Panda Adaptive Defense 360 and Trellix Endpoint Security compete in the endpoint security market. Trellix Endpoint Security appears to have the upper hand due to its extensive features despite a higher cost.
Features: Panda Adaptive Defense 360 focuses on proactive defense mechanisms, real-time malware detection, and advanced threat hunting. Trellix Endpoint Security provides superior integration capabilities, comprehensive threat intelligence, and advanced machine learning algorithms.
Room for Improvement: Users of Panda Adaptive Defense 360 often cite the need for a more intuitive dashboard, enhanced threat reporting capabilities, and improved user interface. Trellix Endpoint Security users point to resource consumption optimization, faster response times during high-demand periods, and lower false positives.
Ease of Deployment and Customer Service: Panda Adaptive Defense 360 is praised for its simple deployment process and responsive customer service. Trellix Endpoint Security offers a more complex deployment but has highly supportive and knowledgeable customer service.
Pricing and ROI: Panda Adaptive Defense 360 is noted for competitive setup costs and solid ROI, making it cost-effective. Trellix Endpoint Security, although more expensive in setup, offers higher ROI due to its extensive feature set and integration capabilities.
Panda Adaptive Defense 360 is not compatible with certain network devices like access points, switches, or routers, which would be an area for improvement.
I would rate the pricing as six out of ten, and its costs appear to be moderately priced.
The stability is approximately a seven to eight out of ten.
The detection capabilities for malicious activities are effective.
Advanced Security to Stop Breaches
Unified Endpoint Protection (EPP) and Endpoint Detection and Response (EDR) capabilities, with our unique Zero-Trust Application Service and Threat Hunting Service in one single solution, to effectively detect and classify 100% of processes running on all the endpoints within your organization.
Cloud-delivered endpoint prevention, detection, containment and response technologies against advanced threat, zero-day malware, ransomware, phishing, in-memory exploits and malware-less attacks. It also provides IDS, firewall, device control, email protection, URL & content filtering capabilities.
Trellix Endpoint Security provides aggressive robust protection for every endpoint in an enterprise organization. Trellix uses dynamic threat intelligence and mounts a superb defense across the complete threat lifecycle. This solution will keep your organization more secure and resistant to any possible threat of risks. Trellix offers an amalgamated suite of next-generation endpoint security tools. These tools give users the benefit of machine learning, intuitive intelligence, and greater assistance to ensure their networks are being protected non-stop against threats - potential or realized - and can stop attacks before they happen. Trellix uses MDR (managed detection and response) and XDR (extended detection and response) to give users a comprehensive endpoint security solution.
Trellix Endpoint Security Benefits
Trellix Endpoint Security Top Features
Reviews from Real Users
“It has a great console. We can manage everything from the central console and it is very easy. Every year we are getting the benefits of legacy also. It's easy to set up.” - S Fazlul H., IT Lead Engineer, Information Technology at Banglalink
“There is a new feature where you can set thresholds for all the CPU consumption allowing for no consumption on the servers when the scans happen. It is a separate plugin or addon, and if we have it on all the virtual machines it automatically checks the resources, and based on that, it will schedule the scans. That is something that I have not seen in other antivirus solutions, such as Symantec.” - Sabari K. Senior Engineer at a comms service provider
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.