Sign in Agent Mode
Categories
Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Reviews from AWS customer

4 AWS reviews

External reviews

16 reviews
from

External reviews are not included in the AWS star rating for the product.


4-star reviews ( Show all reviews )

    Duncan Kims

Advanced detection has reduced targeted attacks and builds daily confidence in our defenses

  • April 14, 2026
  • Review from a verified AWS customer

What is our primary use case?

Trellix Endpoint Detection and Response (EDR) is my organization's main solution for threat detection and mitigation of zero-day and advanced persistent threats in the network, and it is being used throughout the company.

It is highly effective and scalable in terms of detection and prevention, and our usage within Trellix Endpoint Detection and Response (EDR) enhances the value. The SOC team is constantly monitoring Trellix Endpoint Detection and Response (EDR) alerts, in addition to SIEM-generated incidents.

Inline mitigation capabilities work particularly well, and different deployment models cater to specific needs, along with frequent updates, low false positive rates, and advanced detection of targeted attacks.

Trellix Endpoint Detection and Response (EDR) is deployed in my organization using a hybrid cloud.

I purchased Trellix Endpoint Detection and Response (EDR) through the AWS Marketplace.

Advanced detection of targeted attacks has reduced the attacks, and I have seen low false positive rates as relevant metrics that show the return on investment.

What is most valuable?

Trellix Endpoint Detection and Response (EDR) has a very low false positive rate compared to other products, thus increasing the SOC efficiency in how my team relies on the solution day-to-day.

With the best features Trellix Endpoint Detection and Response (EDR) offers, ease of SOAR integration helps to automate the IOC distribution, and our security team and management trust the product. Advanced detection capabilities ensure that targeted attacks will be detected and blocked before they arrive at our network.

SOAR integration has assisted our security team and management in trusting the product.

What needs improvement?

One area where Trellix Endpoint Detection and Response (EDR) can be improved is the lack of device or user mapping.

I cannot make manual submissions to NX, which I would like to add about the needed improvements to make my experience better.

Performance optimization for busy networks is cumbersome.

For how long have I used the solution?

I have been working in my current field for seven years.

What was our ROI?

Trellix Endpoint Detection and Response (EDR) has positively impacted my organization with threat exchange and intel, low false positive ratios, and very high uptime values for both inline and spam modes, along with advanced detection and mitigation capabilities ensuring the highest level of protection and proper detection for command and control and bot attacks.

I have noticed a decrease in attacks as a specific outcome that shows the positive impact of Trellix Endpoint Detection and Response (EDR).

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing is very cost-effective, but for small organizations working under a tight budget, the price may be challenging to manage.

What other advice do I have?

I would rate this product a 9 out of 10.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    Abubakar Bello

Centralized endpoint protection has improved reporting and now needs smarter automation

  • March 19, 2026
  • Review provided by PeerSpot

What is our primary use case?

We use routing and switches, IP phones, routers, switches, and a core switch. We also have Identity Services Engine, but it is end of life or end of support now, so we are working on replacing it.

Our solutions cut across various security products from Sophos and Trellix. We started with McAfee for 15 years and have now transitioned to Trellix, which acquired McAfee.

Basically, we use this to protect our endpoints.

How has it helped my organization?

Trellix Endpoint Detection and Response (EDR) does everything. It saves time, it saves money, and of course, it provides peace of mind. Anytime management wants any report, we can generate it automatically and push it. This is quite effective.

What is most valuable?

First, it is user-friendly. Second, it works with a lot of products and many different versions of Windows. Third, the reporting module is very good. Because if you are using Endpoint Protection with ePO, it has a central console that is quite easy to manage all endpoints at a single dashboard. It has very good threat intelligence.

In addition to the threat intelligence, it is easy to manage and granular. We can easily manage products up to the client level, and we know what is happening, then we do a lot of threat analysis. There are many resources that we can use. They also have very good support.

Trellix Endpoint Detection and Response (EDR) has very good threat hunting capability. We can use the logs to see when a process starts and what it hits, and the other processes or services it has affected. This is quite encouraging.

What needs improvement?

They can enhance Trellix Endpoint Detection and Response (EDR) using AI now to do more enhanced reporting and more enhanced threat analysis. There are some client task assignments and policies that should be automatically automated with AI with a click of a button. They should introduce AI and do a lot of things.

For how long have I used the solution?

We have used this for 16 years. All this information, how can we protect it? Are we covered by the GDPR regulation?

What do I think about the stability of the solution?

Initially, I was using it on servers, but it consumes a lot of resources on servers. So I have to use Sophos XDR on servers because Sophos XDR does not consume resources. That is the difference.

How are customer service and support?

We do a lot of research. Our only problem with Trellix is that it is resource intensive and takes a lot of resources. However, we found out that it works on our systems and on our desktops. But on our servers, we do not want it to touch our resources, so we deployed Sophos XDR on the server.

How was the initial setup?

It is straightforward. The only little challenge is that you have to get all the necessary updates for it to connect to the database.

I am using on-premises with the ePolicy Orchestrator and then we apply the license. After the product is already installed, we do the necessary upgrade, restart the system, and then push the agents to the endpoints. Then we receive updates and manage our clients.

What about the implementation team?

We have partners that provide Trellix Endpoint Detection and Response (EDR), so we work with them to deploy.

What's my experience with pricing, setup cost, and licensing?

It is quite reasonable.

Which other solutions did I evaluate?

For network troubleshooting, I moved to security now and I am not in network, but I think they are using Cisco product too for that.


    CESARCASTRO

Cross-site threat hunting has improved visibility and supports proactive incident response

  • January 07, 2026
  • Review from a verified AWS customer

What is our primary use case?

We are in the energy market, specifically in energy generation. We got the Trellix EDR installed in most endpoints.

How has it helped my organization?

The tool helps us to traverse possible thread incidents thru our mult site network infrastructure. In case of any forensic case it will be helpful to hunt thru the history or evidence information the EDR collects.

What is most valuable?

Trellix Endpoint Detection and Response (EDR) is valuable because we have a Wide Area Network with many sites, and the EDR is cross-site since it is configured and managed from the cloud. This is very useful because it does not matter what is happening at one endpoint of the company in one site and the relation of an incident with another computer or endpoint at another site. All the tree of data that we have, which may be a lot of information help us to argue whether it is going to be a threat or not, can be analyzed. Most of the threats are not really threats, but we can see what is happening in the relations, in the networking, and the data that comes back and forth through our company's network infrastructure.

Threat hunting is valuable because it pinpoints what is happening everywhere in our networking infrastructure. We have a company contract working through a NOC- network operating center 24 hours a day. They are sending us reports many times a day if any threat is arising or asking why this operation has come through or if it is valid or not, or whether we have approved it. We have a lot of that type of information, but we need to manage the contract in a much more efficient way because I do not have the time to read the many information that comes through the network operating center, the security operating center, or the tools itself and the notification reports that I have. While I am managing the policies and the standards, I need a lot of people to monitor, detect, and recover if something happens. The tools are not useful for that. We need to have people with enough expertise to manage all of this.

What needs improvement?

I believe this is a product in evolution. I do not think it is a final tool to conduct forensics or information forensics of the incidents or information incidents that could arise in our network infrastructure. Trellix Endpoint Detection and Response (EDR) is interesting and is a very good entry point that has been evolving through the last years. In the next two months, I have a new contract, and we are pointing out to have an XDR solution with NDR and EDR together.

I do not have enough time to do it because I am the manager. However, my coworkers do not understand it yet. I have a contract with a third-party company that is making reports around that, but also they do not have enough experience or enough utility of this.

It would be interesting if I have a notification system from EDR. For example, if I am the manager, it would be interesting to have a warning, alarm, or something around that which could call me to get into the system and the dashboard to see what is happening. For example, if it is a high-level threat. However, most of them are just advisory or warnings. I do not enter the tool frequently. I guess I access it once every three months.

For how long have I used the solution?

I have been using Trellix Endpoint Detection and Response (EDR) for about six years.

What do I think about the stability of the solution?

As mentioned, this is an evolutionable tool. In the past there has been many times when the tool clogged the endpoints and we had to uninstall it. Windows (c) 10 enterprise edition, for instance, has some problems.

What do I think about the scalability of the solution?

I have not scalate the EDR solution yet. We have not had a critical alert to do it. It's supossed that the SOC company should do it just in the case.

How are customer service and support?

Tech support may be tricky if the support comes from Asia experts. Eeryone here speaks spanish and I are not affordable most of time. The tech is interesting when a high support level is called. Once someone from Argentina helped me that has excellent skills. We need more like her.

Which solution did I use previously and why did I switch?

No other EDR solutions.

How was the initial setup?

I guess it was complex. To get the EDR operating useful I had to wait around 2 years.

What about the implementation team?

Bafing from Peru is an integrator and consultant. They had done all of the work, and accompanied us many years.

What was our ROI?

Of course this is a yes. I had called the US partner during the past years when I need the support directly from the manufacturer and I got all the help to workaround or overcame issues. That had happended when my local partner company was not enough.

What's my experience with pricing, setup cost, and licensing?

I pay for what we get. But the service level from my partner company is not enough to overcome a complex case.

Which other solutions did I evaluate?

We are a gobernment company, so we ask the system to contract a company that is resourceful with cybersecurity withount mentioning the name or mark. We had been using Trellix since it was Mc Afee. But I had evaluated solutions from Microsoft, Panda, ESNET, as general malware tools.

What other advice do I have?

This year, I am planning to have a training for all the personnel of the company in every department so they can learn the basics of the endpoint tool. They can have more actions for possible threats or everything so they can help my department to make a better and faster action if something real is happening. Something like ethical hacking or a service, but using my own personnel in the company. I know that it is difficult, but I want to try to make that this year.

I have evaluated many products including Fortinet environment and a lot of appliances, and also many other products that we have now. I have evaluated around six or seven other brands or other products. However, I have learned Trellix Endpoint Detection and Response (EDR) tools and before that McAfee, around two decades. It is enough expertise that we have made. I do not want to lose that with maybe another interesting tool. For example, what would be interesting is if an XDR tool that can help us in managing the threats of the cybersecurity environment uses AI as an agent, a trained agent that helps our department, so it has to be trained first by a company like Trellix or another with the expertise or the capacity to help us actually. That is one thing I can recommend.

In February or March, I am signing a new contract with five levels, three more levels of security that we have now. We will have the tool, the SOC, the operating center service, and we need to manage applications firewall, web filtering, and XDR, and maybe next year also PAM and so on. I rated this solution an 8 out of 10.


    Sampath Acharya

Helpful to detect malware and threats

  • September 06, 2024
  • Review from a verified AWS customer

What is our primary use case?

I use the solution in my company for malware detection. My customers are mostly banking and government organizations.

What is most valuable?

The most valuable feature of the solution is its area for threat detection.

What needs improvement?

When it comes to some unknown fileless attacks, the tool is not able to detect them properly, making it an area where improvements are required.

The tool's support needs to improve in the areas of response it provides to users.

For how long have I used the solution?

I have been using Trellix Endpoint Detection and Response (EDR) for two and a half years.

What do I think about the stability of the solution?

Stability-wise, I rate the solution an eight out of ten.

What do I think about the scalability of the solution?

Scalability-wise, I rate the solution an eight out of ten.

How are customer service and support?

I rate the technical support a seven and a half out of ten.

How was the initial setup?

The solution is SaaS-based, and we have deployed it using the hybrid cloud model.

The tool's deployment phase is a lengthy process. For one endpoint, it takes 15 to 20 minutes.

What was our ROI?

The tool is cost-effective. Many agents need to be installed, and on-premises integration is required.

What other advice do I have?

I haven't worked on the tool to see how it works for security workflow.

My customers have not seen any challenges while working with Trellix Endpoint Detection and Response (EDR) in terms of integrations.

The tool does not support any AI and security initiatives.

The tool is suitable for enterprise companies.

If businesses are completely on the cloud, then the tool is not required. If a company has a hybrid cloud model with an on-premises model, then it will be a good tool to use.

I rate the tool an eight out of ten.


    RiaanDu Preez

Has behavior monitoring, DLP, and access control

  • August 15, 2024
  • Review provided by PeerSpot

What is our primary use case?

I've used Trellix EDR to improve endpoints and servers' security and feed into MDR solutions.

What is most valuable?

The most useful features are behavior monitoring, DLP, and access control. The automation has gotten much better in the last two years than when it was McAfee. It works better now and integrates more smoothly.

What needs improvement?

I'd like the tool to become more like an XDR, with one management system and endpoint activation.

For how long have I used the solution?

I have been using the solution for seven years.

What do I think about the stability of the solution?

Sometimes, stability issues come from incorrect partner deployments, not Trellix EDR itself.

What do I think about the scalability of the solution?

I rate the tool a seven out of ten. To improve it, I'd like a cloud-based management system where I only need to put a correlator at the client's site, as CyberArk does. The best setup would be cloud management, a manager in a VM, and super agents on endpoints.

How are customer service and support?

My opinion about technical support might be biased because I have direct access to top-level senior staff. I know some people struggle with support if they go through normal channels.

How was the initial setup?

Setting up the solution is easy for me because I've been in cybersecurity for almost 30 years, but new users might find it hard. Depending on the client's needs, it can be set up on-premises, in a private or hybrid cloud, or fully in the cloud. Setting it up can take a few days for small environments or months for big companies with thousands of endpoints.

What's my experience with pricing, setup cost, and licensing?

Pricing is a problem in South Africa. It could be cheaper here. The rand-to-dollar exchange rate makes it expensive for us. A 25 dollar endpoint cost becomes quite significant when converted to rand.

What other advice do I have?

Our clients are usually medium-sized and enterprise businesses. Overall, I would recommend Trellix EDR to others. I'd rate it eight and a half out of ten. No EDR or XDR solution gets a nine from me right now because they all have room for improvement.


    Abdullah Al Hadi

Helps to detect and identify critical management activities with dashboard to analyze data

  • August 12, 2024
  • Review provided by PeerSpot

What is our primary use case?

We use the solution to detect and identify critical management activities. Within the network level, you can understand what is happening in the environment. Organizations using complex systems for various purposes can easily identify shared activity within the environment. There is a detection base that allows us to identify and manage threat events. The solution also includes licenses for forensic investigations of any attack that occurs. Details can be found within the platform's release at the end of the month or whenever needed. Any Trellix malware activity will be displayed on the dashboard, and the moderating services will be integrated into everything we have built.

What is most valuable?

The dashboard makes it easier and more effective to analyze data. It also allows us to access the AWS analytics and system features in one place. If we need to find specific details about an endpoint, we can determine what is happening and how any organization is affected by the data provided.

What needs improvement?

The better approach is to apply the necessary improvements to make the dashboard more effective and user-friendly. If simplified, users can investigate issues in more detail by clicking on the relevant sections. Making it simpler would enhance understanding and improve the investigation process. Customers currently using the system can view everything on a single dashboard, which is very effective for understanding all scenarios and activities.

Customers rely on a single platform When they notice an incident, response, or attack. In SOC analysis teams, especially in banks or traditional organizations, the entire team needs access to the scenario on one platform. This allows them to understand the dashboard and detect any ongoing activity easily. Once they identify an issue, they can proceed with further analysis. Customers need a clear and visible platform that helps them understand when and how their site is being compromised.

The dashboard is split across different platforms. For example, if you want information on Incident Detection, you have to access one dashboard, and for DLP reporting, there's a separate platform. This fragmentation means you can't access everything from a single dashboard. Instead, you must navigate various options to find the right dashboard. This setup results in a separate view for each function. Ideally, we'd like to consolidate this into a unified platform, making it easier to identify site behaviors from one centralized dashboard.

For how long have I used the solution?

I have been using Trellix Endpoint Detection and Response (EDR) as a reseller.

What do I think about the stability of the solution?

We initially used McAfee's VSP and Varia System Enterprise products. After transitioning to Endpoint Security, particularly in version 10 or 7, we encountered performance issues on systems running Windows 7. The high resource utilization caused significant slowdowns, leading to numerous complaints, especially from Sakasho. The EDR was consuming too many system resources, which impacted overall performance. However, with the newer versions, like those in the InVision EPO, these issues seem to have been resolved, and the system now operates more efficiently. The current product is expected to be much lighter and more stable.

I rate the solution’s stability an eight out of ten.

What do I think about the scalability of the solution?

I highly appreciate service architecture. They are developing day by day.

We are an enterprise that provides solutions through Trellix EDR that various external customers use. Our solutions are deployed in a large and diverse environment, including companies, telecoms, and major banks. These organizations rely on our products for their protection needs.

How are customer service and support?

There are multiple ways to get support. You can create a case through your partner or support portal by calling. If necessary, you can raise a call and follow up immediately.

How was the initial setup?

We operate within our environment and country. One of our clients, is interested in using our on-premises solution. They are hesitant to adopt a cloud-based solution due to concerns about data security. They worry that storing data in the cloud could expose it to unauthorized access. They are confused about how the cloud handles sensitive data like CPU data and prefer to keep their information on-premises. However, other banks have embraced cloud solutions and understand their value. Over time, as more companies study and become comfortable with cloud technology, we believe others will also follow and move to the cloud. We hope to maintain their interest in our services.

What other advice do I have?

Its machine learning capability is strong, and the AI configurations and system integration enhance its effectiveness. The API solutions added to this system allow us to detect and respond to incidents quickly. The quick response is also due to Edge Solutions and specific-type solutions, enabling us to conduct thorough investigations and generate reports on the platform.

I recommend Trellix Endpoint Detection and Response (EDR) because it offers strong capabilities. It’s worth noting that XDR solutions are also available and might be more effective. These XDR solutions are advanced technologies with enhanced features, including improved API integration.

Overall, I rate the solution an eight out of ten.


    Muniyappan Vk

User-friendly, reasonably priced, helps with real-time monitoring, and improves security posture

  • February 23, 2024
  • Review provided by PeerSpot

What is our primary use case?

The solution is used for threat hunting and incident response.

What is most valuable?

Trellix is a good solution. It helps with real-time monitoring and alerts. We are pretty satisfied with it. The product is user-friendly. It improves our security posture.

What needs improvement?

The graphical view for nodes must be increased.

For how long have I used the solution?

I have been using the solution for two years.

What do I think about the stability of the solution?

The tool’s stability is good.

What do I think about the scalability of the solution?

The tool is scalable.

How was the initial setup?

We need three to four months to learn the tool. We were given training. It is not difficult if we read the documents properly.

What's my experience with pricing, setup cost, and licensing?

The price is reasonable.

What other advice do I have?

We were looking for other solutions. Whoever is interested in the product can learn to use it. Overall, I rate the solution an eight out of ten.


    Juan Muriel

Completely automated, affordable, and provides good technical functionalities

  • February 22, 2024
  • Review provided by PeerSpot

What is our primary use case?

We use the tool for threat hunting. It detects a lot of threats daily.

How has it helped my organization?

We do not need to monitor the network all the time because the solution is completely automated. The administrators’ time can be dedicated to improving other projects.

What is most valuable?

The antivirus and DLP features are valuable. Now, we have a campaign to encrypt all the drives of the company. We have a solution for network access control from Fortinet. When Trellix detects some threats, the device is isolated in a quarantine zone for examination. We integrate Trellix Endpoint Detection and Response with other solutions to perform such isolations. We also use products for log monitoring and correlation and create use cases for automatic response.

What needs improvement?

The technical support must be improved. We had a problem with the Web Control plug-in with Edge and Chrome. The plug-in was disabled, and the resolution took a lot of time.

For how long have I used the solution?

I have been using the solution for two years.

What do I think about the stability of the solution?

The stability is good. I rate the tool’s stability an eight out of ten.

What do I think about the scalability of the solution?

The scalability is good. I rate the tool’s scalability an eight out of ten.

How was the initial setup?

I rate the ease of setup an eight out of ten.

Which other solutions did I evaluate?

Our clients were using McAfee before. We switched to Trellix because of its price and technical specifications.

What other advice do I have?

We also have a DLP problem with Outlook. Sometimes, people cannot send emails because of an error. We detect the threat, and our clients manage the response. We send a communication, and the clients manage the response for the threat detected. We only administer the tool. Overall, I rate the product an eight out of ten.


    Bernard Van Den Heuvel

A user-friendly and integrated solution that includes EDR and antivirus

  • January 24, 2024
  • Review provided by PeerSpot

What is our primary use case?

We're looking at the logs, and the customer defines the solution's use cases.

What is most valuable?

Trellix Endpoint Detection and Response is a user-friendly solution. The biggest strength of the solution is that it's an integrated product that includes EDR and antivirus. It's not like you have different technologies for different solutions.

What needs improvement?

Some modules that are doing machine learning and artificial intelligence are blocking our processes.

For how long have I used the solution?

I have been using Trellix Endpoint Detection and Response for one year.

What other advice do I have?

Overall, I rate Trellix Endpoint Detection and Response an eight out of ten.


    Mohit Dhingra

A scalable solution that provides a one-click recovery of encrypted files and excellent threat-hunting features

  • December 19, 2023
  • Review provided by PeerSpot

What is most valuable?

The product provides a one-click recovery of encrypted files. Threat hunting is marvelous.

What needs improvement?

The product must improve the ability to work with different operating systems like Windows and macOS. The CPU utilization of the product is quite high compared to its competitors. The agent file size is higher. The number of services that run on a system is quite high. Other EDR solutions have only a single service running on it.

For how long have I used the solution?

I have been working with the product from the day of inception. I am using the latest version of the solution.

What do I think about the stability of the solution?

The stability is good. I rate the stability a nine and a half out of ten.

What do I think about the scalability of the solution?

I rate the tool’s scalability a ten out of ten. The solution is suitable for small, medium, and large enterprises.

How are customer service and support?

The support is great.

How was the initial setup?

The initial setup is simple. It can be done in a couple of days. The solution is cloud-based.

What's my experience with pricing, setup cost, and licensing?

The product’s aggressiveness in competing with the competitor's pricing is almost nil. The pricing is always high. I rate the pricing a three and a half out of ten.

Which other solutions did I evaluate?

We can compare the tool with SentinelOne and CrowdStrike. Kaspersky and Trend Micro cannot compete against the solution.

What other advice do I have?

People must always evaluate the product first. They must see the difference in manageability and flexibility of the licenses. They must also consider the manageability and flexibility of the software before making a decision. Overall, I rate the solution a nine out of ten.