Try our new research platform with insights from 80,000+ expert users
Talent Acquisition Specialist at Nine A Business Connect
Real User
Top 5
Easy to deploy, use and stable solution
Pros and Cons
  • "It's good that it periodically scans all my drives. I can stay up to date with the status of my drivers and update them if needed."
  • "One suggestion is they should reduce the constant notifications. Whenever I open my laptop, there are too many notifications from McAfee, and it gets annoying."

What is our primary use case?

McAfee is used to secure my laptop against online threats and malware. It detects and removes any potential issues from the laptop.

What is most valuable?

It's good that it periodically scans all my drives. I can stay up to date with the status of my drivers and update them if needed.

What needs improvement?

One suggestion is they should reduce the constant notifications. Whenever I open my laptop, there are too many notifications from McAfee, and it gets annoying.

I would like to see less notifications.

For how long have I used the solution?

I have been using this solution for about four to five months because I've just purchased my new laptop. It came with the latest version when I got the laptop.

Buyer's Guide
Trellix Endpoint Security (ENS)
November 2024
Learn what your peers think about Trellix Endpoint Security (ENS). Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
824,067 professionals have used our research since 2012.

What do I think about the stability of the solution?

The stability is good. I receive updates regularly, which is quite good.

How was the initial setup?

It's quite straightforward. You have the dashboard to access all the data protection features, so it's easy to use.

The deployment hardly takes two to three minutes.

What about the implementation team?

For the McAfee process, I didn't need to contact anybody. I just needed to switch on my laptop, and it started on its own.

What's my experience with pricing, setup cost, and licensing?

You need to subscribe to McAfee. There's a subscription on a yearly basis. It's not that expensive; it's quite affordable.

What other advice do I have?

I would suggest giving it a try. Overall, I would rate the solution a nine out of ten. Due to the notifications, I would deduct one point. But overall, it's a nine. It's good.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1581882 - PeerSpot reviewer
Sr Manager - Information Security & Researcher at a tech services company with 1,001-5,000 employees
Real User
Enables us to do IOC-based search across the enterprise and isolate compromised devices
Pros and Cons
  • "It is easy to use, flexible, and stable. Because it is a cloud-based solution and it integrates all endpoints of the cloud, we can do an IOC-based search. It can search the entire enterprise and tell us the endpoints that are possibly compromised."
  • "It has a feature called Isolation. If a device is compromised, we can connect it to our SOC, and no one would be able to access it. This way we can limit the damage to the network while we are investigating."
  • "Malware detection can be better. It doesn't have support and detection for the recent malware, but it has a compensatory control where it can do the behavior-based assessment and alert you when there is something malicious or unexpected. For example, when a certain user is executing the privilege command, which is not normal. These dynamic detections are good, and they compensate for malware detection."
  • "It has very good integrations. However, its integration with Palo Alto was not good, and they seem to be working on it at the backend. It is not very resource-hungry, but it can be even better in terms of resource utilization. It could be improved in terms of efficiency, memory sizing, and disk consumption by agents."
  • "They have something called Managed Detection and Response. They get intel from their customers, and that intel is shared with the rest of FireEye's customers. I want to subscribe to their intel, but that is not available to us."

What is our primary use case?

It can be used for ransomware detection and data exfiltration. It is also able to detect Remote Access Trojan (RAT).

What is most valuable?

It is easy to use, flexible, and stable. Because it is a cloud-based solution and it integrates all endpoints of the cloud, we can do an IOC-based search. It can search the entire enterprise and tell us the endpoints that are possibly compromised.

It has a feature called Isolation. If a device is compromised, we can connect it to our SOC, and no one would be able to access it. This way we can limit the damage to the network while we are investigating.

What needs improvement?

Malware detection can be better. It doesn't have support and detection for the recent malware, but it has a compensatory control where it can do the behavior-based assessment and alert you when there is something malicious or unexpected. For example, when a certain user is executing the privilege command, which is not normal. These dynamic detections are good, and they compensate for malware detection.

It has very good integrations. However, its integration with Palo Alto was not good, and they seem to be working on it at the backend. It is not very resource-hungry, but it can be even better in terms of resource utilization. It could be improved in terms of efficiency, memory sizing, and disk consumption by agents.

They have something called Managed Detection and Response. They get intel from their customers, and that intel is shared with the rest of FireEye's customers. I want to subscribe to their intel, but that is not available to us.

For how long have I used the solution?

I have been using this solution for two years.

What do I think about the stability of the solution?

It is stable. The FireEye team monitors it, and in case it goes down, we get an alert saying that the device is down. We either get their help or troubleshoot it ourselves to get it up and running.

What do I think about the scalability of the solution?

It is quite scalable. We have scaled it according to their sizing recommendations. They have devices for different bandwidths, models, and offices.

We have about 4,000 people who are using this product. In terms of our plans to increase its usage, we are currently studying two options. One of them will basically scale up to about 40,000 instances.

How are customer service and technical support?

Their technical support is good. For each region, they seem to have got local support that takes care of all problems. They have support teams in Singapore, India, and North America.

How was the initial setup?

Its initial setup was straightforward. I have done one installation that took about 90 minutes. Virtual installations are straightforward. Physical installations have got some networking interfaces, and one needs to go through the documentation to do it. If you have got the right configuration, it is straightforward.

What about the implementation team?

We have about five people within SOC. We manage the engineering and deployment aspects of it. It is not very resource-hungry.

For its deployment, we just needed about four people. We deployed about 14 appliances and one cloud-based instance. We have automated the deployment. We deployed it via Puppet, so the installation was fast.

Which other solutions did I evaluate?

We also use CrowdStrike Falcon, which is also endpoint security. At that time, we chose the best option based on our study. Both Falcon and FireEye were doing good in the market, so we basically went ahead with what was the best at that time. We buy the licenses for both of these and then do the deployment.

We also use Sophos, but it is signature-based. We have licenses for the normal management control software of Sophos and the agents. We have not used Sophos Intercept X. My understanding is that it is an EDR, and we look forward to doing a study on it.

What other advice do I have?

Based on my two years of experience with this solution, I would comfortably recommend this solution.

I would rate FireEye Endpoint Security an eight out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Trellix Endpoint Security (ENS)
November 2024
Learn what your peers think about Trellix Endpoint Security (ENS). Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
824,067 professionals have used our research since 2012.
Long-Tran - PeerSpot reviewer
Cloud Expert at GalaxyOne
Real User
Top 10
Has valuable AI capabilities and good technical support services
Pros and Cons
  • "The platform's most valuable features are AI capabilities and its quick updates."
  • "They could provide better integration capabilities for the product with other services."

What is our primary use case?

We use the platform for managing and securing endpoints in our organization.

How has it helped my organization?

The solution's technical support services have a quick response time. It has been beneficial for our organization. 

What is most valuable?

The platform's most valuable features are AI capabilities and its quick updates. 

What needs improvement?

They could provide better integration capabilities for the product with other services.

For how long have I used the solution?

We have been using Trellix Endpoint Security (ENS) for two to three years. We are using the latest version and regularly update it.

What do I think about the stability of the solution?

I rate the product's stability a seven out of ten. 

What do I think about the scalability of the solution?

Our corporation has approximately 13,000 Trellix Endpoint Security (ENS) users. It is a scalable product.

What was our ROI?

The solution helps manage users easier and reduces the workload for the IT team.

What's my experience with pricing, setup cost, and licensing?

The product pricing is high. 

Which other solutions did I evaluate?

We are evaluating Trellix Endpoint Security (ENS) features compared to others. 

What other advice do I have?

I advise others to consider the specific requirements of users, such as personal devices that may not be supported before making a purchase decision.

I rate it an eight out of ten. 

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
PeerSpot user
reviewer1973925 - PeerSpot reviewer
Owner / Consultant at a marketing services firm with 1-10 employees
Real User
A good solution that is stable and scalable with seamless deployment
Pros and Cons
  • "The seamless deployment is very valuable."
  • "The central monitoring dashboard needs improvement."

What is our primary use case?

We deploy the solution on-premises but we have the roadmap to migrate it on cloud. Initially, everything was on-premises, but we are moving to the cloud, which will be our first cloud migration.

What is most valuable?

The seamless deployment is very valuable.

What needs improvement?

The quality of the dashboard could be improved, and the central monitoring dashboard needs improvement. At first, we thought we were getting multiple views. One was a wholly summarized view, and the other was a more detailed view of an endpoint device. Digging into one device's detail is sometimes difficult. Additionally, the granularity of reporting can be improved. The next release could also include an extended mobile connection for the solution.

For how long have I used the solution?

We have been using this solution for approximately four months.

What do I think about the stability of the solution?

The solution is stable.

What do I think about the scalability of the solution?

The solution is scalable. Maybe in another six to eight months, we will scale to around 5,500 because we are recruiting more people, so the number may increase.

How are customer service and support?

I have not had any experience with customer service and support.

Which solution did I use previously and why did I switch?

We previously used Trend Micro. When we were deploying Trend Micro, we faced a lot of difficulties. When we acquired Trend Micro, we had no endpoint security so we had to remove an endpoint and deploy Trend Micro. As a result, deploying Trend Micro was very painful. There were frequent failures in the automatic script that Trend Micro had provided, and it took us about three and a half months to completely cover around 4,000 devices. At the same time, McAfee's deployment was seamless. There might have been an issue, but those issues never escalated. With Trend Micro, the issues escalated frequently.

We switched because of the distinction in scalability, Bluetooth and support. Additionally, one of the reasons we replaced Trend Micro was that we were raising a support ticket every month, which was embarrassing for us. We were losing five to seven tags. PSEs and the response to those PSEs were not satisfied every time.

What's my experience with pricing, setup cost, and licensing?

I rate pricing and licensing a seven out of ten.

What other advice do I have?

I rate this solution an eight out of ten. The solution is good, but the dashboard quality and granularity of reporting can be improved.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Information Security Manager at SPXFLOW
Real User
All the features of HX give the administrator control over the managed devices

What is our primary use case?

We moved on to FireEye HX as an endpoint solution. Mainly, this is the next-generation endpoint protection where it protects the endpoints not just from the office network but also from roaming. Its capability seeing today's threat actors is the best one.

How has it helped my organization?

This gives us a more secure and completely scalable zero-day model security product to the endpoint. We manage not only the software but also the next-gen AV.

What is most valuable?

All the features of HX give the administrator control over the managed devices:

  • Managing is easy
  • The different threat actor based signature
  • Behavioural analysis
  • Malware protection
  • Zero-day protection

IOC based detections are really the best ones. However, the enterprise search option is a hunting option given to the admin.

What needs improvement?

  • AV management based on manual scan
  • Manual scan feature is not easily done
  • A long way of setting hostname set, and
  • Scheduling over policy which is time taking and I don't feel comfortable. 

For how long have I used the solution?

One to three years.

What do I think about the stability of the solution?

Excellent.

What do I think about the scalability of the solution?

Performance wise, it's good. The agent does not consume much process or CPU.

How is customer service and technical support?

Great support, a well technology-minded guy with a proactive and ready-to-resolve easy attitude.

How was the initial setup?

The deployment was easy.

What about the implementation team?

In-house, and sometimes getting help from the product vendor.

What was our ROI?

Though it's expensive, it gives the security required to be trusted with the product.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Information Technology Security Architect at a financial services firm with 5,001-10,000 employees
Real User
A simple to use, yet effective solution for protecting us against malware and other threats
Pros and Cons
  • "The most valuable feature of this solution is its simplicity."
  • "The integration and display of the dashboards have to be done better."

What is our primary use case?

We use this solution to enhance our internal defense system, protecting us against malware and advanced persistent threats.

We use the on-premises deployment model.

How has it helped my organization?

This solution has helped to protect our organization against security threats.

What is most valuable?

The most valuable feature of this solution is its simplicity. The triage process is quite effective, and it is compatible with many different systems.

What needs improvement?

We had a very large problem that has, unfortunately, not been solved. Simply put, when we start the computer the program will not start. We have encouraged FireEye to solve this problem because we have to manually start this product each and every time, and it affects almost thirty percent of our environment. From a security perspective, this is not stable.

After using various components in this solution, I get the feeling that not every part of the whole FireEye suite works perfectly with the other parts. Sometimes you have this functionality where the product has the ability to take data from one part of the solution and use it in different parts. Sometimes, however, you don't have this luxury. The solution needs more suitable dashboards that handle things from different perspectives. For example, a CEO and a technician from operations are completely different. The integration and display of the dashboards have to be done better.

For how long have I used the solution?

We have been using this solution for less than two years.

What do I think about the stability of the solution?

We have had trouble with stability because the program fails to start when the computer does. 

What do I think about the scalability of the solution?

This solution is very flexible and scalable.

How are customer service and technical support?

This solution needs stronger support in Eastern Europe because of the time difference between, for example, Poland and the United States. It makes it difficult to contact technical support. In order to receive good support, we have to wait until 5:00 pm before we call. Essentially, the vender needs a better presence in more time zones, and 24/7 support would help to fix this.

Technical support has another problem, where the support from the US is better than the support elsewhere. The training and knowledge should be the same, no matter which tech support group you contact. This might be accomplished using a better internal knowledge sharing system.

Which solution did I use previously and why did I switch?

We did use another solution prior to this, but because we have the entire FireEye suite, we decided to create a more monolithic approach to security using different products. These include FireEye EX and FireEye AX, which are used for malware protection, network protection, and sandboxing. We decided that if these were good enough then we would push more for the endpoints, which is why we adopted this solution.

How was the initial setup?

The installation of this solution is straightforward from my perspective.

What other advice do I have?

I like FireEye products, and they have a huge portfolio for this solution. However, this is not a magic bullet where you can install it and your problems will disappear. The problem is with the people, rather than the tool. From my perspective, you can install every tool, but you need to have a security operations team involved in the process of analyzing, sorting, and eliminating threats.

When we started our project, we had very few people and we have realized that this had to change. The system without human intervention is useless. We needed to build more complex security operation centers to handle false positives, the triage process, and eliminating threats.

The biggest lesson that I have learned from this solution is that people need to be ready and the business needs to be ready to use it. This is not a toy. It is a very mature solution to protect the internals of the organization and it should be treated in this way.

This is not the worse product that I have seen. I've seen many, many bad products. At the same time, this is not the best product that I have seen.

I would rate this solution an eight out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1915887 - PeerSpot reviewer
Mgr. ICT-Services at a comms service provider with 501-1,000 employees
Real User
User friendly, easy to set up, and provides good support
Pros and Cons
  • "What I like most about McAfee MVISION Endpoint is that it's very user-friendly. You do need some knowledge on how to navigate the portal, but as soon as you've gained that knowledge, navigation will no longer be an issue. I have no complaints about McAfee MVISION Endpoint. For me, the product is perfect the way it is. It's great right now, and it's doing good as it is."
  • "So far, McAfee MVISION Endpoint ticks off all of our boxes, but its pricing could always be better."

What is our primary use case?

We're using MVISION Endpoint for the protection of our endpoint devices.

What is most valuable?

What I like most about McAfee MVISION Endpoint is that it's very user-friendly. You do need some knowledge on how to navigate the portal, but as soon as you've gained that knowledge, navigation will no longer be an issue.

I have no complaints about McAfee MVISION Endpoint. For me, the product is perfect the way it is. It's great right now, and it's doing good as it is.

What needs improvement?

So far, McAfee MVISION Endpoint ticks off all of our boxes, but its pricing could always be better.

For how long have I used the solution?

I started using MVISION Endpoint last year. It was preceded by the MVISION ePO.

What do I think about the stability of the solution?

McAfee MVISION Endpoint is a stable product.

What do I think about the scalability of the solution?

McAfee MVISION Endpoint has no issues in terms of scalability. You just need money to make scaling up possible.

How are customer service and support?

The support for McAfee MVISION Endpoint is okay. I have no complaints about it.

On a scale of one to five, where one is bad and five is good, I would rate support for the product as four out of five.

How was the initial setup?

The initial setup for McAfee MVISION Endpoint is pretty easy.

What about the implementation team?

We used a consultant for the deployment of McAfee MVISION Endpoint.

What was our ROI?

I don't have information on ROI from McAfee MVISION Endpoint because a separate unit takes care of those calculations.

What's my experience with pricing, setup cost, and licensing?

Pricing for McAfee MVISION Endpoint is not very good, and I would rate its cost three out of five, though I won't be able to mention how much its actual price is.

Which other solutions did I evaluate?

There were other solutions in use, but that was before I joined my department, so I don't know which solutions were used before my company went with McAfee MVISION Endpoint.

What other advice do I have?

I have some experience with McAfee MVISION Endpoint, and I'm currently using it. I can't remember the exact version of the solution which I'm using, but it's the latest version.

My company is a customer of McAfee MVISION Endpoint.

My company is a telco, so I don't have the exact user count, but it's surely more than a hundred. All roles within my company use the product, even people at the highest levels.

At the moment, there's no plan to increase usage of McAfee MVISION Endpoint within the company.

My advice for people looking into implementing McAfee MVISION Endpoint is to use the demo, roll it out within your organization, utilize its functionalities, and let it work for you.

In terms of rating, I'm giving McAfee MVISION Endpoint a solid eight because it does what's needed and it works, so no complaints.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
ICT Manager at SecurEyes
Real User
Easy to use, stable, and not heavy on system resources
Pros and Cons
  • "FireEye Endpoint Security is easy to use and lightweight compared to others."
  • "Most of these types of solutions including others, such as Carbon Black and FortiEDR, all have the same features. However, Carbon Black is the leader when it comes to being robust and user-friendly and this solution should improve in those areas to stay more competitive."

What is our primary use case?

We are using this solution for endpoint security against cyber attacks.

What is most valuable?

FireEye Endpoint Security is easy to use and lightweight compared to others.

What needs improvement?

Most of these types of solutions including others, such as Carbon Black and FortiEDR, all have the same features. However, Carbon Black is the leader when it comes to being robust and user-friendly and this solution should improve in those areas to stay more competitive.

For how long have I used the solution?

I have been using FireEye Endpoint Security for a couple of months.

What do I think about the scalability of the solution?

This solution is scalable. However, it could improve to be able to be handle large-scale operations. The OS most systems are running I am not sure it can handle a lot of nodes but many companies are coming out with cloud options that should be able to manage much more nodes.

How are customer service and technical support?

Technical support can take some time to respond on the first level. They could improve the speed at which they resolve and handle support.

What about the implementation team?

We have an administrator and engineer that does the implementation and maintenance of the solution.

Which other solutions did I evaluate?

I have evaluated Carbon Black and FortiEDR.

What other advice do I have?

I would not recommend this solution to others. However, if you have a small budget then this solution could be a second option.

I rate FireEye Endpoint Security an eight out of ten.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Buyer's Guide
Download our free Trellix Endpoint Security (ENS) Report and get advice and tips from experienced pros sharing their opinions.
Updated: November 2024
Buyer's Guide
Download our free Trellix Endpoint Security (ENS) Report and get advice and tips from experienced pros sharing their opinions.