It serves as a comprehensive endpoint security solution that goes beyond traditional antivirus by incorporating features such as document scanning for sensitive information, approval workflows for document sharing, patch management, and advanced threat detection using AI and machine learning. It actively monitors various endpoints, including web interactions and email communications, to detect and prevent a wide range of attacks, even those that are not signature-based.
Business Development Manager at A Cyber 1 Company
Efficient safeguarding of endpoints that provides robust protection, user-friendly features and significant cost savings
Pros and Cons
- "It provides a robust defense against cybersecurity threats while offering user-friendly features like notifications and approval prompts."
- "I've encountered minor challenges related to encryption."
What is our primary use case?
What is most valuable?
One of the standout features of this solution is its encryption capabilities and DLP functionality. It provides a robust defense against cybersecurity threats while offering user-friendly features like notifications and approval prompts. The encryption feature provides peace of mind in the event of a lost or stolen device, safeguarding sensitive conversations and data from unauthorized access. This level of protection significantly reduces the risk of extortion attempts or data breaches, making it a valuable asset for any organization. So far, I haven't experienced any security breaches or attacks.
What needs improvement?
I've encountered minor challenges related to encryption.
For how long have I used the solution?
I have been using it for a year.
Buyer's Guide
Trellix Endpoint Security
December 2024
Learn what your peers think about Trellix Endpoint Security. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
831,265 professionals have used our research since 2012.
What do I think about the scalability of the solution?
We have a user base of over one hundred individuals who use the software.
Which solution did I use previously and why did I switch?
The decision to implement endpoint security software like Trellix is made at a company-wide level, involving discussions and agreements between various entities, including our parent company and potentially other subsidiaries like the one in Sweden. This decision isn't made independently by individual branches like Kenya; rather, it's coordinated and negotiated at a higher level.
How was the initial setup?
I operate within a managed environment where the IT team handles the installation and setup of endpoint security software. Once installed, they provide me with the necessary details, such as login credentials and instructions for changing passwords. My role primarily involves using the machines provided to me, without needing to delve into the setup process.
What was our ROI?
Compared to the solutions, it helped us to save at least ten to twenty percent, if not more.
What's my experience with pricing, setup cost, and licensing?
I would emphasize its affordability rather than merely focusing on cheapness. It provides good value by striking a balance between cost-effectiveness and feature richness.
What other advice do I have?
I would recommend conducting a proof of concept to explore the features firsthand. It's essential to understand what you currently have in place, as that will help determine whether the solution is the right fit for your needs. After that, ensure that the POC is conducted efficiently so that you can make an informed decision about whether to proceed with the solution or consider other options. Overall, , I would rate it an eight out of ten. It's a good solution that meets my needs satisfactorily.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Customer/Partner
IT Services Network Analyst at Saskatchewan Workers' Compensation Board
A reliable and easy-to-deploy product that protects an organization’s network from malware
Pros and Cons
- "The product is fairly reliable."
- "The product is not easy to use."
What is most valuable?
The product is fairly reliable. I have been using the DLP functionality a lot. It blocks all USB-connected devices but still allows charging external devices like phones. It keeps out any malware. It does a good job of protecting our network as an enterprise solution. I mainly use it as an antivirus and DLP solution.
What needs improvement?
The product is not easy to use. Moving around in it is cumbersome. I have heard other users saying that it is cumbersome to find things. Creating and deploying policies with DLP can be really cumbersome. It can be difficult if we don’t know how to use it. Sometimes, we have difficulty in communicating with clients. Sometimes, we have to go through troubleshooting to fix it.
For how long have I used the solution?
I have been using the solution for 17 to 18 years. I am using the latest version of the solution.
What do I think about the stability of the solution?
I rate the product’s stability an eight out of ten.
What do I think about the scalability of the solution?
I rate the solution’s scalability an eight out of ten.
How was the initial setup?
It's pretty straightforward to deploy the product as an enterprise solution. I create a System Tree, and I break everything out between VMs, workstations, servers, and VLANs.
What was our ROI?
We have seen a return on investment.
What other advice do I have?
I would definitely tell people to try the tool. They must go through and test out different solutions. Trellix Endpoint Security is fairly easy to use and manage for an enterprise solution. I'm in the process of getting more visibility for my service desk. The ability to lock it back down and only give what I want the service desk to see is valuable because it gives it a little bit more visibility without affecting what I've done as an enterprise admin. Overall, I rate the tool a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Trellix Endpoint Security
December 2024
Learn what your peers think about Trellix Endpoint Security. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
831,265 professionals have used our research since 2012.
Network Security & Data Management Admin at Digitaltrack
An easy-to-deploy endpoint security tool that needs to improve its technical support
Pros and Cons
- "The initial setup of Trellix Endpoint Security was straightforward."
- "The solution's technical support should be improved since we faced a lot of issues with the support. There were some delays in responses from the technical support."
What is our primary use case?
In my company, we use Trellix Endpoint Security for its endpoint security capabilities. Wherever there is a need for someone to comply with ISMS, we deploy Trellix Endpoint Security over there and support them in maintaining it.
What is most valuable?
The most valuable feature of the solution is that it allows our company to opt for single management for multiple products. The tool also supports DLP encryption or proxy can be managed by a single management console, which is a major advantage.
What needs improvement?
Trellix Endpoint Security doesn't support Mac devices. Trellix Endpoint Security doesn't offer full-fledged support for Linux.
In the future, I would like the product to support Mac and Linux.
When it comes to classification, Trellix has its own DLP solution. They do provide classification in Trellix Endpoint Security, but not at a full-fledged level. It would be good if Trellix Endpoint Security provided a full-fledged classification.
The solution's technical support should be improved since we faced a lot of issues with the support. There were some delays in responses from the technical support. Technical support also lacks in providing proper solutions to issues.
For how long have I used the solution?
I have been using Trellix Endpoint Security for ten to twelve years. I use the solution's latest version. My company has a partnership with Trellix.
What do I think about the stability of the solution?
Stability-wise, I rate the solution an eight out of ten.
What do I think about the scalability of the solution?
Scalability-wise, I rate the solution a seven out of ten.
How are customer service and support?
I rate the technical support below five out of ten.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I have used different products in the past. Since we are a consultant, we have to work with multiple vendors.
How was the initial setup?
The initial setup of Trellix Endpoint Security was straightforward.
The solution is deployed on the hybrid cloud. Trellix Endpoint Security provides its tool as a SaaS product.
The deployment process can be done in around two hours.
Our company has around 40 engineers to deploy and manage the maintenance of the product.
What's my experience with pricing, setup cost, and licensing?
There are some extra expenses for using the product, in addition to licensing related to the maintenance of the product.
What other advice do I have?
The product is good, but that doesn't matter if the support is not proper.
I would definitely recommend the solution to those planning to use provided the support is good. If the support is not good, our company will have to state both the pros and cons of the product to its potential users, after which the customer can choose it if they find the pros to be favorable.
Overall, I rate the solution a seven out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer:
Information Technology Consultant at a outsourcing company with 501-1,000 employees
Useful for containment and taking a triage image
Pros and Cons
- "The most valuable feature of Trellix Endpoint Security is containment, which takes less than a minute."
- "Currently, Trellix Endpoint Security can't find the running mutexes, while other open-source products can do it."
What is our primary use case?
We build our own use cases and those provided by the vendor for specific upcoming attack scenarios. Configuring the rule set using Trellix Endpoint Security is very much flexible based on the IOCs.
How has it helped my organization?
Trellix Endpoint Security is good for doing containment immediately. We can get visibility of processes or services running all over the enterprise, where the agent gets information on a particular end-user system. Since Trellix Endpoint Security keeps the data for three months, we can get a complete picture of the files downloaded from the end user mission. So Trellix Endpoint Security is very helpful when you do forensics. The only drawback is that we cannot change its format, and there is no workaround currently.
What is most valuable?
The most valuable feature of Trellix Endpoint Security is containment, which takes less than a minute. It also has a dual containment feature. Trellix Endpoint Security is also useful for taking the triage image, which takes roughly thirty minutes. So it's pretty fast, and we have multiple configuration sets. We can precisely take a triage image based on what you want, like endpoint logs, antivirus logs, or the RAM.
What needs improvement?
Currently, Trellix Endpoint Security can't find the running mutexes, while other open-source products can do it. Mutex is something like a malware user. Secondly, the solution should support multiple output formats for the triage image. Currently, the solution has only Mandiant format, where you can't use tools like volatility to analyze the memory image.
It would be good if Trellix Endpoint Security had a good visualization like other products, such as SentinelOne and Carbon Black.
For how long have I used the solution?
I have been using Trellix Endpoint Security for one year and six months.
What do I think about the stability of the solution?
I rate Trellix Endpoint Security a seven out of ten for stability because it crashes frequently and requires a lot of maintenance.
What do I think about the scalability of the solution?
I rate Trellix Endpoint Security a nine out of ten for scalability. We have plans to increase the usage of the solution in the future.
How was the initial setup?
I rate Trellix Endpoint Security an eight out of ten for ease of initial setup.
What's my experience with pricing, setup cost, and licensing?
I rate Trellix Endpoint Security a nine out of ten for pricing.
What other advice do I have?
I am using the latest version of Trellix Endpoint Security. Using Trellix Endpoint Security depends upon the user's organizational needs. If their only concern is containing and taking the triage image, and if they are comfortable doing forensics with a deadline, then they can use Trellix Endpoint Security. But if some companies want to integrate their in-house or third-party tools, Trellix Endpoint Security is not a good option.
Overall, I rate Trellix Endpoint Security a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
VP - Cyber Security at a manufacturing company with 11-50 employees
Very scalable and easy to manage but package size is too large
Pros and Cons
- "The manageability of the product itself is its most valuable aspect. You have the underlying EPO, and on top of it, you can deploy the various components as you require. This is unlike other solutions like Symantec where you have to deploy everything or nothing. With this solution, you can choose to only deploy antivirus or only deploy a firewall, or only something else. I choose the components and that deployment is done through EPO. It makes manageability very flexible."
- "There are two main areas that require improvement. One is the size of the packages. Although I'll admit manageability is good, if I want to deploy, let's say just the antivirus or just the firewall, each of those package sizes are quite large. They are sometimes as big as 200MB or 250MB. When I have operations in remote areas where connectivity is always poor, it's difficult. To deploy such a package in a remote location over the internet or something like that is always challenging."
What is our primary use case?
The solution has three primary uses for us.
Our environment is Windows-based. We don't have Mac and very little space for Linux systems. We use the solution on all of our Windows devices as a basic antivirus protection. That's our first use case.
The second use case for the solution is to be able to have USB restrictions on my endpoints.
And the third would be the protection of machines when, especially now in this COVID-19 climate, users connect from home. There are a lot of network-based attacks. When users are connecting from other networks, they're protected from dangers with this solution
What is most valuable?
The manageability of the product itself is its most valuable aspect. You have the underlying EPO, and on top of it, you can deploy the various components as you require. This is unlike other solutions like Symantec where you have to deploy everything or nothing. With this solution, you can choose to only deploy antivirus or only deploy a firewall, or only something else. I choose the components and that deployment is done through EPO. It makes manageability very flexible.
What needs improvement?
There are two main areas that require improvement. One is the size of the packages. Although I'll admit manageability is good, if I want to deploy, let's say just the antivirus or just the firewall, each of those package sizes are quite large. They are sometimes as big as 200MB or 250MB. When I have operations in remote areas where connectivity is always poor, it's difficult. To deploy such a package in a remote location over the internet or something like that is always challenging.
The second improvement I would like to see would be to make the speed of the updates much faster. I've seen other vendors that have already released an update for new ransomware and yet McAfee has not. They seem to generally delay releasing an update to protect against something, which can be dangerous as it gives malicious content time to spread.
For how long have I used the solution?
I've been using the product for almost two years at this point.
What do I think about the stability of the solution?
I would say on a scale of one to 10, the scalability would rate at an eight. It's not perfect and there's room for improvement. However, it's generally been stable for us.
We've seen some versions of McAfee not functioning correctly. Then, suddenly, we had to put in a patch. Occasionally, the notes are not there and when we raise a ticket with the support they came back and say, "Oh no, no, this version has a bug, you guys will need to move to a new version."
What do I think about the scalability of the solution?
The scalability of the solution is good. We've actually scaled up, so we can speak from experience. We initially rolled out to a smaller set of users and then eventually to our entire base. We've scaled up to about 15,000 users at this point. There were no issues in doing so. It's quite straightforward to expand outwards as needed.
How are customer service and technical support?
Technical support I would say is average. A lot of times we've gotten standard responses from support. They don't really offer a solution. The responses that we have gotten from support is something that we have already tried or they'll simply tell us to move to the next version. That requires us to deploy to 15,000 users. They don't go out of their way to be helpful.
Which solution did I use previously and why did I switch?
We've always used McAfee. There never has been another solution that the organization has tried out.
I personally have worked with a few other solutions. I'm not talking about next-generation products, like a CrowdStrike or a Carpenter due to the fact that they are a different league altogether. However, I would say I've had extensive experience with Symantec also.
In terms of Symantec versus McAfee, the two big differences are that on McAfee I am able to scale quite well and now, especially with users who are connecting from home, I can see users' statuses over the internet. That way, we can check the health of the machine and update machines remotely. That isn't the case of Symantec. Unless the user connects to back to the office VPN we will not be able to do as much.
However, where McAfee falters is the size of the modules, which are quite large.
How was the initial setup?
The initial setup was simple and the deployment itself was straightforward. The was no complexity in terms of the architecture or the initial deployment of the solution.
I came into the organization when McAfee was already deployed. However, I've set up some other packages. For example, although McAfee was already deployed, the USB blocking features module, took about two months I would say to deploy across the network.
We have a team of approximately four people the deploy patches and updates and generally maintain the solution.
What about the implementation team?
We deployed the solution ourselves and continue to deploy any ancillary modules on our own as well. We don't need the outside assistance of consultants or integrators. We have a team that manages these items in house.
What other advice do I have?
I would advise, if somebody's looking at buying a brand new solution fresh or have a solution coming up for renewal, to look at the next generation antivirus products. The next-generation products are far more sophisticated. They might be a little higher in price, but in terms of manageability, updates, and the packet size, they are far superior.
McAfee has released something called Envision. It's a next-generation antivirus. In this other solution, they have incorporated a lot of next-generation technologies. It's a different license and a higher-priced license altogether.
Overall, I would rate this solution seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Presales Engineer at Rah Infotech Pvt Ltd
A stable anti-malware solution that provides DLP (data loss prevention) and DAC (Dynamic Access Control)
Pros and Cons
- "The most valuable features of the solution include DLP (data loss prevention), CASB (cloud access security broker) functionality, endpoint encryption, and cloud workload security."
- "The solution's documentation is not streamlined and is in bits and pieces, which should be in a single format."
What is our primary use case?
Customers use Trellix Endpoint Security as an anti-malware or antivirus solution that provides AI and machine learning features. The solution provides DAC (Dynamic Access Control) and HIPS (host intrusion prevention system) functionality in its firewall module. It also has a web control functionality, wherein we can allow, deny, or choose the category part and work it out.
What is most valuable?
Trellix Endpoint Security provides a single umbrella kind of architecture. A lot of different solutions come under a single umbrella and a single console. The most valuable features of the solution include DLP (data loss prevention), CASB (cloud access security broker) functionality, endpoint encryption, and cloud workload security. The solution also has features like application control, device control, and cloud DLP.
What needs improvement?
The solution's documentation is not streamlined and is in bits and pieces, which should be in a single format.
Trellix Endpoint Security should include the virtual patching feature in the next release.
For how long have I used the solution?
I have been working with Trellix Endpoint Security for one year.
What do I think about the stability of the solution?
I rate Trellix Endpoint Security a nine out of ten for stability.
What do I think about the scalability of the solution?
Trellix Endpoint Security has good scalability. Our customers for the solution are most enterprise businesses and government entities.
I rate the solution a nine out of ten for scalability.
How was the initial setup?
The solution’s initial setup is easy.
I rate Trellix Endpoint Security ten out of ten for the ease of its initial setup.
What about the implementation team?
The solution's deployment on the cloud is very fast because we give the requirement and get the solution. On-premises, the basic initial setup of the server takes about half an hour or one hour.
What's my experience with pricing, setup cost, and licensing?
Trellix Endpoint Security is neither a cheap nor an expensive solution.
On a scale from one to ten, where one is cheap and ten is expensive, I rate the solution's pricing a four out of ten.
What other advice do I have?
I am working with the latest version of Trellix Endpoint Security. We provide our customers with on-premises, on-cloud, and hybrid cloud deployment models for Trellix Endpoint Security.
Overall, I rate Trellix Endpoint Security an eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Distributor
ITOfficer at U.S. Army Medical Research Unit - Kenya
An informative dashboard and immediate reporting and notifications
Pros and Cons
- "We really like the dashboard from Trellix and we've found that it's pretty informative."
- "The solution consumes a lot of end user memory and CPU. Trellix doesn't really focus much on the anti-malware side."
What is our primary use case?
Our use case is pretty straightforward. We have the central ePO that's running, and clients connect to it. All the clients connect to the ePO for updates and the ePO is able to go out and get updates, so it's pretty much like a star topology where you have the ePO sitting at the middle and handling all the requests from the clients and the servers.
What is most valuable?
We really like the dashboard from Trellix and we've found that it's pretty informative. Also, the reporting is pretty much immediate, so if there's any activity on the network, you're able to get notifications immediately. That's something that we really like about this product.
What needs improvement?
The solution consumes a lot of end user memory and CPU, so you need to have a computer that has a lot of resources for you to properly run Trellix. The agent ends up using a lot of resources, either RAM or CPU, and at times that bogs down users. I don't know if it's possible to have a lighter version of the agent, but if the agent was lighter it wouldn't consume so many resources, which would be good.
It's a bit complex. It's very granular and you need to really, really know the ins and outs of configuration. If you are specifically configuring an XML against ransomware, some very special setup, it can end up being a bit technical. You wouldn't want to make any mistakes while doing your configuration. A single configuration can make you lose whatever you wanted to do.
The other thing is if the engine would also focus more on malware, sort of an anti-malware. Trellix doesn't really focus so much on the anti-malware side, but there are other better performing antivirus or endpoint products that have better engines or they have a higher detection rate compared to what Trellix is currently providing.
For how long have I used the solution?
I have been working with this solution for about three years.
What do I think about the stability of the solution?
If you've given the solution the resources that it needs, it's pretty much stable and it's able to continuously run uninterrupted. I've never seen any down times, so I'd say it's pretty much stable and it's built well.
What do I think about the scalability of the solution?
As far as scalability, I think the solution is able to handle quite a bit. We have around three admins who interact with the product. Then we have the rest of the organization who interface with it, which is around 300 to 500 employees.
How are customer service and support?
The tech support was pretty responsive and I believe all my questions were answered within the stated timeline. I can't remember what my questions were about, but I spoke with the technical team and got the help that I deserved. I would rate the support as a five out of five.
How would you rate customer service and support?
Positive
How was the initial setup?
From a technical side, it's not so complicated. Of course, you need to set up your server correctly, and then deploying it to the agent is pretty simple. The setup on the server is the one that is a bit technical. You can't have a default deployment, so once you do your deployment you need to set up rules that work within your environment to be able to safeguard it against suspect files or potentially unwanted programs. You need to know exactly what to do, and that's the point that may not be very friendly to admin, because they might not know all of the threats that are out there. You can't really foresee a threat that you don't know about, or rather you don't know if you'd block it or not. The initial setup is pretty much straightforward if you're an IT person, but the configuration side has a learning curve. It takes quite some bit of time to really know exactly what you're doing.
What about the implementation team?
We handled implementation in-house because when we got the licensing, we also got training modules from Trellix. Trellix has KB articles, which are pretty much straightforward and really helped quite a bit. I'd say it took about four hours to deploy from the time we started with a clean machine to the time that we started pulling updates and deploying to client machines.
On a scale of one to five, I'd give the setup a four, because the product pretty much does what it says it does, but it's not perfect. If you're an IT person, you'll be able to deploy it, and sending the Agent file to clients is pretty much a no-brainer.
The maintenance bit is okay as well. There's not a high amount of maintenance because you can automate many activities. You just need to make sure that your server is able to pick up the updates that are necessary, and make sure the databases are running okay. It's nothing new if you're in the IT environment, just making sure everything is running properly. I've never landed on an update that broke the application.
What was our ROI?
I believe for organizations that are looking for what Trellix is offering right now, there is a definite return on investment.
What's my experience with pricing, setup cost, and licensing?
I think Trellix is more on the higher side of the market, just on a general scale, but I also think it depends on what particular package you choose. Different packages have different rates. I would give the pricing a three out of five. It depends on your usage because if the product works for you, then you might say the price is right. At one point it worked for us, but we have shifted our goals.
Which other solutions did I evaluate?
We currently considering switching from Trellix to Bitdefender mainly because Trellix isn't really focused on malware, and right now most threats are coming from within the organization as malware. Malware is something that can stop business continuity, so that's one of our main areas of focus, and Trellix is not doing really well within that perspective.
What other advice do I have?
I would recommend Trellix to someone as long as they know exactly what they're looking for within the organization. For instance, Trellix is very granular, so if you have a dedicated security department that can customize policies and XML documents at a very fine level and specifically work on this product, then I would say, go for it. The solution is going to serve them well, because what it does, it does really well. You're able to experience possibly what's among the best products in the market. I would recommend it as long as the people know exactly what they're getting into and they're ready to handle the challenge.
On a scale of one to ten, I would give Trellix an eight.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
IS Manager, Software Engineer at a manufacturing company with 10,001+ employees
High performance, beneficial black and white lists, and reliable
Pros and Cons
- "Some of McAfee Endpoint Security's main features are it has benefits over normal conventional antivirus solutions because it works much faster."
- "We have had some of our clients not happy with McAfee Endpoint Security because it blocks some of the applications they are trying to use. They should make it easier to unblock applications."
What is our primary use case?
We use McAfee Endpoint Security as a solution for workstations and laptops.
What is most valuable?
Some of McAfee Endpoint Security's main features are it has benefits over normal conventional antivirus solutions because it works much faster.
The solution learns which piece of software is running on the computer and compares it to a white list or black list database, if it is on the white list it allows the application and if it is on the black it does not.
McAfee Endpoint Security uses fewer computer resources than many competitors making it less of a burden on the performance of the computer.
What needs improvement?
We have had some of our clients not happy with McAfee Endpoint Security because it blocks some of the applications they are trying to use. They should make it easier to unblock applications.
In a future release, McAfee Endpoint Security and all other endpoint solutions should reduce the number of resources needed to run their solution, such as hard drive space and CPU processing. The fewer resources the solution uses the better the performance of the hosting computer will have.
For how long have I used the solution?
I have been using McAfee Endpoint Security for approximately 15 years.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
McAfee Endpoint Security is cloud-based making it scalable.
We have approximately 100,000 users using the solution in my organization.
How are customer service and technical support?
I can log into the McAfee portal and get support. We have not had any problem with the support and we have never had an interruption or a case of software failing.
How was the initial setup?
The installation was very easy and quick. It only takes a few minutes.
What about the implementation team?
We can do the implementation of the solution. Customers can do it by themself or in a corporate environment it can be pushed from the central server to each individual computer.
The maintenance of the solution is done by an outside vendor.
What's my experience with pricing, setup cost, and licensing?
For each computer that is connected to the server McAfee charges us for each computer based on our license agreement.
Which other solutions did I evaluate?
We are in the process of moving away from McAfee Endpoint Security and replacing it with Cylance.
What other advice do I have?
The solution is great by itself. However, it is important how management is organized within the company and how quick of response the teams can apply white list and other security measures.
I would recommend this solution to others.
I rate McAfee Endpoint Security an eight out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Trellix Endpoint Security Report and get advice and tips from experienced pros
sharing their opinions.
Updated: December 2024
Popular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
Cisco Secure Endpoint
SentinelOne Singularity Complete
Fortinet FortiClient
Cortex XDR by Palo Alto Networks
Symantec Endpoint Security
Intercept X Endpoint
Trend Vision One Endpoint Security
Kaspersky Endpoint Security for Business
ESET Endpoint Protection Platform
HP Wolf Security
Check Point Harmony Endpoint
Buyer's Guide
Download our free Trellix Endpoint Security Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Symantec Endpoint vs. McAfee Complete Endpoint Protection: Technical Comparison Between Data Loss Protection Solutions
- How does McAfee Endpoint Security compare with MVISION?
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What's the best way to trial endpoint protection solutions?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?
- What to choose: an endpoint antivirus, an EDR solution or both?
- Which ransomware is the biggest threat in 2020?