
Trellix Collaboration Security
TrellixReviews from AWS customer
-
5 star0
-
4 star0
-
3 star0
-
2 star0
-
1 star0
External reviews
External reviews are not included in the AWS star rating for the product.
Email protection solidifies threat coverage and fulfills customer needs
What is our primary use case?
What is most valuable?
What needs improvement?
For how long have I used the solution?
What was my experience with deployment of the solution?
What do I think about the stability of the solution?
What do I think about the scalability of the solution?
How are customer service and support?
How would you rate customer service and support?
Negative
Which solution did I use previously and why did I switch?
How was the initial setup?
What about the implementation team?
Which other solutions did I evaluate?
What other advice do I have?
Which deployment model are you using for this solution?
Provides strong data protection with virtual patching and vulnerability assessments
What is our primary use case?
I primarily use it to monitor database access, particularly in banking and similar environments. It ensures that IT personnel and others do not create unauthorized accounts or users. Collaboration security assists in tracking database access and alerts in case of suspicious activity.
What is most valuable?
One of the most valuable features is the protection against vulnerabilities, particularly through virtual patching. This ensures that I am safe from potential threats affecting database security.
Another significant feature is the vulnerability assessment, which is effective for overall data protection.
What needs improvement?
There is a need for improved integration with totally different products, such as a rapid server. This is currently challenging since the management console becomes overloaded with logs, which complicates troubleshooting.
For how long have I used the solution?
I have been working with Trellix Collaboration Security for ten years.
What do I think about the stability of the solution?
Sometimes, integration can be challenging, impacting its stability, which is why I rate it a five out of ten.
What do I think about the scalability of the solution?
I rate it an eight out of ten. Scalability benefits me by allowing for growth, although sometimes adding users can be difficult due to licensing.
How are customer service and support?
The support isn't bad, but there is room for improvement in response time. Initially, I must generate a ticket, and then it gets escalated through tiers if the issue isn't resolved.
How would you rate customer service and support?
Neutral
How was the initial setup?
For me, setup is easy because of my extensive experience. I rate it ten out of ten.
What's my experience with pricing, setup cost, and licensing?
The price is high at eight out of ten. It is quite expensive and should be reconsidered.
What other advice do I have?
Before installing, consider potential challenges with system performance, especially when integrating multiple tools, which could slow down performance. Overall, I rate the solution with an eight due to its impressive performance, however, integration with other systems needs improvement. My overall product rating is an eight out fo ten.
Which deployment model are you using for this solution?
Out of data and hard to manage
Trellix Enterprise Security Manager helps us to detect the malwares and Threats and help mitigate
McAfee Enterprise Log review
It is having instant access to log data from various sources
And it is filtering options to quickly identify specific events or patterns
It can able to handle large volume of log data from diverse sources
It integrates with other McAfee solutions and third party tools
It is having features enabling security teams to monitor investigate and respond to the security incident
It is difficult to effectively communicate insights to the non technical stakeholders
It requires significant training and expertise for new users
Large volume of lock data can impact search performance leading to slower query results
Integration with diverse log sources and customization of dashboards and reports can be time consuming and require technical expertise
Offering centralised flat form for law collection analysis and reporting improving security teams
Identifying potential security threats in real time
It is giving incidence response enabling rapid investigation and analysis of security incident
Has an easy implementation phase to deal with for users
What is our primary use case?
Ideally, I don't manage the installation, but I do manage the security part. I am responsible for defining security-based best practices and implementing them in our company's environment.
I know about Trellix (formerly FireEye) Endpoint Security HX. I use Trellix Network Security (NX) for network security and devices, while Trellix (formerly FireEye) Endpoint Security HX is used for email security requirements.
What is most valuable?
My experience with the product is good. One of the valuable features of the product stems from the fact that it is easy to implement the tool in our environment.
What needs improvement?
Technology is an area that is evolving every day. As changes are introduced on a day-to-day basis, I feel that my company should evaluate the products we use. In general, our company should make the tool more robust to protect our systems.
For how long have I used the solution?
I have been using Trellix Collaboration Security for more than three years.
What do I think about the stability of the solution?
Stability-wise, I rate the solution a nine out of ten.
What do I think about the scalability of the solution?
Considering the number of people on my team, which is huge, I feel the scalability part is good.
Around 2,00,000 people use the product in my company.
The product is extensively used in my company.
Whether my company plans to increase the number of users of the product or not is something that depends on the growth of the organization.
How are customer service and support?
The solution's technical support is good and supportive when it comes to my interactions with them.
Which solution did I use previously and why did I switch?
I also use Office 365 and Exchange Online Protection (EOP).
How was the initial setup?
The product's implementation phase is easy. When it comes to the implementation part, it is always better to go with some kind of automation process. Automation process can ensure a 100 percent implementation success rate in our company's environment.
The solution is deployed on an on-premises model.
What's my experience with pricing, setup cost, and licensing?
When it comes to the licensing model, my company mostly purchases the five-year license model. I rate the product price as nine out of ten, where ten is the most expensive, and one is the cheapest. There is no need to pay any extra charges apart from the licensing costs.
What other advice do I have?
I primarily use the product in our daily security operations since it is implemented in all of our company's systems and is used in our environment.
Normally, email security tools like FireEye or Trellix help to protect ourselves from spam, malware, and other email-oriented threats. The tool is used extensively in our company's environment. It is more like a collaboration email security that is used in our company.
Whether my company plans to increase the number of users of the product or not is something that depends on the growth of the organization.
I recommend the product to those who plan to use it.
The product is stable and reliable, considering the results my company gets out of it.
When it comes to Trellix or FireEye Endpoint Security (HX), the tools offer antivirus as well as the modern real-time security feature, which is used to automate the detection and protection of the endpoints against all the security threats that are currently there in the industry.
I don't see any challenges with the integration part of the product, but since a different team manages it, I don't have visibility into it.
In terms of the value offered by the product, the solution does help our company protect data and the complete infrastructure.
I rate the tool a nine out of ten.
Which deployment model are you using for this solution?
One of the best endpoint protection in the Market!
Nice product
Value for money for Mid-market segment
Protects emails, is easy to install, and integrates easily with other tools
What is our primary use case?
The solution is used for email security. It streamlines our team’s collaboration and file-sharing efforts.
What is most valuable?
It is a good product. The product protects my email. It prevents APT attacks. It is easy to integrate the solution with other tools. My emails used to have some viruses or malicious threats. Now, I do not face such issues.
What needs improvement?
The solution must provide features to scan QR codes for threats. Nowadays, threats are embedded inside QR codes.
For how long have I used the solution?
I have been using the solution for three years.
What do I think about the stability of the solution?
The tool is stable. I rate the stability a ten out of ten.
What do I think about the scalability of the solution?
We have 100 users.
How was the initial setup?
The tool is easy to install. The installation took four hours. We need one engineer to set up the solution. The product is easy to maintain. One person is enough to maintain the product.
What's my experience with pricing, setup cost, and licensing?
The cost is very high. We pay the license fee yearly. The price could be cheaper.
Which other solutions did I evaluate?
Before, I used to use FireEye. I did not pay for it. Now, I have to pay for email security.
What other advice do I have?
Overall, I rate the solution a ten out of ten.