Try our new research platform with insights from 80,000+ expert users
Simone Scatolini - PeerSpot reviewer
System&Security engineer at Var Group SpA
Reseller
A strong, stable, and scalable solution with good support
Pros and Cons
  • "It is a really strong solution for endpoint security."
  • "There should be better integration between the ePolicy Orchestrator and FireEye console. The integration of both consoles should be better."

What is our primary use case?

We are using all Trellix solutions, and we are also using all McAfee products. Our customers are using virus scan for the old platforms, Endpoint Security, MVISION, File and Folder Encryption, File and Folder Protection, and Device Control, but at the moment, I am really interested in the integration between the new Trellix solution like MVISION and FireEye.

What is most valuable?

It is a really strong solution for endpoint security.

What needs improvement?

There should be better integration between the ePolicy Orchestrator and FireEye console. The integration of both consoles should be better.

For how long have I used the solution?

I have been using this solution for about six years.

Buyer's Guide
Trellix Endpoint Security (ENS)
November 2024
Learn what your peers think about Trellix Endpoint Security (ENS). Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
824,067 professionals have used our research since 2012.

What do I think about the stability of the solution?

Its stability is perfect.

What do I think about the scalability of the solution?

Its scalability is perfect. In our company, we have between 2,000 and 3,000 users, but our installation has about 50,000 endpoints for all customers.

How are customer service and support?

They're very good. I am in contact with their support about five times a day, and they respond quickly.

How would you rate customer service and support?

Positive

How was the initial setup?

It was easy. I have been using Trellix since the carbon age. I have been using Trellix since the day it was released.

Its deployment doesn't take long. 

What about the implementation team?

I customize every installation.

What's my experience with pricing, setup cost, and licensing?

It is not so cheap in comparison to Sophos and other solutions.

What other advice do I have?

Make a really detailed survey of all the systems before implementing any solution on the endpoint. Do not buy the license and try deployment after that.

I would rate it a 10 out of 10.

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
PeerSpot user
reviewer1810833 - PeerSpot reviewer
CEO at a tech services company with 1-10 employees
Real User
Top 5Leaderboard
Central management that enhances endpoint protection with helpful support
Pros and Cons
  • "The EPO, the ePolicy Orchestrator, is the best endpoint protection central management system."
  • "The detection and response capabilities need to be improved."

What is our primary use case?

We use Trellix Endpoint Security for endpoint protection, including virus protection for desktops, laptops, and servers. The solution includes special dedicated modules, such as those for Microsoft SharePoint security.

How has it helped my organization?

Trellix Endpoint Security helps us support and secure a large number of endpoints efficiently. We have a lot of installations, supporting up to twenty thousand endpoints. With the central management system EPO, it has significantly improved our ability to manage security across these devices.

What is most valuable?

The EPO, the ePolicy Orchestrator, is the best endpoint protection central management system. 

Trellix Endpoint Security has a lot of special small modules that I like very much, such as access protection, adaptive threat prevention, exclusion capabilities, and logging capabilities. Together with disk encryption or file encryption, it provides a comprehensive solution.

What needs improvement?

The detection and response capabilities need to be improved. The product is not sharp enough in catching viruses, and we often have to use additional components alongside the pure endpoint security. Symantec, for example, might be better in this area.

For how long have I used the solution?

We have been working with Trellix Endpoint Security for about 20 years.

What do I think about the stability of the solution?

The stability of the solution is very high, I'd rate it around eight or nine out of ten.

What do I think about the scalability of the solution?

Scalability is high; I'd rate it 20 out of ten if possible.

How are customer service and support?

Technical support is correct and absolutely helpful. We had some issues during the migration from McAfee to Trellix, particularly with account migrations, but generally, support has been good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have used Fortinet Endpoint Management, Symantec, Kaspersky, Check Point, and others. Among these, I find that the EPO system of Trellix is the best.

How was the initial setup?

I like the initial setup very much because Trellix Endpoint Security has a lot of special small modules and configurations. It's flexible and allows for detailed customizations.

What's my experience with pricing, setup cost, and licensing?

The pricing of the solution is correct and justified for the value it provides.

What other advice do I have?

I'd rate the solution eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Flag as inappropriate
PeerSpot user
Buyer's Guide
Trellix Endpoint Security (ENS)
November 2024
Learn what your peers think about Trellix Endpoint Security (ENS). Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
824,067 professionals have used our research since 2012.
reviewer1853511 - PeerSpot reviewer
Delivery Manager at a tech services company with 10,001+ employees
Consultant
Great containment feature and very user-friendly GUI
Pros and Cons
  • "A great console with a user-friendly GUI."
  • "Search feature could be made more user-friendly."

What is our primary use case?

The solution enables me to monitor all my endpoints and ensure that our agents are reporting to the FireEye management server. That is key for allowing us to see any suspicious traffic coming in. I'm the delivery manager and we are customers of FireEye. 

What is most valuable?

I like the console and the GUI is user-friendly. One of the most important and critical features is containment. Suppose something gets infected and there's the possibility of it spreading laterally and causing a problem or compromising a network. FireEye has a feature that enables it to disconnect from a system network so that the infection doesn't spread. 

Even if an incident occurs at night when support teams are not available, the feature can contain the infection so that when the support teams get to work, they can carry out the remediation part and bring the system back to production.

What needs improvement?

I'd like to see the searches enhanced because when I hand over the product to someone without experience, it should be user-friendly to them as well. If the feature was enhanced, and the amount of data that comes in reduced, it would simplify the process for anyone. 

For how long have I used the solution?

I've been using this solution for two years. 

What do I think about the stability of the solution?

The solution is stable.

What do I think about the scalability of the solution?

I haven't had any issues with scalability. 

How are customer service and support?

The support is pretty good, we haven't had any problems. 

How would you rate customer service and support?

Neutral

How was the initial setup?

We had a separate team implementing FireEye and there didn't seem to be any issues so I think deployment was relatively straightforward. 

Which other solutions did I evaluate?

I prefer FireEye to solutions like CrowdStrike, Carbon Black, and Trend Micro which are not as user-friendly. FireEye is also easier to integrate with the SIEM, so all the logs get pushed and there are no issues getting the device integrated with SIEM. 

What other advice do I have?

I rate this solution nine out of 10. 

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer2519793 - PeerSpot reviewer
Technical consultant at a construction company with 51-200 employees
Consultant
Top 20
Protects server files deployed in the web tier but have poor support
Pros and Cons
  • "HIPS protects server files from being modified or deleted by unauthorized users. It's primarily deployed in the web tier."
  • "It is a bit technical. The user interface has some significant limitations, mainly when using HIPS on the server side, to protect files from being changed or deleted by hackers, users, or administrators."

What is our primary use case?

I'm working on a project for the Hong Kong library system under the Hong Kong government. They provide workstations in the library for citizens to access the Internet. The ENS needs to be installed on all the PCs in the library. Another part involves the CSWA for the server farm. They are upgrading the entire library system, including the rental system, book search, eBooks, multimedia, and other services. The CSWA modules are primarily for the backend servers, including Linux and Windows.

How has it helped my organization?

Detection and response functionality meet our requirements, but the support is poor.

What is most valuable?

HIPS protects server files from being modified or deleted by unauthorized users. It's primarily deployed in the web tier.

What needs improvement?

It is a bit technical. The user interface has some significant limitations, mainly when using HIPS on the server side, to protect files from being changed or deleted by hackers, users, or administrators. The UI only allows for the inclusion of files using wildcards. 

For example, it can protect an entire directory or a subdirectory, but it doesn't let you select specific files within a directory.

For how long have I used the solution?

I have been using Trellix Endpoint Security (ENS) as an implementor for two years.

What do I think about the stability of the solution?

We haven't had any system crashes or problems in most cases. SolidCore is not compatible with some kernels, which is causing problems. Endpoint, HIPS, and anti-theft are working fine so far. 

I rate the solution’s stability as seven out of ten.

What do I think about the scalability of the solution?

We use one ePO server to manage around four thousand endpoints, including servers. This single server effectively handles this load.

It is suitable for medium and large enterprises.

I rate the solution’s scalability as seven out of ten.

How are customer service and support?

Support is poor. A module called Solidcore needs to match with the OS kernel in one area. The support for this module has been slow because it doesn't match the latest OS. As a result, we haven't been able to upgrade our OS because McAfee does not support the latest version. We've also encountered issues where the product can't be upgraded or installed successfully. We're managing over 300 servers and 3,000 workstations. Upgrading has been a nightmare with this setup.

It provides a slow response. Sometimes, getting feedback takes a few days, and that is also not to the point.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup is easy and straightforward. Determining specific modules and functions often involves a lot of trial and error. Deployment takes only a couple of days.

What other advice do I have?

Overall, I rate the solution a seven out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Implementer
Flag as inappropriate
PeerSpot user
Group Manager at HCL Technologies
Real User
Works in an ecosystem, has a central console, and can enable blocking
Pros and Cons
  • "If the network has seen something, we can use that to put a block to all the endpoints."
  • "The solution can be expensive."

What is our primary use case?

We used it for a compromise assessment. That would be for our client. We deployed the agents. It was for endpoint security.

We had been using the solution previously for one of the clients. We were using it for six months, and we did a compromise assessment based on the FireEye Endpoints that were deployed across the group. At that point in time, there were a lot of ransomware attacks in the environment, and it was impossible to identify the source of the attack and where it came from. The tools didn't point to that visibility. We had to deploy these agents across the environment and also monitor the environment using the network security appliances provided by FireEye just to monitor.

We did monitor it for six months, so it was an assessment. In those six months, we did not have another ransomware attack. It was proven the environmental assessment was clean. That was the whole objective of the compromise assessment - to find out if there are any indicators or anything that has gained a foothold in the environment, trying to fend advanced persistent threats from that standpoint.

What is most valuable?

It is a great solution. The way it exchanges the information between the entire ecosystem, all the endpoints, as well as the network ATP, can trigger the blocking even if it is seen by some other device. If the network has seen something, we can use that to put a block to all the endpoints.

It works in an ecosystem. Centrally, from just one console, you can block malicious attacks across your environment. It provides you with the ability to respond to threats better.

What needs improvement?

The solution can be expensive.

If it could provide a little more in terms of automating things, for example, in response and automatic playbooks wherein you define whatever it is if you see this kind of a threat. You define the actions that need to be followed. If a playbook could be automated and run without even requiring manual involvement, that is the future we want, and they should look into how to make that happen. That is the kind of capability we want them to build.

In terms of reporting, also, if they could provide a little bit more information from where it started, how it progressed; a complete workflow, how that had progressed from where it was picked up; what was the target stage, what was the next stage, and what was the final stage, that would be very helpful. If they could pick up in a simple pictorial way of representing analysis just like the Cisco ASA Packet Analyzer used to do, that would be really helpful.

For how long have I used the solution?

We used the solution for six months.

What do I think about the stability of the solution?

The stability has been very good. There are no bugs or glitches and it doesn’t crash or freeze. It’s reliable.

What do I think about the scalability of the solution?

The product can scale. It’s not an issue at all. 20,000 users were using the solution with no problems.

How are customer service and support?

We have contacted tech support. Tech support was brilliant. They were very knowledgeable, very skillful, and very responsive, and they knew the subject matter. They knew what we were asking for.

How was the initial setup?

The agent installation was okay. It was just a package that was installed. It also provides options to customize and fine-tune based on the system's performance. It's not too heavy on the systems or the servers.

On the network side of things, I think there were challenges to getting that working. We had to do a couple of alterations in terms of making it work, mainly since the appliance's model was provided using a special-purpose SFP, and the compatible SFP was not available in the client environment at that one point. We had to procure it specifically for that assessment.

What's my experience with pricing, setup cost, and licensing?

It’s very costly.

What other advice do I have?

I’d recommend the solution to others.

I would rate the solution eight out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
FaheemSaeed - PeerSpot reviewer
Manager Pre-Sales (ICT) at CNS Engineering
Reseller
Provides good mobile device protection and it works on all platforms
Pros and Cons
  • "Provides good mobile device protection."
  • "The solution lacks device control."

What is our primary use case?

We primarily use this solution as cover for mobile devices. I'm the manager of pre-sales and we are resellers and users of this solution. We are low-level partners of McAfee.

What is most valuable?

The solution provides good mobile device protection and it's great that it's on the cloud. The product is compatible and works for all platforms.

What needs improvement?

I'd like McAfee to include device control on MVISION. The solution currently lacks mobile device management. The cost of the solution is comparatively high and I'd like to see that reduced. 

For how long have I used the solution?

I've been using MVISION for one year and working with McAfee solutions for the past 10 years. 

What do I think about the stability of the solution?

The solution is stable for threat protection. 

What do I think about the scalability of the solution?

The solution is scalable.

How are customer service and support?

The technical support is very good. They are very knowledgeable and also happy to help out. 

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup is easy and very straightforward. 

What's my experience with pricing, setup cost, and licensing?

There's a USD$1,500 supported annual subscription fee that includes maintenance for anywhere between 51 and 100 users. It's USD$30 per users which I think is quite expensive. 

What other advice do I have?

It's important to be clear about your use case and environment before purchasing this solution. 

I rate this solution eight out of 10. 

Disclosure: My company has a business relationship with this vendor other than being a customer: reseller / Partner
PeerSpot user
JamesYa - PeerSpot reviewer
Senior Solutions Architect at Cloud4C Services
Vendor
Simple implementation, stable, but priced high
Pros and Cons
  • "McAfee MVISION Endpoint is stable."
  • "The price of McAfee MVISION Endpoint could improve."

What is our primary use case?

McAfee MVISION Endpoint is used for endpoint protection. Protects the files and network against viruses and malware.

What needs improvement?

The price of McAfee MVISION Endpoint could improve.

For how long have I used the solution?

I have been using McAfee MVISION Endpoint for approximately one year.

What do I think about the stability of the solution?

McAfee MVISION Endpoint is stable.

Which solution did I use previously and why did I switch?

I have previously used Check Point and Microsoft Defender. I would recommend Microsoft Defender over the other solutions I have used.

How was the initial setup?

The installation of the McAfee MVISION Endpoint was simple. We are able to do it remotely from a central location.

What was our ROI?

I have had a return on investment by using McAfee MVISION Endpoint.

What's my experience with pricing, setup cost, and licensing?

We are on an annual subscription for McAfee MVISION Endpoint. The cost for the license could be less expensive.

What other advice do I have?

I rate McAfee MVISION Endpoint a six out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Managing Director at Computer Wise
Real User
Flexible, scalable, and offers a small footprint
Pros and Cons
  • "Technical support is excellent."
  • "The initial setup can be a bit complicated for those unfamiliar with the product."

What is our primary use case?

We've only got two or three machines. The solution is simply used as an antivirus, however,  we've rolled it out to all of our customers and we use it as a managed service.

What is most valuable?

The solution has reduced false positives for our clients and ourselves.

It's got quite good ransomware detection.

The product can be deployed across mobile devices.

It has a managed service push deployment where we can push cloud tasks into policies. 

It's a really good product. It's stable and scalable. It offers good flexibility, has a small footprint, offers a minimal effect on performance, and is from a trusted brand.

We have found the deployment to be very fast.

Technical support is excellent.

What needs improvement?

We're still looking for weaknesses. The product is still quite new for us. That said, so far, every time I have thought, "I wonder if it can do this or it can do that." I've been able to do it.

McAfee has also asked us for feedback, and we noticed when we gave them suggestions, they worked to implement them. For example, we asked for the ability to leverage Windows Defender instead of creating an endpoint. They've just put that in so you can choose now what you want to do. You can change that deployment and push it out without any intervention by the client as well.

The initial setup can be a bit complicated for those unfamiliar with the product.

For how long have I used the solution?

We have been using the solution for about four or five months at this point. 

What do I think about the stability of the solution?

The stability is good. There are no bugs or glitches and it doesn't crash or freeze.

What do I think about the scalability of the solution?

The companies we work with range in size from small to large. 

The solution is very easy to scale.

How are customer service and technical support?

I would rate technical support at a ten out of ten. They have been great. We have found them to be helpful and responsive. My personal interaction with them was absolutely brilliant.

How was the initial setup?

The initial setup can be difficult the first time. You have the flexibility to give all sorts of setup options. You need to know, for example, do you want this, do you want that, do you want these exclusions? Do you want these exploit preventions? et cetera. There are a lot of components. It's going to be complicated initially, however, once you've done that and set it up for a customer, then it's very simple just to deploy it and roll it out.

We rolled out another customer on Friday, and that's 35 sites we've done so far - and I was able to do the whole lot remotely. It's quick to deploy. For clients, in terms of the deployment, I just simply send them a link to their emails and they just go click on it and it goes.

Once the product is deployed, there isn't any maintenance necessary. It's all controlled from a SaaS portal.

What's my experience with pricing, setup cost, and licensing?

The pricing is okay. It's in the middle and there are actually surveys out and they all say that as well.

There's a couple of license options. You can choose a single license or you can choose what we call a MV2 license. Every single license gives you the ability to install a product on five other devices - including mobile. You get a Windows license and that enables you to install it on a tablet, iPhone, or Android device (up to five) as well.

What other advice do I have?

We're a McAfee partner.

We are using the SaaS version. It's my understanding that we are on the latest version of the solution. 

We would recommend the solution to other companies. We actually sell it and provide it to all our clients.

I'd rate the solution at a ten out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Buyer's Guide
Download our free Trellix Endpoint Security (ENS) Report and get advice and tips from experienced pros sharing their opinions.
Updated: November 2024
Buyer's Guide
Download our free Trellix Endpoint Security (ENS) Report and get advice and tips from experienced pros sharing their opinions.