Our primary use case for Trellix Endpoint Security is to protect our customers' endpoints and servers from known malware and ransomware. We are also partners reselling Trellix solutions.
It serves as a comprehensive endpoint security solution that goes beyond traditional antivirus by incorporating features such as document scanning for sensitive information, approval workflows for document sharing, patch management, and advanced threat detection using AI and machine learning. It actively monitors various endpoints, including web interactions and email communications, to detect and prevent a wide range of attacks, even those that are not signature-based.
Customers use Trellix Endpoint Security as an anti-malware or antivirus solution that provides AI and machine learning features. The solution provides DAC (Dynamic Access Control) and HIPS (host intrusion prevention system) functionality in its firewall module. It also has a web control functionality, wherein we can allow, deny, or choose the category part and work it out.
Senior Technical Engineer at Safezone Secure Solutions Private Limited
Real User
Top 10
2023-11-29T10:19:00Z
Nov 29, 2023
Previously, before the transition to Trellix, we used McAfee. Following a merger, FireEye now collaborates with McAfee, utilizing its console and threat intelligence. In terms of endpoint security, I would recommend Trellix Endpoint Security, especially for users prioritizing threat intelligence and seeking an internal solution. Trellix has proven effective in areas such as blocking capabilities, device control, and application control.
Network Security & Data Management Admin at Digitaltrack
Real User
Top 5
2023-08-02T07:14:23Z
Aug 2, 2023
In my company, we use Trellix Endpoint Security for its endpoint security capabilities. Wherever there is a need for someone to comply with ISMS, we deploy Trellix Endpoint Security over there and support them in maintaining it.
We build our own use cases and those provided by the vendor for specific upcoming attack scenarios. Configuring the rule set using Trellix Endpoint Security is very much flexible based on the IOCs.
We use Trellix Endpoint Security for pattern-based scanning. We use it on all our handsets. We also use it for behavior-based adaptive threat prevention; it's a solution that will recognize malicious behavior.
Assistant Vice President at a financial services firm with 10,001+ employees
Real User
Top 20
2023-02-13T20:28:28Z
Feb 13, 2023
Our company just started evaluating the solution for endpoint protection. We have tested it in a POC environment but have not deployed it to the production environment.
General Manager at a tech services company with 11-50 employees
Real User
Top 10
2023-01-03T16:18:16Z
Jan 3, 2023
We use Trellix to secure our customers' endpoint devices and the cloud. It was a McAfee solution before the Trellix acquisition. Trellix has a full portfolio for local and cloud protection. McAfee MVISION products are managed on the cloud, but some customers need an on-premise local management console.
The endpoint of Trellix itself should be placed within an enterprise with more than 200 or 300 endpoints. And then, an administration council should be used to administrate these endpoints and get the updates, including any virtual batching needed, and so on. This is the most usual case for this product. However, of course, there are other supportive add-ons, or sensors, to be added to this endpoint - including the EDR, the endpoint detection response, sensor.
ITOfficer at U.S. Army Medical Research Unit - Kenya
Real User
2022-08-25T13:37:46Z
Aug 25, 2022
Our use case is pretty straightforward. We have the central ePO that's running, and clients connect to it. All the clients connect to the ePO for updates and the ePO is able to go out and get updates, so it's pretty much like a star topology where you have the ePO sitting at the middle and handling all the requests from the clients and the servers.
IT Lead Engineer, Information Technology at Banglalink
Real User
2022-05-12T21:46:26Z
May 12, 2022
We primarily use the solution for security. Sometimes we try to shift to other security sites, however, whenever we compare this solution with the others, we found that McAfee developing in more dynamic ways.
McAfee is a security-based company. All of their products are related to the security of networking. We have approximately 15 to 20 customers working with McAfee Endpoint Security.
I use certain features of the solution, although I am not using the latest version, even though my colleagues do so a lot. They also use MVISION, although I do not. We make use of Endpoint host level data loss prevention.
We are using the latest version at the moment because I'm managed by the MVISION tenants. In the past, many people had issues with the utilization of detections and resources. ENS is actually very good for detection. When properly configured, especially when the prevention feature is activated, it integrates very well with the ATP, in respect of the endpoint. ATP offers very good protection and is a rich solution which helps to remove ransomware. I've been using the product for a while now and been able to secure a lot of environmental ransomware attacks, as well as some others, by integrating the ATP with the ENS.
We are using ePO Center Server to communicate with all the endpoints that are in the network. While I cannot be certain, I believe the relevant version is McAfee 8 or 9. We make use of McAfee Agent version number 5.6.4.151. We utilize McAfee Data Exchange Layer. The McAfee Endpoint Security version to which we refer is 10.7. We use the solution for antivirus purposes.
Overall, we handle the implementation of the solution, taking into account the policy required to secure the network. We primarily use McAfee Endpoint Security for data loss and endpoint protection.
IT Infrastructure Manager at a financial services firm with 51-200 employees
Real User
2021-02-17T17:06:30Z
Feb 17, 2021
We currently have around 50 servers. We aren't really a big company but we have 50 servers which we manage. We use McAfee for the web filtering portion of it. For example, if a user is doing a search on Google, there's a risk-rating web content filter built into McAfee. This alerts us if there are any threats present. We have licensed McAfee ENS on a per-server basis. As of now, from memory, I think we have 56 endpoints running McAfee — 56 servers in total.
Support Security Engineer at a computer software company with 501-1,000 employees
Real User
2021-02-09T08:02:00Z
Feb 9, 2021
I work for a company that is a McAfee partner. We sell the solution, and we have engineers that implement the solutions. Basically, I am part of the technical staff that implements the solution on-premise. We use endpoint security for our clients. We configure policies to scan the computer every single day in some cases and every week or even every moment. Basically, it protects the endpoint, and we have policies to do advanced threat protection.
CISO at a manufacturing company with 10,001+ employees
Real User
2020-12-21T22:27:00Z
Dec 21, 2020
McAfee Endpoint Security can be used for threat protection, for malware protection, and for data loss prevention by encrypting the end user devices using full depth encryption. We are using the latest version minus two because we generally update the antivirus to the current version after testing it. So generally it is two versions behind. We have three versions in our network, one is the latest version, then we have a minus one on critical machines and minus two on the endpoints.
VP - Cyber Security at a manufacturing company with 11-50 employees
Real User
2020-06-28T08:51:00Z
Jun 28, 2020
The solution has three primary uses for us. Our environment is Windows-based. We don't have Mac and very little space for Linux systems. We use the solution on all of our Windows devices as a basic antivirus protection. That's our first use case. The second use case for the solution is to be able to have USB restrictions on my endpoints. And the third would be the protection of machines when, especially now in this COVID-19 climate, users connect from home. There are a lot of network-based attacks. When users are connecting from other networks, they're protected from dangers with this solution
McAfee Complete Endpoint Protection is mature, tested, and usual: this is our policy. We don't go for the latest releases. We go for the release which is before the last.
Trellix Endpoint Security provides aggressive robust protection for every endpoint in an enterprise organization. Trellix uses dynamic threat intelligence and mounts a superb defense across the complete threat lifecycle. This solution will keep your organization more secure and resistant to any possible threat of risks. Trellix offers an amalgamated suite of next-generation endpoint security tools. These tools give users the benefit of machine learning, intuitive intelligence, and greater...
Our primary use case for Trellix Endpoint Security is to protect our customers' endpoints and servers from known malware and ransomware. We are also partners reselling Trellix solutions.
Trellix Endpoint Security is a reliable and developed product and our company's customers are satisfied with the security offered by the product.
It serves as a comprehensive endpoint security solution that goes beyond traditional antivirus by incorporating features such as document scanning for sensitive information, approval workflows for document sharing, patch management, and advanced threat detection using AI and machine learning. It actively monitors various endpoints, including web interactions and email communications, to detect and prevent a wide range of attacks, even those that are not signature-based.
Customers use Trellix Endpoint Security as an anti-malware or antivirus solution that provides AI and machine learning features. The solution provides DAC (Dynamic Access Control) and HIPS (host intrusion prevention system) functionality in its firewall module. It also has a web control functionality, wherein we can allow, deny, or choose the category part and work it out.
Previously, before the transition to Trellix, we used McAfee. Following a merger, FireEye now collaborates with McAfee, utilizing its console and threat intelligence. In terms of endpoint security, I would recommend Trellix Endpoint Security, especially for users prioritizing threat intelligence and seeking an internal solution. Trellix has proven effective in areas such as blocking capabilities, device control, and application control.
In Trellix Endpoint Security, I use all modules, including firewall and web control, except for encryption.
In my company, we use Trellix Endpoint Security for its endpoint security capabilities. Wherever there is a need for someone to comply with ISMS, we deploy Trellix Endpoint Security over there and support them in maintaining it.
The solution is used for drive encryption and as a policy orchestrator.
We build our own use cases and those provided by the vendor for specific upcoming attack scenarios. Configuring the rule set using Trellix Endpoint Security is very much flexible based on the IOCs.
We use Trellix Endpoint Security for pattern-based scanning. We use it on all our handsets. We also use it for behavior-based adaptive threat prevention; it's a solution that will recognize malicious behavior.
Our company just started evaluating the solution for endpoint protection. We have tested it in a POC environment but have not deployed it to the production environment.
We use Trellix to secure our customers' endpoint devices and the cloud. It was a McAfee solution before the Trellix acquisition. Trellix has a full portfolio for local and cloud protection. McAfee MVISION products are managed on the cloud, but some customers need an on-premise local management console.
The endpoint of Trellix itself should be placed within an enterprise with more than 200 or 300 endpoints. And then, an administration council should be used to administrate these endpoints and get the updates, including any virtual batching needed, and so on. This is the most usual case for this product. However, of course, there are other supportive add-ons, or sensors, to be added to this endpoint - including the EDR, the endpoint detection response, sensor.
It covers the AV and malware security piece.
Our use case is pretty straightforward. We have the central ePO that's running, and clients connect to it. All the clients connect to the ePO for updates and the ePO is able to go out and get updates, so it's pretty much like a star topology where you have the ePO sitting at the middle and handling all the requests from the clients and the servers.
We primarily use the solution for security. Sometimes we try to shift to other security sites, however, whenever we compare this solution with the others, we found that McAfee developing in more dynamic ways.
I am not liberty to describe our use cases, as this information is confidential.
McAfee is a security-based company. All of their products are related to the security of networking. We have approximately 15 to 20 customers working with McAfee Endpoint Security.
I use certain features of the solution, although I am not using the latest version, even though my colleagues do so a lot. They also use MVISION, although I do not. We make use of Endpoint host level data loss prevention.
We use McAfee Endpoint Security as a solution for workstations and laptops.
We are using the latest version at the moment because I'm managed by the MVISION tenants. In the past, many people had issues with the utilization of detections and resources. ENS is actually very good for detection. When properly configured, especially when the prevention feature is activated, it integrates very well with the ATP, in respect of the endpoint. ATP offers very good protection and is a rich solution which helps to remove ransomware. I've been using the product for a while now and been able to secure a lot of environmental ransomware attacks, as well as some others, by integrating the ATP with the ENS.
We are using ePO Center Server to communicate with all the endpoints that are in the network. While I cannot be certain, I believe the relevant version is McAfee 8 or 9. We make use of McAfee Agent version number 5.6.4.151. We utilize McAfee Data Exchange Layer. The McAfee Endpoint Security version to which we refer is 10.7. We use the solution for antivirus purposes.
We use the solution as a server and workstation.
Overall, we handle the implementation of the solution, taking into account the policy required to secure the network. We primarily use McAfee Endpoint Security for data loss and endpoint protection.
We use the solution to protect our endpoint systems.
We primarily use the solution for endpoint security.
We currently have around 50 servers. We aren't really a big company but we have 50 servers which we manage. We use McAfee for the web filtering portion of it. For example, if a user is doing a search on Google, there's a risk-rating web content filter built into McAfee. This alerts us if there are any threats present. We have licensed McAfee ENS on a per-server basis. As of now, from memory, I think we have 56 endpoints running McAfee — 56 servers in total.
I work for a company that is a McAfee partner. We sell the solution, and we have engineers that implement the solutions. Basically, I am part of the technical staff that implements the solution on-premise. We use endpoint security for our clients. We configure policies to scan the computer every single day in some cases and every week or even every moment. Basically, it protects the endpoint, and we have policies to do advanced threat protection.
McAfee Endpoint Security can be used for threat protection, for malware protection, and for data loss prevention by encrypting the end user devices using full depth encryption. We are using the latest version minus two because we generally update the antivirus to the current version after testing it. So generally it is two versions behind. We have three versions in our network, one is the latest version, then we have a minus one on critical machines and minus two on the endpoints.
We are using it on our network as protection.
We provide services. We mainly use this solution for endpoint security and protection. We have cloud, hybrid, and on-premises deployments.
We use this solution for endpoint protection, CASB, and it is integrated with Office 365.
Our primary use case is for endpoint protection, to block malware and viruses.
We use this product for our endpoint security.
We use it for all Windows and MAC clients. We use it for endpoint protection, DLP, and disk encryption. We are using the latest version.
This product is mainly used for detecting viruses and malware on the laptops and also to scan older, existing files.
The primary use case of this solution is for intrusion prevention. We are service providers.
The solution has three primary uses for us. Our environment is Windows-based. We don't have Mac and very little space for Linux systems. We use the solution on all of our Windows devices as a basic antivirus protection. That's our first use case. The second use case for the solution is to be able to have USB restrictions on my endpoints. And the third would be the protection of machines when, especially now in this COVID-19 climate, users connect from home. There are a lot of network-based attacks. When users are connecting from other networks, they're protected from dangers with this solution
This is part of our network security solution. We have it running on different servers and workstations that are on different platforms.
McAfee Complete Endpoint Protection is mature, tested, and usual: this is our policy. We don't go for the latest releases. We go for the release which is before the last.
I am using McAfee Complete Endpoint Protection to control bandwidth. Any network administrator can do that easily. Control is the best part of Mcafee.
Our primary use case is to provide our customers with an endpoint security solution.
Our primary use case of this solution is for it to attack malware.
My primary use case of this solution is for the endpoint protection.
We primarily use this solution for antivirus and malware protection.
We receive good protection with this solution. We use this for internet protection on the end-point.
Our primary use case is for endpoint protection.