We use it for protecting our system nodes. It's run on Windows 7 and Windows 10.
Instrument and Control Engineer at Reliance Industries Ltd
Helpful technical support, good stability, and offers good antivirus features
Pros and Cons
- "Technical support is always available and very helpful."
- "The initial setup isn't so easy. You need to know what you are doing."
What is our primary use case?
What is most valuable?
The solution is stable.
You can scale the product.
Overall it's a good product that works well.
Technical support is always available and very helpful.
The antivirus component is very good.
What needs improvement?
It's not very user-friendly as sometimes you have to install the agents and then the agents do not get deleted from the database. Due to this, we have to manually delete it from the nodes and then again we have to install it again. When distributing the product, sometimes things get confused and we need to clean up the temporary folder.
The initial setup isn't so easy. You need to know what you are doing.
The products are getting obsolete too early. That's one of the issues we have with McAfee. They're coming up with new products too early. We installed 10.5 in 2016, and then in 2019, or 2020, we got 10.7. Now, 10.5 is obsolete. They are upgrading the versions too fast. Due to the fact that we have a subscription, we have to upgrade it to the next level which creates some maintenance issues.
For how long have I used the solution?
I have been working with the solution since 2016.
Buyer's Guide
Trellix Endpoint Security
March 2025

Learn what your peers think about Trellix Endpoint Security. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
848,716 professionals have used our research since 2012.
What do I think about the stability of the solution?
The solution is stable. There are no bugs or glitches. It doesn't crash or freeze.
The only thing is the reliability. It changes so fast and versions become obsolete and it creates maintenance issues for us.
What do I think about the scalability of the solution?
The solution is scalable. We do plan to increase usage. Earlier, we had VirusScan Enterprise, however, now, as it is integrated into the ENS threat prevention, we are migrating.
We have 15 or 20 users on the solution right now.
How are customer service and support?
We have found the technical support to be very helpful. They are responsive and available when we need them to help us troubleshoot. We are satisfied with their level of service.
Which solution did I use previously and why did I switch?
We haven't really used another solution in place of McAfee, although we do also use Symantec.
How was the initial setup?
The initial setup is not so straightforward. It's difficult if you aren't used to McAfee. It takes time to get the hang of it.
What other advice do I have?
I'm just a customer and an end-user. I don't have a business relationship with McAfee.
I'd rate the solution at an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Senior Chief Manager at Arcil
A stable antivirus solution, but consumes too much memory and CPU resources
Pros and Cons
- "The solution is stable."
- "We don't like the solution since it requires much memory consumption and consumes much CPU resources."
What is our primary use case?
We are using ePO Center Server to communicate with all the endpoints that are in the network. While I cannot be certain, I believe the relevant version is McAfee 8 or 9.
We make use of McAfee Agent version number 5.6.4.151. We utilize McAfee Data Exchange Layer.
The McAfee Endpoint Security version to which we refer is 10.7.
We use the solution for antivirus purposes.
What needs improvement?
We don't like the solution since it requires much memory consumption and consumes much CPU resources. All the machines becomes very slow whenever it uses its tab scans. For this reason, we consider the solution to not be good nowadays. The newer solutions consume less memory and CPU.
We employ the solution for our antivirus needs, for which it is solely suited, and not as an EDR. We are actually looking for an XDR solution.
The solution is currently outdated. We are looking for Next-Gen antivirus along with EDR and it should have XDR capabilities as well. This would take care of the network and the properties that are running in the background. They should be protected from cyber threats.
The solution should also be faster. McAfee actually offers EDR and XDR capabilities but, based on our experience, it consumes an inordinate amount of memory and CPU and this causes the system to be slow. At present, McAfee does not lead the market when it comes to antivirus security solutions.
For how long have I used the solution?
We have been using McAfee Endpoint Security for eight to ten years.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
While the solution is scalable, we wish to change it with the latest Next-Gen antivirus and EDR option, one which comes with both EDR and XDR capabilities.
How are customer service and technical support?
We have not had direct contact with McAfee support. We have received support from the vendor. The support is forwarded to McAfee should we encounter problems. It is good and I have no issues with it.
Which solution did I use previously and why did I switch?
We did not make use of other solutions prior to going with McAfee Endpoint Security, which we have been using since 2009 or 2010. At that time, an attack happened which caused us to evaluate other antivirus security options. In those days McAfee and Symantec were the market leaders. We are talking about 2008, 2010. This is why awareness of these solutions was prevalent. At the time, Trend Micro greatly lagged behind these two security solutions.
How was the initial setup?
The installation is easy, but expertise is required.
While the installation was not especially time consuming, we would occasionally have to manually install or remove the entire tool. McAfee Endpoint Security can be considered a good product but outdated. The beta version, the one we are currently using, is not up to date. Nowadays, everybody uses EDR and XDR solutions for their security needs.
What about the implementation team?
I have a team which was responsible for the installation. As mentioned, I am currently looking for another solution, one which would allow installation to also be handled remotely from the central management portal dashboard or to have the .exe file installed in each endpoint.
We have our own team, comprised of three to four support HR, who take care of installation, daily troubleshooting, support and all necessary changes. As such, we forward to receive remote support for all our users.
What's my experience with pricing, setup cost, and licensing?
We took out a three-year license, including support, but it is slated to end come December. We would like to switch to a yearly subscription.
We pay for the license on an annual basis.
What other advice do I have?
The solution is in-house, on-premises.
There are 300 people making use of the solution in our organization.
When it comes to the question of whether I would recommend this solution to others, we can see that McAfee greatly lags behind CrowdStrike, Palo Alto Cortex, Cynet and Sophos, which are the top performing security solutions on the market.
I would rate McAfee Endpoint Security as a five or six out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Trellix Endpoint Security
March 2025

Learn what your peers think about Trellix Endpoint Security. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
848,716 professionals have used our research since 2012.
Chief Technology Officer at S.C. Vault Apps S.R.L
The solution is used for drive encryption but it is pretty hard to configure and maintain
Pros and Cons
- "The endpoint security, antivirus and firewall are the most valuable features of Trellix Endpoint Security."
- "The solution should provide a more easy way to uninstall it on specific stations."
What is our primary use case?
The solution is used for drive encryption and as a policy orchestrator.
What is most valuable?
The endpoint security, antivirus and firewall are the most valuable features of Trellix Endpoint Security.
What needs improvement?
Trellix Endpoint Security is pretty hard to configure and maintain. You need to have a dedicated person for the solution. It is very complex when you want to change the data loss prevention and data leak prevention policies. It's quite hard to give some exceptions on specific computers. It's not very fast onboarding with the orchestrator.
The solution should provide a more easy way to uninstall it on specific stations.
For how long have I used the solution?
I have been working with Trellix Endpoint Security for two years.
What do I think about the stability of the solution?
The solution’s stability is quite okay.
I rate Trellix Endpoint Security an eight or nine out of ten for stability.
What do I think about the scalability of the solution?
Trellix Endpoint Security is a scalable solution. Around 200 users are using the solution in our organization.
How was the initial setup?
Currently, the solution's initial setup on a new computer is quite simple. Although some time is needed to configure all the policies, especially for our needs, it is not too difficult.
The deployment takes one week internally and two days of professional help from a local vendor partner.
It is enough to have one administrator for the solution’s maintenance, but we do not have one full-time administrator. A dedicated person is needed for the maintenance and monitoring of the solution to take it to its full potential. The resources or computers needed to use the solution make it quite expensive. Especially if you put the drive encryption and don't have new computers, you will have to delete multiple files, which is quite a pain.
What about the implementation team?
The solution was implemented by a local vendor partner.
What was our ROI?
We have seen a return on investment with Trellix Endpoint Security in terms of time.
What's my experience with pricing, setup cost, and licensing?
Compared to Bitdefender, Trellix Endpoint Security is more expensive, but considering it comes with DLP, the solution's price is fine. The licensing cost for the solution is 20k a year for 400 users and 10k for 200 users. You don't have to pay additionally for the solution's maintenance.
What other advice do I have?
The solution's effectiveness depends a lot on the stations that you want to install it on. I will not recommend Trellix Endpoint Security for people with a lot of small text files on the computer. The DLP solution is quite okay. It is not so easy to configure in terms of the computers and permission to allow USB devices on specific computers.
Overall, I rate Trellix Endpoint Security a seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Architect at a government with 10,001+ employees
Struggle with patch management simplifies but complexity in automation persists
Pros and Cons
- "I have not faced any problems with scalability so far, but we are starting an upgrade or overhaul."
- "The product does not seem to be cloud-native and there are issues with automating it. Automation is not intuitive."
What is our primary use case?
We have Trellix Endpoint Security available and are trying to do an upgrade. I am trying to figure out whether I can get rid of my SUSI manager, WSUS, or 'WaySUS' as we call it, the Windows patching environment.
What is most valuable?
I have been a customer of Trellix Endpoint Security for years, but I am not necessarily satisfied. The product does not seem to be cloud-native and there are issues with automating it. It might have something to do with our skill set, but automation is not intuitive.
What needs improvement?
Automation and overall complexity need improvement. The product does not seem to be cloud-native.
For how long have I used the solution?
It has been in place for years.
What was my experience with deployment of the solution?
Deployment and configuration become complex quickly, especially in a micro-segmented environment.
What do I think about the scalability of the solution?
I have not faced any problems with scalability so far, but we are starting an upgrade or overhaul.
What other advice do I have?
I would rate Trellix Endpoint Security a six and a half to seven. I am not sure whether it is a comprehensive review of the product, but these are my observations. I would rate the overall solution a 6.5 out of 10.
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Last updated: Apr 18, 2025
Flag as inappropriateSenior Technical Engineer at Safezone Secure Solutions Private Limited
Protects the productivity of users with a common service layer and our new anti-malware core engine that helps reduce the amount of resources and power required by a user
Pros and Cons
- "Trellix Endpoint Security offers robust access protection, addressing major concerns in prevention. It provides both application control and user access control within its access protection features."
- "Recently, Trellix has introduced a CDR, which involves more manual response than automatic. I believe they should enhance the system by adding features like automated response and the ability to create custom playbooks. This is crucial for an EDR solution, and currently, Trellix lacks this feature while other products offer it."
What is our primary use case?
Previously, before the transition to Trellix, we used McAfee. Following a merger, FireEye now collaborates with McAfee, utilizing its console and threat intelligence.
In terms of endpoint security, I would recommend Trellix Endpoint Security, especially for users prioritizing threat intelligence and seeking an internal solution. Trellix has proven effective in areas such as blocking capabilities, device control, and application control.
What is most valuable?
Trellix Endpoint Security offers robust access protection, addressing major concerns in prevention. It provides both application control and user access control within its access protection features.
What needs improvement?
Recently, Trellix has introduced a CDR, which involves more manual response than automatic. I believe they should enhance the system by adding features like automated response and the ability to create custom playbooks. This is crucial for an EDR solution, and currently, Trellix lacks this feature while other products offer it.
For how long have I used the solution?
I have been using this solution for the past five years.
What do I think about the stability of the solution?
Previously, I would have rated it around ten, but now it's more like seven. They need to enhance the EDR part and put in more effort.
What do I think about the scalability of the solution?
For on-premise implementation, I would rate it a six as there is a need for more scalable options during the initial setup. On the other hand, for cloud implementation, I would give it a nine because it offers enabled scalability options.
How are customer service and support?
I acknowledge their technical expertise in the product, but the support has not been as satisfactory as it was with McAfee. I believe there is a need for improvement, whether it's the team's capacity or response time. Previously, the response time was excellent, but now it has increased, causing frustration among customers and creating potential issues. Reducing this delay would be beneficial.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
If someone asks for a bundled solution with strong threat detection, I would recommend Trellix because it stands out as the only bundle solution with a decent amount of threat detection. While there are other bundled solutions in the market, Trellix excels in both access and detection capabilities.
How was the initial setup?
Regarding the initial setup of Trellix Endpoint Security, I am accustomed to executing it accurately. I would rate it around 8.5 or 9.I have successfully implemented Trellix Endpoint Security for up to five thousand endpoints, and the process took approximately four days. For smaller enterprises, it can be completed in about one day.
What's my experience with pricing, setup cost, and licensing?
I would rate the cost as four to five, considering it's normal compared to other products. I find it nominal and worth the money.
What other advice do I have?
The support phase needs improvement, specifically in reducing the time taken to respond to calls. Additionally, the EDR functionality in Intelix requires enhancement. While McAfee fulfilled product functionality even without strong support, the introduction of EDR seems to be partial and lacks automated response capabilities. The overall rating for Trellix Endpoint Security would be an eight.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
IT Security Specialist at Commercial Bank of Ethiopia
Stable with good technical support and very good threat prevention capabilities
Pros and Cons
- "The product is quite user-friendly."
- "Users can just install software into their computers. We need some sort of application control system that, if there are any pieces of software that are not whitelisted, then the solution could flag it or maybe alert the administers. That would be very helpful."
What is our primary use case?
We basically use the solution for threat detection. It's for security purposes.
What is most valuable?
The solution is pretty good for threat prevention, web protection, adaptive threat protection, and other tasks.
The solution is very stable.
We have had a good experience dealing with technical support.
The product is quite user-friendly.
What needs improvement?
Currently, we have the threat prevention as well as the web protection, and the McAfee firewall, which we were using before, however, we have not installed it on any of our machines. We have disabled it due to the fact that a lot of stuff was being blocked, it was blocking a lot of internal stuff, which meant it needed some fine-tuning. We were supposed to fine-tune it so that we can recognize our items, however, we're still working on that.
We wanted an EDR solution, and our first option was McAfee as the EDR would go hand in hand with the Endpoint integration. We'd like McAfee to offer stronger security. It's not that it isn't strong right now, however, it needs to continue to improve as attacks are always evolving. We are concerned some attacks may be able to find a way to bypass McAfee. If the solution offered something that could detect better, it would be ideal. It would add more value to what is already in place.
I know that they have application control and all the like. The one feature that maybe is lacking is a different module for the antivirus, however, we have a lot of applications that are running in our environment that were not authorized.
Users can just install software into their computers. We need some sort of application control system that, if there are any pieces of software that are not whitelisted, then the solution could flag it or maybe alert the administers. That would be very helpful.
For how long have I used the solution?
I joined the organization a little while back in 2016 and when I got here they were already using McAfee product. Therefore, I've been using the solution for a few years now.
What do I think about the stability of the solution?
We've found the solution to be quite stable. It doesn't crash or freeze. There are no bugs or glitches. It's quite reliable.
What do I think about the scalability of the solution?
We haven't tried scaling it to as normally the license that we buy, we buy for 650 Rand and at this point, we haven't even tried adding more to try and scale it to that.
How are customer service and technical support?
The tech support has been superb. You log a call. Sometimes we are in a different time zone when we log a service request. However, they are very responsive. I was on the line with them a few hours ago and they were helping me with an issue I was having. We are currently in the process of consolidating our SQL servers. We want them to be running from a centralized server instead of having different SQL servers scattered all over the place. Technical support is really great at helping us with the process.
How was the initial setup?
While I wasn't at the company for the original implementation, looking at it, it's not that complex of a process. When I got here, we were using the lower version and then we've just upgraded it and used a higher version level. The process wasn't difficult. We upgraded to 10.5, 10.6, now we are on 10.7.
What's my experience with pricing, setup cost, and licensing?
We pay 650 Rand for a license. It is a perpetual license which we normally run for two years. It will be expiring sometime in July and our renewal is normally for two years.
When we are looking at the pricing, nobody will ever say the pricing is bad. Normally what we do is we'll take quotes from different local partners, as McAfee doesn't allow us to buy direct from them. Therefore, we typically deal with resellers.
What other advice do I have?
We are customers and end-users. We don't have a business relationship with McAfee.
We are a central bank and one of the things that we haven't really experienced or gone into is putting our solutions into the cloud - even though everything is moving in that direction. We are moving slowly in that direction as well. We'll get there one day.
I have found this solution easy to use. When you need support, you get it. Even in terms of protection, it's fine. I would recommend it to other users.
I'd rate the solution at an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Endpoint Security solution that protects the productivity with a common service layer and our new anti-malware core engine that helps reduce the amount of resources and power required by a user's sys
Pros and Cons
- "Trellix Security Endpoint can promptly isolate any host machines directly from the console. If alerts are received and isolation is necessary, it can be accomplished through the console. The console itself holds significant value, accessible through a browser and allowing remote actions via cloud login."
- "If there's a possibility for remote assistance or investigation support in the future, it would be beneficial. Currently, we use another remote software for such purposes. If this feature could be included in the next version, that would be an improvement. The feature is called Remote Administration. I'm somewhat satisfied, but there's an issue I recently encountered. When attempting to scan a suspected host machine, Symantec Endpoint Security did not provide any alerts. However, when we installed Malwarebytes and ran a scan, it detected a threat that wasn't identified by Symantec. We raised this concern with the team for resolution, and the investigation is still ongoing."
What is our primary use case?
It is exclusively for Endpoint security. Besides that, we have subscribed to additional features such as MDX for mobile security and recently added ESL. Previously, we had Trend Micro, and at times we utilized it for malware. Comparing the three tools, I would recommend sticking with Trend Micro or Malwarebytes.
What is most valuable?
Trellix Security Endpoint can promptly isolate any host machines directly from the console. If alerts are received and isolation is necessary, it can be accomplished through the console. The console itself holds significant value, accessible through a browser and allowing remote actions via cloud login.
What needs improvement?
If there's a possibility for remote assistance or investigation support in the future, it would be beneficial. Currently, we use another remote software for such purposes. If this feature could be included in the next version, that would be an improvement. The feature is called Remote Administration.
I'm somewhat satisfied, but there's an issue I recently encountered. When attempting to scan a suspected host machine, Symantec Endpoint Security did not provide any alerts. However, when we installed Malwarebytes and ran a scan, it detected a threat that wasn't identified by Symantec. We raised this concern with the team for resolution, and the investigation is still ongoing.
For how long have I used the solution?
I have used Trellix Endpoint Security for the last two years.
What do I think about the stability of the solution?
It is stable and I would rate it 8 out of 10.
What do I think about the scalability of the solution?
Scalability is 8 out of 10.
How are customer service and support?
The issue with technical support lies in the response time. When submitting a complaint, there is a delay, sometimes taking one or two days for a response. This extended timeframe is considered quite lengthy.
How would you rate customer service and support?
Neutral
How was the initial setup?
The initial deployment of Trellix Endpoint Security involves some time to install agents on host machines. However, once in use, adding new versions and deploying agents to GPO becomes straightforward. It's possible to manually install agents on various devices, and the current process of deploying agents through GPO policies typically takes around ten to fifteen minutes per agent. The duration may vary based on internet connectivity, and it's generally faster when the machine is on the network.
I would rate it 8 out of 10 and it is very straightforward.
What's my experience with pricing, setup cost, and licensing?
It is reasonably priced.
What other advice do I have?
I would recommend it. I rate the solution an eight out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Sr. Security Engineer at a tech vendor with 10,001+ employees
The Complete Endpoint Suite has certainly simplified the build procedure.
Valuable Features:
I personally really like what the folks at Intel did when creating the Endpoint Protection Suites. Running the EASI.exe installer from the .zip file simplifies the build process for newer administrators and engineers by installing a base-system tree, basic policies, and streamlining the installation process.
What most don't seem to grasp is that Endpoint Protection is a Suite Install Package. There are 6 different versions of Endpoint Protection, each coming with different applications installed. Primarily, I usually install the Endpoint Protection Advanced Suite (EPA) & Complete Endpoint Protection Suite (CEE). I recommend installing SQL either on the same box as ePO if you're managing under 5000 endpoints, or on a separate SQL server if higher, overusing the SQL Express that comes with the Installer. The primary reason is that if you use SQL Express, you do not have access to SQL Management Studio. Having access to the data tables and being able to clean up the space on the SQL server over time will be a must. The Complete Endpoint Suite has certainly simplified the build procedure.
Improvements to My Organization:
I have been installing ePO and the separate modules for years. I am a bit biased on Intel Security products as it is how I make my living as a Subject Matter Expert .
Room for Improvement:
There are a few things I wish the folks at Intel would fix.
The primary for me is with the ePO Query creation. Queries in ePO are powerful tools as they can be used to create dashboards, server tasks, and be exported or rolled up to Senior Management. In older versions of ePO (4.0 & 4.5) the Queries, gave a wide range of data. With ePO 4.6, 5.0, 5.1 & 5.3 the data could be pulled from various installed products to get the data that you were looking for, with the current versions of ePO you can only pull the fields listed in the "Result Type/Feature Group" and it is very limited.
A good example...If i wanted to try and create one report that shows all Common Configuration Enumeration (CCE) data (this data comes from Policy Auditor) while also showing what software is installed from each system (this data comes from Application Control) and adding in fields such as IPv4, FQDN, OS version, Domain...Simplified, if I could pull Hardware Asset, Software Asset, CCE Data, and Policy Auditor Scoring all on one report, it would make my life so much easier.
Alas, this cannot be done with the current Query Building setup. The fields that are available are limited to each application installed and are only for that application.
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Buyer's Guide
Download our free Trellix Endpoint Security Report and get advice and tips from experienced pros
sharing their opinions.
Updated: March 2025
Popular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
SentinelOne Singularity Complete
Cortex XDR by Palo Alto Networks
Fortinet FortiClient
Cisco Secure Endpoint
Symantec Endpoint Security
HP Wolf Security
Trend Vision One Endpoint Security
Kaspersky Endpoint Security for Business
Intercept X Endpoint
ESET Endpoint Protection Platform
Check Point Harmony Endpoint
Buyer's Guide
Download our free Trellix Endpoint Security Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Symantec Endpoint vs. McAfee Complete Endpoint Protection: Technical Comparison Between Data Loss Protection Solutions
- How does McAfee Endpoint Security compare with MVISION?
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What's the best way to trial endpoint protection solutions?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?
- What to choose: an endpoint antivirus, an EDR solution or both?
- Which ransomware is the biggest threat in 2020?