint Security is a proven, robust, and cost-effective solution that protects the organization from different types of ransomware and attacks.
Including options like Application Control (formerly Solidcore), integrated monitoring, change control, DLP, and advanced threat protection, the solution offers comprehensive security.
The most valuable features of Trellix Endpoint Security include its protection capabilities such as DNS and endpoint security, DNS threat prevention, as well as advanced threat prevention.
Microsoft Defender XDR is a comprehensive security solution designed to protect against threats in the Microsoft 365 environment.
It offers robust security measures, comprehensive threat detection capabilities, and an efficient incident response system. With seamless integration with other Microsoft products and a user-friendly interface, it simplifies security management tasks.
Users have found it effective in detecting and preventing various types of attacks, such as phishing attempts, malware infections, and data breaches.
Watch the Microsoft demo video here: Microsoft Defender XDR demo video.
Trellix Endpoint Security provides aggressive robust protection for every endpoint in an enterprise organization. Trellix uses dynamic threat intelligence and mounts a superb defense across the complete threat lifecycle. This solution will keep your organization more secure and resistant to any possible threat of risks. Trellix offers an amalgamated suite of next-generation endpoint security tools. These tools give users the benefit of machine learning, intuitive intelligence, and greater assistance to ensure their networks are being protected non-stop against threats - potential or realized - and can stop attacks before they happen. Trellix uses MDR (managed detection and response) and XDR (extended detection and response) to give users a comprehensive endpoint security solution.
Trellix Endpoint Security Benefits
Trellix Endpoint Security Top Features
Reviews from Real Users
“It has a great console. We can manage everything from the central console and it is very easy. Every year we are getting the benefits of legacy also. It's easy to set up.” - S Fazlul H., IT Lead Engineer, Information Technology at Banglalink
“There is a new feature where you can set thresholds for all the CPU consumption allowing for no consumption on the servers when the scans happen. It is a separate plugin or addon, and if we have it on all the virtual machines it automatically checks the resources, and based on that, it will schedule the scans. That is something that I have not seen in other antivirus solutions, such as Symantec.” - Sabari K. Senior Engineer at a comms service provider
We monitor all Extended Detection and Response (XDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.