Monitors our systems 24/7, offers robust threat scanning features and easy to use
What is our primary use case?
FireEye offers a great suite of tools. I like its threat analyzer and other features.
We have FireEye Endpoint Security installed on all our desktops, laptops, and servers throughout the network.
It's been crucial to monitor threats 24/7, both external and internal.
It's capable of stopping ransomware at the gateway, preventing malware, and it can even protect against zero-day attacks.
How has it helped my organization?
When I implemented it for one of our clients, it improved their security by almost 70 to 80%. They were using a different solution before, but after implementing Trellix Endpoint Security, they were able to block threats that the earlier solution couldn't handle.
There are only about two to three percent false positives, which isn't much. So, this solution handles false positives quite well and minimizes disruption.
What is most valuable?
The threat scanning is excellent. It uses predictive technology and I can utilize attack data to help us fine-tune our systems and network infrastructure. This protects us against current and future attacks.
Trellix Endpoint Security is a really good product. It comes from industry veterans in the US, so their technology, ease of use, and support are all excellent.
When it comes to real-time analysis capabilities, I've seen many benefits.
Integration is very easy with any system, like firewalls or any network. I can also integrate it with our mobile client.
What needs improvement?
There is room for improvement in the pricing. The price should be improved, it's high.
For how long have I used the solution?
I have a lot of experience with FireEye. It's a solid product with several components. It was acquired by another company.
We've been using it for the last few years.
What do I think about the stability of the solution?
It is a very stable product. It has been a well-known name in the industry for the last 30 years or so.
Trellix has a lot of top investors in the company.
What do I think about the scalability of the solution?
The scalability is very good. We can scale it anytime.
There are around 350 end users in our company.
How are customer service and support?
Support is very good; they have local partners everywhere, so there's no issue there.
For people who still use trellis, there's a toll-free number for each country. Support is accessible 24/7.
If you buy a normal license, gold support is included. There's no need to buy platinum support. The normal support lets you talk to any Trellix Endpoint Security (ENS) technical person 24/7.
How would you rate customer service and support?
How was the initial setup?
The initial setup is very straightforward and user-friendly.
It takes about 20 minutes to configure and run it.
For the deployment process, the product team itself provides a file. I get a download link in an email from the web browser. Once I start downloading, a key will be attached. You provide the names of your domains. We integrate it with Active Directory (AD), so it pulls all the users automatically.
What about the implementation team?
It's a good in-house solution; we can do it yourself. Deploying this doesn't need more than one person.
An L2 technician can manage the installation in a maximum of thirty minutes if they have access to Active Directory (AD) and the main server.
Everything is on the cloud now, so you can control and log in from anywhere, anytime. Alerts via email and mobile are easy to set up.
What was our ROI?
The return on investment is very good if you choose a three-year license.
What's my experience with pricing, setup cost, and licensing?
The license is a bit expensive.
What other advice do I have?
Overall, I would rate the solution an eight out of ten. If you are evaluating this product, go ahead and buy it. It's a very good product. There's nothing lacking – great technology, great approach, great support, great availability.
Offers endpoint protection and generates alarms for events
What is our primary use case?
The tool is primarily used for endpoint detection. When an event occurs on an endpoint, alarms are generated. Colleagues from my company then investigate these alarms based on a playbook. Depending on the playbook and the specific customer contract, actions may be taken, such as informing the customer or implementing endpoint containment measures.
What is most valuable?
The tool has contributed to improving our security posture. While it's just one part of our overall solution, it plays a crucial role. As we continue to evolve, we anticipate it becoming even more important alongside other aspects like network behavior and additional metrics.
The tool's most valuable feature is containment. Last year, a German company faced an external attack. We installed the product on every machine, totaling hundreds of endpoints. The Trellix agent collected information, allowing us to check the entire IT infrastructure.
What needs improvement?
The product is consolidating its portfolio into one product. It is difficult at the moment.
For how long have I used the solution?
I have been using the product for three years.
What do I think about the scalability of the solution?
The solution's scalability is easy. If you have Trellix Endpoint Security on-premises, you need to define how many agents you will support and consider future scaling. Different appliances are available for various scenarios. If you plan to have hundreds or thousands of agents in the future, hardware considerations become important. However, if it is deployed in the cloud, scaling up or down is easily manageable.
How are customer service and support?
My experience with the product's tech support is good.
How would you rate customer service and support?
How was the initial setup?
Trellix Endpoint Security (ENS)'s deployment is not difficult. There are different options available, such as using an on-prem hardware box or a virtual machine in the cloud. Setting up the virtual machine in the cloud is easy, requiring only a connection to the customer's system.
If you plan to install the solution on-premises, you bring the box to the customer and connect it to their system. This involves some configuration, such as opening a port on the firewalls. Deploying agents on the endpoints is straightforward and can be done from a central management point. The entire process takes around a day to configure, and then you are up and running.
What's my experience with pricing, setup cost, and licensing?
Microsoft Defender is not cheap and from a cost perspective, Trellix Endpoint Security (ENS) is a better option.
What other advice do I have?
We integrate the product into our system using API. The information, in the form of messages or alarms, is received in our system. We further process this information and incorporate it into our complete solution.
I rate the product an eight out of ten.
Efficient safeguarding of endpoints that provides robust protection, user-friendly features and significant cost savings
What is our primary use case?
It serves as a comprehensive endpoint security solution that goes beyond traditional antivirus by incorporating features such as document scanning for sensitive information, approval workflows for document sharing, patch management, and advanced threat detection using AI and machine learning. It actively monitors various endpoints, including web interactions and email communications, to detect and prevent a wide range of attacks, even those that are not signature-based.
What is most valuable?
One of the standout features of this solution is its encryption capabilities and DLP functionality. It provides a robust defense against cybersecurity threats while offering user-friendly features like notifications and approval prompts. The encryption feature provides peace of mind in the event of a lost or stolen device, safeguarding sensitive conversations and data from unauthorized access. This level of protection significantly reduces the risk of extortion attempts or data breaches, making it a valuable asset for any organization. So far, I haven't experienced any security breaches or attacks.
What needs improvement?
I've encountered minor challenges related to encryption.
For how long have I used the solution?
I have been using it for a year.
What do I think about the scalability of the solution?
We have a user base of over one hundred individuals who use the software.
Which solution did I use previously and why did I switch?
The decision to implement endpoint security software like Trellix is made at a company-wide level, involving discussions and agreements between various entities, including our parent company and potentially other subsidiaries like the one in Sweden. This decision isn't made independently by individual branches like Kenya; rather, it's coordinated and negotiated at a higher level.
How was the initial setup?
I operate within a managed environment where the IT team handles the installation and setup of endpoint security software. Once installed, they provide me with the necessary details, such as login credentials and instructions for changing passwords. My role primarily involves using the machines provided to me, without needing to delve into the setup process.
What was our ROI?
Compared to the solutions, it helped us to save at least ten to twenty percent, if not more.
What's my experience with pricing, setup cost, and licensing?
I would emphasize its affordability rather than merely focusing on cheapness. It provides good value by striking a balance between cost-effectiveness and feature richness.
What other advice do I have?
I would recommend conducting a proof of concept to explore the features firsthand. It's essential to understand what you currently have in place, as that will help determine whether the solution is the right fit for your needs. After that, ensure that the POC is conducted efficiently so that you can make an informed decision about whether to proceed with the solution or consider other options. Overall, , I would rate it an eight out of ten. It's a good solution that meets my needs satisfactorily.
Which deployment model are you using for this solution?
On-premises
A stable anti-malware solution that provides DLP (data loss prevention) and DAC (Dynamic Access Control)
What is our primary use case?
Customers use Trellix Endpoint Security as an anti-malware or antivirus solution that provides AI and machine learning features. The solution provides DAC (Dynamic Access Control) and HIPS (host intrusion prevention system) functionality in its firewall module. It also has a web control functionality, wherein we can allow, deny, or choose the category part and work it out.
What is most valuable?
Trellix Endpoint Security provides a single umbrella kind of architecture. A lot of different solutions come under a single umbrella and a single console. The most valuable features of the solution include DLP (data loss prevention), CASB (cloud access security broker) functionality, endpoint encryption, and cloud workload security. The solution also has features like application control, device control, and cloud DLP.
What needs improvement?
The solution's documentation is not streamlined and is in bits and pieces, which should be in a single format.
Trellix Endpoint Security should include the virtual patching feature in the next release.
For how long have I used the solution?
I have been working with Trellix Endpoint Security for one year.
What do I think about the stability of the solution?
I rate Trellix Endpoint Security a nine out of ten for stability.
What do I think about the scalability of the solution?
Trellix Endpoint Security has good scalability. Our customers for the solution are most enterprise businesses and government entities.
I rate the solution a nine out of ten for scalability.
How was the initial setup?
The solution’s initial setup is easy.
I rate Trellix Endpoint Security ten out of ten for the ease of its initial setup.
What about the implementation team?
The solution's deployment on the cloud is very fast because we give the requirement and get the solution. On-premises, the basic initial setup of the server takes about half an hour or one hour.
What's my experience with pricing, setup cost, and licensing?
Trellix Endpoint Security is neither a cheap nor an expensive solution.
On a scale from one to ten, where one is cheap and ten is expensive, I rate the solution's pricing a four out of ten.
What other advice do I have?
I am working with the latest version of Trellix Endpoint Security. We provide our customers with on-premises, on-cloud, and hybrid cloud deployment models for Trellix Endpoint Security.
Overall, I rate Trellix Endpoint Security an eight out of ten.
Endpoint Security solution that protects the productivity with a common service layer and our new anti-malware core engine that helps reduce the amount of resources and power required by a user's sys
What is our primary use case?
It is exclusively for Endpoint security. Besides that, we have subscribed to additional features such as MDX for mobile security and recently added ESL. Previously, we had Trend Micro, and at times we utilized it for malware. Comparing the three tools, I would recommend sticking with Trend Micro or Malwarebytes.
What is most valuable?
Trellix Security Endpoint can promptly isolate any host machines directly from the console. If alerts are received and isolation is necessary, it can be accomplished through the console. The console itself holds significant value, accessible through a browser and allowing remote actions via cloud login.
What needs improvement?
If there's a possibility for remote assistance or investigation support in the future, it would be beneficial. Currently, we use another remote software for such purposes. If this feature could be included in the next version, that would be an improvement. The feature is called Remote Administration.
I'm somewhat satisfied, but there's an issue I recently encountered. When attempting to scan a suspected host machine, Symantec Endpoint Security did not provide any alerts. However, when we installed Malwarebytes and ran a scan, it detected a threat that wasn't identified by Symantec. We raised this concern with the team for resolution, and the investigation is still ongoing.
For how long have I used the solution?
I have used Trellix Endpoint Security for the last two years.
What do I think about the stability of the solution?
It is stable and I would rate it 8 out of 10.
What do I think about the scalability of the solution?
Scalability is 8 out of 10.
How are customer service and support?
The issue with technical support lies in the response time. When submitting a complaint, there is a delay, sometimes taking one or two days for a response. This extended timeframe is considered quite lengthy.
How would you rate customer service and support?
How was the initial setup?
The initial deployment of Trellix Endpoint Security involves some time to install agents on host machines. However, once in use, adding new versions and deploying agents to GPO becomes straightforward. It's possible to manually install agents on various devices, and the current process of deploying agents through GPO policies typically takes around ten to fifteen minutes per agent. The duration may vary based on internet connectivity, and it's generally faster when the machine is on the network.
I would rate it 8 out of 10 and it is very straightforward.
What's my experience with pricing, setup cost, and licensing?
What other advice do I have?
I would recommend it. I rate the solution an eight out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
Protects the productivity of users with a common service layer and our new anti-malware core engine that helps reduce the amount of resources and power required by a user
What is our primary use case?
Previously, before the transition to Trellix, we used McAfee. Following a merger, FireEye now collaborates with McAfee, utilizing its console and threat intelligence.
In terms of endpoint security, I would recommend Trellix Endpoint Security, especially for users prioritizing threat intelligence and seeking an internal solution. Trellix has proven effective in areas such as blocking capabilities, device control, and application control.
What is most valuable?
Trellix Endpoint Security offers robust access protection, addressing major concerns in prevention. It provides both application control and user access control within its access protection features.
What needs improvement?
Recently, Trellix has introduced a CDR, which involves more manual response than automatic. I believe they should enhance the system by adding features like automated response and the ability to create custom playbooks. This is crucial for an EDR solution, and currently, Trellix lacks this feature while other products offer it.
For how long have I used the solution?
I have been using this solution for the past five years.
What do I think about the stability of the solution?
Previously, I would have rated it around ten, but now it's more like seven. They need to enhance the EDR part and put in more effort.
What do I think about the scalability of the solution?
For on-premise implementation, I would rate it a six as there is a need for more scalable options during the initial setup. On the other hand, for cloud implementation, I would give it a nine because it offers enabled scalability options.
How are customer service and support?
I acknowledge their technical expertise in the product, but the support has not been as satisfactory as it was with McAfee. I believe there is a need for improvement, whether it's the team's capacity or response time. Previously, the response time was excellent, but now it has increased, causing frustration among customers and creating potential issues. Reducing this delay would be beneficial.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
If someone asks for a bundled solution with strong threat detection, I would recommend Trellix because it stands out as the only bundle solution with a decent amount of threat detection. While there are other bundled solutions in the market, Trellix excels in both access and detection capabilities.
How was the initial setup?
Regarding the initial setup of Trellix Endpoint Security, I am accustomed to executing it accurately. I would rate it around 8.5 or 9.I have successfully implemented Trellix Endpoint Security for up to five thousand endpoints, and the process took approximately four days. For smaller enterprises, it can be completed in about one day.
What's my experience with pricing, setup cost, and licensing?
I would rate the cost as four to five, considering it's normal compared to other products. I find it nominal and worth the money.
What other advice do I have?
The support phase needs improvement, specifically in reducing the time taken to respond to calls. Additionally, the EDR functionality in Intelix requires enhancement. While McAfee fulfilled product functionality even without strong support, the introduction of EDR seems to be partial and lacks automated response capabilities. The overall rating for Trellix Endpoint Security would be an eight.
A stable solution that offers good technical support and can be implemented without much difficulties
What is our primary use case?
In Trellix Endpoint Security, I use all modules, including firewall and web control, except for encryption.
What needs improvement?
There are certain shortcomings in the features concerning DLP in Trellix, where certain additions must be made in the future.
For how long have I used the solution?
I have been using Trellix Endpoint Security for five years. My company is a customer of the solution.
What do I think about the stability of the solution?
It is a stable solution. If I consider using Trellix Endpoint Security right now, I won't find it a problem since it is a good product to use.
What do I think about the scalability of the solution?
There are around 800 users of the solution in my company.
How are customer service and support?
The solution's technical support is good. Whenever I open or raise a ticket with Trellix's support team, I get a response from their end.
I rate the technical support a nine out of ten.
How would you rate customer service and support?
How was the initial setup?
The implementation part of the product is not difficult. From an implementation perspective, I find the product to be good enough.
For me, the product's deployment in all endpoints takes an hour, and it is a simple process. I don't know if the deployment process is still simple or not and whether improvements have been made to the solution.
What other advice do I have?
I find Trellix Endpoint Security to be a good product. In Trellix Endpoint Security, it is not simple to understand the policies and rules, but it is good as an antivirus product. Trellix Endpoint Security is not easy to use, especially since the mechanism of communication is not very good.
I rate the overall product an eight out of ten.
A simple and easy-to-use product that works in the background and does not slow down the computer
What is most valuable?
The product works in the background. It does not slow down the computer, which is good. If we put the USB, it automatically asks us whether the device must be scanned. We can scan it or postpone it. If anything goes wrong, the tool informs us that a file or website was blocked. It might be because the IP is on a blacklist. The product is simple. We do not have to do anything. The product is easy to use.
What needs improvement?
The tool could provide more advanced protection. It should do a deeper analysis of the files.
For how long have I used the solution?
I have been using the solution for eight years. I am using the latest version of the solution.
What do I think about the scalability of the solution?
The tool is scalable. We can choose when and how to scan. We can even choose to exclude certain folders. Ten people in our organization use the solution extensively.
Which solution did I use previously and why did I switch?
I have used NOD32 and Kaspersky. I started using Trellix Endpoint Security because my company decided to use it.
How was the initial setup?
The initial setup was straightforward. It took us 10 to 15 minutes to deploy the solution because we had to go a bit deeper into the settings.
What about the implementation team?
The product can be deployed in-house. The deployment process is quite easy and fast.
What was our ROI?
The solution is worth the money.
What's my experience with pricing, setup cost, and licensing?
We have a yearly subscription. We have bought the solution for ten stations. The pricing is more or less the same as the other tools in the market.
What other advice do I have?
Some tools use a lot of memory, so it's really difficult to use them, especially when we are scanning something. We mostly work on documents on the cloud. We do not get many files on the computer. We do get some spam. I would recommend the solution to others. So far, we've never had any problems. Nothing gets through. Overall, I rate the tool an eight out of ten.
Which deployment model are you using for this solution?
On-premises
A solution with a flexible dashboard that can be used for setting up data storage via ELM
What is our primary use case?
Some of the solution's primary use cases include successfully adding devices through ESM GUI and setting up data storage via ELM.
What is most valuable?
Trellix Endpoint Security's dashboard is very flexible, and I can create my own user-specific dashboard depending on user privilege or preference.
What needs improvement?
With Trellix Endpoint Security, adding a device as a data source can be done one by one. Whenever I try to add a device like a firewall or a server, the accounts are enrolled one by one per added data source. It would be a lot easier if I could add multiple user accounts within a single device.
For how long have I used the solution?
I have been testing Trellix Endpoint Security for around three months.
How are customer service and support?
I have tried to contact the solution's technical support team. Whenever I tried to ask for partner support, the Trellix website would ask for my company email details. Then an email would come to my inbox saying that Trellix would get back to me shortly, but unfortunately, they did not. So I couldn't contact Trellix Endpoint Security's technical support.
Which solution did I use previously and why did I switch?
I have worked with other security tools, such as CrowdStrike. The flexibility of the dashboard and filtering are useful features in Trellix Endpoint Security. Also, adding different elements to the SIEM infrastructure is not that complicated with Trellix Endpoint Security.
How was the initial setup?
There's no need for any additional configuration settings to install Trellix Endpoint Security. You just access the web UI, and that's it.
What about the implementation team?
It took me two months to implement Trellix Endpoint Security because of our company's hardware limitations.
My implementation strategy for Trellix Endpoint Security was to build a demonstration based on what the company would like me to do. So I built a SIEM infrastructure and got the images of the different tools first. Then from there, I tried to connect the different devices before I connected the data sources.
What other advice do I have?
My advice is that users should have a fair background in MQL, which really helps a lot in investigating.
Overall, I rate Trellix Endpoint Security an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Great visibility of devices and ability to push out products to client machines
What do you like best about the product?
Love that you can view all managed and unmanaged devices and have the ability to push out products to both types of devices.
What do you dislike about the product?
Times where certain products start to malfunction and removing it from a particular computer may become tricky to do
What problems is the product solving and how is that benefiting you?
providing security and vulnerability protection for all of our end-user devices