Try our new research platform with insights from 80,000+ expert users
Trellix ESM Logo

Trellix ESM pros and cons

Vendor: Trellix
3.7 out of 5
1,710 followers
Post review

Pros & Cons summary

Buyer's Guide

Get pricing advice, tips, use cases and valuable features from real users of this product.
Get the report

Prominent pros & cons

PROS

Trellix ESM is recognized for its stability and reliability in operation.
It enables easy detection of malicious threats, issues, or vulnerabilities within a network.
Features such as intrusion detection, malware protection, and effective log monitoring are highly valued.
The tool can be deployed quickly and integrates effortlessly with other defensive technologies.
Support for Trellix ESM is considered excellent, enhancing user satisfaction and providing timely assistance.

CONS

There are no packet capturing or network behavior analysis features
No security updates or proper support, causing operational struggles
Lacks advanced features and cannot cope with complex requirements like two-factor authentication
Performance issues such as slow data display and outdated data storage
Integrating additional features such as User Behavior Analytics, automation, and improved threat intelligence is needed
 

Trellix ESM Pros review quotes

Chetankumar Savalagimath - PeerSpot reviewer
May 15, 2021
The most valuable feature in ESM is its search and reporting feature. It's really nice.
it_user1033191 - PeerSpot reviewer
Mar 11, 2019
The most valuable feature is the capability to correlate different events from different platforms that we feed into it.
Daniel Durian - PeerSpot reviewer
Dec 6, 2022
The most valuable feature is for the security operation center because it provides visibility of all traffic within the company infrastructure.
Learn what your peers think about Trellix ESM. Get advice and tips from experienced pros sharing their opinions. Updated: October 2024.
814,649 professionals have used our research since 2012.
ES
Nov 15, 2023
The solution's technical support is great.
WA
Aug 8, 2019
This solution integrates easily and very well with other technologies.
MV
May 5, 2021
It is user-friendly. The notification part of McAfee ESM is very easy.
MA
Sep 27, 2020
It is easy to use and deploy. It comes with user-friendly manuals.
CM
Mar 11, 2019
The most valuable feature is that if the scanning does find something, it quarantines it. Then you can decide what you are going to do with it.
it_user380976 - PeerSpot reviewer
Jul 4, 2016
The most valuable feature for us is that it comes with many correlations, reports, and dashboards already available. It's also very easy to use.
VA
Aug 5, 2019
We are now able to completely monitor our environment so we can review what is there, which is a big win for us.
 

Trellix ESM Cons review quotes

Chetankumar Savalagimath - PeerSpot reviewer
May 15, 2021
Cloud integration has room for improvement because they're not full-fledged to integrate with the cloud solutions that come. They use different integration platforms to bring in data, and that needs to be improved.
it_user1033191 - PeerSpot reviewer
Mar 11, 2019
There are some banking and transactional cases that are local, South America transactions. I would like to see them add features that can be used locally, to make those transactions more reliable.
Daniel Durian - PeerSpot reviewer
Dec 6, 2022
Tech support is required each time there is a system update of the solution.
Learn what your peers think about Trellix ESM. Get advice and tips from experienced pros sharing their opinions. Updated: October 2024.
814,649 professionals have used our research since 2012.
ES
Nov 15, 2023
The product's stability is an area of concern where improvements are required.
WA
Aug 8, 2019
We cannot add new data sources to the most recent version.
MV
May 5, 2021
It is not a very advanced solution, and it is for very generic use cases. It cannot cope with the advanced requirements that we're going to have. For example, for multiple authentication failures, it is still based on Windows events for detecting multiple login failures, whereas other companies are going beyond and working on implementing two-factor authentication. It is time to correlate the two-factor authentication results with authentification failures, which is not happening with McAfee ESM. The performance of the tool should be improved because it is very slow. The data display on the console is very slow in McAfee ESM. Its data storage is still old-fashioned, and it should be improved and upgraded to the latest versions. They have to come up with some new ideas to match what other leaders in the same domain are doing. For example, in Splunk, when you search for information for the last 60 days or five months, it quickly shows the information, but that is not the case with McAfee. The results should be quicker and faster on the console. They should integrate some additional features such as User Behavior Analytics (UBA) and automation. The threat intelligence part should also be improved on McAfee.
MA
Sep 27, 2020
McAfee is no more providing security updates on this product, and the enhancements to this product seem to have stopped. Moreover, we don't get proper support, and we struggle to get its support. It would be good if they can add some AI engine and out of the box use cases because it is currently limited to the same scenario and the same setup. I have done a POC for Securonix, LogRhythm. These products are much more ahead as compared to McAfee ESM. They have included multiple modules in the same solution. Correlation is very easy. If McAfee ESM can improve, especially in such implementations, then I believe it would be much better.
CM
Mar 11, 2019
The only issue I have with McAfee is the amount of computer resources that it takes... it's definitely impacting some of the other applications that are running on a computer at the same time.
it_user380976 - PeerSpot reviewer
Jul 4, 2016
The disk space needed for events is not clear. In all clients, we had at least more than 100GB free that we could not use.
VA
Aug 5, 2019
I would like to see improvements to the user interface.