Introducing G2.ai, the future of software buying.Try now

Trellix Endpoint Security Reviews & Product Details

Profile Status

This profile is currently managed by Trellix Endpoint Security but has limited features.

Are you part of the Trellix Endpoint Security team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Value at a Glance

Averages based on real user reviews.

Time to Implement

3 months

Return on Investment

16 months

Trellix Endpoint Security Media

Trellix Endpoint Security Demo - FireEye Endpoint Security
FireEye Endpoint Security
Trellix Endpoint Security Demo - FireEye Endpoint Security
FireEye Endpoint Security
Trellix Endpoint Security Demo - FireEye Endpoint Security
FireEye Endpoint Security
Product Avatar Image

Have you used Trellix Endpoint Security before?

Answer a few questions to help the Trellix Endpoint Security community

Trellix Endpoint Security Reviews (326)

View 2 Video Reviews
Reviews

Trellix Endpoint Security Reviews (326)

View 2 Video Reviews
4.3
326 reviews

Review Summary

Generated using AI from real user reviews
Users consistently praise the product for its robust protection and ease of use, highlighting its effectiveness in detecting and blocking threats in real-time. The intuitive interface and comprehensive features contribute to a positive user experience, making it suitable for both individuals and organizations. However, some users note that it can be resource-intensive, particularly during startup.

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Verified User in Security and Investigations
IS
Mid-Market (51-1000 emp.)
"Windows Memory Analysis with Redline"
What do you like best about Trellix Endpoint Security?

FireEye Redline helps us analyse data from the memory file we saved in our system.

If you are looking for a memory analysis software, you must try Redline tool.

If you want to collect IOC based collection then Redline Tool helps us with that.

Collecting data gives us three options: Standard collector, Comprehensive collector, and IOC search collector.

If you want to analyse data from an image, you can use FireEye Redline, which helps us with that. Review collected by and hosted on G2.com.

What do you dislike about Trellix Endpoint Security?

The only disadvantage i can say is FireEye Redline is only available in Windows Operating System only if you want to use it then you must have windows operating system to use it. Review collected by and hosted on G2.com.

Vilasana R.
VR
Senior Software Engineer
Enterprise (> 1000 emp.)
"Great secure app for endpoints!"
What do you like best about Trellix Endpoint Security?

I like how it has been designed for easy and quick connections to endpoint without compromising on security. Review collected by and hosted on G2.com.

What do you dislike about Trellix Endpoint Security?

Sometimes when it gets disconnected, there are too many prompts to connect back. Review collected by and hosted on G2.com.

Raghavendra R.
RR
Associate I-Associate Connectivity & NW
Enterprise (> 1000 emp.)
"Review on MVISION CLOUD"
What do you like best about Trellix Endpoint Security?

I want to say that the product is very good and is very user friendly and also the customer support is very responsive Review collected by and hosted on G2.com.

What do you dislike about Trellix Endpoint Security?

The cost of the product might be disliking Review collected by and hosted on G2.com.

Lin L.
LL
Senior Infra Engineer, Network
Mid-Market (51-1000 emp.)
"End Point Detection and Response"
What do you like best about Trellix Endpoint Security?

Most of orginization require not only End point solution but also monitoring logs. Macfee EDR is one of the best solution. Review collected by and hosted on G2.com.

What do you dislike about Trellix Endpoint Security?

License is the main concern to consider by user. Review collected by and hosted on G2.com.

Ankit J.
AJ
Cyber Security Specialist
Mid-Market (51-1000 emp.)
"Easy to use EDR"
What do you like best about Trellix Endpoint Security?

The main thing, it is very easy to deploy and use. Review collected by and hosted on G2.com.

What do you dislike about Trellix Endpoint Security?

It is bit higher on cost side in coparison to comptetior. Review collected by and hosted on G2.com.

Ravi P.
RP
Malware Analyst
Small-Business (50 or fewer emp.)
"Good to use"
What do you like best about Trellix Endpoint Security?

Enriched features such as antivirus, real time treat intelligence Review collected by and hosted on G2.com.

What do you dislike about Trellix Endpoint Security?

High Cpu consumption and improve troubleshooting logs Review collected by and hosted on G2.com.

Verified User in Consulting
AC
Mid-Market (51-1000 emp.)
"Capable tool for protecting client workspace"
What do you like best about Trellix Endpoint Security?

It has the option for scheduling scans for malware, it also notifies, it also immedietly notifies the super user if any applications are installed without permission. Review collected by and hosted on G2.com.

What do you dislike about Trellix Endpoint Security?

This tool needs a guide to get acustom with it, because it is very difficult to grasp it's complex environment. Automation would make it earier to manage the whitelist. Review collected by and hosted on G2.com.

Verified User in Manufacturing
AM
Mid-Market (51-1000 emp.)
"McAfee - End to End Control over Systems"
What do you like best about Trellix Endpoint Security?

As a admin McAfee helps me control the devices that are under our organisation. This helps us prevent all kinds of threats like unwanted applications, unwanted data transfer of cofidential data and gives a mental satisfaction against common cyber/manual threats. Review collected by and hosted on G2.com.

What do you dislike about Trellix Endpoint Security?

It has a pricing based on nodes but it should also have an pricing based on features. Quite a few features are not usable sometimes but still we end up paying for them. Review collected by and hosted on G2.com.

Verified User in Packaging and Containers
AP
Mid-Market (51-1000 emp.)
"Full visibility and speed of response"
What do you like best about Trellix Endpoint Security?

- Total visibility of all my company's endpoints

- Being able to directly contain any endpoint that may have been compromised

- Ability to feed it with external intelligence sources and integrate with MDR services

- Automatic agent update from the console

- To be able to perform an on-demand forensic analysis of any endpoint in my company. Review collected by and hosted on G2.com.

What do you dislike about Trellix Endpoint Security?

Some false positives sometimes occur, although it is easy to fine-tune the rules to prevent further false positives. Review collected by and hosted on G2.com.

Shubhanshu M.
SM
Account Manager (Client & Delivery)
Small-Business (50 or fewer emp.)
"MCAfee Review"
What do you like best about Trellix Endpoint Security?

Protection with McAfee was bang on; It has given us a solid firewall and security to protect the system from Malware and Trozens. The detection of Viruses in this software was exceptional. Review collected by and hosted on G2.com.

What do you dislike about Trellix Endpoint Security?

A lot of bugs, Malware, and Spam websites, Cloud was not protected. Entrance of silly bugs with a lot of websites with dozens were not detected in this software which made us to switch to a different platform. Review collected by and hosted on G2.com.

Pricing Insights

Averages based on real user reviews.

Time to Implement

3 months

Return on Investment

16 months

Average Discount

17%

Trellix Endpoint Security Comparisons
Product Avatar Image
SentinelOne Singularity Endpoint
Compare Now
Product Avatar Image
CrowdStrike Falcon Endpoint Protection Platform
Compare Now
Product Avatar Image
Microsoft Defender for Endpoint
Compare Now
Trellix Endpoint Security Features
Compliance
Web Control
Application Control
System Isolation
Firewall
Endpoint Intelligence
Automated Remediation
Incident Reports
Behavioral Analysis
Product Avatar Image
Trellix Endpoint Security
View Alternatives