Listing Thumbnail

    Trellix Network Detection and Response

     Info
    Sold by: Trellix 
    Deployed on AWS
    Free Trial
    Eliminate network security blind spots with Trellix NDR

    Overview

    Disrupt Attackers at Every Stage

    Trellix NDR delivers extended visibility, multilayered threat detection and accelerated investigation and response into network traffic across each stage of the MITRE ATT&CK framework spanning data centers, hybrid cloud environments, branch offices, and corporate campuses.

    Product Options

    Trellix Network Security: Automatically spot suspicious network behavior and prevent attacks that elude traditional signature and policy based security. Combine multiple AI, machine learning, and correlation engines to detect and respond to advanced threats and lateral movements in minutes.

    Trellix Network Forensics: pairs the industrys fastest lossless data capture and retrieval solution with centralized analysis and visualization. Determine the scope and impact of threats and resecure your network faster.

    Trellix Intrusion Prevention System: Trellix IPS is a NDR ready, next generation IPS that detects and blocks sophisticated malware threats across the network. It uses advanced detection and emulation techniques, moving beyond traditional pattern matching to defend against stealthy attacks with a high degree of accuracy and performance.

    Please contact aws@trellix.com  before purchasing. Your account team will provide an AWS Private Offer with the correct product mix, quantities, and applicable discounts. Multiple product choices and deployment options are possible using part numbers not listed here.

    Highlights

    • Adapt to new threats automatically
    • Protect across your network to the cloud
    • Connect to Trellix Helix to enable GenAI insights

    Details

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Free trial

    Try this product free according to the free trial terms set by the vendor.

    Trellix Network Detection and Response

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (6)

     Info
    Dimension
    Description
    Cost/12 months
    NDRT0-T
    Network Detection and Response Essentials Edition (2 way)
    $105,193.00
    NDRT1-T
    Network Detection and Response Core Edition - 2 Way
    $142,010.55
    NDRT2-T
    Network Detection and Response Enterprise Edition - 2 Way
    $173,568.45
    IVXECE-AA
    Trellix Intelligent Virtual Execution (IVX) - Per User Pricing (1 yr)
    $62.29
    DODE1E-AA
    Trellix IVX Enterprise Cloud - Per User Pricing (1 yr)
    $40.19
    VCMGAE-AT
    Central Management - Virtual Appliance - Per Instance - (1 yr)
    $11,836.44

    Vendor refund policy

    Please contact aws@trellix.com  for refund requests

    Custom pricing options

    Request a private offer to receive a custom quote.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    Standard support and customer success programs available support@trellix.com 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    50
    In Generative AI
    Top
    10
    In Education & Research
    Top
    10
    In Security

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Network Traffic Analysis
    Advanced multilayered threat detection across data centers, hybrid cloud environments, branch offices, and corporate campuses using AI and machine learning correlation engines
    Threat Detection Methodology
    Comprehensive network security approach spanning multiple stages of MITRE ATT&CK framework with automated suspicious behavior identification
    Intrusion Prevention Capabilities
    Next-generation intrusion prevention system using advanced detection and emulation techniques beyond traditional pattern matching
    Machine Learning Detection
    Multiple AI and machine learning engines for detecting advanced threats and identifying lateral network movements
    Network Forensics
    Lossless data capture and retrieval solution with centralized analysis and visualization for comprehensive threat impact assessment
    Threat Detection Mechanism
    Advanced endpoint detection and response (EDR) capabilities with multi-stage threat identification across attack vectors
    Malware Prevention Technology
    Sophisticated prevention-first approach using advanced blocking technologies against broad range of cyber attacks
    Security Investigation Tools
    Unified XDR platform enabling comprehensive threat investigation, detection, and response capabilities
    Attack Vector Coverage
    Multi-layered protection mechanism targeting different stages and types of cybersecurity threats
    Endpoint Protection Framework
    Comprehensive security solution with default strong protection settings and drift identification capabilities
    Threat Detection and Response
    Advanced extended detection and response (XDR) platform with deep and broad threat visibility across multiple digital environments
    Cloud Security Coverage
    Comprehensive security protection for cloud workloads, containers, networks, serverless functions, storage, and open source vulnerabilities
    Global Threat Intelligence
    Cybersecurity platform leveraging decades of security expertise and continuous global threat research
    Multi-Environment Protection
    Security solution spanning cloud, networks, devices, and endpoint protection with integrated monitoring capabilities
    Enterprise Security Platform
    Purpose-built threat defense platform providing unified security management across digital infrastructure

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    |
    7 external reviews
    Star ratings include only reviews from verified AWS customers. External reviews can also include a star rating, but star ratings from external reviews are not averaged in with the AWS customer star ratings.
    Abdullah Al Hadi

    Network defense becomes effective with automatic responses to incidents

    Reviewed on Feb 18, 2025
    Review provided by PeerSpot
    ">

    What is our primary use case?

    The primary use case for Trellix Network Detection and Response  is network intrusion detection, which is crucial for protecting environments. It helps secure networks and defend against phishing and other attacks created by the networking sector. We use the solution for detection and forensics investigation, reporting incidents such as the source and network path of attacks.

    What is most valuable?

    Trellix NDR provides an essential defense by automatically responding to network incidents that firewalls may not catch. When users break firewall rules, the solution identifies affected areas for immediate action, helping determine the actual reason for attacks. Its ability to report incidents like network paths makes it invaluable in securing the environment. With eight years of experience, I can attest that Trellix NDR is effective in detecting and protecting networks.

    What needs improvement?

    The Trellix solution could be improved by enhancing the Central Management Console for faster visibility, which would help in network detection response. Networking often involves complexity that could be simplified. More visibility in the dashboard would help in quickly identifying and responding to incidents. Additionally, there should be improvements in AI intelligence, faster decision-making, and a more responsive technical support team.

    For how long have I used the solution?

    I have been using Trellix NDR for approximately eight and a half years.

    How are customer service and support?

    Technical support needs improvement as sometimes engineers are not available promptly, especially during high-severity incidents. There is a need for technical expertise, specifically in device control and DLP  issues.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    The initial setup of Trellix NDR has some complexities, particularly when dealing with big organizations' network design and path.

    What's my experience with pricing, setup cost, and licensing?

    While I do not handle pricing directly, it is known that there is a variety of customers with different licensing needs, which depends on the organization's size and policy.

    What other advice do I have?

    Currently, I would rate Trellix NDR as an eight out of ten. There are various opportunities for improving its response capabilities and dashboard visibility to quickly address incidents, which could improve the overall effectiveness of the solution.

    Which deployment model are you using for this solution?

    On-premises
    Daniel_Martins

    Helps increase response to attacks and reduce client risks

    Reviewed on Jun 10, 2024
    Review provided by PeerSpot
    ">

    What is our primary use case?

    The tool helps to reduce client risks. 

    What is most valuable?

    Trellix Network Detection and Response helps increase response to attacks. One benefit is increased visibility and simplicity in maintaining it. AI analyzes and relates data based on past performance over the last five days. 

    What needs improvement?

    The solution's support needs to improve their support.

    For how long have I used the solution?

    I have been working with the product for two years. 

    What do I think about the stability of the solution?

    The tool is stable. However, it has some monthly limitations. 

    Which solution did I use previously and why did I switch?

    Trellix Network Detection and Response differs from other products due to its integration. 

    How was the initial setup?

    Trellix Network Detection and Response's deployment is easy and can be completed in a minute. 

    What about the implementation team?

    My team helps with the tool's deployment. 

    What other advice do I have?

    I would recommend the product to others. I rate it a nine out of ten. 

    reviewer2392089

    Lacks to let users use multiple IOCs but helps conduct threat investigations efficiently

    Reviewed on Apr 26, 2024
    Review provided by PeerSpot
    ">

    What is our primary use case?

    I use the solution in my company's daily operations to conduct threat investigations.

    What is most valuable?

    The most valuable feature of the solution stems from how it allows users to do the investigation part. Another important part of the product that is valuable is associated with how it gives information to users in the form of a storyline.

    What needs improvement?

    In Trellix Network Detection and Response, I suggest having Trellix EDR like features as it currently does not have the feature to add multiple IOCs to search an environment. If you want to search the hashes in the environment, you need to put in IOCs one by one, making it a very hectic job. In my company, we have to use IOCs daily to search for hashes in our environment, and then we have to put in the IOCs one by one. My company had spoken to Trellix's team to look into the matter concerning IOCs and was told by Trellix that the tool doesn't have a search feature that allows the use of IOCs in one go. The aforementioned area needs improvement in Trellix.

    For how long have I used the solution?

    I have been using Trellix Network Detection and Response for two years. I am a user of Trellix.

    What do I think about the stability of the solution?

    The product sometimes crashes, but it is up and working most of the time. In general, there is some downtime and certain issues with the product.

    What do I think about the scalability of the solution?

    I use the product daily in my company.

    Multiple people in my company use the product.

    How are customer service and support?

    In my company, if you face issues with Trellix Network Detection and Response or Trellix EDR, there is a separate team in my organization that offers technical support.

    Which solution did I use previously and why did I switch?

    I have almost four years of experience in the area of cybersecurity, and I have used many EDR solutions before Trellix, like Kaspersky and Cybereason. My company decided to use Trellix Network Detection and Response.

    How was the initial setup?

    I rate the product's initial setup phase a seven on a scale of one to ten, where one is difficult, and ten is easy.

    The solution is deployed on an on-premises model.

    What other advice do I have?

    The product's response capabilities were good. In general, I can say that the solution's response capabilities are neither too good nor very bad, so I can place it somewhere in the medium range.

    I rate the tool a five out of ten.

    Which deployment model are you using for this solution?

    On-premises
    BiswabhanuPanda

    Offers in-depth investigation capabilities, integrates well and smoothly transitioned from a lower-capacity appliance to a higher one

    Reviewed on Apr 04, 2024
    Review provided by PeerSpot
    ">

    What is our primary use case?

    The solution has been in place for quite some time – three or four years. We've renewed it several times, and we upgraded from Gen 3 to Gen 4 hardware at one point as well.

    Currently, it's integrated with our firewall and McAfee IPS. We also have network-based sandboxing deployed. It uses static and dynamic analysis engines, so we get alerts if malicious traffic is detected or harmful objects are downloaded.

    We've been using their PX solution for packet capture, which is the core of their NDR functionality. But we haven't fully adopted the combined product – NX and PX  – yet because they are still separate. 

    The storage requirements for raw packet capture, especially with our traffic levels, make it quite expensive.  And that's true for many security products. I feel like NDR is pretty expensive. 

    However, this is especially true about raw packet capture for network telemetry – the storage requirements with RAID 0 become quite expensive, regardless of the solution.

    How has it helped my organization?

    We had a serious incident where an attacker attempted a web shell attack on one of our web servers [DevOps server]. We were able to identify that the hackers used a malicious script and tried to target specific files. The hacker also tried to make a copy of some files. 

    We wanted to cross-reference that activity with the network traffic just to be sure there was no lateral movement. With Trellix, we easily confirmed that there was no lateral network involvement and that nothing else was infected. It helped us correlate the events and feel confident in our containment.

    Trellix NDR was effective in that situation.

    Morevoer, we've integrated this solution with our SIEM. There's a degree of integration provided by Trellix with their solution, and we're satisfied with that. However, without the SIEM, that's the extent of our integrations at the moment.

    We're exploring further options due to organizational shifts towards the cloud, potentially moving away from a hybrid environment. We're assessing SaaS-based SIEM solutions. Trellix has its own offering, Helix, which we've evaluated and even purchased in the past. Ultimately, we discontinued its use. To summarize, our primary integration right now is with our SIEM.

    The SIEM integrates well with our threat intelligence sources. We also have some secondary integrations in place. Overall, things are running smoothly.

    What is most valuable?

    The in-depth investigation capabilities are a major advantage. When the system flags something as malicious, it provides a packet capture of that activity within the environment. 

    That helps my team quickly identify additional context that most other tools wouldn't offer – like source IP or base64 encoded data. We can also see DNS requests and other details that aren't readily available in solutions like Check Point or others that we've tried.

    The detection itself is solid, and their sandboxing is powerful. 

    There's a learning curve – you need a strong grasp of OS-level changes, process forking, registry changes, and the potential impact of those. But with that knowledge, the level of information Trellix provides is far greater than what we've seen elsewhere.

    The real-time response capability of Trellix has been quite effective, although it's not very fast.  The key is this solution's concept of 'preference zero.' They don't immediately act on a zero-day. For example, the solution has seen a piece of malware for the first time. It'll let it in, then do sandboxing. Maybe after four or five minutes, it identifies that specific file's DNX Secure Store as malicious. At that point, they update the static analysis engine, and it gets detected if anything else tries to download the same file.

    There is that initial 'preference zero' concept, like with Panda. You may not hold traffic in the network. That's standard in the industry; we don't do much about it. To address that, we also have endpoint solutions. We use SentinelOne in our environment, which helps us identify threats like Western Bureaus and others.

    What needs improvement?

    The analytics could be better. It seems heavily influenced by the McAfee and FireEye integration, and that integration still isn't seamless. 

    STG needs to... I'm not sure what their roadmap is; they've mentioned full integration, but it hasn't materialized yet. Both the McAfee and FireEye engineering teams need to accelerate the process, as it would definitely benefit customers. The integration between Nextiva and Trellix could also use some work.

    For how long have I used the solution?

    I have been using it for seven years. I have been involved since the FireEye days. That's when I started working with it.

    We're on version 9.1.5.

    What do I think about the stability of the solution?

    I would rate the stability an eight out of ten. It's quite stable.

    What do I think about the scalability of the solution?

    We've upgraded without any major hiccups – I'd rate scalability a nine out of ten. We've smoothly transitioned from a lower-capacity appliance to a higher one. The current appliance supports 2.5 Gbps of traffic, and we're currently handling around 300-500 Mbps without issue. Scalability is definitely there, we've never faced any problems in that regard.

    We have approximately 500+ users. However, we also have applications hosted here, along with multiple IPC tunnels. We're using Netskope's Zero Trust Web DNA as well. So, 500+ users, but typical traffic averages around 300 to 400 Mbps.

    How are customer service and support?

    The customer service and support are really good. Trellix offer multiple contact options – you can call and get immediate assistance from someone in Israel, Singapore, Japan, or even India. Plus, they offer chat support through Teams or Webex. 

    Trellix's documentation portal is also good.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We've used Forcepoint, NetFlow, SentinelOne, Trellix, Arista…some Splunk, and some Elastic as well. It's a mix of tools across different security domains.

    These are all security-focused products. Security is my primary focus.

    How was the initial setup?

    The initial setup was really straightforward. It took maybe a day to complete the upgrade. 

    We spent some time getting the prerequisites ready, which took a bit longer, but the actual deployment was very fast.

    So you just identify the network where you want to connect it and just plug it in. It only took half a day. 

    Therefore, the preparation took some time, but the deployment itself was quick.

    Handling upgrades:

    We have a practice where network device upgrades take priority - starting with the App Firewall and working our way through Web Proxy and so on. We avoid parallel endpoint upgrades as we've had challenges with those.

    Trellix releases sandbox system updates yearly, which are fine. Those don't require downtime. However, operating system upgrades are a factor. 

    We review KBR details thoroughly. Three or four months ago, we went from 9.1.4 to 9.1.5, and we're evaluating a possible upgrade to version 10, perhaps next month.

    Generally, we follow the n-1 version strategy. But if there are significant new features in a release, we might upgrade sooner. Overall, it's manageable – we upgrade frequently, and this particular solution hasn't caused downtime issues. Plus, we use DNS-based global [settings/configuration?], so downtime isn't a major concern.

    What about the implementation team?

    For the deployment process, we needed two or three engineers. The physical appliance mounting and setup require multiple people. Trellix's appliances are very heavy.

    What's my experience with pricing, setup cost, and licensing?

    The pricing is fair, a little expensive, but fair. We've evaluated other products, and they're similarly priced. It's a bit on the expensive side, but we don't want to compromise with cheap, less reliable solutions. 

    We want quality. It's like... you might not opt for the top-of-the-line Apple product, but Samsung is a good choice. We wouldn't go for an Oppo, VIVO or ASUS type of device.

    Overall, I would rate the pricing an eight out of ten, with one being expensive and ten being very cheap. 

    What other advice do I have?

    Overall, I would rate the solution a nine out of ten.

    Potential customers should definitely evaluate their specific use cases, budget, and commercial considerations. The product itself is good, there's no doubt. But it's essential to understand your use cases – then I'd definitely recommend it.

    Which deployment model are you using for this solution?

    On-premises
    Archie Scorgie

    Blocks traffic and DDoS attacks

    Reviewed on Feb 22, 2024
    Review provided by PeerSpot
    ">

    What is our primary use case?

    We use the solution in our servers and workstations for Endpoint Detection and Response. 

    What is most valuable?

    Over the thirteen years of using the product, we have not experienced a single compromise in our environment. During the COVID period, we faced numerous DDoS attacks, and the tool proved highly effective in mitigating these threats. The IP devices played a crucial role in blocking and reducing the amount of malicious traffic entering our company. Its endpoint security, EDR, and insights are valuable. The automation functionality, particularly the ability to automatically handle and mitigate detected threats, has proven to be immensely beneficial for our security operations.

    What needs improvement?

    Certain features in Trellix Network Detection and Response, such as using AL-type commands, may initially pose a challenge for those unfamiliar with such commands. However, once users become accustomed to the system, it becomes easier to use.

    For how long have I used the solution?

    I have been using the product for 13 years. 

    What do I think about the stability of the solution?

    I rate the product’s stability a nine out of ten. 

    What do I think about the scalability of the solution?

    We are using Trellix Network Detection and Response on approximately 3,500 servers and 33,000 workstations. I rate its scalability a ten out of ten. 

    How are customer service and support?

    We handle the first-line support for Trellix Network Detection and Response on our own, performing troubleshooting and maintenance. For more advanced issues, we rely on Trellix Network Detection and Response's classic support as the third-line support.

    How was the initial setup?

    The tool's integration with our existing security infrastructure was not difficult. Following the provided processes made the integration relatively straightforward. Its deployment was not difficult for us. We received support from Trellix professional services, which made the process smoother. The process took two months to complete. 

    What other advice do I have?

    I rate the tool a nine out of ten. 

    Which deployment model are you using for this solution?

    On-premises
    View all reviews