We block DMARC for incoming mails and have threat detection enabled to block or identify any spam mail received in end-user mailboxes. We prevent spam mails and unknowns such as DKIM and DMARC unavailable mail. Additionally, we have country-based restrictions in our email gateway, which helps us prevent mail coming from unrecognized or unused countries. These are the ways we provide security to our end-user mailboxes.

External reviews
External reviews are not included in the AWS star rating for the product.
Ease of deployment and cost-effectiveness boost operational efficiency
What is our primary use case?
What is most valuable?
We have cloud threat protection, which helps us identify any suspicious threats in emails.
Threat intelligence is adequate because they are using Microsoft GTI threat intelligence, but we need to increase protection against phishing and spam mails. It is already implemented, but we need to increase intelligence for cases where phishing links are received and need to be blocked. If users try to open links that have converted to phishing after some time, those need to be blocked. We are blocking some links, but we may miss others, so we need clarity on that protection, especially for older links.
What needs improvement?
I have recommendations for increasing dashboard customization. Currently, we are using custom dashboards, but they are not effectively customizable. If they provide better customization options, it would be easier to understand everything in a single dashboard instead of navigating through dropdown menus to see reports. Additionally, log retention is currently 30 days, but some customers request to extend it to 60 days. Having 60 days of log retention would be helpful for maintaining logs.
For how long have I used the solution?
I have been working with Trellix Email Security for the past one year.
What was my experience with deployment of the solution?
There are two deployment modes: API integration, which is very easy, and MX record change, which requires some downtime. For deployment with inline mode, it takes around four to six hours of downtime. For API-based integration, we do not need any downtime and can implement it directly in production.
What do I think about the stability of the solution?
The security rates at eight out of ten.
What do I think about the scalability of the solution?
I have not performed scalability adjustments because the user count has not increased. However, based on my understanding, we have the option to increase the count in the future. The scalability rates at nine out of ten.
How are customer service and support?
Technical support rates at eight out of ten. The overall service rates at eight.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I work with both Sophos and Trellix Email Security solutions. When compared with Sophos, Trellix Email Security is better, and when compared to other solutions, the price is more cost-effective.
How was the initial setup?
We deployed the solution for approximately 1,000 mailboxes.
What about the implementation team?
Three people were involved in the installation: one from the DNS side, one from Office 365, and another from my team.
What was our ROI?
The operational cost involves a one-time investment for purchasing and implementing the solution, which provides protection for one year. The operational cost is average. Compared to other email solutions such as Cisco, price-wise, we get this solution within 50 to 60% of the average. They provide good percentages for enterprise customers. It reduces costs by almost 40% or 45% compared to other security solutions.
What's my experience with pricing, setup cost, and licensing?
I am satisfied with the secure licensing cost because compared to other solutions, Trellix Email Security is cheaper and provides most features. I only know about the pricing from one year ago.
What other advice do I have?
I am not working with other Trellix products such as Trellix Move AntiVirus or Trellix Intrusion Prevention System. The solution is easy to deploy, and the operational cost is less compared to other solutions. The price rates at eight out of ten. We use inline mode for integration with existing security infrastructure. They recently added AI to the solution, but I need to check with the team regarding AI implementation for email specifically. My final rating for Trellix Email Security is nine out of ten.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Out of data and hard to manage
Trellix Enterprise Security Manager helps us to detect the malwares and Threats and help mitigate
McAfee Enterprise Log review
It is having instant access to log data from various sources
And it is filtering options to quickly identify specific events or patterns
It can able to handle large volume of log data from diverse sources
It integrates with other McAfee solutions and third party tools
It is having features enabling security teams to monitor investigate and respond to the security incident
It is difficult to effectively communicate insights to the non technical stakeholders
It requires significant training and expertise for new users
Large volume of lock data can impact search performance leading to slower query results
Integration with diverse log sources and customization of dashboards and reports can be time consuming and require technical expertise
Offering centralised flat form for law collection analysis and reporting improving security teams
Identifying potential security threats in real time
It is giving incidence response enabling rapid investigation and analysis of security incident
One of the best endpoint protection in the Market!
Nice product
Value for money for Mid-market segment
Powerful and robust SIEM solution
- It has a lightweight and intuitive interface.
- Allows integrations with other McAfee and third-party products.
- The brand's support has many opportunities to improve in knowledge and response times, and escalations tend to be quite painful.
- Real-time management for the IT Monitoring and Security area.
- Compliance with corporate security policies.