The product is fairly reliable. I have been using the DLP functionality a lot. It blocks all USB-connected devices but still allows charging external devices like phones. It keeps out any malware. It does a good job of protecting our network as an enterprise solution. I mainly use it as an antivirus and DLP solution.
IT Services Network Analyst at Saskatchewan Workers' Compensation Board
A reliable and easy-to-deploy product that protects an organization’s network from malware
Pros and Cons
- "The product is fairly reliable."
- "The product is not easy to use."
What is most valuable?
What needs improvement?
The product is not easy to use. Moving around in it is cumbersome. I have heard other users saying that it is cumbersome to find things. Creating and deploying policies with DLP can be really cumbersome. It can be difficult if we don’t know how to use it. Sometimes, we have difficulty in communicating with clients. Sometimes, we have to go through troubleshooting to fix it.
For how long have I used the solution?
I have been using the solution for 17 to 18 years. I am using the latest version of the solution.
What do I think about the stability of the solution?
I rate the product’s stability an eight out of ten.
Buyer's Guide
Trellix Endpoint Security
October 2024
Learn what your peers think about Trellix Endpoint Security. Get advice and tips from experienced pros sharing their opinions. Updated: October 2024.
816,406 professionals have used our research since 2012.
What do I think about the scalability of the solution?
I rate the solution’s scalability an eight out of ten.
How was the initial setup?
It's pretty straightforward to deploy the product as an enterprise solution. I create a System Tree, and I break everything out between VMs, workstations, servers, and VLANs.
What was our ROI?
We have seen a return on investment.
What other advice do I have?
I would definitely tell people to try the tool. They must go through and test out different solutions. Trellix Endpoint Security is fairly easy to use and manage for an enterprise solution. I'm in the process of getting more visibility for my service desk. The ability to lock it back down and only give what I want the service desk to see is valuable because it gives it a little bit more visibility without affecting what I've done as an enterprise admin. Overall, I rate the tool a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Presales Engineer at Rah Infotech Pvt Ltd
A stable anti-malware solution that provides DLP (data loss prevention) and DAC (Dynamic Access Control)
Pros and Cons
- "The most valuable features of the solution include DLP (data loss prevention), CASB (cloud access security broker) functionality, endpoint encryption, and cloud workload security."
- "The solution's documentation is not streamlined and is in bits and pieces, which should be in a single format."
What is our primary use case?
Customers use Trellix Endpoint Security as an anti-malware or antivirus solution that provides AI and machine learning features. The solution provides DAC (Dynamic Access Control) and HIPS (host intrusion prevention system) functionality in its firewall module. It also has a web control functionality, wherein we can allow, deny, or choose the category part and work it out.
What is most valuable?
Trellix Endpoint Security provides a single umbrella kind of architecture. A lot of different solutions come under a single umbrella and a single console. The most valuable features of the solution include DLP (data loss prevention), CASB (cloud access security broker) functionality, endpoint encryption, and cloud workload security. The solution also has features like application control, device control, and cloud DLP.
What needs improvement?
The solution's documentation is not streamlined and is in bits and pieces, which should be in a single format.
Trellix Endpoint Security should include the virtual patching feature in the next release.
For how long have I used the solution?
I have been working with Trellix Endpoint Security for one year.
What do I think about the stability of the solution?
I rate Trellix Endpoint Security a nine out of ten for stability.
What do I think about the scalability of the solution?
Trellix Endpoint Security has good scalability. Our customers for the solution are most enterprise businesses and government entities.
I rate the solution a nine out of ten for scalability.
How was the initial setup?
The solution’s initial setup is easy.
I rate Trellix Endpoint Security ten out of ten for the ease of its initial setup.
What about the implementation team?
The solution's deployment on the cloud is very fast because we give the requirement and get the solution. On-premises, the basic initial setup of the server takes about half an hour or one hour.
What's my experience with pricing, setup cost, and licensing?
Trellix Endpoint Security is neither a cheap nor an expensive solution.
On a scale from one to ten, where one is cheap and ten is expensive, I rate the solution's pricing a four out of ten.
What other advice do I have?
I am working with the latest version of Trellix Endpoint Security. We provide our customers with on-premises, on-cloud, and hybrid cloud deployment models for Trellix Endpoint Security.
Overall, I rate Trellix Endpoint Security an eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Distributor
Buyer's Guide
Trellix Endpoint Security
October 2024
Learn what your peers think about Trellix Endpoint Security. Get advice and tips from experienced pros sharing their opinions. Updated: October 2024.
816,406 professionals have used our research since 2012.
Endpoint Security solution that protects the productivity with a common service layer and our new anti-malware core engine that helps reduce the amount of resources and power required by a user's sys
Pros and Cons
- "Trellix Security Endpoint can promptly isolate any host machines directly from the console. If alerts are received and isolation is necessary, it can be accomplished through the console. The console itself holds significant value, accessible through a browser and allowing remote actions via cloud login."
- "If there's a possibility for remote assistance or investigation support in the future, it would be beneficial. Currently, we use another remote software for such purposes. If this feature could be included in the next version, that would be an improvement. The feature is called Remote Administration. I'm somewhat satisfied, but there's an issue I recently encountered. When attempting to scan a suspected host machine, Symantec Endpoint Security did not provide any alerts. However, when we installed Malwarebytes and ran a scan, it detected a threat that wasn't identified by Symantec. We raised this concern with the team for resolution, and the investigation is still ongoing."
What is our primary use case?
It is exclusively for Endpoint security. Besides that, we have subscribed to additional features such as MDX for mobile security and recently added ESL. Previously, we had Trend Micro, and at times we utilized it for malware. Comparing the three tools, I would recommend sticking with Trend Micro or Malwarebytes.
What is most valuable?
Trellix Security Endpoint can promptly isolate any host machines directly from the console. If alerts are received and isolation is necessary, it can be accomplished through the console. The console itself holds significant value, accessible through a browser and allowing remote actions via cloud login.
What needs improvement?
If there's a possibility for remote assistance or investigation support in the future, it would be beneficial. Currently, we use another remote software for such purposes. If this feature could be included in the next version, that would be an improvement. The feature is called Remote Administration.
I'm somewhat satisfied, but there's an issue I recently encountered. When attempting to scan a suspected host machine, Symantec Endpoint Security did not provide any alerts. However, when we installed Malwarebytes and ran a scan, it detected a threat that wasn't identified by Symantec. We raised this concern with the team for resolution, and the investigation is still ongoing.
For how long have I used the solution?
I have used Trellix Endpoint Security for the last two years.
What do I think about the stability of the solution?
It is stable and I would rate it 8 out of 10.
What do I think about the scalability of the solution?
Scalability is 8 out of 10.
How are customer service and support?
The issue with technical support lies in the response time. When submitting a complaint, there is a delay, sometimes taking one or two days for a response. This extended timeframe is considered quite lengthy.
How would you rate customer service and support?
Neutral
How was the initial setup?
The initial deployment of Trellix Endpoint Security involves some time to install agents on host machines. However, once in use, adding new versions and deploying agents to GPO becomes straightforward. It's possible to manually install agents on various devices, and the current process of deploying agents through GPO policies typically takes around ten to fifteen minutes per agent. The duration may vary based on internet connectivity, and it's generally faster when the machine is on the network.
I would rate it 8 out of 10 and it is very straightforward.
What's my experience with pricing, setup cost, and licensing?
It is reasonably priced.
What other advice do I have?
I would recommend it. I rate the solution an eight out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Client Engineer at KSB
An endpoint security solution with a valuable threat prevention feature
Pros and Cons
- "I like trap prevention DNS and threat prevention."
- "I would like to have the ability to have more control over the deployment in the next release. If you have this console in the cloud, you cannot make pilot groups for deploying the agents. We only have the current group. So, as soon as you inject the software, it will go directly into production, which doesn't work for us. We need to build up pilot groups slowly. We already requested to have this feature on the cloud, and we are still waiting."
What is our primary use case?
We use Trellix Endpoint Security for pattern-based scanning. We use it on all our handsets. We also use it for behavior-based adaptive threat prevention; it's a solution that will recognize malicious behavior.
What is most valuable?
I like trap prevention DNS and threat prevention.
What needs improvement?
I would like to have the ability to have more control over the deployment in the next release. If you have this console in the cloud, you cannot make pilot groups for deploying the agents. We only have the current group. So, as soon as you inject the software, it will go directly into production, which doesn't work for us. We need to build up pilot groups slowly. We already requested to have this feature on the cloud, and we are still waiting.
For how long have I used the solution?
I have been working with Trellix Endpoint Security for about 15 years.
What do I think about the stability of the solution?
Trellix Endpoint Security is mostly stable. I haven't had any false positives in the last few years.
On a scale from one to ten, I would give stability a nine.
What do I think about the scalability of the solution?
Trellix Endpoint Security is very scalable. Our company has three users, but we have more than 3000 devices.
How are customer service and support?
Technical support is good, and that's an important thing to have. They are very helpful and care about our needs. The best thing is that they speak German, and we can talk to them naturally in our language.
How was the initial setup?
The initial setup is quite straightforward.
What other advice do I have?
Trellix Endpoint Security is best suited for large companies. I would tell potential users to find an excellent partner to configure and build a basic policy setup. A third-level contact is also essential if it's not part of your daily responsibility.
On a scale from to ten, I would give Trellix Endpoint Security a nine.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
CTO at ABM Info. tech
Pretty straightforward and good integration but does not offer good technical support
Pros and Cons
- "The installation is pretty straightforward."
- "Every time we open a ticket with McAfee, their response differs and they are not consistent."
What is our primary use case?
The solution is specifically used at the endpoints. We do a lot of integrations with various clients.
What is most valuable?
A single agent can cover multiple units.
The installation is pretty straightforward.
The solution can integrate into other products.
What needs improvement?
The solution is not really stable.
Every time we open a ticket with McAfee, their response differs and they are not consistent. For example, they might say the issue will be addressed in the next release. Then, the release comes, and it is not available. Basically, we don't get a resolution from support.
This version is not very effective in our region.
The functionality of the product needs to improve the way it addresses zero-day threat levels.
For how long have I used the solution?
We've been using the solution since 2003.
What do I think about the stability of the solution?
The stability isn't so great. We've had issues with it in general and have reached out to technical support for help.
What do I think about the scalability of the solution?
We have three to five people that use the product right now. In Pakistan, we have three offices in all three major cities and set up the solution for clients. We also use it in the offices.
How are customer service and support?
Technical support is ineffective. Instead of dealing with the issue head-on, they tell us that the problem at hand will be fixed in the next release. They do not help at all.
However, our organization also offers technical support to our clients and we have a good experience - almost 20 years with McAfee and other solutions. We're good at troubleshooting.
Which solution did I use previously and why did I switch?
We started using Symantec, then we adopted different technologies including McAfee and SSP, which includes Microsoft Defender. We keep changing based on the price structure in the market.
How was the initial setup?
The initial setup is not overly complex or difficult. It's pretty simple and rather straightforward.
That said, I didn't handle the installation myself. We had a team that did it.
We did the installation with the main product that integrated with McAfee Endpoint Security. Between the two, the installation took a whole day, however, just the McAfee section takes about two or so hours.
What's my experience with pricing, setup cost, and licensing?
You do need to pay for a license. It's not a good idea to try and get a pirated copy.
Which other solutions did I evaluate?
We've looked into and worked with McAfee, Trend Micro, Kaspersky, and Symantec.
What other advice do I have?
We, at one time, were the official service partner for Symantec. We still provide support to the Pakistan market on behalf of Symantec.
While the solutions we use are on-premises, the latest upgraded services that we use are moving into the cloud, and the endpoints are on-premises. Now it's sort of a hybrid solution.
I'd rate the solution at a six out of ten.
I'd choose McAfee as maybe the third-best option, based on the experience I've had with it and the issues we've faced.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Instrument and Control Engineer at Reliance Industries Ltd
Helpful technical support, good stability, and offers good antivirus features
Pros and Cons
- "Technical support is always available and very helpful."
- "The initial setup isn't so easy. You need to know what you are doing."
What is our primary use case?
We use it for protecting our system nodes. It's run on Windows 7 and Windows 10.
What is most valuable?
The solution is stable.
You can scale the product.
Overall it's a good product that works well.
Technical support is always available and very helpful.
The antivirus component is very good.
What needs improvement?
It's not very user-friendly as sometimes you have to install the agents and then the agents do not get deleted from the database. Due to this, we have to manually delete it from the nodes and then again we have to install it again. When distributing the product, sometimes things get confused and we need to clean up the temporary folder.
The initial setup isn't so easy. You need to know what you are doing.
The products are getting obsolete too early. That's one of the issues we have with McAfee. They're coming up with new products too early. We installed 10.5 in 2016, and then in 2019, or 2020, we got 10.7. Now, 10.5 is obsolete. They are upgrading the versions too fast. Due to the fact that we have a subscription, we have to upgrade it to the next level which creates some maintenance issues.
For how long have I used the solution?
I have been working with the solution since 2016.
What do I think about the stability of the solution?
The solution is stable. There are no bugs or glitches. It doesn't crash or freeze.
The only thing is the reliability. It changes so fast and versions become obsolete and it creates maintenance issues for us.
What do I think about the scalability of the solution?
The solution is scalable. We do plan to increase usage. Earlier, we had VirusScan Enterprise, however, now, as it is integrated into the ENS threat prevention, we are migrating.
We have 15 or 20 users on the solution right now.
How are customer service and technical support?
We have found the technical support to be very helpful. They are responsive and available when we need them to help us troubleshoot. We are satisfied with their level of service.
Which solution did I use previously and why did I switch?
We haven't really used another solution in place of McAfee, although we do also use Symantec.
How was the initial setup?
The initial setup is not so straightforward. It's difficult if you aren't used to McAfee. It takes time to get the hang of it.
What other advice do I have?
I'm just a customer and an end-user. I don't have a business relationship with McAfee.
I'd rate the solution at an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Business Development Manager at A Cyber 1 Company
Efficient safeguarding of endpoints that provides robust protection, user-friendly features and significant cost savings
Pros and Cons
- "It provides a robust defense against cybersecurity threats while offering user-friendly features like notifications and approval prompts."
- "I've encountered minor challenges related to encryption."
What is our primary use case?
It serves as a comprehensive endpoint security solution that goes beyond traditional antivirus by incorporating features such as document scanning for sensitive information, approval workflows for document sharing, patch management, and advanced threat detection using AI and machine learning. It actively monitors various endpoints, including web interactions and email communications, to detect and prevent a wide range of attacks, even those that are not signature-based.
What is most valuable?
One of the standout features of this solution is its encryption capabilities and DLP functionality. It provides a robust defense against cybersecurity threats while offering user-friendly features like notifications and approval prompts. The encryption feature provides peace of mind in the event of a lost or stolen device, safeguarding sensitive conversations and data from unauthorized access. This level of protection significantly reduces the risk of extortion attempts or data breaches, making it a valuable asset for any organization. So far, I haven't experienced any security breaches or attacks.
What needs improvement?
I've encountered minor challenges related to encryption.
For how long have I used the solution?
I have been using it for a year.
What do I think about the scalability of the solution?
We have a user base of over one hundred individuals who use the software.
Which solution did I use previously and why did I switch?
The decision to implement endpoint security software like Trellix is made at a company-wide level, involving discussions and agreements between various entities, including our parent company and potentially other subsidiaries like the one in Sweden. This decision isn't made independently by individual branches like Kenya; rather, it's coordinated and negotiated at a higher level.
How was the initial setup?
I operate within a managed environment where the IT team handles the installation and setup of endpoint security software. Once installed, they provide me with the necessary details, such as login credentials and instructions for changing passwords. My role primarily involves using the machines provided to me, without needing to delve into the setup process.
What was our ROI?
Compared to the solutions, it helped us to save at least ten to twenty percent, if not more.
What's my experience with pricing, setup cost, and licensing?
I would emphasize its affordability rather than merely focusing on cheapness. It provides good value by striking a balance between cost-effectiveness and feature richness.
What other advice do I have?
I would recommend conducting a proof of concept to explore the features firsthand. It's essential to understand what you currently have in place, as that will help determine whether the solution is the right fit for your needs. After that, ensure that the POC is conducted efficiently so that you can make an informed decision about whether to proceed with the solution or consider other options. Overall, , I would rate it an eight out of ten. It's a good solution that meets my needs satisfactorily.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Customer/Partner
Information Technology Consultant at a outsourcing company with 501-1,000 employees
Useful for containment and taking a triage image
Pros and Cons
- "The most valuable feature of Trellix Endpoint Security is containment, which takes less than a minute."
- "Currently, Trellix Endpoint Security can't find the running mutexes, while other open-source products can do it."
What is our primary use case?
We build our own use cases and those provided by the vendor for specific upcoming attack scenarios. Configuring the rule set using Trellix Endpoint Security is very much flexible based on the IOCs.
How has it helped my organization?
Trellix Endpoint Security is good for doing containment immediately. We can get visibility of processes or services running all over the enterprise, where the agent gets information on a particular end-user system. Since Trellix Endpoint Security keeps the data for three months, we can get a complete picture of the files downloaded from the end user mission. So Trellix Endpoint Security is very helpful when you do forensics. The only drawback is that we cannot change its format, and there is no workaround currently.
What is most valuable?
The most valuable feature of Trellix Endpoint Security is containment, which takes less than a minute. It also has a dual containment feature. Trellix Endpoint Security is also useful for taking the triage image, which takes roughly thirty minutes. So it's pretty fast, and we have multiple configuration sets. We can precisely take a triage image based on what you want, like endpoint logs, antivirus logs, or the RAM.
What needs improvement?
Currently, Trellix Endpoint Security can't find the running mutexes, while other open-source products can do it. Mutex is something like a malware user. Secondly, the solution should support multiple output formats for the triage image. Currently, the solution has only Mandiant format, where you can't use tools like volatility to analyze the memory image.
It would be good if Trellix Endpoint Security had a good visualization like other products, such as SentinelOne and Carbon Black.
For how long have I used the solution?
I have been using Trellix Endpoint Security for one year and six months.
What do I think about the stability of the solution?
I rate Trellix Endpoint Security a seven out of ten for stability because it crashes frequently and requires a lot of maintenance.
What do I think about the scalability of the solution?
I rate Trellix Endpoint Security a nine out of ten for scalability. We have plans to increase the usage of the solution in the future.
How was the initial setup?
I rate Trellix Endpoint Security an eight out of ten for ease of initial setup.
What's my experience with pricing, setup cost, and licensing?
I rate Trellix Endpoint Security a nine out of ten for pricing.
What other advice do I have?
I am using the latest version of Trellix Endpoint Security. Using Trellix Endpoint Security depends upon the user's organizational needs. If their only concern is containing and taking the triage image, and if they are comfortable doing forensics with a deadline, then they can use Trellix Endpoint Security. But if some companies want to integrate their in-house or third-party tools, Trellix Endpoint Security is not a good option.
Overall, I rate Trellix Endpoint Security a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Trellix Endpoint Security Report and get advice and tips from experienced pros
sharing their opinions.
Updated: October 2024
Popular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
Cisco Secure Endpoint
SentinelOne Singularity Complete
Fortinet FortiClient
Cortex XDR by Palo Alto Networks
Symantec Endpoint Security
Intercept X Endpoint
Trend Vision One Endpoint Security
Kaspersky Endpoint Security for Business
ESET Endpoint Protection Platform
VMware Carbon Black Endpoint
Check Point Harmony Endpoint
Buyer's Guide
Download our free Trellix Endpoint Security Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Symantec Endpoint vs. McAfee Complete Endpoint Protection: Technical Comparison Between Data Loss Protection Solutions
- How does McAfee Endpoint Security compare with MVISION?
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?
- What to choose: an endpoint antivirus, an EDR solution or both?
- Are you aware of SIEM platforms that integrate both Active Directory auditing and security monitoring tools?
- Which ransomware is the biggest threat in 2020?