This is an anti-virus and firewall solution. We have over 5,000 users and we are customers of Trellix.
Executive Director of Infrastructure and Technology Asia Pacific at a manufacturing company with 10,001+ employees
Impacts performance of servers negatively but it does protect us against threats
Pros and Cons
- "Provides protection against threats."
- "Impacts performance of the servers quite negatively."
What is our primary use case?
What is most valuable?
Provides endpoint security protection against malware and the like.
What needs improvement?
Trellix tends to get in the way and really impacts the performance of the servers quite negatively.
For how long have I used the solution?
We've been using this product for around 20 years.
Buyer's Guide
Trellix Endpoint Security (ENS)
December 2024
Learn what your peers think about Trellix Endpoint Security (ENS). Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
831,265 professionals have used our research since 2012.
How was the initial setup?
I wasn't involved in the initial setup.
What other advice do I have?
I'd recommend that potential users of this solution look for something more modern, for a newer company providing innovative solutions. I rate this solution five out of 10.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Sr Manager - Information Security & Researcher at a tech services company with 1,001-5,000 employees
Enables us to do IOC-based search across the enterprise and isolate compromised devices
Pros and Cons
- "It is easy to use, flexible, and stable. Because it is a cloud-based solution and it integrates all endpoints of the cloud, we can do an IOC-based search. It can search the entire enterprise and tell us the endpoints that are possibly compromised."
- "It has a feature called Isolation. If a device is compromised, we can connect it to our SOC, and no one would be able to access it. This way we can limit the damage to the network while we are investigating."
- "Malware detection can be better. It doesn't have support and detection for the recent malware, but it has a compensatory control where it can do the behavior-based assessment and alert you when there is something malicious or unexpected. For example, when a certain user is executing the privilege command, which is not normal. These dynamic detections are good, and they compensate for malware detection."
- "It has very good integrations. However, its integration with Palo Alto was not good, and they seem to be working on it at the backend. It is not very resource-hungry, but it can be even better in terms of resource utilization. It could be improved in terms of efficiency, memory sizing, and disk consumption by agents."
- "They have something called Managed Detection and Response. They get intel from their customers, and that intel is shared with the rest of FireEye's customers. I want to subscribe to their intel, but that is not available to us."
What is our primary use case?
It can be used for ransomware detection and data exfiltration. It is also able to detect Remote Access Trojan (RAT).
What is most valuable?
It is easy to use, flexible, and stable. Because it is a cloud-based solution and it integrates all endpoints of the cloud, we can do an IOC-based search. It can search the entire enterprise and tell us the endpoints that are possibly compromised.
It has a feature called Isolation. If a device is compromised, we can connect it to our SOC, and no one would be able to access it. This way we can limit the damage to the network while we are investigating.
What needs improvement?
Malware detection can be better. It doesn't have support and detection for the recent malware, but it has a compensatory control where it can do the behavior-based assessment and alert you when there is something malicious or unexpected. For example, when a certain user is executing the privilege command, which is not normal. These dynamic detections are good, and they compensate for malware detection.
It has very good integrations. However, its integration with Palo Alto was not good, and they seem to be working on it at the backend. It is not very resource-hungry, but it can be even better in terms of resource utilization. It could be improved in terms of efficiency, memory sizing, and disk consumption by agents.
They have something called Managed Detection and Response. They get intel from their customers, and that intel is shared with the rest of FireEye's customers. I want to subscribe to their intel, but that is not available to us.
For how long have I used the solution?
I have been using this solution for two years.
What do I think about the stability of the solution?
It is stable. The FireEye team monitors it, and in case it goes down, we get an alert saying that the device is down. We either get their help or troubleshoot it ourselves to get it up and running.
What do I think about the scalability of the solution?
It is quite scalable. We have scaled it according to their sizing recommendations. They have devices for different bandwidths, models, and offices.
We have about 4,000 people who are using this product. In terms of our plans to increase its usage, we are currently studying two options. One of them will basically scale up to about 40,000 instances.
How are customer service and technical support?
Their technical support is good. For each region, they seem to have got local support that takes care of all problems. They have support teams in Singapore, India, and North America.
How was the initial setup?
Its initial setup was straightforward. I have done one installation that took about 90 minutes. Virtual installations are straightforward. Physical installations have got some networking interfaces, and one needs to go through the documentation to do it. If you have got the right configuration, it is straightforward.
What about the implementation team?
We have about five people within SOC. We manage the engineering and deployment aspects of it. It is not very resource-hungry.
For its deployment, we just needed about four people. We deployed about 14 appliances and one cloud-based instance. We have automated the deployment. We deployed it via Puppet, so the installation was fast.
Which other solutions did I evaluate?
We also use CrowdStrike Falcon, which is also endpoint security. At that time, we chose the best option based on our study. Both Falcon and FireEye were doing good in the market, so we basically went ahead with what was the best at that time. We buy the licenses for both of these and then do the deployment.
We also use Sophos, but it is signature-based. We have licenses for the normal management control software of Sophos and the agents. We have not used Sophos Intercept X. My understanding is that it is an EDR, and we look forward to doing a study on it.
What other advice do I have?
Based on my two years of experience with this solution, I would comfortably recommend this solution.
I would rate FireEye Endpoint Security an eight out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Trellix Endpoint Security (ENS)
December 2024
Learn what your peers think about Trellix Endpoint Security (ENS). Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
831,265 professionals have used our research since 2012.
CEO at a tech services company with 1-10 employees
Central management that enhances endpoint protection with helpful support
Pros and Cons
- "The EPO, the ePolicy Orchestrator, is the best endpoint protection central management system."
- "The detection and response capabilities need to be improved."
What is our primary use case?
We use Trellix Endpoint Security for endpoint protection, including virus protection for desktops, laptops, and servers. The solution includes special dedicated modules, such as those for Microsoft SharePoint security.
How has it helped my organization?
Trellix Endpoint Security helps us support and secure a large number of endpoints efficiently. We have a lot of installations, supporting up to twenty thousand endpoints. With the central management system EPO, it has significantly improved our ability to manage security across these devices.
What is most valuable?
The EPO, the ePolicy Orchestrator, is the best endpoint protection central management system.
Trellix Endpoint Security has a lot of special small modules that I like very much, such as access protection, adaptive threat prevention, exclusion capabilities, and logging capabilities. Together with disk encryption or file encryption, it provides a comprehensive solution.
What needs improvement?
The detection and response capabilities need to be improved. The product is not sharp enough in catching viruses, and we often have to use additional components alongside the pure endpoint security. Symantec, for example, might be better in this area.
For how long have I used the solution?
We have been working with Trellix Endpoint Security for about 20 years.
What do I think about the stability of the solution?
The stability of the solution is very high, I'd rate it around eight or nine out of ten.
What do I think about the scalability of the solution?
Scalability is high; I'd rate it 20 out of ten if possible.
How are customer service and support?
Technical support is correct and absolutely helpful. We had some issues during the migration from McAfee to Trellix, particularly with account migrations, but generally, support has been good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have used Fortinet Endpoint Management, Symantec, Kaspersky, Check Point, and others. Among these, I find that the EPO system of Trellix is the best.
How was the initial setup?
I like the initial setup very much because Trellix Endpoint Security has a lot of special small modules and configurations. It's flexible and allows for detailed customizations.
What's my experience with pricing, setup cost, and licensing?
The pricing of the solution is correct and justified for the value it provides.
What other advice do I have?
I'd rate the solution eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Last updated: Sep 20, 2024
Flag as inappropriateDeputy Director, Research at NACA
Provides efficient integration features, but it could be flexible to use
Pros and Cons
- "The platform’s most valuable features are ease of use, integration, and deployment."
- "The product could be flexible and offer better pricing."
What is our primary use case?
We use the product to provide system security for shared data on the network.
What is most valuable?
The platform’s most valuable features are ease of use, integration, and deployment.
What needs improvement?
The product could be flexible and offer better pricing. They should make it free, open-source software.
For how long have I used the solution?
We have been using McAfee Endpoint Security for ten years.
What do I think about the stability of the solution?
The platform is stable.
What do I think about the scalability of the solution?
The platform is scalable. A minimum of five licenses are required for ten executives.
How are customer service and support?
Our IT team requires deployment assistance from the product’s technical support team.
How was the initial setup?
The initial setup process is easy if you have the required technical skills. It takes 30 minutes to complete. A team of around 20 technicians is involved in the deployment.
What about the implementation team?
We implement the product with the help of our technical staff.
What's my experience with pricing, setup cost, and licensing?
We pay for the product’s license. They should reduce the cost or make it free, open-source software.
Which other solutions did I evaluate?
We evaluated three vendors. We decided to go to McAfee Endpoint Security for better availability, ease of use, and deployment.
What other advice do I have?
I recommend McAfee Endpoint Security to others and rate it a seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Regional Cyber Security Manager
Offers a variety of plugins, is reasonably stable, and has fair pricing
Pros and Cons
- "The extendability is great."
- "The solution needs to work on memory consumption. It is too high."
What is our primary use case?
We primarily use the solution for managed defense. It is a next-generation EDR, similar to Cylance and CrowdStrike. It's used for endpoint enforcement.
What is most valuable?
It offers more plugins for endpoints in order to extend endpoint protection. There are a variety of plugin options.
The extendability is great.
It is pretty stable.
The product is very scalable.
We find the pricing to be in line with the current market.
What needs improvement?
The solution needs to work on memory consumption. It is too high. EDRs are notorious for this.
Technical support could be improved a bit. They are doing a lot with the acquisition and rebranding, and things may take a while to settle.
For how long have I used the solution?
We've used the solution for 18 months.
What do I think about the stability of the solution?
The solution is stable and reliable. It's just as stable as anything else on the market. This is a stable build. All of it does depend on the interaction with the Microsoft patches. Most of the time, the performance is quite good.
What do I think about the scalability of the solution?
The solution scales well and has a lot of device plugins. I'd rate it a ten out of ten. You can do all kinds of things with it that you can't do with other endpoint protection options.
How are customer service and support?
Technical support isn't ideal. It's not that it is awful; it's just not fantastic.
Which solution did I use previously and why did I switch?
I'm also familiar with Cylance and CrowdStrike, which I've used at a different company.
How was the initial setup?
I wasn't involved with the initial setup. However, we have a top-notch implementation engineer.
What about the implementation team?
We had the vendor's assistance, and we've always had an excellent experience using them.
What's my experience with pricing, setup cost, and licensing?
I am not sure about the exact costs. However, my understanding is it is comparable to Crowdstrike. Like other solutions, the more endpoints you have, the less the cost.
What other advice do I have?
We're customers. We're an international conglomerate. They are our vendor, and they are partners with us on our security journey.
I'd advise people to use Managed Defense. It pays for itself.
I'd rate the solution a solid eight out of ten overall.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Group Manager at HCL Technologies
Works in an ecosystem, has a central console, and can enable blocking
Pros and Cons
- "If the network has seen something, we can use that to put a block to all the endpoints."
- "The solution can be expensive."
What is our primary use case?
We used it for a compromise assessment. That would be for our client. We deployed the agents. It was for endpoint security.
We had been using the solution previously for one of the clients. We were using it for six months, and we did a compromise assessment based on the FireEye Endpoints that were deployed across the group. At that point in time, there were a lot of ransomware attacks in the environment, and it was impossible to identify the source of the attack and where it came from. The tools didn't point to that visibility. We had to deploy these agents across the environment and also monitor the environment using the network security appliances provided by FireEye just to monitor.
We did monitor it for six months, so it was an assessment. In those six months, we did not have another ransomware attack. It was proven the environmental assessment was clean. That was the whole objective of the compromise assessment - to find out if there are any indicators or anything that has gained a foothold in the environment, trying to fend advanced persistent threats from that standpoint.
What is most valuable?
It is a great solution. The way it exchanges the information between the entire ecosystem, all the endpoints, as well as the network ATP, can trigger the blocking even if it is seen by some other device. If the network has seen something, we can use that to put a block to all the endpoints.
It works in an ecosystem. Centrally, from just one console, you can block malicious attacks across your environment. It provides you with the ability to respond to threats better.
What needs improvement?
The solution can be expensive.
If it could provide a little more in terms of automating things, for example, in response and automatic playbooks wherein you define whatever it is if you see this kind of a threat. You define the actions that need to be followed. If a playbook could be automated and run without even requiring manual involvement, that is the future we want, and they should look into how to make that happen. That is the kind of capability we want them to build.
In terms of reporting, also, if they could provide a little bit more information from where it started, how it progressed; a complete workflow, how that had progressed from where it was picked up; what was the target stage, what was the next stage, and what was the final stage, that would be very helpful. If they could pick up in a simple pictorial way of representing analysis just like the Cisco ASA Packet Analyzer used to do, that would be really helpful.
For how long have I used the solution?
We used the solution for six months.
What do I think about the stability of the solution?
The stability has been very good. There are no bugs or glitches and it doesn’t crash or freeze. It’s reliable.
What do I think about the scalability of the solution?
The product can scale. It’s not an issue at all. 20,000 users were using the solution with no problems.
How are customer service and support?
We have contacted tech support. Tech support was brilliant. They were very knowledgeable, very skillful, and very responsive, and they knew the subject matter. They knew what we were asking for.
How was the initial setup?
The agent installation was okay. It was just a package that was installed. It also provides options to customize and fine-tune based on the system's performance. It's not too heavy on the systems or the servers.
On the network side of things, I think there were challenges to getting that working. We had to do a couple of alterations in terms of making it work, mainly since the appliance's model was provided using a special-purpose SFP, and the compatible SFP was not available in the client environment at that one point. We had to procure it specifically for that assessment.
What's my experience with pricing, setup cost, and licensing?
It’s very costly.
What other advice do I have?
I’d recommend the solution to others.
I would rate the solution eight out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Simple implementation, stable, but priced high
Pros and Cons
- "McAfee MVISION Endpoint is stable."
- "The price of McAfee MVISION Endpoint could improve."
What is our primary use case?
McAfee MVISION Endpoint is used for endpoint protection. Protects the files and network against viruses and malware.
What needs improvement?
The price of McAfee MVISION Endpoint could improve.
For how long have I used the solution?
I have been using McAfee MVISION Endpoint for approximately one year.
What do I think about the stability of the solution?
McAfee MVISION Endpoint is stable.
Which solution did I use previously and why did I switch?
I have previously used Check Point and Microsoft Defender. I would recommend Microsoft Defender over the other solutions I have used.
How was the initial setup?
The installation of the McAfee MVISION Endpoint was simple. We are able to do it remotely from a central location.
What was our ROI?
I have had a return on investment by using McAfee MVISION Endpoint.
What's my experience with pricing, setup cost, and licensing?
We are on an annual subscription for McAfee MVISION Endpoint. The cost for the license could be less expensive.
What other advice do I have?
I rate McAfee MVISION Endpoint a six out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Managing Director at Computer Wise
Flexible, scalable, and offers a small footprint
Pros and Cons
- "Technical support is excellent."
- "The initial setup can be a bit complicated for those unfamiliar with the product."
What is our primary use case?
We've only got two or three machines. The solution is simply used as an antivirus, however, we've rolled it out to all of our customers and we use it as a managed service.
What is most valuable?
The solution has reduced false positives for our clients and ourselves.
It's got quite good ransomware detection.
The product can be deployed across mobile devices.
It has a managed service push deployment where we can push cloud tasks into policies.
It's a really good product. It's stable and scalable. It offers good flexibility, has a small footprint, offers a minimal effect on performance, and is from a trusted brand.
We have found the deployment to be very fast.
Technical support is excellent.
What needs improvement?
We're still looking for weaknesses. The product is still quite new for us. That said, so far, every time I have thought, "I wonder if it can do this or it can do that." I've been able to do it.
McAfee has also asked us for feedback, and we noticed when we gave them suggestions, they worked to implement them. For example, we asked for the ability to leverage Windows Defender instead of creating an endpoint. They've just put that in so you can choose now what you want to do. You can change that deployment and push it out without any intervention by the client as well.
The initial setup can be a bit complicated for those unfamiliar with the product.
For how long have I used the solution?
We have been using the solution for about four or five months at this point.
What do I think about the stability of the solution?
The stability is good. There are no bugs or glitches and it doesn't crash or freeze.
What do I think about the scalability of the solution?
The companies we work with range in size from small to large.
The solution is very easy to scale.
How are customer service and technical support?
I would rate technical support at a ten out of ten. They have been great. We have found them to be helpful and responsive. My personal interaction with them was absolutely brilliant.
How was the initial setup?
The initial setup can be difficult the first time. You have the flexibility to give all sorts of setup options. You need to know, for example, do you want this, do you want that, do you want these exclusions? Do you want these exploit preventions? et cetera. There are a lot of components. It's going to be complicated initially, however, once you've done that and set it up for a customer, then it's very simple just to deploy it and roll it out.
We rolled out another customer on Friday, and that's 35 sites we've done so far - and I was able to do the whole lot remotely. It's quick to deploy. For clients, in terms of the deployment, I just simply send them a link to their emails and they just go click on it and it goes.
Once the product is deployed, there isn't any maintenance necessary. It's all controlled from a SaaS portal.
What's my experience with pricing, setup cost, and licensing?
The pricing is okay. It's in the middle and there are actually surveys out and they all say that as well.
There's a couple of license options. You can choose a single license or you can choose what we call a MV2 license. Every single license gives you the ability to install a product on five other devices - including mobile. You get a Windows license and that enables you to install it on a tablet, iPhone, or Android device (up to five) as well.
What other advice do I have?
We're a McAfee partner.
We are using the SaaS version. It's my understanding that we are on the latest version of the solution.
We would recommend the solution to other companies. We actually sell it and provide it to all our clients.
I'd rate the solution at a ten out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Buyer's Guide
Download our free Trellix Endpoint Security (ENS) Report and get advice and tips from experienced pros
sharing their opinions.
Updated: December 2024
Popular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
Cisco Secure Endpoint
SentinelOne Singularity Complete
Fortinet FortiClient
Cortex XDR by Palo Alto Networks
Symantec Endpoint Security
Intercept X Endpoint
Trend Vision One Endpoint Security
Trellix Endpoint Security
Kaspersky Endpoint Security for Business
ESET Endpoint Protection Platform
HP Wolf Security
Buyer's Guide
Download our free Trellix Endpoint Security (ENS) Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- How does McAfee Endpoint Security compare with MVISION?
- How does Crowdstrike Falcon compare with FireEye Endpoint Security?
- Where can I get a fully paid for training course for McAfee MVISION Endpoint?
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What's the best way to trial endpoint protection solutions?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?
- What to choose: an endpoint antivirus, an EDR solution or both?