We performed a comparison between Trellix Endpoint Security and Trend Micro Apex One based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Trellix Endpoint Security is highly valued for its easy administration options and reliability. Trend Micro Apex One stands out for its centralized reporting, efficient policy implementation, and a diverse array of features including DLP, encryption, and patch management. Reviews suggest that Trellix could reduce resource consumption and improve user-friendliness. Trend Micro Apex One users say the platform should improve its compatibility with different operating systems and address performance issues. Users also say the reporting, forensic analysis, and ransomware features could use some work.
Service and Support: Some users have found the support for Trellix Endpoint Security helpful and reliable, while others have encountered ineffective assistance and communication problems. Trend Micro support generally earned positive reviews, but some said that support could be more proactive and respond faster.
Ease of Deployment: The setup process for Trellix Endpoint Security varies in difficulty, depending on the user's experience with McAfee and general technical expertise. Most users thought Trend Micro Apex One was easy to set up, but a few said that it’s more complex than competing solutions.
Pricing: Some find Trellix’s price reasonable and competitive, while others believe it could be lowered. Some considered the price of Trend Micro Apex One to be fair, while others found it expensive.
ROI: Trellix Endpoint Security provides significant time savings. Trend Micro Apex One provides extra cost-effective advantages and safeguards vital information.
"I like FortiClient EMS. FortiEDR has a lot of great features like lockdown mode, remote wipes, and encryption. I can set malware outbreak policies and controls for detecting abnormalities. You can also simulate phishing attacks."
"This is stable and scalable."
"The setup is pretty simple."
"Exceptions are easy to create and the interface is easy to follow with a nice appearance."
"Fortinet has helped free up around 20 percent of our staff's time to help us out."
"Forensics is a valuable feature of Fortinet FortiEDR."
"he solution is an anti-malware product that integrates well with other vendor products such as firewalls, SIEM, etc. It captures threat intelligence and gives you better visibility. The product also has sandboxing features."
"The solution was relatively easy to deploy."
"It's quite easy to install agents."
"The user behavioral analysis feature is great."
"We can manage everything from the central console and it is very easy."
"The product has a robust reporting feature"
"It provides a robust defense against cybersecurity threats while offering user-friendly features like notifications and approval prompts."
"I think the costing is fine compared to other products. Cost-wise you definitely get value for your money."
"The detection is great and the solution is constantly improving."
"There is a new feature where you can set thresholds for all the CPU consumption allowing for no consumption on the servers when the scans happen. It is a separate plugin or addon, and if we have it on all the virtual machines it automatically checks the resources, and based on that, it will schedule the scans. That is something that I have not seen in other antivirus solutions, such as Symantec."
"The ease of deployment is one of its most valuable features."
"This solution protects us from virus attacks before they affect the organization."
"Apex One includes a built-in fine-grained DLP solution."
"The most valuable feature of Trend Micro Apex One is the response time and detection module."
"Trend Micro Apex One is a seamless solution compared to others."
"Its real-time features are valuable. It is in real-time, and it works fine."
"The nano protection and device control are great."
"The antivirus is the most valuable aspect of Trend Micro Apex One."
"I think cloud security and SASE are areas of concern in the product where improvements are required. The tool's cloud version has to be improved in terms of the security it offers."
"We'd like to see more one-to-one product presentations for the distribution channels."
"The support needs improvement."
"Making the portal mobile friendly would be helpful when I am out of office."
"Detections could be improved."
"We find the solution to be a bit expensive."
"To improve Fortinet, we need to see more features and technology areas at the endpoint level introduced."
"It takes about two business days for initial support, which is too slow in urgent situations."
"We know that McAfee isn't the best antivirus and it can't protect us 100%, although we are okay with the level of protection that it gives us."
"Support-wise they need to be better."
"Although they have increased the complexity, it has affected the scanning speed."
"The local technical support could be better."
"It didn't work well for some of the use cases. We have different use cases for each entity. Their support is also not good and needs improvement."
"The software download features could stand improvement."
"There are times the solution has some additional software added that is not fully integrated properly, such as Exchange Group Sheild. It is quite old and is not fully integrated properly and could be improved."
"Trying to move away from the signature model for antivirus and malware blocking is something that would be nice. Instead of having to update every day, which is signature-based, moving to more of a kernel or architecture-based model would probably be beneficial."
"I would like to see better reporting."
"I would like to see behavior analysis capabilities included."
"I would like to see a sandboxing feature in the next release - which is currently something being supported by a third party - in addition to EDR capability on the cloud applications."
"Trend Micro's encryption is not up to the mark. We tried their encryption product, but we did not like it. Encryption was difficult to manage."
"Apex One uses a lot of RAM and other physical resources, and I also don't like the web interface."
"We had issues with our system integrator who didn't have enough experience with Trend Micro. There aren't many enterprise customers in our country who use Trend Micro on the level that we are using it, so it might be a little too complex for them. Trend Micro is typically used in small companies that do not need all the advanced features that we are looking for. The integrators don't have experience deploying these features. The scope is broad, but Microsoft Defender is simpler."
"The security features need improvement."
"Trend Micro Apex One could improve by having better integration in the future."
Trellix Endpoint Security is ranked 10th in Endpoint Protection Platform (EPP) with 95 reviews while Trend Micro Apex One is ranked 6th in Endpoint Protection Platform (EPP) with 125 reviews. Trellix Endpoint Security is rated 8.0, while Trend Micro Apex One is rated 8.2. The top reviewer of Trellix Endpoint Security writes "Good user behavioral analysis and helpful patching but needs better support services". On the other hand, the top reviewer of Trend Micro Apex One writes "We can get consolidated logs of suspicious objects and malware attacks in a single console". Trellix Endpoint Security is most compared with Microsoft Defender for Endpoint, Trellix Endpoint Security (ENS), CrowdStrike Falcon, Cortex XDR by Palo Alto Networks and SentinelOne Singularity Complete, whereas Trend Micro Apex One is most compared with Trend Micro Deep Security, Microsoft Defender for Endpoint, Cortex XDR by Palo Alto Networks, CrowdStrike Falcon and Trend Micro Worry-Free Services Suites. See our Trellix Endpoint Security vs. Trend Micro Apex One report.
See our list of best Endpoint Protection Platform (EPP) vendors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.