Try our new research platform with insights from 80,000+ expert users
Trellix Collaboration Security Logo

Trellix Collaboration Security pros and cons

Vendor: Trellix
4.3 out of 5
337 followers
Start review

Pros & Cons summary

Buyer's Guide

Get pricing advice, tips, use cases and valuable features from real users of this product.
Get the report

Prominent pros & cons

PROS

Trellix Collaboration Security is valued for its simplicity and ease of use, making it very user-friendly.
The ability to integrate with cloud solutions, such as Google and Microsoft, is highlighted as a significant advantage.
FireEye provides robust protection against malware and security threats, enhancing email security.
The solution effectively reduces the number of malicious emails, including spam and phishing attempts, reaching users' inboxes.
Trellix Collaboration Security is appreciated for its stable and comprehensive protection capabilities that fulfill customer needs.

CONS

Reporting capabilities require enhancement.
Spam detection needs improvement.
Email management features must be better to compete as the primary solution.
Support services require improvement.
Zero-day spam email filtering could be enhanced.
 

Trellix Collaboration Security Pros review quotes

reviewer1074132 - PeerSpot reviewer
Jun 17, 2021
The product helps reduce the number of malicious emails reaching the user's inbox.
Amey Darekar - PeerSpot reviewer
Apr 29, 2024
One of the valuable features of the product stems from the fact that it is easy to implement the tool in our environment.
SA
Mar 19, 2025
Trellix Collaboration Security is valued for being a stable and comprehensive solution that fulfills customer needs.
Learn what your peers think about Trellix Collaboration Security. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
842,592 professionals have used our research since 2012.
Mustapha - PeerSpot reviewer
Jun 15, 2022
The initial setup is simple.
DS
Nov 3, 2021
We can control this solution from the cloud and are able to access it from wherever we are.
ED
Jan 31, 2021
FireEye is good for malware depicting and security.
WAKKAS AHMAD - PeerSpot reviewer
Feb 22, 2023
FireEye Email Security helps us prevent spam and phishing emails and all other business-compromised email attacks.
BernardLugalia - PeerSpot reviewer
Dec 24, 2024
One of the most valuable features is the protection against vulnerabilities, particularly through virtual patching.
Murali Krishnan L - PeerSpot reviewer
Jun 20, 2022
The auto-remediation feature is valuable.
BP
Jul 25, 2022
I like FireEye's filtering, spam digests, and its advanced threat review of email flow. It also has a broad range of riskware rules you can deploy.
 

Trellix Collaboration Security Cons review quotes

reviewer1074132 - PeerSpot reviewer
Jun 17, 2021
The solution needs better support.
Amey Darekar - PeerSpot reviewer
Apr 29, 2024
In general, our company should make the tool more robust to protect our systems.
SA
Mar 19, 2025
I would rate them as a 1.5. The new hub created in India is not good.
Learn what your peers think about Trellix Collaboration Security. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
842,592 professionals have used our research since 2012.
Mustapha - PeerSpot reviewer
Jun 15, 2022
Sometimes especially zero-day spam emails can be passed to the user's inbox.
DS
Nov 3, 2021
The custom tailoring is limited.
ED
Jan 31, 2021
If they want to be the primary or best solution, they need to have better email management features.
BernardLugalia - PeerSpot reviewer
Dec 24, 2024
There is a need for improved integration with totally different products, such as a rapid server.
Murali Krishnan L - PeerSpot reviewer
Jun 20, 2022
The spam detection feature could be better.
BP
Jul 25, 2022
FireEye needs single sign-on. They say it's on their roadmap. They should also implement support for Microsoft Authenticator app for 2FA.
reviewer1581882 - PeerSpot reviewer
Aug 31, 2021
I would like the solution to be able to automatically quarantine the malicious emails before getting to the user's mailbox and continue with regular email operations. This could result in the user clicking the email before the purge operation is completed.