Try our new research platform with insights from 80,000+ expert users
Business8c2a - PeerSpot reviewer
Business System Analyst at a consultancy with 5,001-10,000 employees
Real User
An easy way to protect my privacy if I lose my computer
Pros and Cons
  • "It is easy to use."
  • "I would like to see fingerprint recognition included in the next release of this solution."

What is our primary use case?

My primary use case for this solution is to secure the data on my laptop.

How has it helped my organization?

If I lost my computer somewhere then hopefully the software will protect my data from anyone.

What is most valuable?

The ability to secure my data is the most important feature.

It is easy to use. I just need to enter the username and the password and it protects my data.

What needs improvement?

I would like to see fingerprint recognition included in the next release of this solution.

Buyer's Guide
Trellix ESM
December 2024
Learn what your peers think about Trellix ESM. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
831,265 professionals have used our research since 2012.

How are customer service and support?

I have not used technical support for the product.

Which solution did I use previously and why did I switch?

My company did use another product previous to this one but I do not know why they switched.

How was the initial setup?

The installation and setup of this solution is straightforward.

What about the implementation team?

I handled the deployment myself.

What other advice do I have?

This is a product that I would recommend to a colleague at another company.

I would rate this solution an eight out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user374493 - PeerSpot reviewer
Security Consultant, Presale and System Engineer at a tech services company with 501-1,000 employees
Consultant
If you provide it with the Advanced Correlation Engine and Global Threat Intelligence, you can raise your infrastructure to be a complete advanced SOC.

What is most valuable?

Doing Incident analysis in my opinion with ESM is easier than other solutions. There are a lot of ways to build queries and a great filter engine; if you provide ESM with the Advanced Correlation Engine and Global Threat Intelligence you can raise your infrastructure to be a complete advanced SOC.

How has it helped my organization?

I work for a System Integrator.

What needs improvement?

I have almost no complaints with this solution because it's almost a complete solution, but I do hope to have more stability in the next upgrade and to have the interface re-engineered to be HTML5-based rather than Flash-based.

I'd also like some Splunk-like ELM (Log Manager) enterprise functions.

For how long have I used the solution?

I've used it for three years, from versions 9.1 to 9.5

What was my experience with deployment of the solution?

Yes, sometimes it seems that versions with major upgrades come with some bugs and regressions that affected deployment.

What do I think about the stability of the solution?

Yes, sometimes it seems that versions with major upgrades come with some bugs and regressions that affected stability.

What do I think about the scalability of the solution?

It has scaled to our needs.

How are customer service and technical support?

Customer Service:

Customer service is very good and very professional.

Technical Support:

Technical support is very good and very professional.

Which solution did I use previously and why did I switch?

I also work with with RSA and McAfee SIEM solutions.

How was the initial setup?

If you buy the all-in-one solution (Virtual or Hardware), the setup takes a couple of hours.

What's my experience with pricing, setup cost, and licensing?

SIEM is not a Log Manager; ESM is meant for people who need advanced SOC functionality and not only to satisfy compliance rules.

Disclosure: My company has a business relationship with this vendor other than being a customer: We're a partner.
PeerSpot user
Buyer's Guide
Trellix ESM
December 2024
Learn what your peers think about Trellix ESM. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
831,265 professionals have used our research since 2012.
reviewer1614318 - PeerSpot reviewer
Vice President Cyber Security Practice Head at a tech services company with 1,001-5,000 employees
Real User
Does not integrate well, and scalability needs improvement but it's fairly priced
Pros and Cons
  • "I like the ease of deployment."
  • "I would like to see good analytics in future releases."

What is our primary use case?

We use this solution for correlation, alerting, and log management.

We are integrators.

What is most valuable?

I like the ease of deployment.

What needs improvement?

I would like to see good analytics in future releases.

McAfee has many issues with integration. I am looking for an end-to-end integration such as EDR, and Next-Generation SOC 2.0. 

For how long have I used the solution?

I have been working with McAfee ESM for 20 years.

What do I think about the scalability of the solution?

We are looking for horizontal and verticle expansion. McAfee has issues with scalability. Other ESM solutions, don't have the same issues.

How are customer service and technical support?

We have not contacted technical support in quite some time. We had issues with the parsing.

How was the initial setup?

The deployment is easy, but because it is a hybrid deployment which makes it complex. It is partly in the cloud and partly an on-premises deployment. The device will have to access the cloud and on-premises data.

What about the implementation team?

We have an internal team to maintain this solution.

What's my experience with pricing, setup cost, and licensing?

The pricing is fair.

What other advice do I have?

I would recommend this solution to others who are interested in using it.

I would rate McAfee ESM a five out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
IT Security Analyst at Ingenium Group
Real User
A good central viewpoint for issues, but it requires Flash
Pros and Cons
  • "It is a good central viewpoint for issues. These can then be investigated in more detail on the subnet server(s)/endpoints."
  • "Product currently requires Flash."
  • "Update to user interface from version 9 is cosmetic in some aspects, and after a few clicks you are back on the old interface."
  • "We would welcome integrations with some of the new McAfee acquisitions, e.g., behavioural analytics."

What is our primary use case?

  • To gain transparency into potential vulnerabilities within the network. 
  • To monitor problems, e.g., failure to update packages within the back-end security environment.

How has it helped my organization?

It is a good central viewpoint for issues. These can then be investigated in more detail on the subnet server(s)/endpoints.

What is most valuable?

Ability to create own views. Statistical (normalised) views help to highlight inconsistencies, which may need further investigation

What needs improvement?

  • Product currently requires Flash. 
  • Update to user interface from version 9 is cosmetic in some aspects, and after a few clicks you are back on the old interface.
  • Some filters are still very low level "magic numbers", which do not make sense on the high level user interface. 
  • We would welcome integrations with some of the new McAfee acquisitions, e.g., behavioral analytics.

For how long have I used the solution?

Less than one year.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Trellix ESM Report and get advice and tips from experienced pros sharing their opinions.
Updated: December 2024
Buyer's Guide
Download our free Trellix ESM Report and get advice and tips from experienced pros sharing their opinions.