Listing Thumbnail

    Trellix Collaboration Security + Email Security + IVX Cloud

     Info
    Sold by: Trellix 
    Deployed on AWS
    Free Trial
    AWS Free Tier
    Trellix Email Security protects organizations from credential harvesting, impersonation, spear-phishing, and malwareless attacks that traditional gateways miss. Powered by AI, ML, and multi-layered analytics, it provides advanced detection and visibility while enabling analysts to investigate and respond quickly. Integrated SOC workflows support rapid claw-back, enriched alerts, and root-cause analysis. The solution deploys as ICES or SEG and supports Microsoft 365 and Google Workspace via API with active-active cloud resilience.
    4.3

    Overview

    As organizations strive to innovate and grow, they create highly complex interconnected networks of external partners, suppliers, vendors, contractors, and customers. Digital transformation initiatives have transformed both the nature and velocity of collaboration - introducing a largely unprotected attack vector, and creating significant challenges for security defenders.

    Trellix Collaboration Security ensures people can work together securely across the extended enterprise.

    • Real-time analysis of URLs and attachments to block suspicious emails - and extract those weaponized post-delivery
    • Seamlessly integrate with platforms such as Slack, Microsoft 365, and Google Workspace to ensure the integrity of files as they're shared - without friction.
    • Trust a single solution to inspect files shared by popular applications such as Salesforce, Ariba, Microsoft Azure, and Workday ensuring quick time to value.

    Solution Options:

    • Trellix Email Security
    • Trellix IVX Cloud for Collaboration Platforms
    • Trellix IVX Cloud Enterprise Applications

    Before purchasing, please contact aws@trellix.com . Your account team will build an AWS Private Offer reflecting accurate SKUs, quantities, and qualified discounts.

    Highlights

    • Stops phishing, impersonation, and malwareless attacks
    • AI- and ML-based detection with behavioral analytics
    • Deployable as ICES or SEG

    Details

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Free trial

    Try this product free according to the free trial terms set by the vendor.

    Trellix Collaboration Security + Email Security + IVX Cloud

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (3)

     Info
    Dimension
    Description
    Cost/12 months
    EMCLECE-AA
    Email Security - Cloud Edition (w/o AV or anti-SPAM) - Per user (1 yr)
    $55.44
    EMCAECE-AA
    Email Security - Cloud Edition (w/AV & anti-SPAM) - Per user (1 yr)
    $81.50
    IVXECE-AA
    Intelligent Virtual eXecution (IVX) Cloud - Per User Pricing (1 yr)
    $53.74

    Vendor refund policy

    Please contact aws@trellix.com  for refund requests

    Custom pricing options

    Request a private offer to receive a custom quote.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    Standard support and customer success programs available support@trellix.com 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    10
    In Data Security and Governance

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Threat Detection Mechanism
    Advanced AI and machine learning-powered multi-layered analytics for detecting sophisticated email-based cyber threats
    Collaboration Platform Integration
    Seamless security integration with multiple collaboration platforms including Slack, Microsoft 365, and Google Workspace
    Attack Vector Protection
    Real-time analysis and blocking of suspicious URLs and attachments with post-delivery extraction capabilities
    Deployment Flexibility
    Supports deployment as Inline Cloud Email Security (ICES) or Secure Email Gateway (SEG) with active-active cloud resilience
    Enterprise Application Security
    Comprehensive file inspection across enterprise applications like Salesforce, Ariba, Microsoft Azure, and Workday
    Threat Detection
    Advanced sandboxing and active-content analysis for comprehensive malware and phishing prevention across inbound, outbound, and internal communications
    Multi-Platform Security
    Full security coverage for Microsoft 365, G-Suite, Slack, Microsoft Teams, and other collaboration environments
    Data Loss Prevention
    Context-aware policy enforcement to identify and protect confidential information, ensuring regulatory compliance for PCI, HIPAA, and PII data
    Cloud-Native Deployment
    Instant, single-click cloud-enabled platform deployment without requiring proxy, appliance, or endpoint agents
    Comprehensive Communication Scanning
    Real-time scanning of emails, files, and collaboration content to prevent threat propagation within and outside the organization
    Threat Detection
    AI-driven solution that identifies and prevents advanced email and cloud-based threats using content, behavior, and threat telemetry
    Data Loss Prevention
    Comprehensive protection against insider threats by providing contextualized insights into content, behavior, and user interactions across multiple channels
    Automated Remediation
    Scalable incident response mechanism that enables consistent and automated handling of sophisticated email security attacks
    Multi-Channel Security
    Integrated protection across cloud, email, endpoint, and web platforms with centralized threat monitoring and management
    Privacy Protection
    User data anonymization, content snippet masking, and regional data residency management to ensure privacy during security monitoring

    Security credentials

     Info
    Validated by AWS Marketplace
    FedRAMP
    GDPR
    HIPAA
    ISO/IEC 27001
    PCI DSS
    SOC 2 Type 2
    No security profile
    No security profile
    -
    -
    -
    -
    -

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4.3
    43 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    26%
    58%
    9%
    5%
    2%
    1 AWS reviews
    |
    42 external reviews
    External reviews are from G2  and PeerSpot .
    Jorge Abalo

    Endpoint protection has strengthened network control and has simplified global threat response

    Reviewed on Dec 12, 2025
    Review provided by PeerSpot

    What is our primary use case?

    My main use case for Trellix Collaboration Security  is based on my experience with Trellix EPO and Trellix products, as I have over six years of experience managing Trellix EPO and all its features when it comes to antivirus protection, including its firewall and DLP  functionality. You can also encrypt a drive instead of using BitLocker , integrate your whole network, deploy a fabric from Trellix, and this fabric serves as a private network that enhances secure communication. It becomes comparable to an EDR because you can integrate it with Trellix TIE services, a reputation service, and manage USBs for controlling data movement from the computer to the USB.

    On top of that, you can run scans 24/7, which is called the on-access scan, or run on-demand scans whenever you prefer, perhaps once a day for a full scan. You have extensive management capabilities regarding the ports and IPs the computers communicate with, providing a lot of functionalities.

    A specific example of how I have used Trellix Collaboration Security  in my consulting work is in my current work environment, where I manage over 130,000 endpoints, allowing me to protect each endpoint with a firewall, which makes a significant difference because the entire network is not protected by a network firewall alone. Having an endpoint firewall is valuable, and being able to scan all applications for malicious content 24/7 with an on-access scan, which scans everything you click on in real-time, ensures effective security which I truly appreciate.

    Day-to-day, we scan the endpoints once a week and conduct full scans weekly while also performing 24/7 scans through the on-access scans. We help people troubleshoot performance issues related to scanning and create exclusions for threat prevention, exploit prevention, and the on-access scan itself because a file, folder, or software may not need to be scanned continuously. My everyday tasks revolve around managing performance and connectivity, which may involve opening ports or ensuring domain reachability, as well as managing USBs, including creating new exclusions for new vendors of USBs. Additionally, you can integrate Trellix EPO with LDAP, which helps manage computers and users, enabling the creation of specific, more granular rules.

    What is most valuable?

    In my opinion, the best features Trellix Collaboration Security offers include the firewall, the on-access scan, and the ability to obtain daily signatures for the latest malware. These daily signatures, referred to as content, ensure that we are protected against the most recent malware threats recognized by other companies.

    Another feature I particularly enjoy is the capability to maintain different locations that can communicate with the fabric, or DXL fabric as I refer to it, allowing me to create something akin to an EDR for immediate responses to resolve issues.

    The DXL fabric has helped my organization by enabling communication between different locations, such as one in Europe, another in South America, and one here. This fabric communicates with a broker that interacts with the TIE servers, which maintain the reputation of files, certificates, and known signatures from various regions including Europe, South America, and Canada. When something suspicious occurs, such as a certificate appearing malicious on an application, I can easily click and indicate that I trust this file, and through the fabric, I can apply an exclusion for that application across all locations simultaneously.

    Other features I find valuable include the SSO  integration with Trellix EPO, specifically SAML SSO , allowing people not to have to manage usernames and passwords if they already utilize an SSO service for SAML; I consider this functionality to be quite beneficial.

    What needs improvement?

    Areas where Trellix Collaboration Security can be improved include the fact that it used to support OpenLDAP but now does not support it any longer; it only supports LDAP, which means open-source lightweight directories are not supported anymore.

    While I find Trellix's support and performance to be satisfactory, I do have concerns. Sometimes Trellix uploads packages, identifies bugs, and removes them without notifying users, which requires us to wait for the next release or roll back, both undesirable situations. I need assurance that proper testing occurs before the release of new packages.

    For how long have I used the solution?

    I have been using Trellix Collaboration Security for approximately six years.

    What do I think about the stability of the solution?

    Trellix Collaboration Security can indeed be stable if you know how to manage its features effectively.

    What do I think about the scalability of the solution?

    Trellix Collaboration Security is very good when it comes to scalability, demonstrating impressive capacity for growth.

    How are customer service and support?

    I appreciate the customer support, particularly if you can effectively communicate the issue you are experiencing.

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    I have previously used SonicWall for antivirus and network firewalls; however, Trellix exceeds SonicWall's offerings, which are more aligned with a SaaS solution. The absence of an on-premise console with SonicWall was a significant factor that led me to choose Trellix.

    What was our ROI?

    I observe that the return on investment is hindered by the lack of adequate training opportunities, with Trellix's own training being quite costly, ranging from 2,000 to 4,000 dollars, which many small or medium-sized businesses cannot afford. I believe the educational materials can be enhanced, as Trellix does not explain certain concepts well in their training, and having completed the training, I feel I could offer better instructional support.

    What's my experience with pricing, setup cost, and licensing?

    The experience with pricing, setup costs, and licensing indicates that while Trellix Collaboration Security is a great product, it tends to be on the pricier side. I do not possess complete knowledge of all the pricing details for licensing or support as I am only somewhat involved in the purchasing process, but I know that larger enterprises, such as a bank I previously supported, invest in it as they have the financial resources. However, I believe it might be less accessible for small to medium-sized businesses, and I wish there were more affordable options available for them.

    Which other solutions did I evaluate?

    Before selecting Trellix Collaboration Security, I evaluated other options, including Trend Micro, which many individuals discuss. Though I personally have not used Trend Micro, it appears that it is popular for file servers, possibly enabling faster scans for zip files and specific files that can take Trellix longer to unzip.

    What other advice do I have?

    My advice for those considering using Trellix Collaboration Security is to ensure your budget accounts for investing over 100,000 dollars to hire someone to manage the product, as professionals with this expertise tend to come at a high cost. I give this product an overall rating of ten out of ten.

    Hassan Sheikh

    Centralized sensors have improved threat visibility and have reduced staffing needs

    Reviewed on Dec 08, 2025
    Review provided by PeerSpot

    What is our primary use case?

    My main use case for Trellix Collaboration Security  involves using Policy Orchestrator, email gateway, web gateway, and Trellix sensors, Security Manager, Network Security Manager.

    What is most valuable?

    I use Trellix Collaboration Security  in my daily operations by utilizing different sites sensors and then integrating security manager, which controls network operations, traffic inspections, packet inspection, deep packet inspection, and SSL inspections.

    The best features Trellix Collaboration Security offers include GTI threat intelligence and signatures upgrade database. Since I have integrated GTI and sensors along with network security manager, all sensors share information and reports effectively, allowing me to view attack reports from the dashboard easily.

    I can customize dashboards in Trellix Collaboration Security to view information like top attacks, ransomware attacks, and critical high attacks. I can monitor sensor health, attacks, logs that generate, and customize these as per my needs, plus I can add emails and alerts.

    I rely on Trellix Collaboration Security because the sensors are highly reliable and high-performance sensors that can handle traffic efficiently. CPU resources are effectively utilized while handling deep packet inspections and SSL inspections. Moreover, there are policies to be on networks, and there is a built-in firewall that I can use to block external attacks.

    What needs improvement?

    Trellix Collaboration Security can improve by addressing some zero-day attacks and enhancing VM-based protections.

    I chose a nine out of ten because some improvements are required, especially concerning East-West traffic or zero-day vulnerabilities. To improve vulnerabilities, Trellix can use an automation process to check if the system is vulnerable.

    For how long have I used the solution?

    I have worked with Trellix Collaboration Security for over almost four and a half years.

    What do I think about the stability of the solution?

    Trellix Collaboration Security is very stable.

    What do I think about the scalability of the solution?

    Trellix Collaboration Security scalability allows me to use sensors on-cloud, on-premises, inside premises, and in a hybrid environment. I can use VM-based environments to effectively stop East-West attacks.

    How are customer service and support?

    I have interacted with the customer support team of Trellix Collaboration Security. The support team is good overall, though my experience with the Indian support team was not as satisfactory since they did not provide adequate support to rectify issues. I managed to identify and resolve the problem myself.

    How would you rate customer service and support?

    Which solution did I use previously and why did I switch?

    I previously tried to use the Fortinet solution, but the Fortinet solution was not providing good performance, making Trellix Collaboration Security a better choice for me.

    What was our ROI?

    I have seen a return on investment with Trellix Collaboration Security; specifically, money was saved and fewer employees were needed because I do not need employees on different sites. I only need a Network Security Manager deployed centrally to control all these sensors from one location.

    What's my experience with pricing, setup cost, and licensing?

    My experience with Trellix Collaboration Security regarding pricing, setup cost, and licensing was very good, and the setup cost was very cheap.

    Which other solutions did I evaluate?

    I evaluated other options, including Trend Micro-based sensors, but I found that Trellix Collaboration Security's performance is better.

    What other advice do I have?

    All is good with Trellix Collaboration Security.

    I would rate Trellix Collaboration Security a ten out of ten.

    My advice for others looking into using Trellix Collaboration Security is to ensure that data backup is performed before upgrading to the latest version, as Trellix should provide a proper plan for device upgrades and fallback options. Sometimes, if the sensors are located in different locations and the network security manager is positioned elsewhere, data may get corrupted during upgrades. Firmware files may become corrupt, leading to sensor instability, and I would have to go on-site to resolve this. Therefore, Trellix should develop options for sensors to restore firmware remotely in case of failures.

    I have additional thoughts about Trellix Collaboration Security. Trellix has various security products working; however, it should improve its design and devices to effectively compete with Fortinet, which is a growing company with diverse, efficiently running products.

    Farruda Antoniazzi

    Real-time threat response has boosted detection accuracy and reduces manual investigation work

    Reviewed on Dec 02, 2025
    Review from a verified AWS customer

    What is our primary use case?

    In my field, I have been in the information security area for 17 years, and I am currently working in my position for a year and a half.

    I have worked with Trellix Collaboration Security  for several years in different outsourcing services before Johnson & Johnson. At BNP Paribas Bank, a French bank, I worked with Trellix Collaboration Security . At Santander Bank, I also worked with Trellix Collaboration Security. Before the banking sector, I worked in a security operations center with Trellix Collaboration Security since the McAfee company.

    At Johnson & Johnson, I am not currently using Trellix Collaboration Security. However, before Johnson & Johnson, I worked at Santander Bank where I participated in a project to implement the endpoint in different offices of the bank, coordinating the alignment and sending of policies, tasks, update tasks, and deployment of the new versions of the products.

    What is most valuable?

    In my experience, the best features related to Trellix Collaboration Security concern the protection against threats. Trellix Collaboration Security has a good solution to protect based on behavior and threat intelligence, reputation, and other features. I appreciated being able to include a malicious hash in the console, and the console then disseminated this information to different databases internally to protect against threats, download of the file for web reputation, and check the malicious activities in the email according to the hashes included in the databases.

    Regarding threat intelligence, it helped us with signatures, IOCs, or reports related to geolocation, where we could use it to create correlation in the XDR  to block and create a campaign to block different malicious activities based on the historical data published in the threat intelligence and based on reputation. It is very important because it is integrated, so it is not necessary to contact VirusTotal  or put the hash in VirusTotal . Instead, I use the database and the threat intelligence from Trellix Collaboration Security. In the past, it helped me a great deal with detecting and confirming whether something was malicious or not.

    Another feature I believe is very important is the real-time response capability. It is possible to collect artifacts, run scripts, kill processes, and isolate machines all without leaving the interface. For me, this serves as a bridge between detection and reaction, and it truly makes a difference in the tool.

    In my view, Trellix Collaboration Security and other XDRs can help the company elevate the trust in operations. Of course, it is necessary to create automations and integrations with pipelines with CSVs, inventory, normalization of data, and automatically raising incidents for the agents and endpoints. In my view, this reduced manual activities significantly and increased the precision of the indicators. Everything helped the operations team and the engineering team respond more quickly to malicious activities detected. It helped us reduce risks, avoid silent failures, and improve the health in general in the environment. Another important point is that we have an improved security posture because it is possible to treat the findings, adjust policies, and block malicious hashes. With that, we reduced the noise according to the detections, increasing the capacity of prevention and detection. We also improved the resilience of the security tools inside the company.

    What needs improvement?

    I have had challenges in the past with Trellix Collaboration Security for implementation because of issues related to compatibility. Since we worked in a global company with different operating systems, it was necessary to create different plans and different actions to implement the product.

    One thing I really do not prefer in Trellix Collaboration Security is not related to the console. I am a McAfee fan since the McAfee tool, and I find the console of Trellix Collaboration Security to be very user-friendly and easy to use. However, I do not know if it is related to the architecture of the product. Of course, we have modern threats based on behaviors and zero days. We have today CrowdStrike and SentinelOne, where we have better results based on threats and behavior, where it is possible to create a simulation environment based on the file detected and based on it, confirm if it really is malicious or not. In general, I believe Trellix Collaboration Security improved the console based on the last console of McAfee, but I think it is possible to improve more. It really is a good product, but in my view, it needs to improve detection based on behaviors.

    Regarding automations, I have implemented Trellix Collaboration Security here at Johnson & Johnson, and I implemented it in the same situation at Santander Bank and BNP Paribas Bank, where I created automations to export data for different metrics, including malicious detections, compliance, baselines, scans, last scans based on the seven days, and checking of patterns. I export everything to CSV files. Based on that, I create Power BI dashboards, and in these Power BI dashboards, I have a more executive view for different metrics to provide to myself, my manager, or director to create an executive view based on it. Another important point we use here at Johnson & Johnson and other companies is a data hub or a SIEM  solution, such as Elastic or ArcSight, where we select some logs to be sent and use it to build reports and metrics.

    What do I think about the stability of the solution?

    Trellix Collaboration Security is stable in my experience, and I agree with this assessment.

    What do I think about the scalability of the solution?

    Regarding scalability, the strong points of scalability are related to Trellix Collaboration Security's offering and the high availability in a cloud architecture. This creates more possibility to expand without issues. The console is strong and can be used for a large quantity of machines without slowing down. It is possible to improve and create very good scalability. Integration with multiple tools such as email, collaboration platforms, security, and other SaaS solutions is possible through API. This permits the increase of new services without creating a new architecture. It is possible to integrate.

    Another aspect is the unified detection and analysis of sandbox, URL, file inspection, and threat intelligence. This creates a more robust increase for a horizontal solution. It creates a good range of use because it really helps a lot. In my view, the limitation about scalability may be related to license and costs. When you include other modules and services, of course, you increase the cost, and because you need to adjust.

    How are customer service and support?

    Customer support for Trellix Collaboration Security has been very positive in my view. Of course, we have concerns about limitation of support. For example, in evaluations of the AWS  marketplace, some users spoke about the new hub created in India and not having good support. However, in my view, I have not had issues with support. I had a great experience with my recent cases opened. My contract of support at Santander and BNP was a platinum support level, and with that, we really had a good experience.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    Previously at Santander Bank and BNP, we were using McAfee. We continued using Trellix Collaboration Security with some improvements. At Johnson & Johnson, we are in transition from Trend Micro Vision One to CrowdStrike. I have had experiences in the past in security operation centers with different solutions. We had good results when we migrated from McAfee to Trellix Collaboration Security. Trellix Collaboration Security is more modern, and in my view, it organizes the structure of the console better.

    How was the initial setup?

    Another feature I believe is very important is the real-time response capability because it is possible to collect artifacts, run scripts, kill processes, and isolate machines, all without leaving the interface. For me, this serves as a bridge between detection and reaction, and it truly makes a difference in the tool.

    What about the implementation team?

    I implemented Trellix Collaboration Security here at Johnson & Johnson, and I implemented it in the same situation at Santander Bank and BNP Paribas Bank, where I created automations to export data for different metrics, including malicious detections, compliance, baselines, scans, last scans based on seven days, and checking of patterns. I export everything to CSV files. Based on that, I create Power BI dashboards, and in these Power BI dashboards, I have a more executive view for different metrics to provide to myself, my manager, or director to create an executive view based on it. Another important point we use here at Johnson & Johnson and other companies is a data hub or a SIEM  solution, such as Elastic or ArcSight, where we select some logs to be sent and use it to build reports and metrics.

    What was our ROI?

    We did see a return on investment, mostly related to operational efficiency and incident reduction rather than headcount reduction. The biggest ROI came from gaining visibility and reducing manual work. With Trellix Collaboration Security's endpoint telemetry, policy automation, and faster threat correlation, our team spent around 25 to 35% less time on routine investigations. Tasks that previously required manual log collection or waiting for the user became near real-time. That alone freed up analyst time for deeper work instead of repetitive triage.

    We also saw a major reduction in noise. After tuning the ENS and aligning the threat intelligence with real detections, we dropped false positives around 20 to 30%, which directly reduced the number of tickets escalated to security operations. The real-time feature is a good capability, and we had good results in the past based on it because it prevents lateral movement and avoids more expensive downstream impacts, such as re-imaging and downtime.

    What's my experience with pricing, setup cost, and licensing?

    We did not purchase Trellix Collaboration Security based on the AWS Marketplace .

    Which other solutions did I evaluate?

    I participated in a recent RFP where we evaluated Microsoft Defender, SentinelOne, CrowdStrike, and Proofpoint to check and create a comparison.

    What other advice do I have?

    My main advice for others about Trellix Collaboration Security is to go with a clear understanding of what you actually need. Trellix Collaboration Security really is powerful, but it is not a plug-and-play product. The value really shows up when you tune policies, integrate multiple collaboration channels, and leverage the threat intelligence and behavioral analysis model. Make  sure you have the internal capacity for configuration and ongoing tuning. If your environment is complex with multiple SaaS tools, file sharing, and cross-tenant collaboration, it is necessary to create a plan for proper setup. Once configured, the detection depth and cross-layer correction are really strong. In short, it is a powerful platform, but it rewards teams that prepare, tune, and manage it well.

    Regarding integrations, Trellix Collaboration Security has good integration with a large list of products, and it is possible to integrate. Performance and integration are good, and support in my experience has provided good results during telephone calls and email requests. For public and private cloud, we had good results, but I prefer to work with the console of Trellix Collaboration Security as a SaaS solution, and it helped in the deployment for cloud, hybrid, or on-premises environments. It depends on the internet link, but in my last experience with Trellix Collaboration Security, I did not have issues related to deployment using the security solution in a cloud environment. We reached a good result during the deployment of new versions and new products without creating a saturation of the link.

    Regarding deployment, we used AWS  as the main solution here and at Santander Bank. It is the same at BNP Paribas. In the last three experiences I have had, we used AWS.

    My review rating for Trellix Collaboration Security is an 8 out of 10.

    Which deployment model are you using for this solution?

    Hybrid Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Amazon Web Services (AWS)
    Shadi Alyounes

    Email protection solidifies threat coverage and fulfills customer needs

    Reviewed on Mar 19, 2025
    Review provided by PeerSpot

    What is our primary use case?

    I have worked on Email Security  both on-premises and in the cloud, Web Security, and also on MDR, which is called HX endpoint security for Trellix Collaboration Security . I am familiar with the File Analysis system as well. It actually depends on the use case and whether the email system is on the cloud or on-premises. Our focus is on what is required for the customer based on security policies. Most of the time, it's not dependent on one factor but rather a package.

    What is most valuable?

    The entire system is stable and delivers what the customer needs. Trellix Collaboration Security  is valued for being a stable and comprehensive solution that fulfills customer needs. Despite not being able to use it for complete on-premises email security, it is effective for sandboxing and new threat coverage, working as a standalone solution without needing to integrate with other systems.

    What needs improvement?

    I would like to see the addition of email digital protection features, such as anti-spam and antivirus, not just sandboxing, in the on-premises solution.

    For how long have I used the solution?

    I have been working with the Email Security  product for more than ten years, about fourteen to fifteen years. In Trellix Collaboration Security in general, I have been involved for about twelve years.

    What was my experience with deployment of the solution?

    There were no deployment issues.

    What do I think about the stability of the solution?

    Trellix Collaboration Security is very stable. There were no stability issues for me recently.

    What do I think about the scalability of the solution?

    I do not find it limited for the technology. There’s an area not limited for the vendors, and there is nothing new in terms of limitations.

    How are customer service and support?

    I would rate them as a 1.5. The new hub created in India is not good.

    How would you rate customer service and support?

    Negative

    Which solution did I use previously and why did I switch?

    I worked with Forcepoint and Cisco IronPort . Trellix Collaboration Security cannot be used for full security on-premises for email security unlike other products, but it does meet the needs.

    How was the initial setup?

    The setup is straightforward.

    What about the implementation team?

    I am involved in the implementation and troubleshooting as well as in sales and presales, making opportunities for my account manager colleagues.

    Which other solutions did I evaluate?

    I worked with Forcepoint and Cisco IronPort .

    What other advice do I have?

    Trellix Collaboration Security came to fill a gap in areas not filled before. Multiple security layers are needed to protect email and web security, like firewall, web security, and email security. Some gaps needed filling, like new threats covered by Trellix Collaboration Security, which works as a standalone and doesn’t need integration with other solutions. I would rate it as nine out of ten.
    BernardLugalia

    Provides strong data protection with virtual patching and vulnerability assessments

    Reviewed on Dec 24, 2024
    Review provided by PeerSpot

    What is our primary use case?

    I primarily use it to monitor database access, particularly in banking and similar environments. It ensures that IT personnel and others do not create unauthorized accounts or users. Collaboration security assists in tracking database access and alerts in case of suspicious activity.

    What is most valuable?

    One of the most valuable features is the protection against vulnerabilities, particularly through virtual patching. This ensures that I am safe from potential threats affecting database security.

    Another significant feature is the vulnerability assessment, which is effective for overall data protection.

    What needs improvement?

    There is a need for improved integration with totally different products, such as a rapid server. This is currently challenging since the management console becomes overloaded with logs, which complicates troubleshooting.

    For how long have I used the solution?

    I have been working with Trellix Collaboration Security  for ten years.

    What do I think about the stability of the solution?

    Sometimes, integration can be challenging, impacting its stability, which is why I rate it a five out of ten.

    What do I think about the scalability of the solution?

    I rate it an eight out of ten. Scalability benefits me by allowing for growth, although sometimes adding users can be difficult due to licensing.

    How are customer service and support?

    The support isn't bad, but there is room for improvement in response time. Initially, I must generate a ticket, and then it gets escalated through tiers if the issue isn't resolved.

    How would you rate customer service and support?

    Neutral

    How was the initial setup?

    For me, setup is easy because of my extensive experience. I rate it ten out of ten.

    What's my experience with pricing, setup cost, and licensing?

    The price is high at eight out of ten. It is quite expensive and should be reconsidered.

    What other advice do I have?

    Before installing, consider potential challenges with system performance, especially when integrating multiple tools, which could slow down performance. Overall, I rate the solution with an eight due to its impressive performance, however, integration with other systems needs improvement. My overall product rating is an eight out fo ten.

    View all reviews