Our primary use case is for endpoint protection. We need the solution to integrate with the firewall so that we could get some threat intel based on the kinds of malicious factors that we are getting on the internet at work. We are working to optimize it with the firewall and the other tools we are using for network protection.
Information Security Consultant at a financial services firm with 1,001-5,000 employees
Enhances security and visibility on all levels
Pros and Cons
- "Initially, we didn't have much visibility around what is occurring at our applications lower level. For instance, if we are exposed to any malicious attacks or SQL injections. But now we've integrated FireEye with Splunk, so now we get lots of triggers based on policy content associated with FireEye. The solution has allowed for growth and improvement in our information security and security operations teams."
- "Improvements could be achieved through greater integration capabilities with different firewall solutions. Integrating with the dashboard itself for different firewalls so users can also pull tags into their firewall dashboard."
What is our primary use case?
How has it helped my organization?
Initially, we didn't have much visibility around what is occurring at our applications lower level, for instance, if we are exposed to any malicious attacks or SQL injections. Now, we've integrated FireEye with Splunk, so we get lots of triggers based on policy content associated with FireEye. The solution has allowed for growth and improvement in our information security and security operations teams.
What is most valuable?
The most valuable feature is FireEye NX.
What needs improvement?
Improvements could be achieved through greater integration capabilities with different firewall solutions. Integrating with the dashboard itself for different firewalls so users can also pull tags into their firewall dashboard.
Buyer's Guide
Trellix Network Detection and Response
December 2024
Learn what your peers think about Trellix Network Detection and Response. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
831,265 professionals have used our research since 2012.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
From both a network level and security level it's pretty stable and it satisfies our organizational requirements.
What do I think about the scalability of the solution?
The scalability of the solution is above average.
What about the implementation team?
We implemented through a vendor team. I believe it took a five or possibly six-person networking team for the actual implementation. Followed by an information security team for policy configuration.
What other advice do I have?
On a scale of one to 10, with one being the worst and 10 being the best, I would you rate this product an 8. From a security perspective, it's pretty decent. It's just that I have seen it miss some semi loads or triggers when it's integrated with other products. On the flexibility scale, I think that's where the improvement needs to be achieved.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
System Engineer at IRIS
Prevents attacks and breaches but they should emphasize application filtering
Pros and Cons
- "Application categorization is the most valuable feature for us. Application filtering is very interesting because other products don't give you full application filtering capabilities."
- "Based on what we deployed, they should emphasize the application filtering and the web center. We need to look deeper into the SSM inspection. If we get the full solution with that module, we don't need to get the SSM database from another supplier."
What is our primary use case?
Our primary use case is for application filtering and security.
How has it helped my organization?
We use it as a second level of defense for many clients in the telecom field. We use Symantec Blue Coat as a proxy for the web center. We even have a little bit of SSM because we are floating some Symantec traffic on the end for SSM integration. We also use it for oil and gas as a standalone or in remote sites to have a bit of security there.
What is most valuable?
Application categorization is the most valuable feature for us. Application filtering is very interesting because other products don't give you full application filtering capabilities.
What needs improvement?
Based on what we deployed, they should emphasize the application filtering and the web center. We need to look deeper into the SSM inspection. If we get the full solution with that module, we don't need to get the SSM database from another supplier.
They should develop something similar to the feature that Palo Alto has called Traps. Then it will be an all-encompassing security solution.
For how long have I used the solution?
More than five years.
What do I think about the stability of the solution?
Stability is fine as long as we don't go deeper into the system. Once we go deeper into the SSM, inspection, and decryption, we get some issues.
It requires one expert and three technicians for maintenance.
What do I think about the scalability of the solution?
Scalability is smooth. I don't have any issues with the scale. We have the right boxes and the right configuration. For the telecom industry we have around 400 users and in the oil and gas industry, we have 600 users.
Which solution did I use previously and why did I switch?
We are also resellers for Palo Alto.
How was the initial setup?
If you look at the documentation, the initial setup is easy. We had the right training documents to go over and it was simple, it wasn't complicated at all. It took three days for configuration but in total around ten days.
It requires one expert and three technicians for maintenance.
What about the implementation team?
We are resellers so we implement it ourselves. We got the documentation from Cisco and were able to deploy.
What was our ROI?
I was with one of my clients last week and he told me that he's satisfied with the solution because they prevent a lot of attacks and a lot of breaches.
What's my experience with pricing, setup cost, and licensing?
We're partners with Cisco so we get a reasonable price. It's cheaper than Palo Alto in terms of licensing. We can get cheaper features from Palo Alto though.
What other advice do I have?
The main advice for such product is if you don't have any visibility regarding your application you need to deploy the FireEye solution. Otherwise, you don't have any visibility for the SSM, for the web traffic, and the application solution. If you need security with reasonable pricing, this is a good solution.
I would rate it a seven out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
Buyer's Guide
Trellix Network Detection and Response
December 2024
Learn what your peers think about Trellix Network Detection and Response. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
831,265 professionals have used our research since 2012.
OT/ICS Information Security Specialist at SANS
Good support, easy to implement, and proactively tests incoming files for malicious behavior
Pros and Cons
- "The most valuable feature is MVX, which tests all of the files that have been received in an email."
- "It would be very helpful if there were better integration with other solutions from other vendors, such as Fortinet and Palo Alto."
What is our primary use case?
We use FireEye to protect our web and email traffic.
What is most valuable?
The most valuable feature is MVX, which tests all of the files that have been received in an email. It uses virtual machines to test the behavior of the files and determine whether they are malicious in nature. If there is any abnormal activity then the file will be blocked. The corresponding hash value will then be recorded, submitted to the cloud, and added to the blacklist.
What needs improvement?
It would be very helpful if there were better integration with other solutions from other vendors, such as Fortinet and Palo Alto. They should be sharing their threat database and information. For example, if something is discovered by FortiSandbox or the Palo Alto Sandbox, it should be announced to all of the vendors so that they can take action and block these files.
FireEye can be improved in terms of network visibility. Some minor enhancements are needed.
For how long have I used the solution?
I have been working with FireEye for about three years.
What do I think about the stability of the solution?
The stability is very good.
What do I think about the scalability of the solution?
Scalability has been okay until now. If there is a major expansion in the future then we will proceed with that as it comes.
How are customer service and technical support?
I have been in contact with technical support and I find them to be good.
How was the initial setup?
I found the initial setup straightforward.
What about the implementation team?
We had assistance with the implementation.
What other advice do I have?
My advice to anybody who is implementing this solution is to fine-tune based on the use cases. Test the solution, monitor the alerts, and be proactive about anything that shows up. If there is any abnormal activity then be sure to take action quickly, and also, ensure that there is policy in place for other departments to act accordingly when malicious traffic is detected.
I would rate this solution an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Sr Manager - Information Security & Researcher at a tech services company with 1,001-5,000 employees
Very functional with its own ecosystem of products integrated with an inbuilt SIEM
Pros and Cons
- "Very functional and good for detecting malicious traffic."
- "Technical support could be improved."
What is our primary use case?
The solution can be used for detecting malicious traffic based upon known IOCs and it's integrated with the artificial intelligent speed, so we're able to recognize which IOCs are matching and their threat attribution.
What is most valuable?
I think there are some very functional features in FireEye when you compare the solution to traditional SIEM solutions. Traditional SIEM solutions don't have their own IPS/IDS functionalities and they integrate with third party WANs. In contrast, FireEye has created an ecosystem of products integrated with their own SIEM, which is cloud-based and integrates with network security, email security, host security and the like.
What needs improvement?
The support is somewhat lacking with long response times. The expectation is that when it comes to security response, technical support should be readily available.
For how long have I used the solution?
I've been using this solution for four years.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
The solution is scalable with different modules of NX appliance which is a passive IPS/IDs for different bandwidth capacities. It's a matter of using the appropriate ones.
How was the initial setup?
The initial setup is straightforward. There is one template for location where we installed the virtual appliance and once that was up and running, it was fine. We had four or five people in the network team that set up the appliances.
What's my experience with pricing, setup cost, and licensing?
We pay an annual subscription fee.
Which other solutions did I evaluate?
We evaluated three options and decided to go with FireEye.
What other advice do I have?
I would recommend this solution and rate it nine out of 10.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Lead Program Manager at a computer software company with 10,001+ employees
Stable, protective, easy to set up, and has a lot of features to scan vulnerabilities
Pros and Cons
- "It is stable and quite protective. It has a lot of features to scan a lot of malicious things and vulnerabilities."
- "I heard that FireEye recently was hacked, and a lot of things were revealed. We would like FireEye to be more secure as an organization. FireEye has to be more protective because it is one of the most critical devices that we are using in our environment. They have a concept called SSL decryption, but that is only the packet address. We would like FireEye to also do a lot of decryption inside the packet. Currently, FireEye only does encryption and decryption of the header, but we would like them to do encryption and decryption of the entire packet."
What is our primary use case?
We are using it from the perspective of data protection. We have two types of data that is coming. One is the actual data or the customer data that comes into our premises, and the second is the internet traffic that comes into our organization. FireEye devices scan all the traffic that comes through the tools on which we have configured FireEye, and they also analyze a lot of traffic.
What is most valuable?
It is stable and quite protective. It has a lot of features to scan a lot of malicious things and vulnerabilities.
What needs improvement?
I heard that FireEye recently was hacked, and a lot of things were revealed. We would like FireEye to be more secure as an organization. FireEye has to be more protective because it is one of the most critical devices that we are using in our environment.
They have a concept called SSL decryption, but that is only the packet address. We would like FireEye to also do a lot of decryption inside the packet. Currently, FireEye only does encryption and decryption of the header, but we would like them to do encryption and decryption of the entire packet.
For how long have I used the solution?
We have been using FireEye for a couple of years.
What do I think about the stability of the solution?
It is stable.
How are customer service and technical support?
They are very good. They follow the SLA and have two types of support. Premium support is available 24/7, and it is more customized.
Which solution did I use previously and why did I switch?
We were using an IBM product.
How was the initial setup?
Its installation is quite easy. It is a straightforward installation unless you are using multiple technologies in your environment. If you are using Radware and other stuff, your FireEye needs to understand all the technologies. It needs to understand the data coming in from the switch and the data sent from the hardware devices and the load balancer. It tends to take a little time to understand the data traffic, but it is easy to implement. It takes about an hour.
What about the implementation team?
We had a consultant. Configuring the device takes about an hour, but we also have the backend configuration related to our environment, which takes a bit more time.
We work across the globe. From the data center perspective, we have about 13 locations across the globe where we have implemented this solution. Two to three people are enough for its implementation.
What other advice do I have?
I would recommend this solution to others. We plan to keep using this solution. We have just migrated to the latest FireEye devices.
I would rate FireEye Network Security an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Network Security Analyst at a manufacturing company with 5,001-10,000 employees
Provides us with better malware, intrusion and incident detection.
What is most valuable?
- Ability to edit the Yara rules
- Malware analysis tool
How has it helped my organization?
It has provided us with better malware, intrusion and incident detection.
What needs improvement?
A lot of false positives.
For how long have I used the solution?
I've been using FireEye NX with web, email, and the malware analysis sandbox tool for two years.
What do I think about the stability of the solution?
No issues encountered.
What do I think about the scalability of the solution?
No issues encountered.
How are customer service and technical support?
Customer Service:
8/10.
Technical Support:8/10.
Which solution did I use previously and why did I switch?
No previous solution was used.
How was the initial setup?
It wasn't bad, the technical support team walked us through it.
What about the implementation team?
We used a vendor who was 8/10.
What other advice do I have?
Get training with editing Yara rules.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Sr. Network Engineer at a tech services company with 1,001-5,000 employees
I like how it detects zero day attacks, APT’s, and other types of malware.
What is most valuable?
I like the ability to detect zero day attacks, APT’s, and other types of malware which almost every other security device in the world is unable to detect.
How has it helped my organization?
One of the projects where we were deploying was a POC. When it was tested, it detected one of the world’s most dangerous APTs, like KABA, that was specially designed to target the telecommunication industry. This was one of the many thousands of findings that we were proud of.
What needs improvement?
Almost every feature of the product is on a high level.
For how long have I used the solution?
I have worked on these products from FireEye for three different projects, and I found them wonderful.
What was my experience with deployment of the solution?
No issues encountered.
What do I think about the stability of the solution?
No issues encountered.
What do I think about the scalability of the solution?
No issues encountered.
How are customer service and technical support?
Customer Service:
9/10.
Technical Support:10/10.
Which solution did I use previously and why did I switch?
Our clients have used almost all of the best solutions available but most of them were unable to detect about 90% of the threats that FireEye NX can detect.
How was the initial setup?
The initial setup was quite straightforward and easy.
What about the implementation team?
We had implemented it in-house and in fact, I deployed the NX 2400 and NX 7400 devices myself.
What was our ROI?
Both for our clients and for ourselves, ROI was almost 200% more than we expected. We were satisfied.
What's my experience with pricing, setup cost, and licensing?
The initial setup and day-to-day cost is almost the same as other security devices available. However, others fail about 90% of the time to detect threats, APT’s & most importantly zero day attacks, while FireEye can detect them.
Which other solutions did I evaluate?
Of course, we had to check all other products available in the market, research their features, and then we had to compare these products based on benefits to our clients, and the expected ROI.
What other advice do I have?
It's one of the best products around based on its features like detection of almost all types of malware, APT’s, virus and zero day attacks, reporting, and its integration with other FireEye products like CMS, IPS etc.
Disclosure: My company has a business relationship with this vendor other than being a customer: The company I previously worked for iwas the only partner of FireEye for almost one and half years in our country
Professional Services Division Manager at 2Bsecure
Agile, easy to scale, and the network security module is good
Pros and Cons
- "The most valuable feature is the network security module."
- "It is very expensive, the price could be better."
What is our primary use case?
We are using this solution for sandboxing on all channels.
What is most valuable?
The most valuable feature is the network security module. It is better than other solutions and it can make and find electrical movement.
Also, the attack vector is a feature that no one else offers.
Overall, it's a great solution.
What needs improvement?
It is very expensive, the price could be better.
For how long have I used the solution?
I have been using FireEye Network Security for a couple of years.
We are using the latest version.
What do I think about the stability of the solution?
It's a stable solution. It's very agile.
What do I think about the scalability of the solution?
The scalability is great.
You don't have to purchase another machine, but if you want, you can add another one. It goes through the cluster very smoothly.
I am part of the professional services with multiple organizations and multiple users.
How are customer service and technical support?
Technical support is great.
How was the initial setup?
The initial setup was complex because there were some bugs, but the professional service of FireEye was able to resolve them.
It took a long time to deploy.
What about the implementation team?
We are a reseller and the professional services of FireEye.
What's my experience with pricing, setup cost, and licensing?
It's an expensive solution.
Which other solutions did I evaluate?
We evaluated other solutions before choosing FireEye.
What other advice do I have?
I would recommend this solution to others interested in using it.
I would rate FireEye Network Security a nine out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Buyer's Guide
Download our free Trellix Network Detection and Response Report and get advice and tips from experienced pros
sharing their opinions.
Updated: December 2024
Popular Comparisons
Microsoft Defender for Office 365
Palo Alto Networks WildFire
Microsoft Defender for Identity
Palo Alto Networks VM-Series
Trend Micro Deep Discovery
Fortinet FortiSandbox
Check Point SandBlast Network
Symantec Advanced Threat Protection
Trellix Advanced Threat Defense
SonicWall Capture Advanced Threat Protection
Buyer's Guide
Download our free Trellix Network Detection and Response Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- How much do independent test results affect your security purchases?
- Holding Security Vendors Accountable
- What can businesses do to improve their security posture?
- When evaluating Advanced Threat Protection, what aspect do you think is the most important to look for?
- What is your recommended cost-effective solution to detect and prevent APT attacks?
- Compromise Assessment vs Threat Hunting
- What are the main evaluation criteria for you when choosing the right vendor for brand protection services?
- Why is ATP (Advanced Threat Protection) important for companies?
Thanks