In Trellix Endpoint Security, I use all modules, including firewall and web control, except for encryption.
IT Security Specialist at asystel italia
A stable solution that offers good technical support and can be implemented without much difficulties
Pros and Cons
- "It is a stable solution...The solution's technical support is good."
- "There are certain shortcomings in the features concerning DLP in Trellix, where certain additions must be made in the future."
What is our primary use case?
What needs improvement?
There are certain shortcomings in the features concerning DLP in Trellix, where certain additions must be made in the future.
For how long have I used the solution?
I have been using Trellix Endpoint Security for five years. My company is a customer of the solution.
What do I think about the stability of the solution?
It is a stable solution. If I consider using Trellix Endpoint Security right now, I won't find it a problem since it is a good product to use.
Buyer's Guide
Trellix Endpoint Security
March 2025

Learn what your peers think about Trellix Endpoint Security. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
849,190 professionals have used our research since 2012.
What do I think about the scalability of the solution?
There are around 800 users of the solution in my company.
How are customer service and support?
The solution's technical support is good. Whenever I open or raise a ticket with Trellix's support team, I get a response from their end.
I rate the technical support a nine out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
The implementation part of the product is not difficult. From an implementation perspective, I find the product to be good enough.
For me, the product's deployment in all endpoints takes an hour, and it is a simple process. I don't know if the deployment process is still simple or not and whether improvements have been made to the solution.
What other advice do I have?
I find Trellix Endpoint Security to be a good product. In Trellix Endpoint Security, it is not simple to understand the policies and rules, but it is good as an antivirus product. Trellix Endpoint Security is not easy to use, especially since the mechanism of communication is not very good.
I rate the overall product an eight out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
CEO & MD at Gurjartech
Good DLP but offers problematic encryption
Pros and Cons
- "The solution is reliable."
- "The solution has problematic encryption, which needs reforming."
What is most valuable?
I have found DLP to be a valuable feature.
What needs improvement?
When it comes to DLP or McAfee Security Encryption, with which I am happy, I like to make use of the solution for Vault, but find that the encryption is problematic. The system needs reforming. Suppose the solution is utilized on a laptop or desktop and the client wishes to make an assignment to another person but forgot his password. The data cannot be archived or backed up.
For how long have I used the solution?
I have been using McAfee Endpoint Security for the past five years.
What do I think about the stability of the solution?
The solution is reliable.
What do I think about the scalability of the solution?
Previously, I used the solution for a single site consisting of nearly 300 users. However, as I found it to also be a good tool for DLP endpoint, I now use it for another client with nearly 700 users.
How are customer service and technical support?
Counting from one to ten, this being the highest, I fully support the solution's technical services.
How was the initial setup?
The initial setup is very simple, allowing a person to get the videos or documents on the internet.
The deployment takes one to two days.
What's my experience with pricing, setup cost, and licensing?
I do licensing on an annual basis and this is what I always recommend to my clients over the monthly option. This is because all my clients are long-term and do not wish to pay on a monthly basis, instead preferring licenses of, perhaps, three years with an additional one or two year option.
What other advice do I have?
I am using the latest version of the solution minus one.
Some of our clients deploy the solution on-premises and others use clouds, such as AWS or IBM Cloud. I'm actually a service partner with IBM Cloud and the community manager with AWS Cloud.
We currently have two or three clients utilizing the solution and it can be said that it is a good product.
The solution is really good and competitively priced, so someone wishing to secure his enterprise or make use of it in an inexpensive fashion should do so.
I would rate it a seven out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Trellix Endpoint Security
March 2025

Learn what your peers think about Trellix Endpoint Security. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
849,190 professionals have used our research since 2012.
Support Security Engineer at a computer software company with 501-1,000 employees
An endpoint security solution with a valuable threat prevention feature
Pros and Cons
- "Threat prevention is valuable because most clients use other solutions like antivirus as part of web protection. I don't find that kind of solution useful."
- "The local technical support could be better."
What is our primary use case?
I work for a company that is a McAfee partner. We sell the solution, and we have engineers that implement the solutions. Basically, I am part of the technical staff that implements the solution on-premise.
We use endpoint security for our clients. We configure policies to scan the computer every single day in some cases and every week or even every moment. Basically, it protects the endpoint, and we have policies to do advanced threat protection.
How has it helped my organization?
Thanks to the implementation of this tool, we have managed to avoid massive virus infection, have visibility into console events and be able to implement action plans to contain threats.
What is most valuable?
Threat prevention is valuable because most clients use other solutions like antivirus as part of web protection. I don't find that kind of solution useful. We use the firewall to protect the client's network or even blocks and some kind of traffic that the computer received. The ATP model, I think, is one of the most important features because it can protect the computer when an application doesn't work as expected. It will alert and send messages to the ePO, and we can see everything.
What needs improvement?
The local technical support could be better. It would also help if the engineers can develop some automation features for the on-prem ePO. For example, in the on-prem ePO, you can store the endpoint using the IP address or using text, or using the default version. But in the MVISION ePO, you don't have that kind of feature. It's complicated to sort the endpoint because you have to do it manually.
I also think the detailed level of the detection could be better. In some cases, it's very complicated to figure out which file is the one that is actually impacted, depending on the dashboard you see. The dashboard is one of the most important things in the ePO because it's where you can see everything in a central location. But sometimes, you need to change from one view to another view to find what you're looking for.
For how long have I used the solution?
I have been using McAfee Endpoint Security for about three years.
What do I think about the stability of the solution?
It's very stable. It works as expected, and I am very happy with this solution.
What do I think about the scalability of the solution?
This is a very flexible product. It can be installed on a single physical or virtual server, or well installed on a windows cluster, and if you want to explore other modes it can also be implemented in the AWS cloud or as a SAAS.
How are customer service and technical support?
In some cases, if the report comes from India or America, it's basically an open and shut case. But if the support comes from Latin America, you probably have to scale that problem to another area or another region. You need a person that has more experience with the product.
Which solution did I use previously and why did I switch?
No.
How was the initial setup?
The initial setup can be both straightforward or complex. Some documentation on clients is very slow. Basically, we spent time implementing the ePO version because sometimes the database from the ePO is too big, and we need to do some things to the database to shrink the space, and it doesn't always work as expected. Sometimes, we have to follow one, two, or three steps to get the data and various scenarios to increase the number of steps because troubleshooting wasn't working.
If we implement MVISION, eventually, it would take around three hours because we have to install the software on the server. We have to do all the upgrades and implement some upgrades to the ePO software. Basically, it's three hours, but it can take five to six hours, depending on the data's size.
What about the implementation team?
We implement this solution for our customers. If you are an engineer, and you have the experience, you can do it. If someone doesn't have experience with the OS, with Windows, or with the product, you might need specialized engineers.
What's my experience with pricing, setup cost, and licensing?
For the issue of implementation costs, you require that the partner you use has qualified personnel to carry out this activity or you can use the professional services of McAfee, but these can be somewhat expensive.
Which other solutions did I evaluate?
Our clients ask us about other solutions like Cylance. I have one client that uses CrowdStrike. If you compare Cylance and McAfee Endpoint Security, the main difference is support.
McAfee is excellent. You can ask any questions, and with a couple of clicks, you will find the answer to the issue. If you don't find it, you can open a support ticket. Sometimes, the McAfee solutions are very complex to configure. Just in some topics, but on the other hand, very simple to configure.
What other advice do I have?
I recommend that the client needs to be aware of what McAfee can do for them. If the engineer can implement the solution, he'll just follow the book, and he's not going to get the best experience from the product.
To not impact the computer or the endpoint's performance, you need to finetune the policies. If the engineer doesn't have that kind of experience, you won't get the best out of the product. The client needs to get an engineer with a lot of performance tuning experience to get the most out of the product.
On a scale from one to ten, I would give McAfee Endpoint Security a nine.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Solution Architect Security at a tech services company with 201-500 employees
Enterprise endpoint security offerings are centrally managed and defend against the full threat spectrum from zero-day exploits to advanced targeted attacks.
Pros and Cons
- "It has a very simple like multi-tenancy option and scalability is outstanding."
- "Support-wise they need to be better."
What is our primary use case?
How has it helped my organization?
Controlling and Monitoring Change
Change control processes are often reactive and require manual responses, an ineffective approach to combating today’s threats and handling the growing number of devices in the IT infrastructure. The Security Connected approach from McAfee ensures that every desktop, server, application, network device, and database is in the scope of a change control solution, giving you critical visibility into who is using your systems and what activities are taking place.
Enabling Consumerization of the Workforce
A flood of iPhones, iPads, Android devices, and employee-owned laptops is hitting the workplace, bringing better productivity but also new security risks. Learn how businesses can effectively and securely enable the use of consumer-owned devices in the enterprise by protecting how data is being manipulated and controlling network access across mobile devices, laptops, desktops, and virtual desktops.
Managing Security and Risk
Limit your exposure to security risks that reveal customer data and internal assets. This solution guide addresses the importance of implementing a strategic security and risk management program focused on prevention and protection — helping you reduce incidents and risks throughout your entire IT infrastructure.
Obtaining Benefit from PCI
McAfee helps enterprises take a formal, strategic approach to meeting PCI DSS requirements — an implementation that can yield other cost saving and operational benefits to the business. McAfee compliance solutions automatically assess compliance status, proactively respond to any issues or potential violations, and continuously monitor controls across the enterprise.
Protecting Information
Your company’s sensitive information, including intellectual property, financial records, and personal information about employees and customers, is an attractive target for cybercriminals. The Security Connected approach from McAfee helps you secure sensitive information on databases, file servers, smartphones, email servers, and USB drives — while keeping it accessible to multiple users and groups.
Protecting Information from Insider Threats
Don’t overlook the threats to your data and network from company insiders. To address these risks, McAfee provides a new level of visibility into your organization with security controls that work together across endpoints, networks, and data to improve incident detection, protection, and response capabilities.
What is most valuable?
The following are the main features of the McAfee Suite:
- Threat/risk protection at the core level: All of the components , including the antivirus and exploit functionalities, all communicate with each other on a real-time basis.
- Machine learning: The McAfee Suite consists of sophisticated learning algorithms in order to precisely identify and confirm the presence of any malware, primarily based on their signature profiles.
- The containment of applications: With this feature, your IT security staff can mitigate the damaging impacts of malicious files (such as those found in phishing emails) and other types of malware by blocking them from entering further into your network infrastructure, and from there, isolating them.
- Endpoint Detection and Response (EDR): EDR is now fully integrated into the McAfee Suite and is completely automated. Any risks and threats can be curtailed by just a few clicks of the mouse.
- Centralized management: The McAfee ePolicy Orchestrator is a specific tool that allows for your IT Security staff to a get a much greater visibility and insight into your network infrastructure with easy-to-use and understandable at-a-glance dashboards.
- Proactive learning analysis: With machine learning algorithms, the McAfee Suite can quickly create models of your organization’s cyber-threat landscape and what potential malware attack vectors could like in the future.
- Sophisticated levels of anti-malware protection: The engine that drives the McAfee Suite is updated on a 24-7 basis via the McAfee Global Threat Intelligence feeds.
- Advanced threat forensic capabilities: With this functionality, your IT security staff can quickly determine where the malware resides in your network infrastructure, how they evolved and penetrated your lines of defense, and how long they have stayed in your systems.
- Malware behavior monitoring: This tool of the McAfee Suite can actually record the “behavior” of the malware in question while also studying its Attack Techniques and Procedures (TPPs). It comes with a comprehensive alert system and can even provide a sophisticated review (or “playback”) for the network administrator.
- Migration assistant: This functionality allows for your IT security staff to quickly migrate network security policies from legacy platforms into the McAfee Suite.
What needs improvement?
Business Support some times lazy but once they on board they will get the job done.
What do I think about the scalability of the solution?
With McAfee ePO software, you can scale your network vertically or horizontally.
- Vertical scalability — Adding and upgrading to bigger, faster hardware to manage larger and larger environments. Scaling vertically is accomplished by upgrading your server hardware, and installing McAfee ePO on multiple servers throughout your network, each with its own database.
-
Horizontal scalability — Increasing the size of the environment that one McAfee ePOserver can manage. Scaling horizontally is accomplished by installing additional Agent Handlers, all sharing a single database.
Make sure the McAfee ePO infrastructure is scaled to handle major peaks in outbreak situations.
How are customer service and technical support?
Technical support is getting better now, but previously, the support was not optimum or not available. when we opened a case, the engineer took too much time to listen to us and then they collect all the information. But then he never came back to us. Sometimes, five days, three days, sometimes even two months would pass and nothing would happen. But now I can see that the tremendous change. From the moment you open a case, in the next hour, you will get a response from the technical support, so now I'm feeling that the support is getting better.
How was the initial setup?
Installing McAfee products is very easy. Not only at the endpoint. Any McAfee product, because of the Product and Installation guide available with good detailing,and the availability in the community & knowledge base articles. Most of the blogs you find even outside of the McAfee community, which help me in the deployment of McAfee products. So installation never seems to be hard for me.
What about the implementation team?
Experts
What was our ROI?
20 Months or less depending on each organization
What other advice do I have?
There are many other endpoint security solutions that are available today, but McAfee Suite has several distinct advantages when you make a procurement decision. For example:
- All of the information, data, malware signature profiles, intelligence gathering, alerts, warnings and so on can be accessed and viewed very easily from just one console
- You do not have to overspend on security technology, because all of the features described earlier comes as one unified, cohesive set. McAfee Suite also leverages all of the existing security features of the operating systems and virtualized environments also previously mentioned. So in the end, there is really nothing more that you need to add on
- McAfee Suite can work as a single security solution for all kinds and types of device hardware and software such as workstations, servers, wireless/mobile devices, containers, virtual instances, and even those objects found in the Internet of Things (IoT)
- McAfee Suite has been comprehensively tested by certified third parties and has proven itself in the real world
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller.
Lead Information Technology Specialist at a healthcare company with 1,001-5,000 employees
It has helped us to enforce State mandates for protecting both staff and patient information data.
What is most valuable?
As of July 2016 we updated our version of Endpoint encryption from V5.03 to V7.03 with an updated deployment console it is much more convenient to navigate and to recover the user \ machine password process is so less cumbersome ..
thumbs up to this version ...
How has it helped my organization?
All the care facilities are mandated by the State to protect patient information. McAfee Complete Endpoint Protection has helped us to enforce that mandate, protecting both staff and patient information data. That's why the most value that it provides to us is simply and obviously the fact that it does a very good job of overall endpoint encryption.
What needs improvement?
The virus scanning in Enterprise V8 needs improvement. Also, the spyware protection needs to be be more expansive.
For how long have I used the solution?
We've used it for six years.
What was my experience with deployment of the solution?
The deployment from the ePolicy Orchestator console to either re-imaged or rebuilt laptops was sporadic and not reliable enough to be standalone.
What do I think about the stability of the solution?
We have had no issues with the stability.
What do I think about the scalability of the solution?
We have had no issues scaling it for our needs.
How are customer service and technical support?
Customer Service:
very good ....
Technical Support:Technical support is excellent. We've worked with them a lot over the years, some days for hours at a time.
Which solution did I use previously and why did I switch?
SafeBoot encryption was purchased by McAfee shortly after we deployed it to our fleet of laptops. We simply inherited it by use of encryption.
How was the initial setup?
The initial setup was straightforward, as we tried to automate the deployment of AV. However, it got more cumbersome after that, requiring a lot more of our time and resources.
What about the implementation team?
It was implemented by our in-house team and then deployed using the McAfee ePolicy server that's designated for McAfee deployments only.
What's my experience with pricing, setup cost, and licensing?
This was all managed by our IT director.
What other advice do I have?
Overall, the product is good. You need to get advice on the overall deployment to your infrastructure from McAfee before any roll-out.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Systems Engineer at First Datacorp
A solution with a flexible dashboard that can be used for setting up data storage via ELM
Pros and Cons
- "Trellix Endpoint Security's dashboard is very flexible, and I can create my own user-specific dashboard depending on user privilege or preference."
- "It would be a lot easier if I could add multiple user accounts within a single device."
What is our primary use case?
Some of the solution's primary use cases include successfully adding devices through ESM GUI and setting up data storage via ELM.
What is most valuable?
Trellix Endpoint Security's dashboard is very flexible, and I can create my own user-specific dashboard depending on user privilege or preference.
What needs improvement?
With Trellix Endpoint Security, adding a device as a data source can be done one by one. Whenever I try to add a device like a firewall or a server, the accounts are enrolled one by one per added data source. It would be a lot easier if I could add multiple user accounts within a single device.
For how long have I used the solution?
I have been testing Trellix Endpoint Security for around three months.
How are customer service and support?
I have tried to contact the solution's technical support team. Whenever I tried to ask for partner support, the Trellix website would ask for my company email details. Then an email would come to my inbox saying that Trellix would get back to me shortly, but unfortunately, they did not. So I couldn't contact Trellix Endpoint Security's technical support.
Which solution did I use previously and why did I switch?
I have worked with other security tools, such as CrowdStrike. The flexibility of the dashboard and filtering are useful features in Trellix Endpoint Security. Also, adding different elements to the SIEM infrastructure is not that complicated with Trellix Endpoint Security.
How was the initial setup?
There's no need for any additional configuration settings to install Trellix Endpoint Security. You just access the web UI, and that's it.
What about the implementation team?
It took me two months to implement Trellix Endpoint Security because of our company's hardware limitations.
My implementation strategy for Trellix Endpoint Security was to build a demonstration based on what the company would like me to do. So I built a SIEM infrastructure and got the images of the different tools first. Then from there, I tried to connect the different devices before I connected the data sources.
What other advice do I have?
My advice is that users should have a fair background in MQL, which really helps a lot in investigating.
Overall, I rate Trellix Endpoint Security an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Works at a government with 51-200 employees
Centralized administration controls, always improving, and reliable
Pros and Cons
- "The most valuable feature is the centralized console where everything can be controlled by the administration."
- "There are times the solution has some additional software added that is not fully integrated properly, such as Exchange Group Sheild. It is quite old and is not fully integrated properly and could be improved."
What is our primary use case?
I use this solution for system security protection.
How has it helped my organization?
McAfee has helped our organization by keeping all of our computer systems secure from viruses or other intrusions.
What is most valuable?
The most valuable feature is the centralized console where everything can be controlled by the administration. McAfee is always improving and is coming out with advanced cloud strategies, you can always rely on them now and for many years ahead.
What needs improvement?
There are times the solution has some additional software added that is not fully integrated properly, such as Exchange Group Shield. It is quite old and is not fully integrated properly and could be improved.
In an upcoming release, there could be an improvement in performance. There are times the solution can use a lot of resources on the local machines. This normally happens when the system is scanning, the end-user can really notice the performance change. After every new version that is released, there are improvements made. However, there is still room for improvement.
For how long have I used the solution?
I have been using this solution for approximately 15 years.
What do I think about the stability of the solution?
The stability is good, whenever there is an issue there is an update or solution to fix it shortly after.
What do I think about the scalability of the solution?
The scalability has been good for us, we have not expanded very much to know more.
How are customer service and technical support?
The technical support could be improved. We currently have business support and this has been a lot better than the regular support. The business support is more responsive and the resolutions are more thorough.
What's my experience with pricing, setup cost, and licensing?
The price of the solution is fair, we have a complete security package.
What other advice do I have?
The solution is very good but it is useful and important to have good experience with the endpoint testing machine.
I rate McAfee Endpoint Security nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Task Leader at a government with 1,001-5,000 employees
The most valuable feature that I've found most useful is the availability of seamless AES 256 full-disk encryption.
What is most valuable?
The most valuable feature that I've found most useful is the availability of seamless AES 256 full-disk encryption.
How has it helped my organization?
I don't need to worry about the content of a laptop if it's lost or stolen. It provides better security of laptops when doing foreign travel.
What needs improvement?
I think encryption needs to move to an all hardware-based solution. Software encryption is less efficient than hardware-based. Intel purchased McAfee a few years ago, so this company is set up from the chipset point-of-view.
For how long have I used the solution?
We've used it for six years.
What was my experience with deployment of the solution?
Initially, we ran into issues running full-disk encryption and certain versions of disk defragmentation software. However, this has now been resolved.
What do I think about the stability of the solution?
There have been no issues with the stability.
What do I think about the scalability of the solution?
We have had no issues scaling it for our needs.
How are customer service and technical support?
9/10. I've found technical support to be very good and responsive.
Which solution did I use previously and why did I switch?
We selected this endpoint protection solution due to its multi-platform support, not just Windows (e.g BitLocker). Other reasons were that it has enterprise key storage and recovery, which is very important to us.
How was the initial setup?
It's fairly easy to get going. It's been around for a while now, and there are lots of use cases. You just just need to follow the best practice installation documentation.
What about the implementation team?
We implemented it with the help of a McAfee vendor team.
What's my experience with pricing, setup cost, and licensing?
Everything has a cost. During the initial product evaluation, price was considered but it was not a show stopper.
What other advice do I have?
The central management console, ePO, is very useful. It incorporates file/folder encryption as well as encrypted thumb drive registration and policy management.
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Buyer's Guide
Download our free Trellix Endpoint Security Report and get advice and tips from experienced pros
sharing their opinions.
Updated: March 2025
Popular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
SentinelOne Singularity Complete
Cortex XDR by Palo Alto Networks
Fortinet FortiClient
Cisco Secure Endpoint
Symantec Endpoint Security
HP Wolf Security
Trend Vision One Endpoint Security
Kaspersky Endpoint Security for Business
Intercept X Endpoint
ESET Endpoint Protection Platform
Check Point Harmony Endpoint
Buyer's Guide
Download our free Trellix Endpoint Security Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Symantec Endpoint vs. McAfee Complete Endpoint Protection: Technical Comparison Between Data Loss Protection Solutions
- How does McAfee Endpoint Security compare with MVISION?
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What's the best way to trial endpoint protection solutions?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?
- What to choose: an endpoint antivirus, an EDR solution or both?
- Which ransomware is the biggest threat in 2020?
Centralized administration controls refer to a system in which one centralized authority manages and controls a network, system, or organization. This approach allows for more efficient management and control of resources, data, and security.
Continuous improvement is a key aspect of any successful organization, and centralized administration controls can facilitate this by providing a framework for evaluating and implementing improvements in a systematic manner. With a centralized system, updates and improvements can be rolled out uniformly and quickly, reducing the likelihood of errors or inconsistencies.
Reliability is also an important characteristic of a centralized system. Because there is a single point of control, it is easier to ensure that all components of the system are functioning correctly and that any issues can be addressed promptly. This can result in increased uptime and better overall performance.
However, it is important to note that centralized administration controls can also have drawbacks. For example, they can be vulnerable to single points of failure, and they may not be as adaptable to changing circumstances as decentralized systems. It is important to carefully consider the specific needs of an organization before deciding whether a centralized or decentralized approach is best.