Listing Thumbnail

    Trellix Endpoint Security

     Info
    Sold by: Trellix 
    Deployed on AWS
    Free Trial
    Secure your organization with proactive endpoint detection, response, and prevention.

    Overview

    Secure your organization with proactive endpoint detection, response, and prevention. Trellix Endpoint Security can be used as a stand-alone solution or part of an overall Trellix eXtended Detection & Response (XDR) strategy.

    Product Options:

    • Trellix Endpoint Security (ENS)
    • Trellix Endpoint Security (HX)
    • Trellix Endpoint Detection and Response (EDR)
    • Trellix Endpoint Detection and Response with Forensics (EDRF)

    Before purchasing, please contact aws@trellix.com . Your account team and reseller will customize an AWS Private Offer with the correct quantities, SKUs, and qualified discounts.

    Highlights

    • Proactively protect every endpoint
    • Prevent ransomware and other advanced threats
    • Easily scale and manage all your endpoints

    Details

    Categories

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Free trial

    Try this product free according to the free trial terms set by the vendor.

    Trellix Endpoint Security

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (12)

     Info
    Dimension
    Description
    Cost/12 months
    MVAECE-AA
    Trellix Advanced (SaaS-MVA) - (5-250) Per User Pricing (1 yr)
    $118.44
    MVPECE-AA
    Trellix Premium (SaaS-MVP) -(5-250) Per User Pricing (1 yr)
    $222.32
    MVCECE-AA
    Trellix Complete (SaaS-MVC) - Per User Pricing (1 yr)
    $366.08
    TRXE1ECE-AA
    Trellix Endpoint Security (TRXE1) -(100-250) Per User Pricing (1 yr)
    $136.16
    MV6ECE-AA
    Trellix Protect Plus EDR (MV6) - (5-250) Per User Pricing (1 yr)
    $104.65
    MV7ECE-AA
    Trellix Protect Plus and EDR Premium (MV7) - Per User Pricing (1 yr)
    $176.767
    MV4ECE-AA
    Trellix EDR (MV4) -(251-1000) Per User Pricing (1 yr)
    $54.54
    MV5ECE-AA
    Trellix EDR Premium (MV5) - Per User Pricing (1 yr)
    $145.978
    MV1ECE-AA
    Trellix Protect Standard for one year subscription with one year Thrive Essential (5-250 end points)
    $46.18
    MV2ECE-AA
    Trellix Protect Plus one year subscription with one year Thrive Essential (5-250 end points)
    $91.49

    Vendor refund policy

    Please contact aws@trellix.com  for refund requests

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    Standard support and customer success programs support@trellix.com 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    100
    In Security
    Top
    10
    In Education & Research
    Top
    10
    In Security

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Threat Detection
    Advanced endpoint detection capabilities using proactive scanning and analysis techniques
    Malware Prevention
    Comprehensive protection against ransomware and sophisticated cyber threats through real-time monitoring
    Endpoint Management
    Scalable solution for centralized management and monitoring of organizational endpoints
    Detection and Response
    Integrated endpoint detection and response (EDR) framework with forensic investigation capabilities
    Security Strategy
    Flexible deployment options supporting standalone and extended detection and response (XDR) integration
    Threat Detection Mechanism
    Advanced endpoint detection and response (EDR) capabilities with multi-stage threat identification across attack vectors
    Malware Prevention Technology
    Sophisticated prevention-first approach using advanced blocking technologies against broad range of cyber attacks
    Security Investigation Tools
    Unified XDR platform enabling comprehensive threat investigation, detection, and response capabilities
    Attack Vector Coverage
    Multi-layered protection mechanism targeting different stages and types of cybersecurity threats
    Endpoint Protection Framework
    Comprehensive security solution with default strong protection settings and drift identification capabilities
    Threat Detection and Response
    Advanced extended detection and response (XDR) platform with deep and broad threat visibility across multiple digital environments
    Cloud Security Coverage
    Comprehensive security protection for cloud workloads, containers, networks, serverless functions, storage, and open source vulnerabilities
    Global Threat Intelligence
    Cybersecurity platform leveraging decades of security expertise and continuous global threat research
    Multi-Environment Protection
    Security solution spanning cloud, networks, devices, and endpoint protection with integrated monitoring capabilities
    Enterprise Security Platform
    Purpose-built threat defense platform providing unified security management across digital infrastructure

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4
    1 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    100%
    0%
    0%
    0%
    1 AWS reviews
    |
    78 external reviews
    Star ratings include only reviews from verified AWS customers. External reviews can also include a star rating, but star ratings from external reviews are not averaged in with the AWS customer star ratings.
    KarthiS

    Ensures seamless protection for diverse industries

    Reviewed on May 15, 2025
    Review provided by PeerSpot

    What is our primary use case?

    Our customers primarily use Trellix Endpoint Security (ENS)  only for endpoint security, with some cases where they prepare for Data Loss Prevention (DLP) .

    The main use case for Trellix Endpoint Security (ENS)  is to protect the end user and to block USB and other devices, which is why they prefer to go with Trellix. They also use it for DLP  to protect email and other things in their environment.

    What is most valuable?

    They find Trellix Endpoint Security  (ENS) easy and user-friendly for their environment, which is why they choose Trellix. Additionally, it has a more manageable console compared to other products, which they felt were more difficult.

    For incidents, we don't handle them directly because we provide the services for installation and management. We have our own SOC team that manages Trellix Endpoint Security  (ENS), offering support. Any incidents that occur are taken care of via email for our customers.

    What needs improvement?

    Some customers feel that the Trellix Endpoint Security (ENS) agent consumes more memory and resources in their environment, which is a major issue we are facing. This causes their endpoints to consume more CPU under subscription, resulting in a feeling of slowness in their processes.

    For how long have I used the solution?

    I have been working with Trellix Endpoint Security (ENS) for the last two years.

    What was my experience with deployment of the solution?

    Trellix Endpoint Security (ENS) is easy to scale and we have not encountered any scalability issues.

    The solution is easier to set up compared to Trend Micro. I would rate the setup of Trellix Endpoint Security (ENS) about a nine out of ten.

    It takes approximately two to three days to deploy Trellix Endpoint Security (ENS) since we just need to provide the consoles, deploy the agent and their policies, and verify that the agents are functioning.

    What do I think about the stability of the solution?

    Trellix Endpoint Security (ENS) is a stable solution, and we have not faced any stability issues.

    What do I think about the scalability of the solution?

    Trellix Endpoint Security (ENS) is easy to scale and there are no issues with scalability.

    How are customer service and support?

    We are very happy with the technical support we receive from the Trellix team. I rate the support from Trellix a perfect ten.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    Trellix Endpoint Security (ENS) is not challenging to set up and is easier to implement compared to Trend Micro. I would rate the setup about a nine out of ten.

    It takes approximately two to three days to deploy Trellix Endpoint Security (ENS) since we just need to provide the consoles, deploy the agent and their policies, and verify that the agents are functioning.

    What other advice do I have?

    Currently, we are working with Trellix Endpoint Security (ENS) and Trend Micro, focusing only on Trellix.

    I am not entirely sure about the integration capabilities Trellix Endpoint Security (ENS) provides, and I am not very familiar with those features either.

    For those wanting to use Trellix Endpoint Security (ENS), I recommend it for protecting their environment in an easy way. It is straightforward to know and features no complicated deployment, and we also appreciate the support we receive.

    My total rating for Trellix Endpoint Security (ENS) is a ten out of ten.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    VenkatKrishnan

    Long-term compatibility boosts performance while integration support needs improvement

    Reviewed on May 13, 2025
    Review provided by PeerSpot

    What is our primary use case?

    We use it mainly for two purposes: one is for encryption of the laptops, and the other is for endpoint DLP .

    Our biggest advantage is the compatibility with a variety of laptops. The compatibility with old laptops and new laptops is the most significant advantage.

    We are not using the response automation functionality because we're only using it for encryption and for DLP , so there is no response automation we are utilizing.

    What is most valuable?

    The compatibility with a variety of laptops is our biggest advantage. The system works with both old laptops and new laptops, which is the most significant benefit.

    We have to maintain it because when new versions of Windows are released, we must test the compatibility and functionality.

    What needs improvement?

    The main area for improvement is the integration with Microsoft Windows Hello, which includes Face ID or fingerprint-based authentication. Currently, they don't support either, so users have to type in the username and password. It doesn't support Microsoft Windows Hello authentication.

    For how long have I used the solution?

    I have been using Trellix Endpoint Security  for more than five years now.

    What was my experience with deployment of the solution?

    The potential challenge while deploying Trellix Endpoint Security  is that multiple agents are needed for successful deployment. If one of the agents doesn't deploy, the installation is not successful. A base agent is needed, then a protection agent on top of it. If the base agent fails, the protection agent will not get installed, whereas other products don't have multiple agents to install, just one agent and it's complete.

    What do I think about the stability of the solution?

    I think it's stable enough; earlier it had glitches, but now it's stable enough.

    They have fixed the previous issues.

    What do I think about the scalability of the solution?

    Trellix Endpoint Security  is scalable; there are no issues there.

    How are customer service and support?

    The technical support from Trellix is average - it's neither good nor bad. I would give it five or six points out of ten for support.

    How would you rate customer service and support?

    Which solution did I use previously and why did I switch?

    We are not using threat detection capabilities from the McAfee set of products or Trellix products.

    What was our ROI?

    AI would be needed, especially because of the data protection part. There are two parts: one is the encryption which is standard and no AI is needed, but the data protection part could benefit from AI to detect new types of data and protect it.

    What's my experience with pricing, setup cost, and licensing?

    I don't have visibility on pricing because it is negotiated by a different team, as I look after the technical side.

    Which other solutions did I evaluate?

    I have not seen anything connected with AI in Trellix.

    What other advice do I have?

    The implementation is neither straightforward nor very difficult. It's somewhere in between.

    It has more to do with enhancements of features and functionality. There's nothing much which has come out, and it's been a product that we are running for so long with not many support cases that open up for us.

    I would rate Trellix Endpoint Security  overall as six and a half out of ten, closer to seven rather than six points.

    Which deployment model are you using for this solution?

    On-premises

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Mohit Dhingra

    Excellent threat detection and smooth maintenance with powerful AI utility integration

    Reviewed on May 12, 2025
    Review provided by PeerSpot

    What is our primary use case?

    The company is using it for cybersecurity, malware, and anti-malware.

    How has it helped my organization?

    We have customers who were facing challenges with traditional security solutions such as Trend Micro or Symantec that were not working. They would receive reports indicating no malware in their network. However, when we implemented Trellix Endpoint Security  in their network, multiple types of malware was detected.

    What is most valuable?

    The solution is easy to manage, easy to implement, easy to install, and the support is excellent.

    The detection capability of Trellix Endpoint Security  is higher than traditional antivirus solutions.

    The AI functionality has proven quite useful with the new version. Trellix Endpoint Security  has introduced the new MVISION solution, MVISION Endpoint, which works completely on AI and machine learning.

    What needs improvement?

    The agent is very heavy, so we have to ensure that we have a lightweight agent for Windows systems.

    For how long have I used the solution?

    We have been using the solution for almost 20 years now.

    What do I think about the scalability of the solution?

    The cloud management console ensures there are no limits on scalability. It's quite scalable with no restrictions.

    How are customer service and support?

    Support has been excellent overall. 

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    The solution has been easy to manage, easy to implement, and very easy to install.

    What other advice do I have?

    I'd rate the solution ten out of ten. 

    Which deployment model are you using for this solution?

    Hybrid Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    reviewer2696286

    Struggle with patch management simplifies but complexity in automation persists

    Reviewed on Apr 18, 2025
    Review provided by PeerSpot

    What is our primary use case?

    We have Trellix Endpoint Security  available and are trying to do an upgrade. I am trying to figure out whether I can get rid of my SUSI manager, WSUS , or 'WaySUS' as we call it, the Windows patching environment.

    What is most valuable?

    I have been a customer of Trellix Endpoint Security  for years, but I am not necessarily satisfied. The product does not seem to be cloud-native and there are issues with automating it. It might have something to do with our skill set, but automation is not intuitive.

    What needs improvement?

    Automation and overall complexity need improvement. The product does not seem to be cloud-native.

    For how long have I used the solution?

    It has been in place for years.

    What was my experience with deployment of the solution?

    Deployment and configuration become complex quickly, especially in a micro-segmented environment.

    What do I think about the scalability of the solution?

    I have not faced any problems with scalability so far, but we are starting an upgrade or overhaul.

    What other advice do I have?

    I would rate Trellix Endpoint Security  a six and a half to seven. I am not sure whether it is a comprehensive review of the product, but these are my observations. I would rate the overall solution a 6.5 out of 10.

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Abdullah Al Hadi

    Customization capabilities allow clients to autonomously deploy policies

    Reviewed on Apr 15, 2025
    Review provided by PeerSpot

    What is our primary use case?

    The primary use case for Trellix Endpoint Security  is its customization capabilities, allowing me and my organization to create and deploy our policies autonomously. I prefer this because it offers flexibility. I use it for product types like Endpoint Security , Data Loss Prevention (DLP) , and for integrating with Network Detection and Response  (NDR) and Extended Detection and Response (XDR)  solutions.

    What is most valuable?

    The most valuable feature of Trellix Endpoint Security  is its extensive customization capability, which allows me to create and deploy policies autonomously, suiting my individual needs. Including options like Application Control  (formerly Solidcore), integrated monitoring, change control, DLP , and advanced threat protection, the solution offers comprehensive security. The integrated AI features enhance reporting, investigation, and forensic analysis, providing useful threat detection capabilities.

    What needs improvement?

    There are a few areas where Trellix Endpoint Security  can improve. Firstly, the high CPU utilization when agents are installed can negatively impact client systems. Another issue is with end-users outside the network, where the agent handler sometimes fails to deploy the product properly. Improvements are needed in forensic analytics to detect specific vulnerabilities. It would also help if detection specifics were identified more quickly and the problem-solving process accelerated, especially to meet larger clients' expectations.

    For how long have I used the solution?

    I have over nine years of experience using Trellix Endpoint Security .

    What was my experience with deployment of the solution?

    Sometimes, I encounter deployment issues with low bandwidth. When deploying multiple products, like Web Control, Firewall, and Adaptive Threat Protection, one or more can fail to install, requiring manual intervention. It's not always clear why some systems face these issues, as typically, 80% of systems complete deployment successfully, while 20% may not.

    What do I think about the stability of the solution?

    I would rate the stability of Trellix Endpoint Security as near perfect, close to ten out of ten.

    What do I think about the scalability of the solution?

    I would rate the scalability of Trellix Endpoint Security at 7.5, close to eight out of ten.

    How are customer service and support?

    Technical support from Trellix is generally good, with a rating of eight out of ten. Some engineers are knowledgeable, though newer engineers might take longer to resolve issues.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I have also worked with products from other vendors such as Sophos and Trend Micro. I prefer Trellix for its customization capabilities, which are significant when compared to these other products.

    How was the initial setup?

    The deployment is possible with Trellix Endpoint Security, but there are issues if the bandwidth is low, causing partial product installations. In such cases, manual installations are necessary to complete the process. Another downside is the absence of clear explanations for why certain installations fail.

    What was our ROI?

    Trellix Endpoint Security offers a good return on investment as highlighted by its continued use despite some client complaints. Clients appreciate the solution’s customization capabilities and ongoing product improvements.

    Which other solutions did I evaluate?

    I have worked with security solutions such as Sophos and Trend Micro, comparing them with Trellix Endpoint Security.

    What other advice do I have?

    Overall, I strongly recommend Trellix Endpoint Security due to its customization features. Even so, certain areas like AI integration should see improvements. In terms of the overall rating, I would give Trellix an eight out of ten.

    Which deployment model are you using for this solution?

    On-premises
    View all reviews