
Overview
Trellix Email Security offers agile, adaptable, and unified email security that detects and responds to threats instantly. It helps identify and mitigate advanced email threats like ransomware, business email compromise (BEC), and phishing. Trellix Email Security can be integrated with up to 650 Trellix solutions and third-party products. Trellix Email Security has received recognition from Frost Sullivan, IDC, Gartner, Forrester, and Cyber Security.
Please contact aws@trellix.com before purchasing. Your account team will provide an AWS Private Offer with the correct product mix, quantities, and applicable discounts. This product is also available for a free trial.
Highlights
- Detect and defend against the most sophisticated business email compromise (BEC), ransomware, and phishing attacks
- Protect on-premises and cloud-based email infrastructure, including easily integrating with Microsoft 365 and Google Workspace
- Identify critical threats with minimal false positives and block threats inline to keep them out of your environment
Unlock automation with AI agent solutions

Features and programs
Financing for AWS Marketplace purchases
Pricing
Free trial
Dimension | Description | Cost/12 months |
---|---|---|
100 Users | Email Security Cloud - 100 users - 1 year | $5,544.00 |
1001 Users | Email Security Cloud - 1001 users - 1 year | $32,372.34 |
5001 Users | Email Security Cloud - 5001 Users - 1 year | $144,428.88 |
100 Users | Email Security Cloud AntiVirus/AntiSpam Edition - 100 Users - 1 year | $8,150.00 |
1001 Users | Email Security Cloud AntiVirus/AntiSpam Edition - 1001 Users - 1 year | $47,587.54 |
5001 Users | Email Security Cloud AntiVirus/AntiSpam Edition - 5001 Users - 1 year | $1,805,366.10 |
Vendor refund policy
We do not currently support refunds.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Support
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

Standard contract
Customer reviews
Ease of deployment and cost-effectiveness boost operational efficiency
What is our primary use case?
We block DMARC for incoming mails and have threat detection enabled to block or identify any spam mail received in end-user mailboxes. We prevent spam mails and unknowns such as DKIM and DMARC unavailable mail. Additionally, we have country-based restrictions in our email gateway, which helps us prevent mail coming from unrecognized or unused countries. These are the ways we provide security to our end-user mailboxes.
What is most valuable?
We have cloud threat protection, which helps us identify any suspicious threats in emails.
Threat intelligence is adequate because they are using Microsoft GTI threat intelligence, but we need to increase protection against phishing and spam mails. It is already implemented, but we need to increase intelligence for cases where phishing links are received and need to be blocked. If users try to open links that have converted to phishing after some time, those need to be blocked. We are blocking some links, but we may miss others, so we need clarity on that protection, especially for older links.
What needs improvement?
I have recommendations for increasing dashboard customization. Currently, we are using custom dashboards, but they are not effectively customizable. If they provide better customization options, it would be easier to understand everything in a single dashboard instead of navigating through dropdown menus to see reports. Additionally, log retention is currently 30 days, but some customers request to extend it to 60 days. Having 60 days of log retention would be helpful for maintaining logs.
For how long have I used the solution?
I have been working with Trellix Email Security for the past one year.
What was my experience with deployment of the solution?
There are two deployment modes: API integration, which is very easy, and MX record change, which requires some downtime. For deployment with inline mode, it takes around four to six hours of downtime. For API-based integration, we do not need any downtime and can implement it directly in production.
What do I think about the stability of the solution?
The security rates at eight out of ten.
What do I think about the scalability of the solution?
I have not performed scalability adjustments because the user count has not increased. However, based on my understanding, we have the option to increase the count in the future. The scalability rates at nine out of ten.
How are customer service and support?
Technical support rates at eight out of ten. The overall service rates at eight.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I work with both Sophos and Trellix Email Security solutions. When compared with Sophos, Trellix Email Security is better, and when compared to other solutions, the price is more cost-effective.
How was the initial setup?
We deployed the solution for approximately 1,000 mailboxes.
What about the implementation team?
Three people were involved in the installation: one from the DNS side, one from Office 365Â , and another from my team.
What was our ROI?
The operational cost involves a one-time investment for purchasing and implementing the solution, which provides protection for one year. The operational cost is average. Compared to other email solutions such as Cisco, price-wise, we get this solution within 50 to 60% of the average. They provide good percentages for enterprise customers. It reduces costs by almost 40% or 45% compared to other security solutions.
What's my experience with pricing, setup cost, and licensing?
I am satisfied with the secure licensing cost because compared to other solutions, Trellix Email Security is cheaper and provides most features. I only know about the pricing from one year ago.
What other advice do I have?
I am not working with other Trellix products such as Trellix Move AntiVirus or Trellix Intrusion Prevention System . The solution is easy to deploy, and the operational cost is less compared to other solutions. The price rates at eight out of ten. We use inline mode for integration with existing security infrastructure. They recently added AI to the solution, but I need to check with the team regarding AI implementation for email specifically. My final rating for Trellix Email Security is nine out of ten.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Out of data and hard to manage
Trellix Enterprise Security Manager helps us to detect the malwares and Threats and help mitigate
McAfee Enterprise Log review
It is having instant access to log data from various sources
And it is filtering options to quickly identify specific events or patterns
It can able to handle large volume of log data from diverse sources
It integrates with other McAfee solutions and third party tools
It is having features enabling security teams to monitor investigate and respond to the security incident
It is difficult to effectively communicate insights to the non technical stakeholders
It requires significant training and expertise for new users
Large volume of lock data can impact search performance leading to slower query results
Integration with diverse log sources and customization of dashboards and reports can be time consuming and require technical expertise
Offering centralised flat form for law collection analysis and reporting improving security teams
Identifying potential security threats in real time
It is giving incidence response enabling rapid investigation and analysis of security incident