Cyber Defense Advisor | Founder Executive at a tech services company with 1-10 employees
Real User
2022-02-21T09:43:20Z
Feb 21, 2022
The response part of EDR was most valuable. We used that to separate the endpoint from the network. We utilized the solution during the instant response. We were also utilizing advanced malware detection capabilities, but we benefited the most from its help with the response.
Learn what your peers think about Trellix Endpoint Security (ENS). Get advice and tips from experienced pros sharing their opinions. Updated: October 2024.
Sr Manager - Information Security & Researcher at a tech services company with 1,001-5,000 employees
Real User
2021-05-25T16:00:34Z
May 25, 2021
It is easy to use, flexible, and stable. Because it is a cloud-based solution and it integrates all endpoints of the cloud, we can do an IOC-based search. It can search the entire enterprise and tell us the endpoints that are possibly compromised.
Technical Manager (SOC Operations) at Novac Technology Solutions
Real User
Top 5
2020-08-30T08:33:50Z
Aug 30, 2020
The exploit guard and malware protection features are very useful. The logon tracker feature is also very useful.
They have also given new modules such as logout backup, process backup. We ordered these modules from the FireEye market place, and we have installed these modules. We are currently exploring these features.
Trellix Endpoint Security (ENS) is a comprehensive solution designed to protect organizations from advanced cyber threats. With its advanced threat detection capabilities, ENS provides real-time visibility into endpoint activities, enabling proactive threat hunting and response.
It leverages machine learning algorithms to identify and block sophisticated malware, ransomware, and zero-day attacks. ENS also offers robust data loss prevention (DLP) features, preventing sensitive...
We have a cloud-based instance, so we can deploy all our configurations through the cloud. That's the beauty of FireEye.
The extendability is great.
If the network has seen something, we can use that to put a block to all the endpoints.
It is a really strong solution for endpoint security.
The response part of EDR was most valuable. We used that to separate the endpoint from the network. We utilized the solution during the instant response. We were also utilizing advanced malware detection capabilities, but we benefited the most from its help with the response.
The features we have found most valuable have been containment as well as the ability to triage agent activities.
It's a stable solution with good performance.
FireEye Endpoint Security is easy to use and lightweight compared to others.
It is easy to use, flexible, and stable. Because it is a cloud-based solution and it integrates all endpoints of the cloud, we can do an IOC-based search. It can search the entire enterprise and tell us the endpoints that are possibly compromised.
FireEye Endpoint Security's scalability is awesome. I think it is one of the best on that front.
The exploit guard and malware protection features are very useful. The logon tracker feature is also very useful.
They have also given new modules such as logout backup, process backup. We ordered these modules from the FireEye market place, and we have installed these modules. We are currently exploring these features.
The most valuable feature is the integration between environments.
The most valuable network security feature is the network sandbox solution. This sandbox feature works on traffic flow.
The most valuable feature of this solution is its simplicity.
It is very valuable in finding out unknown malware.