Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Reviews from AWS customer

0 AWS reviews
  • 5 star
    0
  • 4 star
    0
  • 3 star
    0
  • 2 star
    0
  • 1 star
    0

External reviews

16 reviews
from

External reviews are not included in the AWS star rating for the product.


    CESARCASTRO

Enhancements needed for security alerts while ongoing training strengthens defenses

  • January 03, 2025
  • Review provided by PeerSpot

What is our primary use case?

I use César for our endpoints, our users, and the services from email and web services, back and forth, and also at the edge of our network. We have contracted firewalls and everything else for networking.

What is most valuable?

The product and the services we have are quite good. However, I cannot stay at this level forever. I have to improve continuously and dynamically. 

Everything is working, and the company is training its personnel. I have had in a few months in the past some attacks on personnel—so phishing, for example. I have spent efforts on training our managers and others - what can software do if the knowledge base is low?

What needs improvement?

This year, I am going to improve some tools to be installed or maybe acquire some services to better manage our web services and work with my coworkers. 

Application fiber also needs attention. Nowadays I am making applications that are publicly seen on the Internet. I need some protection, possibly multi-factor authentication improvements. I am seeing, for workflows, some sort of ethical hacking to test our environment.

Knowledge of everything, not only the product - maybe some kind of alerts - needs to emerge. I see the current ones as very low-tier, and they must improve.

For how long have I used the solution?

I have used Trellix for some years.

What do I think about the stability of the solution?

I haven't had any issues. The pricing is very fine and according to the service. Trellix has done a good job reducing threats.

How are customer service and support?

I have spent a lot of time with this product. I have contracted support and also have an operating control so I can get various types of support.

Which solution did I use previously and why did I switch?

I have used Trellix for some years. In the past, the EDR was McAfee. I have worked with it for around 20 years.

How was the initial setup?

The initial setup is a hard issue.

What about the implementation team?

I have two contractors that help me support the infrastructure here. One is at the edge of networking, and the other is in the endpoints of our company.

What was our ROI?

I don't have any return on this investment. This is just a security policy for everything.

What's my experience with pricing, setup cost, and licensing?

I haven't had any really great problems with pricing in the past two or three years.

Which other solutions did I evaluate?

Maybe another level of product and support from manufacturers would be better.

What other advice do I have?

I have seen companies without any EDR services, and we were lacking information. I started with IDR around four years ago, and the support services were very light. I remember doing many tickets for Trellix support, and my EDR was not properly functioning. I didn't feel the detection or the real protection. My company is one among 17 others that are part of a corporation. I am a member of the IT Security Council.  

Overall product rating is five out of ten.


    Sampath Acharya

Helpful to detect malware and threats

  • September 06, 2024
  • Review provided by PeerSpot

What is our primary use case?

I use the solution in my company for malware detection. My customers are mostly banking and government organizations.

What is most valuable?

The most valuable feature of the solution is its area for threat detection.

What needs improvement?

When it comes to some unknown fileless attacks, the tool is not able to detect them properly, making it an area where improvements are required.

The tool's support needs to improve in the areas of response it provides to users.

For how long have I used the solution?

I have been using Trellix Endpoint Detection and Response (EDR) for two and a half years.

What do I think about the stability of the solution?

Stability-wise, I rate the solution an eight out of ten.

What do I think about the scalability of the solution?

Scalability-wise, I rate the solution an eight out of ten.

How are customer service and support?

I rate the technical support a seven and a half out of ten.

How would you rate customer service and support?

Neutral

How was the initial setup?

The solution is SaaS-based, and we have deployed it using the hybrid cloud model.

The tool's deployment phase is a lengthy process. For one endpoint, it takes 15 to 20 minutes.

What was our ROI?

The tool is cost-effective. Many agents need to be installed, and on-premises integration is required.

What other advice do I have?

I haven't worked on the tool to see how it works for security workflow.

My customers have not seen any challenges while working with Trellix Endpoint Detection and Response (EDR) in terms of integrations.

The tool does not support any AI and security initiatives.

The tool is suitable for enterprise companies.

If businesses are completely on the cloud, then the tool is not required. If a company has a hybrid cloud model with an on-premises model, then it will be a good tool to use.

I rate the tool an eight out of ten.

Which deployment model are you using for this solution?

Hybrid Cloud


    RiaanDu Preez

Has behavior monitoring, DLP, and access control

  • August 15, 2024
  • Review provided by PeerSpot

What is our primary use case?

I've used Trellix EDR to improve endpoints and servers' security and feed into MDR solutions.

What is most valuable?

The most useful features are behavior monitoring, DLP, and access control. The automation has gotten much better in the last two years than when it was McAfee. It works better now and integrates more smoothly.

What needs improvement?

I'd like the tool to become more like an XDR, with one management system and endpoint activation.

For how long have I used the solution?

I have been using the solution for seven years. 

What do I think about the stability of the solution?

Sometimes, stability issues come from incorrect partner deployments, not Trellix EDR itself.

What do I think about the scalability of the solution?

I rate the tool a seven out of ten. To improve it, I'd like a cloud-based management system where I only need to put a correlator at the client's site, as CyberArk does. The best setup would be cloud management, a manager in a VM, and super agents on endpoints.

How are customer service and support?

My opinion about technical support might be biased because I have direct access to top-level senior staff. I know some people struggle with support if they go through normal channels.

How would you rate customer service and support?

Positive

How was the initial setup?

Setting up the solution is easy for me because I've been in cybersecurity for almost 30 years, but new users might find it hard. Depending on the client's needs, it can be set up on-premises, in a private or hybrid cloud, or fully in the cloud. Setting it up can take a few days for small environments or months for big companies with thousands of endpoints.

What's my experience with pricing, setup cost, and licensing?

Pricing is a problem in South Africa. It could be cheaper here. The rand-to-dollar exchange rate makes it expensive for us. A 25 dollar endpoint cost becomes quite significant when converted to rand.

What other advice do I have?

Our clients are usually medium-sized and enterprise businesses. Overall, I would recommend Trellix EDR to others. I'd rate it eight and a half out of ten. No EDR or XDR solution gets a nine from me right now because they all have room for improvement. 


    Abdullah Al Hadi

Helps to detect and identify critical management activities with dashboard to analyze data

  • August 12, 2024
  • Review provided by PeerSpot

What is our primary use case?

We use the solution to detect and identify critical management activities. Within the network level, you can understand what is happening in the environment. Organizations using complex systems for various purposes can easily identify shared activity within the environment. There is a detection base that allows us to identify and manage threat events. The solution also includes licenses for forensic investigations of any attack that occurs. Details can be found within the platform's release at the end of the month or whenever needed. Any Trellix malware activity will be displayed on the dashboard, and the moderating services will be integrated into everything we have built.

What is most valuable?

The dashboard makes it easier and more effective to analyze data. It also allows us to access the AWS analytics and system features in one place. If we need to find specific details about an endpoint, we can determine what is happening and how any organization is affected by the data provided.

What needs improvement?

The better approach is to apply the necessary improvements to make the dashboard more effective and user-friendly. If simplified, users can investigate issues in more detail by clicking on the relevant sections. Making it simpler would enhance understanding and improve the investigation process. Customers currently using the system can view everything on a single dashboard, which is very effective for understanding all scenarios and activities.

Customers rely on a single platform When they notice an incident, response, or attack. In SOC analysis teams, especially in banks or traditional organizations, the entire team needs access to the scenario on one platform. This allows them to understand the dashboard and detect any ongoing activity easily. Once they identify an issue, they can proceed with further analysis. Customers need a clear and visible platform that helps them understand when and how their site is being compromised.

The dashboard is split across different platforms. For example, if you want information on Incident Detection, you have to access one dashboard, and for DLP reporting, there's a separate platform. This fragmentation means you can't access everything from a single dashboard. Instead, you must navigate various options to find the right dashboard. This setup results in a separate view for each function. Ideally, we'd like to consolidate this into a unified platform, making it easier to identify site behaviors from one centralized dashboard.

For how long have I used the solution?

I have been using Trellix Endpoint Detection and Response (EDR) as a reseller.

What do I think about the stability of the solution?

We initially used McAfee's VSP and Varia System Enterprise products. After transitioning to Endpoint Security, particularly in version 10 or 7, we encountered performance issues on systems running Windows 7. The high resource utilization caused significant slowdowns, leading to numerous complaints, especially from Sakasho. The EDR was consuming too many system resources, which impacted overall performance. However, with the newer versions, like those in the InVision EPO, these issues seem to have been resolved, and the system now operates more efficiently. The current product is expected to be much lighter and more stable.

I rate the solution’s stability an eight out of ten.

What do I think about the scalability of the solution?

I highly appreciate service architecture. They are developing day by day.

We are an enterprise that provides solutions through Trellix EDR that various external customers use. Our solutions are deployed in a large and diverse environment, including companies, telecoms, and major banks. These organizations rely on our products for their protection needs.

How are customer service and support?

There are multiple ways to get support. You can create a case through your partner or support portal by calling. If necessary, you can raise a call and follow up immediately.

How would you rate customer service and support?

Positive

How was the initial setup?

We operate within our environment and country. One of our clients, is interested in using our on-premises solution. They are hesitant to adopt a cloud-based solution due to concerns about data security. They worry that storing data in the cloud could expose it to unauthorized access. They are confused about how the cloud handles sensitive data like CPU data and prefer to keep their information on-premises. However, other banks have embraced cloud solutions and understand their value. Over time, as more companies study and become comfortable with cloud technology, we believe others will also follow and move to the cloud. We hope to maintain their interest in our services.

What other advice do I have?

Its machine learning capability is strong, and the AI configurations and system integration enhance its effectiveness. The API solutions added to this system allow us to detect and respond to incidents quickly. The quick response is also due to Edge Solutions and specific-type solutions, enabling us to conduct thorough investigations and generate reports on the platform. 

I recommend Trellix Endpoint Detection and Response (EDR) because it offers strong capabilities. It’s worth noting that XDR solutions are also available and might be more effective. These XDR solutions are advanced technologies with enhanced features, including improved API integration.

Overall, I rate the solution an eight out of ten.


    ObaseunAwoyinfa

Has investigative capabilities with real-time search but lacks supports

  • June 05, 2024
  • Review provided by PeerSpot

What is most valuable?

It relies on external systems for detection and then asks the endpoint to handle blocking. However, the most crucial feature is its investigative capabilities. With real-time search and other functionalities, it enables comprehensive detection and response. This capability resembles a layered approach, integrating and correlating all relevant data for thorough investigation.

What needs improvement?

Trellix needs to focus on gaining traction with partners and building trust among users. Many users may have moved on due to the name change, but concerns about resource intensity are more related to endpoint security than EDR itself. Improving its position in Gartner's quadrant and enhancing the product's image are crucial.

For how long have I used the solution?

I have been using Trellix Endpoint Detection and Response (EDR) for three to four years.

What do I think about the stability of the solution?

It's pretty stable.

What do I think about the scalability of the solution?

Trellix EDR is designed to scale seamlessly, leveraging cloud infrastructure that eliminates traditional hardware limitations. This allows scalability up to fifteen thousand nodes or even two hundred thousand nodes, depending on the licensing. The cloud-based architecture enables centralized management from anywhere globally, facilitating comprehensive coverage across different geographical locations. In essence, it offers robust scalability and management capabilities.

For SMBs and enterprises, Trellix EDR typically recommends environments with more than fifty computers. The rationale is that the more computers there are, the greater the likelihood of being targeted by malicious actors. With an EDR solution, there's a better chance of detecting and mitigating malicious activities on your systems. 

How are customer service and support?

Support for Trellix EDR is not great. There have been instances where we encountered issues that required support intervention. In some cases, we were unable to resolve the problem ourselves, and escalated it to support. Unfortunately, there were delays in getting responses from support, which sometimes led to frustration and caused us to consider alternative solutions. 

How would you rate customer service and support?

Neutral

How was the initial setup?

Administering Trellix EDR involves specific procedures. For instance, real-time searching requires using predefined keywords, which aren't readily visible unless you consult with Trellix support or a SE. A comprehensive manual simplifying these administrative tasks would greatly enhance usability. Despite this, setting up the product is straightforward and quick, since it operates in the cloud. Connecting to either cloud-based or on-premises APIs is seamless. However, the challenge lies in product administration, which some users might find complex, leading them to opt for alternative solutions over Trellix EDR.

What was our ROI?

Trellix EDR provides capabilities similar to AI, significantly aiding your software or IT support team in conducting investigations rapidly. Tasks that might have taken months can now be resolved quickly using the platform. This ability to swiftly identify and address the root causes of attacks is a major advantage. Moreover, by preventing breaches, Trellix EDR helps safeguard data and avoids the need for compliance measures with regulatory bodies. This security is crucial because, in regions like Africa or Nigeria, where certain breaches may go unnoticed, Trellix ensures compliance and transparency, such as mandatory breach reporting in other jurisdictions. Maintaining trust with customers is paramount, as damage to brand reputation can be difficult to repair. Therefore, investing in a solution like Trellix EDR not only protects your organization but also enhances its credibility and operational resilience.

What's my experience with pricing, setup cost, and licensing?

Trellix Endpoint Detection and Response (EDR) is not expensive. When compared to competitors, the main difference lies in their flexibility. 

I rate the product’s pricing a five out of ten, where one is cheap and ten is expensive.

What other advice do I have?

Technical personnel often recommend Trellix Endpoint Detection and Response (EDR) for environments that are not necessarily small, but rather SMBs, those with around 50 computers. EDR solutions are increasingly aligned with the evolving threat landscape.

Trellix EDR provides advantages beyond just detection and response; it facilitates thorough investigation. It operates more like a layered approach, enabling detailed investigation through Trellix Investigator. This allows you to drill down into threats. With real-time search capabilities, you can monitor threats as they occur. Historical search features let you trace when a threat entered the environment and its progression. This granularity extends to file searches and other detailed inquiries, simplifying and enhancing threat management tasks.

In terms of integration, there is still room for growth. Currently, apart from basic anonymized data sharing, there isn't much integration visible. The ability to leverage EDR with other security solutions seems limited, except perhaps through programming. 

Trellix EDR has the potential to be among the top EDR solutions with a few adjustments. It could become the best out there. When considering factors like support, pricing, and ease of use, Trellix EDR has the opportunity to excel. However, currently, there are areas where it can enhance user experience, particularly in simplifying tasks that end users might find challenging on the EDR platform. While it promises to enhance security posture and threat detection speed, these improvements may not be immediately apparent to users, impacting their confidence in the product.

Overall, I rate the solution a seven out of ten.


    reviewer2392089

Offers effective investigation and rule detection features but the IOC searching capabilities need to improve

  • May 30, 2024
  • Review provided by PeerSpot

What is our primary use case?

The solution is used to search the IOCs. We use it in our company when we are unable to search for multiple hashes at a time for a particular file. Without Trellix Endpoint Detection and Response (EDR), each hash needs to be executed individually in the search parameter. 

What is most valuable?

The investigation and rule detection feature of the solution has proven most useful for our company. 

What needs improvement?

The searching capabilities for the IOCs can be further improved in the product. 

For how long have I used the solution?

I have been using Trellix Endpoint Detection and Response (EDR) for one year. 

What do I think about the stability of the solution?

I would rate the stability an eight out of ten. 

What do I think about the scalability of the solution?

I would rate the scalability a five out of ten. The solution sometimes functions quite slowly, and at our company, we face multiple issues around which we regularly need to contact tech support. There are more than 1000 users of Trellix Endpoint Detection and Response (EDR) in our organization. I use the product daily in my company. 

Which solution did I use previously and why did I switch?

In my previous organization, I used to work with Cybereason instead of Trellix Endpoint Detection and Response (EDR). My present company prefers to use Trellix Endpoint Detection and Response (EDR), so I switched. 

How was the initial setup?

I would rate the initial setup an eight out of ten. 

What other advice do I have?

Trellix Endpoint Detection and Response (EDR) handles security incidents but generates multiple false positive alerts. If the solution is fine-tuned from time to time, then true positive results can be expected accurately. 

After implementing Trellix Endpoint Detection and Response (EDR) in our organization, we have witnessed great security efficiency. 

I would recommend the solution to others as it's very easy to use. I would rate the solution a seven out of ten. 

Which deployment model are you using for this solution?

On-premises


    SaiKiran

Detect different threats but difficult to manage

  • March 29, 2024
  • Review provided by PeerSpot

What is our primary use case?

We use the solution to detect different threats.

What is most valuable?

Trellix has a user-friendly interface.

What needs improvement?

Everything is normal, but it's not up to the mark compared to other solutions. It isn't easy to manage. The detection rate is also not reasonable. Trellix does not support Linux and Mac.

For how long have I used the solution?

I have used Trellix Endpoint Detection and Response (EDR) for 1 year.

What do I think about the stability of the solution?

I rate the solution’s stability a six out of ten.

What do I think about the scalability of the solution?

Earlier, 10,000 users were using this solution.

I rate the solution’s scalability a six out of ten.

How are customer service and support?

Support is good. They provide a swift response.

Which solution did I use previously and why did I switch?

I have used Symantec. It is a user-friendly solution with good performance and easy deployment. Support is also good.

How was the initial setup?

The initial setup is easy. We use email deployment. Sometimes, we use third-party tools like SSCM to deploy.

What's my experience with pricing, setup cost, and licensing?

The product has agent-based costs.

What other advice do I have?

We need to get special training for maintenance. Maintenance is very easy, but it requires engineers.

Overall, I rate the solution a six out of ten.


    Muniyappan Vk

User-friendly, reasonably priced, helps with real-time monitoring, and improves security posture

  • February 23, 2024
  • Review provided by PeerSpot

What is our primary use case?

The solution is used for threat hunting and incident response.

What is most valuable?

Trellix is a good solution. It helps with real-time monitoring and alerts. We are pretty satisfied with it. The product is user-friendly. It improves our security posture.

What needs improvement?

The graphical view for nodes must be increased.

For how long have I used the solution?

I have been using the solution for two years.

What do I think about the stability of the solution?

The tool’s stability is good.

What do I think about the scalability of the solution?

The tool is scalable.

How was the initial setup?

We need three to four months to learn the tool. We were given training. It is not difficult if we read the documents properly.

What's my experience with pricing, setup cost, and licensing?

The price is reasonable.

What other advice do I have?

We were looking for other solutions. Whoever is interested in the product can learn to use it. Overall, I rate the solution an eight out of ten.


    Juan Muriel

Completely automated, affordable, and provides good technical functionalities

  • February 22, 2024
  • Review provided by PeerSpot

What is our primary use case?

We use the tool for threat hunting. It detects a lot of threats daily.

How has it helped my organization?

We do not need to monitor the network all the time because the solution is completely automated. The administrators’ time can be dedicated to improving other projects.

What is most valuable?

The antivirus and DLP features are valuable. Now, we have a campaign to encrypt all the drives of the company. We have a solution for network access control from Fortinet. When Trellix detects some threats, the device is isolated in a quarantine zone for examination. We integrate Trellix Endpoint Detection and Response with other solutions to perform such isolations. We also use products for log monitoring and correlation and create use cases for automatic response.

What needs improvement?

The technical support must be improved. We had a problem with the Web Control plug-in with Edge and Chrome. The plug-in was disabled, and the resolution took a lot of time.

For how long have I used the solution?

I have been using the solution for two years.

What do I think about the stability of the solution?

The stability is good. I rate the tool’s stability an eight out of ten.

What do I think about the scalability of the solution?

The scalability is good. I rate the tool’s scalability an eight out of ten.

How was the initial setup?

I rate the ease of setup an eight out of ten.

Which other solutions did I evaluate?

Our clients were using McAfee before. We switched to Trellix because of its price and technical specifications.

What other advice do I have?

We also have a DLP problem with Outlook. Sometimes, people cannot send emails because of an error. We detect the threat, and our clients manage the response. We send a communication, and the clients manage the response for the threat detected. We only administer the tool. Overall, I rate the product an eight out of ten.


    Bernard Van Den Heuvel

A user-friendly and integrated solution that includes EDR and antivirus

  • January 24, 2024
  • Review provided by PeerSpot

What is our primary use case?

We're looking at the logs, and the customer defines the solution's use cases.

What is most valuable?

Trellix Endpoint Detection and Response is a user-friendly solution. The biggest strength of the solution is that it's an integrated product that includes EDR and antivirus. It's not like you have different technologies for different solutions.

What needs improvement?

Some modules that are doing machine learning and artificial intelligence are blocking our processes.

For how long have I used the solution?

I have been using Trellix Endpoint Detection and Response for one year.

What other advice do I have?

Overall, I rate Trellix Endpoint Detection and Response an eight out of ten.