Try our new research platform with insights from 80,000+ expert users

Panda Adaptive Defense 360 vs Trellix Endpoint Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Panda Adaptive Defense 360
Ranking in Endpoint Protection Platform (EPP)
29th
Average Rating
8.2
Reviews Sentiment
7.4
Number of Reviews
28
Ranking in other categories
Endpoint Detection and Response (EDR) (23rd)
Trellix Endpoint Security
Ranking in Endpoint Protection Platform (EPP)
10th
Average Rating
8.0
Reviews Sentiment
7.4
Number of Reviews
99
Ranking in other categories
Extended Detection and Response (XDR) (13th)
 

Mindshare comparison

As of April 2025, in the Endpoint Protection Platform (EPP) category, the mindshare of Panda Adaptive Defense 360 is 1.6%, up from 1.2% compared to the previous year. The mindshare of Trellix Endpoint Security is 3.0%, down from 3.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP)
 

Featured Reviews

PaolaLamura - PeerSpot reviewer
While being easy to manage and create reports, the tool also offers a good UI
I rate the ease of use and management of Panda Adaptive Defense 360 an eight on a scale of one to ten. The tool's ability to provide information about the vulnerability is the most impactful feature of the product that has an impact on our company's security posture. Speaking about scenarios where the solution effectively prevented the security breach, I would say that our company sees how the tool blocks when our customers accidentally click on some malware, after which it quarantines that file. My company makes a playbook with the SOAR tool that Panda Adaptive Defense 360 uses to block and isolate attacks. In our company's system, if there is a big event that occurs, then to block the endpoint, we use SOAR with Panda Adaptive Defense 360 to block and isolate attacks or threats. The solution's real-time monitoring has improved our company's ability to detect threats if we use it in our company with Panda SIEMFeeder. Only if in my company there is a need to do some research, prepare a report, or if we want to change the policy, so it is not very often that we use the visualization part of the tool in our company. The reporting and analytics part of the tool has helped with the decision-making in our company since we combine different kinds of logs and situations from different ingestion logs, and we can configure a specific alert. In my company, we use the tool's data search functionality if required to check the information we need. Presently, our company uses the configuration alert and SIEMFeeder in our system. I rate the tool a nine out of ten.
AhmedEl-Tayeb - PeerSpot reviewer
Good user behavioral analysis and helpful patching but needs better support services
Some of our products have a first and second line owned by us. We are giving support services to the customers instead of the vendor. Some other products are supported directly by the technology vendor, however. Technical support from the vendor is very bad. Usually, when the customer submits a ticket, they put a severity level on the case. Whenever the case is very important, and there is a real malfunction in the product on the customer side, and there is something down that needs someone to have a look immediately, it takes more time than it should to even engage with the customer. When someone has to contact the customer and have a remote session within the customer environment, they sometimes lack in terms of communication with the customer. The support centers are located in the East and not all have an acceptable level of English in order to communicate directly with the customer.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The detection capabilities for malicious activities are effective."
"It's very easy to deploy, we don't have any problem or issues. It's most full automatic. It basically takes the assumption that everything is supposed to be a suspect; files, processes, URL accesses, and so on."
"The feature I find most valuable is the advance search engine."
"It allows us to stop activation windows."
"The most valuable features of Panda Security Adaptive Defense are the useful hardware information it provides, light on resources, controllable from the console, remote scan functionality, and the blocking of a lot of URL malware."
"The dashboard management feature is valuable."
"I like the Panda Security Adaptive Defense cloud usages. Everything is on a single plane of glass like the dashboards. I also like the information I can get about the computers itself."
"The most valuable features of the solution stem from the fact that I like the tool's UI, ease of management, ease of making reports, and the ability to export information easily."
"The primary reason the solution is good is because of its ease-of-use."
"The most valuable feature of Trellix Endpoint Security is containment, which takes less than a minute."
"One valuable feature is Threat Prevention with the on-demand scan."
"The initial setup is straightforward, not complex."
"The product’s stability and security features enhance user protection and organizational security."
"The most valuable features are reporting from the ePO console and the advanced threat protection (ATP)."
"The reporting capabilities are a valuable feature. In enables more visibility on our network."
"Trellix Security Endpoint can promptly isolate any host machines directly from the console. If alerts are received and isolation is necessary, it can be accomplished through the console. The console itself holds significant value, accessible through a browser and allowing remote actions via cloud login."
 

Cons

"The Linux installation is performed on the command line and they need a package installer for that operating system."
"It would be nice if Panda Security Adaptive Defense could come out with remote desktop usage."
"It needs improvements in its EDR and its ability to manage all the nodes. I'd like better communication between the console and the nodes, so I don't have to remote into each individual machine that's having an issue with the protection."
"Panda Adaptive Defense 360 is not compatible with certain network devices like access points, switches, or routers, which would be an area for improvement."
"The only part I really don't use as much is their firewall. It's a bit superfluous. Most people have their own firewall in place, so they don't really need that part portion of the solution."
"They need to expand their offering of add-ons to enhance capabilities further."
"The software has performance issues due to its requirements on the processor, however, these issues are common with other vendors, not just WatchGuard."
"Panda Security Adaptive Defense’s stability could be improved."
"It would be helpful if the controlling of connections coming to the PC could be done from McAfee's side so that we can block those connections."
"Trellix Endpoint Security needs some improvement in the dashboards. Artificial intelligence also requires improvement to further enhance the product."
"On the next release, they should build an easier way to see a repair option within the McAfee icon on your system tray. If there was an issue, you should be able to contact the user or just right-click on "repair". That would be a very good feature to add. That could be a place of improvement, just adding that button, or customizing it."
"The solution could provide open XDR in addition to EDR."
"They can make it free, but that's not going to happen."
"I've encountered minor challenges related to encryption."
"Technical support is an area that can be improved because sometimes, the response time is a bit slow and the explanation is short."
"We experienced some bad behavior when we first installed the product. The system also starts slowly in some instances. If for some reason this solution crashes, we could lose all our data."
 

Pricing and Cost Advice

"The price of this solution depends on the number of licenses that you are purchasing."
"The solution is priced well for what features it provides."
"The licensing is subscription-based and priced well compared to other endpoint security solutions."
"There is a license needed to use this solution and it is approximately $30 annually."
"Our licensing fee is 1M Euro per month, so it is about 80 Euro's per user."
"The licensing costs are not too high. We pay about 20 Euros a year. It's a reasonable amount to pay."
"Customers need to pay monthly licensing costs for Panda Security Adaptive Defense, which is not expensive."
"I don't think Panda's license is too expensive, but they're charging more than it's worth. It's a yearly license. For 1,000 endpoints, it's around $18,000."
"Trellix may cost around $46 to $47 for a single license without an EDR."
"It's fairly priced compared to other products on the market."
"I rate Trellix Endpoint Security a nine out of ten for pricing."
"Trellix Endpoint Security is neither a cheap nor an expensive solution."
"We pay 650 Rand for a license. It is a perpetual license which we normally run for two years."
"The price of the solution is fair, we have a complete security package."
"Its price is reasonable, but it could be made free."
"Trellix Endpoint Security is an inexpensive platform."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
844,944 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Comms Service Provider
13%
Hospitality Company
8%
Financial Services Firm
6%
Educational Organization
44%
Government
9%
Computer Software Company
7%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Panda Security Adaptive Defense?
The most valuable features of the solution stem from the fact that I like the tool's UI, ease of management, ease of making reports, and the ability to export information easily.
What is your experience regarding pricing and costs for Panda Security Adaptive Defense?
Although it is not a cheap solution, it is satisfying and functional. It is worth the money and provides good return on investment.
What needs improvement with Panda Security Adaptive Defense?
The software has performance issues due to its requirements on the processor, however, these issues are common with other vendors, not just WatchGuard.
How does McAfee Endpoint Security compare with MVISION?
The flexible manageability of McAfee Endpoint Security is one of our favorite aspects of this solution. You can deploy various components as desired with McAfee Endpoint Security, whereas many othe...
What do you like most about McAfee Endpoint Security?
It provides a robust defense against cybersecurity threats while offering user-friendly features like notifications and approval prompts.
What is your experience regarding pricing and costs for McAfee Endpoint Security?
Trellix Endpoint Security is cost-effective and provides excellent value for money, with no need for extra expenses for premium support.
 

Also Known As

Panda Security Endpoint Protection, Panda Security for Desktops
McAfee Endpoint Security, McAfee Endpoint Protection, Intel Security Total Protection for Endpoint, McAfee Complete Endpoint Protection
 

Overview

 

Sample Customers

Indra, Valea AB, Fineit, Aemcom, Data Solutions INC., Gloucestershire NHS, Golden Star Resources Ltd, Hispania Racing Team, Instituto Dos Museus e da ConserÊo, Escuelas Pias Provincia Emaus, Axiom Housing Association, Municipality of Bjuv, Lesedi Nuclear, Mullsj_ municipality, Eng. skolan Norr AB, Dalakraft AB, Peter Green Haulage Ltd
inHouseIT, Seagate Technology
Find out what your peers are saying about Panda Adaptive Defense 360 vs. Trellix Endpoint Security and other solutions. Updated: March 2025.
844,944 professionals have used our research since 2012.