Try our new research platform with insights from 80,000+ expert users
reviewer1097622 - PeerSpot reviewer
Technical Lead Specialist at a computer software company with 1,001-5,000 employees
Real User
Intrusion prevention that detects threats and protects your network, with good support
Pros and Cons
  • "The most valuable features are the prevention layer that detects the signature value and prevents threats in the network."
  • "The resolution time should be faster."

What is our primary use case?

The primary use case of this solution is for intrusion prevention.

We are service providers.

What is most valuable?

The most valuable features are the prevention layer that detects the signature value and prevents threats in the network.

What needs improvement?

The reporting could be improved, by providing more reporting features.

The resolution time should be faster.

For how long have I used the solution?

I have been working with McAfee Endpoint for more than ten years.

Buyer's Guide
Trellix Endpoint Security
November 2024
Learn what your peers think about Trellix Endpoint Security. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
824,053 professionals have used our research since 2012.

What do I think about the stability of the solution?

We have experienced a few issues.

How are customer service and support?

I have contacted technical support and they are good.

How was the initial setup?

The initial setup was straightforward.

It takes two days to deploy.

What about the implementation team?

We did not use a vendor or an integrator, we have our own team.

What other advice do I have?

I have experience with multiple vendors and this is a product I recommend.

I would rate this solution an eight out of ten.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
it_user581046 - PeerSpot reviewer
Network Security Engineer with 11-50 employees
Real User
With the increase in malware attacks, having a product like this that protects against zero-day attacks is invaluable
Pros and Cons
  • "Dynamic Application Containment."
  • "Signatures to protect against new attacks."

What is most valuable?

  • Dynamic Application Containment
  • Real Protect

How has it helped my organization?

With the increase in malware attacks, having a product like this which protects against zero-day attacks is invaluable.

What needs improvement?

Signatures to protect against new attacks.

For how long have I used the solution?

I've used this solution for three months.

What do I think about the stability of the solution?

No.

What do I think about the scalability of the solution?

No.

How are customer service and technical support?

Five out of 10.

Which solution did I use previously and why did I switch?

No.

Which other solutions did I evaluate?

No.

What other advice do I have?

It's an essential.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Trellix Endpoint Security Report and get advice and tips from experienced pros sharing their opinions.
Updated: November 2024
Buyer's Guide
Download our free Trellix Endpoint Security Report and get advice and tips from experienced pros sharing their opinions.