IT Management Specialist at a computer software company with 10,001+ employees
MSP
Top 5
2024-02-22T16:42:24Z
Feb 22, 2024
Network Threat Behavior Analysis must be improved. The technical support must be improved. The support team must provide better help with configurations of devices and enabling NTBA.
Senior Tech Lead Engineer at Banking IT department
Real User
Top 20
2023-08-08T09:42:42Z
Aug 8, 2023
One challenge in Sri Lanka is the lack of available learning materials for Trellix products. We rely on our experience rather than formal training or guides, which can be a major challenge when configuring Trellix since there are limited resources for configuration guidance.
We have encountered some glitches from time to time. Some of the documentation is not as straightforward as it could be. It's much too general - especially in areas related to updates. They need to do a better job of explaining things. If you need a specific configuration, they should be able to provide the necessary details. It's something they can really improve upon if they wanted to. What I would like to see more on the roadmap for McAfee is the compatibility of high availability in terms of the virtual machine. They could make an interchangeable model that could serve the throughput requirements of the client. Right now, if you are not under the same mold there, although you have the same version, you are not able to do a proper deployment on it.
The system isn't fool-proof. Sometimes, based on the network or other reasons, McAfee cannot detect the actual attack. This rarely happens. It's only been the case maybe one or two times. The solution could improve some aspects of detection. If they implemented some machine learning technique, they might be able to better detect abnormal occurances.
Learn what your peers think about Trellix Intrusion Prevention System. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
Junior Product Consultant at a tech services company with 501-1,000 employees
Real User
2020-12-06T17:08:58Z
Dec 6, 2020
We would like to have a simpler version. Some settings and functions on the McAfee console are complex and complicated. I want the management console to be simpler.
Project Manager at a comms service provider with 51-200 employees
Real User
2020-10-11T08:58:14Z
Oct 11, 2020
I can't think of any area of improvement. It works pretty well for us. The pricing could be improved. The product offering could be enhanced a bit. I'm on the second-biggest offering and I have mostly common packets and features. They could offer a bit more to higher tiers. They also seem to mix and match other products within their suite of offerings and change those. There needs to be more consistency overall with what they offer.
Junior Product Consultant at a tech services company with 501-1,000 employees
Real User
2020-09-09T06:28:53Z
Sep 9, 2020
We would like to have a similar version that offers a bit less complexity. Currently, the settings and confirmations on the McAfee console are complex and complicated for our branches. I wouldn't describe this solution as easy to use. The management console needs to be less complex and easier to navigate.
Senior Network Security Engineer with 201-500 employees
Real User
2019-12-10T07:29:00Z
Dec 10, 2019
Integration with Global Thereat Intelligence could be better. Also, I think management solutions are end of life now at McAfee. Network threat analyzer may be used for endpoint quarantines. Integration between these sides, as well as endpoint APO, will help you quarantine the risky endpoints. Maybe they should add a feature to block all high severity threats. You cannot block all of them now. I would like to select them all and block then in one action. In crunch data situations, you need to go through every attack one at a time and change the action.
The solution needs to improve the graphical interface. They had a limitation in some of the sensor modems as well. You probably need to buy a big model to get the solution in line. They don't give you the big model by default. During deployment, since everything goes down, all the traffic will be down. You have high variability compared to others. You need to deploy a lot of sensors and figure out the best practices. This may cost you a lot. I think they should have a correlation of the IA deployment or IA policies. They should improve their policies to get the correlation and the variables from one policy.
Block More IntrusionsStop new and unknown attacks with signature-based and signature-less intrusion prevention systems. Signature-less intrusion detection finds malicious network traffic and stops attacks where no signatures exist.
Unify Virtual and Physical SecuritySupport network virtualization across private and public cloud platforms to scale security and evolve with changing IT dynamics.
Maximize Security and PerformanceScale hardware performance to speeds up to 100 Gbps and leverage...
Network Threat Behavior Analysis must be improved. The technical support must be improved. The support team must provide better help with configurations of devices and enabling NTBA.
The platform’s GUI could be the latest.
One challenge in Sri Lanka is the lack of available learning materials for Trellix products. We rely on our experience rather than formal training or guides, which can be a major challenge when configuring Trellix since there are limited resources for configuration guidance.
The technical support has room for improvement.
We have encountered some glitches from time to time. Some of the documentation is not as straightforward as it could be. It's much too general - especially in areas related to updates. They need to do a better job of explaining things. If you need a specific configuration, they should be able to provide the necessary details. It's something they can really improve upon if they wanted to. What I would like to see more on the roadmap for McAfee is the compatibility of high availability in terms of the virtual machine. They could make an interchangeable model that could serve the throughput requirements of the client. Right now, if you are not under the same mold there, although you have the same version, you are not able to do a proper deployment on it.
The system isn't fool-proof. Sometimes, based on the network or other reasons, McAfee cannot detect the actual attack. This rarely happens. It's only been the case maybe one or two times. The solution could improve some aspects of detection. If they implemented some machine learning technique, they might be able to better detect abnormal occurances.
We would like to have a simpler version. Some settings and functions on the McAfee console are complex and complicated. I want the management console to be simpler.
I can't think of any area of improvement. It works pretty well for us. The pricing could be improved. The product offering could be enhanced a bit. I'm on the second-biggest offering and I have mostly common packets and features. They could offer a bit more to higher tiers. They also seem to mix and match other products within their suite of offerings and change those. There needs to be more consistency overall with what they offer.
We would like to have a similar version that offers a bit less complexity. Currently, the settings and confirmations on the McAfee console are complex and complicated for our branches. I wouldn't describe this solution as easy to use. The management console needs to be less complex and easier to navigate.
It's a very good solution but we would like to have a simpler version. The management component could be simplified.
Integration with Global Thereat Intelligence could be better. Also, I think management solutions are end of life now at McAfee. Network threat analyzer may be used for endpoint quarantines. Integration between these sides, as well as endpoint APO, will help you quarantine the risky endpoints. Maybe they should add a feature to block all high severity threats. You cannot block all of them now. I would like to select them all and block then in one action. In crunch data situations, you need to go through every attack one at a time and change the action.
The solution needs to improve the graphical interface. They had a limitation in some of the sensor modems as well. You probably need to buy a big model to get the solution in line. They don't give you the big model by default. During deployment, since everything goes down, all the traffic will be down. You have high variability compared to others. You need to deploy a lot of sensors and figure out the best practices. This may cost you a lot. I think they should have a correlation of the IA deployment or IA policies. They should improve their policies to get the correlation and the variables from one policy.
I would like the ability to apply more filters or better customize reports in order to display information in a readable way. That would be nice.