
Validated through a business email account
Organic review. This review was written entirely without invitation or incentive from G2, a seller, or an affiliate.
This review has been translated from English using AI.
You’re seeing this ad based on the product’s relevance to this page. Sponsored content does not receive preferential treatment in any of G2’s ratings.

By Trellix
How would you rate your experience with Trellix Enterprise Security Manager?
You’re seeing this ad based on the product’s relevance to this page. Sponsored content does not receive preferential treatment in any of G2’s ratings.

McAfee Enterprise Log search is best security tool
It is having instant access to log data from various sources
And it is filtering options to quickly identify specific events or patterns
It can able to handle large volume of log data from diverse sources
It integrates with other McAfee solutions and third party tools
It is having features enabling security teams to monitor investigate and respond to the security incident Review collected by and hosted on G2.com.
McAfee enterprise log search can be costly solution especially for large scale deployments organisation with the limited budgets
It is difficult to effectively communicate insights to the non technical stakeholders
It requires significant training and expertise for new users
Large volume of lock data can impact search performance leading to slower query results
Integration with diverse log sources and customization of dashboards and reports can be time consuming and require technical expertise Review collected by and hosted on G2.com.
Validated through LinkedIn
This reviewer was offered a nominal gift card as thank you for completing this review.
Invitation from G2. This reviewer was offered a nominal gift card as thank you for completing this review.

The thing that I like best about MVISION ePO is how it helps me managed my McAfee Solutions in our organization. It helps me automate our organization workflows thus reducing the time and task that is needed for the investigation and triaging. Review collected by and hosted on G2.com.
The only downside that I dont like about mvision ePO is how complicated it is to configure especially if you don't have any necessary training with regards to this solution. Review collected by and hosted on G2.com.
At G2, we prefer fresh reviews and we like to follow up with reviewers. They may not have updated their review text, but have updated their review.
Validated through LinkedIn
This reviewer was offered a nominal gift card as thank you for completing this review.
Invitation from G2. This reviewer was offered a nominal gift card as thank you for completing this review.

This tool is good value for money for the mid-market segment. It is not as mature and doesn't have third-party OEM information on processing the logs or making some information out of Logs like its competitors such as Splunk, Datadog etc but still for the miod market segment whose aim is point products. The requirement is quite simple, is it reliable able to provide a response to query and store/collect the logs reliably - that is can do with 99.9999% availability which is good enough for them. Review collected by and hosted on G2.com.
They have kept this product in a cvery close loop instead of partnering with other third-party vendors who ghenerate these logs. If they have solid relationship or have a way to process the information better, avoiding false positives then the tool could have better market share. Review collected by and hosted on G2.com.
Validated through LinkedIn
This reviewer was offered a nominal gift card as thank you for completing this review.
Invitation from G2. This reviewer was offered a nominal gift card as thank you for completing this review.

- Very efficient for threat prevention and identifying them on the network, providing real-time visibility.
- It has a lightweight and intuitive interface.
- Allows integrations with other McAfee products and third-party products. Review collected by and hosted on G2.com.
- Improve the appearance to make administration simpler; despite having a simple interface for end users, the administration is quite cumbersome.
- The brand's support has many opportunities to improve in knowledge and response times; escalations also tend to be quite painful. Review collected by and hosted on G2.com.
The reviewer uploaded a screenshot or submitted the review in-app verifying them as current user.
Validated through LinkedIn
This reviewer was offered a nominal gift card as thank you for completing this review.
Invitation from G2. This reviewer was offered a nominal gift card as thank you for completing this review.
This review has been translated from Spanish; Castilian using AI.
This tool was hard to manage, and we are glad that we no longer have to support it in our environment. Review collected by and hosted on G2.com.
Hard to manage. No parsers ever available for new products we would wish to send logs for. Every feature request or parser request turned into a Pay to uprgade instance. The interface is from the 80s, and hard to find everything. Review collected by and hosted on G2.com.
Validated through a business email account
Organic review. This review was written entirely without invitation or incentive from G2, a seller, or an affiliate.
Trellix Enterprise Security Manager helps us to detect the malwares and threats and helps us to mitigate them promptly with mininal efforts Review collected by and hosted on G2.com.
Sometimes it responds very slow. Due to slowness, sometimes we stuck to responds to threats promptly Review collected by and hosted on G2.com.
Validated through a business email account
This reviewer was offered a nominal gift card as thank you for completing this review.
Invitation from G2. This reviewer was offered a nominal gift card as thank you for completing this review.
This reviewer's identity has been verified by our review moderation team. They have asked not to show their name, job title, or picture.
Minute logs allows to manage and troubleshooting issues at less time Review collected by and hosted on G2.com.
It consume some space but it's worthy. Really recommend Review collected by and hosted on G2.com.
Validated through LinkedIn
This reviewer was offered a nominal gift card as thank you for completing this review.
Invitation from G2. This reviewer was offered a nominal gift card as thank you for completing this review.

The McAfee Enterprise Log Manager is easy to use and there are suitable options for creating dashboards and alarms. THe visibility is clear and effecient for checking at a glance. Review collected by and hosted on G2.com.
The configuration UI is very back dated and super annoying to maneuver. The windows are mostly non scrollable which makes it difficult to find out one source among hundreds. Review collected by and hosted on G2.com.
The reviewer uploaded a screenshot or submitted the review in-app verifying them as current user.
Validated through LinkedIn
This reviewer was offered a nominal gift card as thank you for completing this review.
Invitation from G2. This reviewer was offered a nominal gift card as thank you for completing this review.
Love that you can view all managed and unmanaged devices and have the ability to push out products to both types of devices. Review collected by and hosted on G2.com.
Times where certain products start to malfunction and removing it from a particular computer may become tricky to do Review collected by and hosted on G2.com.
Validated through a business email account
This reviewer was offered a nominal gift card as thank you for completing this review.
Invitation from G2. This reviewer was offered a nominal gift card as thank you for completing this review.
McAfee Enterprise Log Manager stores all the logs universally & can be accessed easily. It is a hybrid system & easy to integrate with any device. It supports log analysis & search. Review collected by and hosted on G2.com.
McAfee Enterprise Log Manager can improve its UI. Their cost can be made more low for all enterprise Review collected by and hosted on G2.com.
The reviewer uploaded a screenshot or submitted the review in-app verifying them as current user.
Validated through a business email account
This reviewer was offered a nominal gift card as thank you for completing this review.
Invitation from G2. This reviewer was offered a nominal gift card as thank you for completing this review.
Averages based on real user reviews.
2 months