Learn what your peers think about Trellix Intrusion Prevention System. Get advice and tips from experienced pros sharing their opinions. Updated: October 2024.
Junior Product Consultant at a tech services company with 501-1,000 employees
Real User
2020-12-06T17:08:58Z
Dec 6, 2020
It has a lot of functions, such as firewall. We are administrators, and we create some rules to protect our network. We also monitor the traffic in and out and have disk encryption on-premises. When we detect malware, we scan for the virus on the PC. We can then delete or block the malware.
Senior Network Security Engineer with 201-500 employees
Real User
2019-12-10T07:29:00Z
Dec 10, 2019
The feature I found most valuable is the network threat analyzer in the security platform. It also integrates with GTI, or Global Threat Intelligence. Otherwise, I just use the basic features.
The ability to centrally manage all the IPS sensors, track the different security events generated by it, and customize the different policies, depending on their location.
Block More IntrusionsStop new and unknown attacks with signature-based and signature-less intrusion prevention systems. Signature-less intrusion detection finds malicious network traffic and stops attacks where no signatures exist.
Unify Virtual and Physical SecuritySupport network virtualization across private and public cloud platforms to scale security and evolve with changing IT dynamics.
Maximize Security and PerformanceScale hardware performance to speeds up to 100 Gbps and leverage...
The threat intelligence updates are very accurate.
The product is worth the investment.
The most valuable features in Trellix for me are the automated signature updates. It is a great and convenient feature.
McAfee NSP is much more stable than Cisco.
There's a good dashboard you can drill down into. It helps you easily locate intrusions and the source of attacks.
The initial setup is straightforward.
It has a lot of functions, such as firewall. We are administrators, and we create some rules to protect our network. We also monitor the traffic in and out and have disk encryption on-premises. When we detect malware, we scan for the virus on the PC. We can then delete or block the malware.
The solution can scale.
Overall the solution is very good. It offers great protection and gives us a good overview of what is on the network.
Great monitoring feature.
The feature I found most valuable is the network threat analyzer in the security platform. It also integrates with GTI, or Global Threat Intelligence. Otherwise, I just use the basic features.
The most valuable features are the customization of the signature and the unlimited amount of signatures in IPS.
The ability to centrally manage all the IPS sensors, track the different security events generated by it, and customize the different policies, depending on their location.