Reviews from AWS customer

4 AWS reviews

External reviews

83 reviews
from and

External reviews are not included in the AWS star rating for the product.


    Aritro Bhattacharjee

AI-driven endpoint protection has given us confidence to work securely from office and home

  • May 10, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for Trellix Endpoint Security Platform is when we are working behind the firewall in the office, where everything is protected, and I don't have to worry about users accessing potentially malicious websites. However, when we bring devices back home to work and we aren't always connected to a VPN, we may unknowingly click on malicious links or download harmful content, which is where Trellix Endpoint Security Platform comes into play by warning users about risky sites and blocking unwanted downloads.

One specific example where Trellix Endpoint Security Platform protected our organization occurred when many users received anonymous emails prompting them to click on suspicious links for surveys or rewards; the AI-driven platform successfully intervened on several occasions, blocking connections that could have allowed hackers access to our network.

What is most valuable?

The best feature of Trellix Endpoint Security Platform, in my opinion, is the AI-driven behavioral analysis because it enables real-time protection without relying solely on predefined signatures, effectively addressing sophisticated threats that try to bypass traditional systems.

The Data Loss Prevention feature, which is one of the key highlights of Trellix Endpoint Security Platform, is crucial because it helps us stop zero-day threats and ensures that our endpoints are protected even if we unintentionally click on harmful content.

The features of Trellix Endpoint Security Platform have greatly improved my day-to-day work; I no longer lose sleep over potential data breaches or ransomware attacks as the solution gives me peace of mind, allowing my users to work from various locations with less concern about security.

A feature I believe is often overlooked is the lightweight agent of Trellix Endpoint Security Platform, which doesn't burden system resources, allowing older machines to run smoothly while still providing robust security measures.

Trellix Endpoint Security Platform has positively impacted my organization by improving productivity because we can focus on our work rather than security concerns; the platform manages our threats effectively, allowing us to devote more time to our actual productivity.

What needs improvement?

At this point in time, I don't foresee any improvements needed for Trellix Endpoint Security Platform, as I am very satisfied with its performance.

For how long have I used the solution?

I have been using Trellix Endpoint Security Platform for almost seven to eight months since we deployed it to protect our endpoints from the sophisticated threats we see each and every day.

What do I think about the stability of the solution?

Trellix Endpoint Security Platform is very stable, with no downtime or issues.

What do I think about the scalability of the solution?

The scalability of Trellix Endpoint Security Platform is excellent; it can easily grow with our organization's needs by simply buying licenses and deploying them.

How are customer service and support?

I am satisfied with the customer support for Trellix Endpoint Security Platform; they have provided the assistance I needed.

I would rate customer support an eight on a scale of one to ten.

Which solution did I use previously and why did I switch?

I have not used a different solution previously.

How was the initial setup?

It was very easy to integrate Trellix Endpoint Security Platform with our other security tools and IT systems; I didn't encounter any complexities during the process.

What was our ROI?

I don't have specific numbers regarding the return on investment at this time, but Trellix Endpoint Security Platform has certainly been beneficial for us.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing for Trellix Endpoint Security Platform has been straightforward, with no unexpected surprises; it is relatively lesser compared to other peers in the domain.

Which other solutions did I evaluate?

I have only identified competitors, but I have not evaluated any other options before choosing Trellix Endpoint Security Platform.

What other advice do I have?

Trellix Endpoint Security Platform handles updates and patches very smoothly and automatically without any challenges that I have to address.

At this point in time, I haven't faced any challenges with policy management or setting up rules within Trellix Endpoint Security Platform.

Trellix Endpoint Security Platform handles threat detection and response fast enough for my needs, as everything is managed automatically without waiting.

I am unable to comment specifically on compliance requirements, but I am certain that Trellix Endpoint Security Platform helps meet our regulations and standards effectively.

Trellix Endpoint Security Platform is the most user-friendly endpoint platform available on the market today for both admins and end-users.

My advice to others looking into using Trellix Endpoint Security Platform is to go for it; you will not regret the decision. I have rated this product nine out of ten.


    reviewer2837214

Centralized endpoint policies have streamlined workstation protection and daily security tasks

  • May 10, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for Trellix Endpoint Security Platform is securing endpoints, specifically computer workstations. I use Trellix Endpoint Security Platform to deploy group security policies, which is a typical task for securing those endpoints or workstations.

What is most valuable?

The best features Trellix Endpoint Security Platform offers allow for quick access to the specific features via the user interface. Quick access to features helps me in my daily work because having it allows me to complete my job quickly, though I don't use a particular feature most often. In just about two or three clicks, I can deploy the group security policies, making it a unique and helpful feature. Trellix Endpoint Security Platform has positively impacted my organization by allowing us to deploy group security policies for multiple endpoints in a matter of a couple of minutes.

What needs improvement?

Trellix Endpoint Security Platform is great the way it is, and I see no need for improvement. There isn't anything, even small, that I think could be improved, including user interface or reporting.

What do I think about the stability of the solution?

Trellix Endpoint Security Platform is stable.

What do I think about the scalability of the solution?

I don't know how Trellix Endpoint Security Platform's scalability is.

What other advice do I have?

I would tell others looking into using Trellix Endpoint Security Platform to go ahead and use the platform. I give Trellix Endpoint Security Platform a perfect score because it has a simple user interface and simple application. I rate Trellix Endpoint Security Platform a 10 out of 10.


    Oodukoya Adokoya Manon

Centralized endpoint security has protected data, simplified audits, and saves daily investigation time

  • May 08, 2026
  • Review provided by PeerSpot

What is our primary use case?

For day-to-day work, I mainly use Trellix Endpoint Security Platform for threat detection across employee devices, unblocking US reports, blocking users from using Bluetooth, and drive encryption. I check the dashboard of the agents daily to know if systems that are currently updated are communicating with the agent.

I rely on Trellix Endpoint Security Platform for detection, threat detection on the dashboard, security events, last communication, and encrypted devices.

For the threat detection feature, whenever you get an alert, you can see the sites users visited and narrow it down to the time, which gives you facts. You are not asking the user and the user is not playing with what you tell them. You are telling the user this is what they did. I have the fact that this is the time they logged into the site, this is how it ended up there, this is how the malicious effect happened, the time it occurred, the link they clicked, the website they used, and the browser they used to access the site. The specific benefits for me are that whenever a user tries to plug in an external drive which is not allowed, we get a pop-up immediately showing the user with the computer name trying to use a plug-in device or external drive which is not allowed. An email is sent immediately to the user to let them know that this is not permitted. The user receives an alert on their end, but even if they are not visible enough or not sensitive enough to see the alert, there is also an email sent to the user stating it is not allowed.

What is most valuable?

One thing that stood out is that I appreciate the fact that Trellix Endpoint Security Platform has centralized management and many reporting features, and it is easy to use. I had training with the vendor just once, and I was able to navigate through everything and carry out health checks on my own, which is very valuable. The dashboard tells you which agents are not compliant and allows you to ping an agent to know when last it communicated. It has the feature that tells you down to the MAC address of the system, which is very useful. I am able to know the current IP address and in some environments, I can know the last time the user communicated with the network and the last IP the person used. I could even drill down to know the department of the user instead of struggling to find it, which is very helpful. The MAC address always tells me the MAC address and the current computer name.

Trellix Endpoint Security Platform makes my work seamless and is a quality platform. Trellix Endpoint Security Platform can do many things that a lot of people do not know about. It can actually do the work of BitLocker and lock your drive. When your system is stolen, the person that steals your system or whoever takes it will not be able to access the drive. It locks, so you need to type in your username with a password before you can access the drive. Without that, the laptop is useless. For port blocking, many people do not know that Trellix Endpoint Security Platform has a feature where you can block your ports and block USB. For management staff, you do not want to block the USB ports or block the Bluetooth from them. There is a template where you can filter the management staff and exempt them from that role.

There was a time a colleague's laptop got stolen, and the good thing was the agent was communicating. We pushed the last subject that was communicating so the people that stole the laptop were not able to access anything. They were later caught, but due to the camera, the laptop was useless for them. The beauty is that all the company's important documents and users' data were kept safe. There was no trespass from anyone because they were not able to access the drive. The only way someone could have accessed it would be to format, but that would mean losing lots of data.

There was a time we were trying to get ISO certification and we were looking for examples to share with the ISO team. We actually used Trellix Endpoint Security Platform to display everything. The compliance section shows you how many systems helped with the compliance of the laptop and how regular the detection has been. It shows all that on the dashboard, which was very impressive. When the ISO examiner saw it, they were impressed by the compliance demonstration. That was one of the reasons that led to our certification. Any time we do the purging to drill down and take out old systems that have not communicated and bring in new ones, it is seamless. I just pull the template, install the agent, and I am good to go. Within a few minutes, I can see it on the dashboard. It captures everything on the system, including the person's name, the username, who logged in, and who logged on to the system next. It saves time because I do not need to search manually or open an Excel sheet for that. We save time doing the inventory in Excel. Whenever we need new inventory, I just export from the Trellix Endpoint Security Platform dashboard straight to my laptop, which is much better than manually inputting.

What needs improvement?

What could be better is the performance impact on some machines and the complexity of configuration.

There was one time I had to wait because it was a different time zone. I was in Nigeria back then and the support was in India, so we had to wait to get in touch. However, it was fantastic. The support representative did a great job, so I commend the customer service team.

A colleague of mine complained once about the interface, saying they do not prefer it because it is a bit overwhelming for newer admins. Perhaps they can improve that, and maybe because the workflow sometimes requires clicking on this to go to that place. It might be better to reduce the workflow complexity. However, for me, it is seamless. I appreciate new technology and exploring new things, and for me, it was a good experience. They could reduce the complexity of the workflow and the policy configuration workflow, which would be good for newer admins.

Trellix Endpoint Security Platform does the work for enterprise security, but there is definitely room for improvement to enhance usability and performance. As for other features, I am thinking that perhaps there could be a feature where instead of some users not preferring to update their system or push patches, Trellix Endpoint Security Platform could push critical patches to workstations. That would be beneficial instead of using another tool for that function. Trellix Endpoint Security Platform could do that, providing one centralized tool that can help and improve the process. The centralization for everything and pushing critical patches would be something the Trellix team can look into.

How are customer service and support?

There was one time I had to wait because it was a different time zone. I was in Nigeria back then and the support was in India, so we had to wait to get in touch. However, it was fantastic. The support representative did a great job, so I commend the customer service team.

There was a time we were trying to get ISO certification and we were looking for examples to share with the ISO team. We actually used Trellix Endpoint Security Platform to display everything. The compliance section shows you how many systems helped with the compliance of the laptop and how regular the detection has been. It shows all that on the dashboard, which was very impressive. When the ISO examiner saw it, they were impressed by the compliance demonstration. That was one of the reasons that led to our certification. Any time we do the purging to drill down and take out old systems that have not communicated and bring in new ones, it is seamless. I just pull the template, install the agent, and I am good to go. Within a few minutes, I can see it on the dashboard. It captures everything on the system, including the person's name, the username, who logged in, and who logged on to the system next. It saves time because I do not need to search manually or open an Excel sheet for that. We save time doing the inventory in Excel. Whenever we need new inventory, I just export from the Trellix Endpoint Security Platform dashboard straight to my laptop, which is much better than manually inputting.

How was the initial setup?

I joined when Trellix Endpoint Security Platform was already set up, so I do not know much about the pricing, setup cost, and licensing. I was a new admin and it was seamless for me. I found it easy to understand the workflow, which is brilliant.

Which other solutions did I evaluate?

I joined the company when they were already using Trellix Endpoint Security Platform, so I just started using it immediately. I did not know if there was any other evaluation. Probably the company had to evaluate other vendors to see which one was best, but for them to choose Trellix Endpoint Security Platform, it was a good choice.

What other advice do I have?

For a startup company that does not want to hire a security team, the IT support person can just handle Trellix Endpoint Security Platform. It reduces the cost of hiring a whole security team for this purpose. Trellix Endpoint Security Platform places a dashboard that your IT support person can use, which saves costs. I was managing it before the company set up a security team when there was not one in place.

I always recommend Trellix Endpoint Security Platform to anybody and any startup company. I have been promoting Trellix Endpoint Security Platform because anything that is good for me, I want other people to also experience it. The advice I give to other people is that they should not hesitate to try it because it is a good platform and they will not regret it.

It is awesome working with Trellix Endpoint Security Platform every time and every day. It makes work seamless, faster, and saves time. I do not have to struggle to navigate it. The visibility is narrowed down to all the systems and all the information I need. The company just needs to improve the experience for newer admins, and that is all. I am giving this review a perfect rating of ten out of ten.


    reviewer2837076

Timeline monitoring has improved incident investigations but user experience still needs major changes

  • May 08, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for Trellix Endpoint Security Platform is SOC monitoring for the whole endpoint plus network monitoring of the client systems.

A specific example of how I use Trellix Endpoint Security Platform for endpoint or network monitoring in my daily work is that we had alerts set up through rules via the SOC, and whenever something went wrong, it gave a flag via those rules that we set up on the SIEM. Via the SIEM platforms, we would get an alert for a malicious IP address or a quarantine mail or some file that is on someone's system which is malicious with a malicious hash value, and we used to investigate those.

What is most valuable?

The best features Trellix Endpoint Security Platform offers would be the timeline monitoring and the detailed parsing of the metafields, which were accurate when we wanted to know what time it had occurred, what the file name was, and what the hash value was. The parsing is good.

The timeline monitoring specifically helps me in my day-to-day work because it definitely makes the investigation faster for us. We get to see and open up the timeline of the users and the endpoints, and we get to see what they have done, how they have done it, and if a certain file or the certain IOC has occurred before in the history.

Trellix Endpoint Security Platform has not really impacted my organization positively. Some of the features that it had did not work quite well, for which we had to switch again. Trellix definitely came with its down points, as it had issues with the patches and the update rollouts, and some of the features did not work.

What needs improvement?

Trellix Endpoint Security Platform can be improved by having more user-centric features. Competitors like CrowdStrike and Microsoft Defender have a very user-centric UI, and it is easier to see the visibility is much more. The menus and the dashboards are interactive, they have some response, some touch and feel to it. Trellix does not have either of those features, so it is very bland, and the simple things would be done after taking the long route, with menus within menus. This definitely needs to improve, plus the customer support.

The issues with patches and rollouts include a scenario where we had this issue whereby when we wanted to import multiple alerts for reports, we could only select 50 or 60 at one time. Whereas the other SIEMs give you more flexibility on selecting the bunch of reports and just exporting them directly, which was a limiting factor and it definitely slowed down the whole automation of the process. When we tried to reach out to the team, they did not help us with the rollout.

There are multiple other improvements needed for Trellix Endpoint Security Platform. The rules are a bit hard to tweak, and to tweak a rule, you would have to go very deep into the system, which again leads to more alerts, more detections, and ultimately more fatigue within the SOC analysts. It basically needs a lot of fine-tuning from the developers, but unfortunately, they are not open to feedback.

For how long have I used the solution?

I have been using Trellix Endpoint Security Platform for one to one and a half years.

What do I think about the stability of the solution?

In my experience, Trellix Endpoint Security Platform was stable for the most part, but sometimes during the off-hours, they would have downtimes for 30 minutes to one hour, and sometimes they had some issues in the connectors, and we had to contact the support. Sometimes it was a mess, and I have never seen that with other SIEM providers.

What do I think about the scalability of the solution?

Trellix Endpoint Security Platform is not very scalable because it is a legacy system, and we have to go very deep in order to pop connectors and all. It is not readily expandable.

How are customer service and support?

The customer support is the worst part of Trellix Endpoint Security Platform. They do not support, they do not reply on time, and they take a lot of time when they have a ticket open.

Which solution did I use previously and why did I switch?

I did not previously use a different solution, but after this, we switched to a different solution. I cannot reveal the name because of the NDA, but we had to switch because of the issues that I mentioned before.

What was our ROI?

I have seen a return on investment with Trellix Endpoint Security Platform because we had Trellix for two years continuously and the deal was renewed, so I believe they definitely saw the profit.

Which other solutions did I evaluate?

Before choosing Trellix Endpoint Security Platform, we had evaluated other options like Palo Alto, CrowdStrike, and Defender, and based on the pricing factor, I think we went for Trellix.

What other advice do I have?

My advice to others looking into using Trellix Endpoint Security Platform is if you are looking for a cost factor, then you can go for it, but know that it will come with its limitations in the UI, customer support, and the scalability. I would rate Trellix Endpoint Security Platform overall as a six out of ten because Trellix has more issues being a legacy SIEM compared to other SIEMs in the market which are its competitors. Being someone who has worked on multiple SIEM platforms and environments, I know the differences.


    Tacio Veiga

Data loss controls have protected sensitive information and prevent costly compliance penalties

  • May 08, 2026
  • Review from a verified AWS customer

What is our primary use case?

My main use case for Trellix Endpoint Security Platform was the DLP functions, and I was responsible for implementing the rules and analyzing situations and conducting investigations regarding data loss.

I can provide a specific example of how I used the DLP functions for an investigation. I received many alerts daily, and we could identify numerous situations regarding data leakage. In these situations, we could take actions to address them. Additionally, we could implement many blockages on the network and on computers to prevent data leakage.

We experienced a situation where Outlook was updated to the latest version, and we could not see some documents passing through this application because we had to wait a long time for an update from Trellix. This was a negative experience with Trellix, but in general, it was a very good application and it worked very well.

What is most valuable?

Trellix Endpoint Security Platform's best features include functions regarding endpoint DLP, which was beneficial because we had many functions covered, such as Bluetooth and removable devices. It also covered many other environments like cloud, emails, and other applications on the web. Trellix Endpoint Security Platform positively impacted my organization because it was a good application that we used extensively. I believe it remained at my last company for more than seven or eight years, and this was valuable because we could create many personalized DLP rules and prevent several problems that could have resulted in fines or fees from companies or the government regarding LGPD.

Daily, we had a thousand attempts of data leakage, and we could prevent many situations. While I do not have any specific number now since I no longer work at the company, I truly believe it was a very good application.

What needs improvement?

I think Trellix Endpoint Security Platform's live application could be more user-friendly. When we tried to find some rules or specific configurations, it was sometimes difficult, and I believe they could be centralized in a specific location rather than being separated by topic, as it was confusing at times.

For how long have I used the solution?

I have been using Trellix Endpoint Security Platform for four years.

What do I think about the stability of the solution?

Trellix Endpoint Security Platform is stable. The situation I mentioned about the Outlook client was an issue, but I believe it was the only problem we encountered.

What do I think about the scalability of the solution?

The scalability of Trellix Endpoint Security Platform is great as it was really easy to scale up as my organization grew.

How are customer service and support?

The customer support for Trellix Endpoint Security Platform has been good. We did not experience many problems regarding this, and during the time we had more issues, I specifically attended a convention in Las Vegas, where we could tell the CIO of the company about these problems and we were listened to.

Which solution did I use previously and why did I switch?

I did not use a different solution before Trellix Endpoint Security Platform.

What was our ROI?

I have seen a return on investment. I believe the cost was approximately eight million per year, and in this situation, we avoided fees of approximately fifty million per year because of the situations that were prevented by blockages, so in this case, it really paid for itself.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing was good.

Which other solutions did I evaluate?

Before choosing Trellix Endpoint Security Platform, I evaluated other options such as Microsoft Endpoint.

What other advice do I have?

I wish I had used more the network DLP, which we did have at the last company I worked at, but we could not use the network DLP specifically because of an architecture problem. My advice to others looking into using Trellix Endpoint Security Platform is that you can use it with the assurance that it will work well. I give this review a rating of eight out of ten.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    reviewer2837028

Centralized endpoint control has saved admin time but client communication still needs improvement

  • May 08, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for Trellix Endpoint Security Platform is predominantly client endpoint protection. Within the suites, there are various components such as web security, and depending on the suite, there could be EDR functionality and many other things that their suites encompass.

What is most valuable?

The best features Trellix Endpoint Security Platform offers are the advanced capabilities of their management platform and the effectiveness of the various configuration settings that can be applied, which for specific customers is really useful to have.

The advanced management capabilities of Trellix Endpoint Security Platform allow you to manage different sub-networks and apply various policies with specificity in terms of what user will have what specific policies. Trellix Endpoint Security Platform is also very unique when it comes to companies having various locations where not every location should have the same policy. Those kinds of things are really unique about Trellix Endpoint Security Platform.

Trellix Endpoint Security Platform has had a positive impact on my organization and clients in the past, but lately, some customers tend to move on. When Trellix Endpoint Security Platform had a positive impact, the outcome I saw was time saved, because ultimately the solution was doing its job.

What needs improvement?

Trellix Endpoint Security Platform needs to sort out their issues with the organization and outreach to clients to improve their platform because they have been lagging behind.

The needed improvements for Trellix Endpoint Security Platform are more a company decision and not so much a product decision.

For how long have I used the solution?

I have been selling Trellix Endpoint Security Platform for all of the time that I have been here.

What do I think about the stability of the solution?

Trellix Endpoint Security Platform is somewhat adequate in terms of stability, but it depends on the size of the client.

What do I think about the scalability of the solution?

Trellix Endpoint Security Platform is very scalable. This is why they still keep winning in some very large organizations.

How are customer service and support?

The customer support for Trellix Endpoint Security Platform is very good. I would rate the customer support of Trellix Endpoint Security Platform an eight.

What was our ROI?

I have not necessarily seen a return on investment with Trellix Endpoint Security Platform. These sort of metrics would have been very useful probably ten or fifteen years ago. Now, it is simply a matter of needing a solution that does its job correctly and saves the IT team time to get on with other work.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing for Trellix Endpoint Security Platform is very positive. The licensing is straightforward, pricing is very competitive, and margins are good.

Which other solutions did I evaluate?

Before choosing Trellix Endpoint Security Platform for my clients, I evaluated options such as Sophos and Symantec back in the days, but now there are many other vendors, such as SentinelOne and CrowdStrike.

What other advice do I have?

My advice to others looking into using Trellix Endpoint Security Platform is that depending on their requirements and how complicated they may be, Trellix Endpoint Security Platform is definitely worth reviewing. Most importantly, it matters with whom they are reviewing it and who will be the supplier. I would rate this review a seven.


    PankajKumar24

Advanced threat prevention has strengthened incident response and customized security workflows

  • March 05, 2026
  • Review from a verified AWS customer

What is our primary use case?

Regarding the use cases for Trellix Endpoint Security Platform, if we are going for the POC for the customer, we have multiple types of performed use cases, such as credential dumping, lateral movement of the EPP solution, ICAR performing, USB blocking, and we can allow specific USBs from Trellix.

We are able to exclude specific USBs, and there are seven to eight use cases we are performing for the customer environment.

What is most valuable?

The biggest advantage of Trellix Endpoint Security Platform is the ATP solution, which provides advanced threat prevention.

Machine learning algorithms are available in the product as part of the threat anti-malware, including predictive machine learning and behavioral analysis, which are integral to the anti-malware module of EPP.

In terms of my experience with the machine learning algorithms for analysis and threat detection, we are analyzing logs provided by Trellix, but we are not able to conduct specific machine learning analysis on those logs.

The automated response mechanisms in the products help with incident management because we have to create playbooks in Trellix console for automation, which we need to enable.

The customizable dashboard of Trellix Endpoint Security Platform definitely contributes to the decision-making process, as we customize the dashboard according to customer requirements.

When it comes to integration aspects, we are able to integrate Trellix Endpoint Security Platform with SIEM or SOAR solutions using the ePO console, which enhances threat detection capabilities.

Reporting and analytics aspects have an impact on security posture assessment, as we are able to fetch reports in the ePO console customized according to customer requirements for downloading and sending via email.

What needs improvement?

There is a need to enhance the expertise of the support portal and support engineers for Trellix Endpoint Security Platform, but overall, everything else is acceptable.

The support could be improved, particularly concerning response time.

What do I think about the stability of the solution?

Trellix Endpoint Security Platform is stable.

What do I think about the scalability of the solution?

Trellix Endpoint Security Platform is a scalable product.

There are no limitations; the solution is easily scalable.

How are customer service and support?

I would rate the support for this product as seven points out of 10.

How would you rate customer service and support?

Positive

What about the implementation team?

In terms of implementation and selling, both Trellix and Trend Micro have similar price quotes for our customers, and the implementation cost does not come from the OEM, as we provide professional services from our organization.

In terms of implementation, I would say it is equally straightforward for both Trellix XDR and Trellix Endpoint Security Platform.

What was our ROI?

Regarding return on investment for Trellix Endpoint Security Platform, my assessment is a 10 to 15 ratio for ROI.

When I mention 10 to 15, I am talking about money saving as the percentage.

What's my experience with pricing, setup cost, and licensing?

If we are talking about price for Trellix Endpoint Security Platform, for small or SMB businesses, the price is quite high, but for enterprise levels with 5,000 to 3,000 users, the price is affordable.

Which other solutions did I evaluate?

Comparing Trellix Endpoint Security Platform to other similar products such as Trend Micro, I see some differences.

The difference can relate to the selling perspective or implementation.

What other advice do I have?

Based on everything that I have told you about the products, I give Trellix XDR nine points as a reseller, with 10 points being the best.

We have a mixed model that operates both on-cloud and on-prem.

My overall rating for this review is 9 out of 10.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    Abhimanyu Das

Threat detection is effective, and the solution provides good control over device access, but it still needs better troubleshooting options for agent-related issues.

  • November 17, 2025
  • Review from a verified AWS customer

What is our primary use case?

My main use case for the Trellix Endpoint Security Platform is primarily from an antivirus perspective. We have approximately 1,200 servers where the Trellix Endpoint Security Platform is deployed.

Previously, we used it mainly on legacy servers, but now we have implemented the latest version across our Windows Server 2006, 2020, and 2022 environments.

Additionally, we rely on the Trellix Endpoint Security Platform for daily health checks, including all vulnerability assessment (VA) activities. At times, certain exclusions are also required depending on the application or server requirements.

How has it helped my organization?

Trellix Endpoint Security Platform has improved our organization in several ways. It has enhanced our overall security posture by providing stronger antivirus protection and better visibility across all endpoints. With around 1,200 servers onboarded, we have seen a noticeable reduction in malware incidents and faster detection of potential threats.

The platform’s centralized management has also improved operational efficiency. Daily health checks, VA activities, and policy enforcement are easier to manage, which has reduced manual effort. Additionally, the ability to configure exclusions and fine-tune policies has helped maintain both performance and security.

Overall, Trellix Endpoint Security Platform has provided more stability, improved endpoint compliance, and strengthened our preventive security controls.

What is most valuable?

The best features that the Trellix Endpoint Security Platform offers, and which stand out to me, are its reporting capabilities, exclusion policy handling, and detection features.

In terms of reporting and exclusion policies, the platform provides multiple options to generate customized reports, allowing us to filter data and extract exactly what we need. We receive daily requests from the client side for exclusions or process additions, and Trellix makes it easy to manage these efficiently.

Trellix Endpoint Security Platform also provides several advanced capabilities, including EDR for comprehensive threat hunting and attack investigations, along with modules for firewall, web control, ATP, Exploit Prevention, real-time scanning, and on-demand scanning. These features work together to strengthen the overall security of our environment.

Overall, Trellix Endpoint Security Platform has positively impacted our organization by offering strong protection against malware and ransomware. It has significantly improved our ability to detect and block threats in real time, while features like ATP and Exploit Prevention help reduce malware incidents and mitigate zero-day attacks.

What needs improvement?

From an improvement perspective, I am looking for a way to troubleshoot situations where the endpoint agent becomes corrupted and requires reinstallation, as there is currently no option to resolve these issues without rebooting the system.

I give it a rating of seven because, in today’s scenario, the portal is complicated to navigate. The Trellix Endpoint Security Platform dashboard is somewhat difficult to understand, and it takes considerable time to familiarize oneself with the tools and policies compared to other solutions.

For on-premises deployment, I would also like to highlight that the architecture is quite complex, which is an area Trellix Endpoint Security Platform should consider improving.

For how long have I used the solution?

I have been working in my current field for almost seven years.

What do I think about the stability of the solution?

In terms of scalability, the solution performs well overall. It is capable of handling a large number of endpoints without significant performance issues. However, as the environment grows, the complexity of managing policies, agent communication, and server load also increases. With on-premises deployments in particular, scaling requires careful planning of resources, database capacity, and infrastructure components.

While the solution is scalable, simplifying the architecture and improving the responsiveness of the management console would make it even more efficient for large enterprises.

What do I think about the scalability of the solution?

In terms of scalability, the solution performs well overall. It is capable of handling a large number of endpoints without significant performance issues. However, as the environment grows, the complexity of managing policies, agent communication, and server load also increases. With on-premises deployments in particular, scaling requires careful planning of resources, database capacity, and infrastructure components.

While the solution is scalable, simplifying the architecture and improving the responsiveness of the management console would make it even more efficient for large enterprises.

How are customer service and support?

Customer support for Trellix Endpoint Security Platform responds quickly, but if there are unresolved issues, they escalate it, which can sometimes be difficult.

Which solution did I use previously and why did I switch?

I previously used CrowdStrike, Defender, Trend Micro, and Symantec, and I chose Trend Micro because it had the option to handle the console easily.

How was the initial setup?

Trellix Endpoint Security Platform is deployed in a hybrid and on-premises setup; however, we are facing many issues on-premises.

What about the implementation team?

We implemented the solution through a vendor team. Their level of expertise was good, and they handled the deployment efficiently. However, in some cases, deeper troubleshooting required escalation to senior engineers, which slightly impacted the overall experience. Overall, I would rate their expertise as above average.

What was our ROI?

I have seen a return on investment; I can say that we have saved money and required fewer employees because of the complicated architecture.

What's my experience with pricing, setup cost, and licensing?

My experience with the pricing, setup costs, and licensing has been positive. Compared to other tools, the Trellix Endpoint Security Platform offers lower overall costs.

One of the strongest advantages of Trellix Endpoint Security Platform is its cost-effectiveness.

Which other solutions did I evaluate?

I have evaluated other options based on price and the mechanisms used by Trellix Endpoint Security Platform.

What other advice do I have?

If you are looking for a cost-effective solution, the Trellix Endpoint Security Platform is a good option, and it also offers support for legacy servers.

My company has a business relationship with Trellix Endpoint Security Platform as a partner.

Overall, I would rate this product seven out of ten.


    KarthiS

Ensures seamless protection for diverse industries

  • May 15, 2025
  • Review provided by PeerSpot

What is our primary use case?

Our customers primarily use Trellix Endpoint Security (ENS) only for endpoint security, with some cases where they prepare for Data Loss Prevention (DLP).

The main use case for Trellix Endpoint Security (ENS) is to protect the end user and to block USB and other devices, which is why they prefer to go with Trellix. They also use it for DLP to protect email and other things in their environment.

What is most valuable?

They find Trellix Endpoint Security (ENS) easy and user-friendly for their environment, which is why they choose Trellix. Additionally, it has a more manageable console compared to other products, which they felt were more difficult.

For incidents, we don't handle them directly because we provide the services for installation and management. We have our own SOC team that manages Trellix Endpoint Security (ENS), offering support. Any incidents that occur are taken care of via email for our customers.

What needs improvement?

Some customers feel that the Trellix Endpoint Security (ENS) agent consumes more memory and resources in their environment, which is a major issue we are facing. This causes their endpoints to consume more CPU under subscription, resulting in a feeling of slowness in their processes.

For how long have I used the solution?

I have been working with Trellix Endpoint Security (ENS) for the last two years.

What was my experience with deployment of the solution?

Trellix Endpoint Security (ENS) is easy to scale and we have not encountered any scalability issues.

The solution is easier to set up compared to Trend Micro. I would rate the setup of Trellix Endpoint Security (ENS) about a nine out of ten.

It takes approximately two to three days to deploy Trellix Endpoint Security (ENS) since we just need to provide the consoles, deploy the agent and their policies, and verify that the agents are functioning.

What do I think about the stability of the solution?

Trellix Endpoint Security (ENS) is a stable solution, and we have not faced any stability issues.

What do I think about the scalability of the solution?

Trellix Endpoint Security (ENS) is easy to scale and there are no issues with scalability.

How are customer service and support?

We are very happy with the technical support we receive from the Trellix team. I rate the support from Trellix a perfect ten.

How was the initial setup?

Trellix Endpoint Security (ENS) is not challenging to set up and is easier to implement compared to Trend Micro. I would rate the setup about a nine out of ten.

It takes approximately two to three days to deploy Trellix Endpoint Security (ENS) since we just need to provide the consoles, deploy the agent and their policies, and verify that the agents are functioning.

What other advice do I have?

Currently, we are working with Trellix Endpoint Security (ENS) and Trend Micro, focusing only on Trellix.

I am not entirely sure about the integration capabilities Trellix Endpoint Security (ENS) provides, and I am not very familiar with those features either.

For those wanting to use Trellix Endpoint Security (ENS), I recommend it for protecting their environment in an easy way. It is straightforward to know and features no complicated deployment, and we also appreciate the support we receive.

My total rating for Trellix Endpoint Security (ENS) is a ten out of ten.


    VenkatKrishnan

Long-term compatibility boosts performance while integration support needs improvement

  • May 13, 2025
  • Review provided by PeerSpot

What is our primary use case?

We use it mainly for two purposes: one is for encryption of the laptops, and the other is for endpoint DLP.

Our biggest advantage is the compatibility with a variety of laptops. The compatibility with old laptops and new laptops is the most significant advantage.

We are not using the response automation functionality because we're only using it for encryption and for DLP, so there is no response automation we are utilizing.

What is most valuable?

The compatibility with a variety of laptops is our biggest advantage. The system works with both old laptops and new laptops, which is the most significant benefit.

We have to maintain it because when new versions of Windows are released, we must test the compatibility and functionality.

What needs improvement?

The main area for improvement is the integration with Microsoft Windows Hello, which includes Face ID or fingerprint-based authentication. Currently, they don't support either, so users have to type in the username and password. It doesn't support Microsoft Windows Hello authentication.

For how long have I used the solution?

I have been using Trellix Endpoint Security for more than five years now.

What was my experience with deployment of the solution?

The potential challenge while deploying Trellix Endpoint Security is that multiple agents are needed for successful deployment. If one of the agents doesn't deploy, the installation is not successful. A base agent is needed, then a protection agent on top of it. If the base agent fails, the protection agent will not get installed, whereas other products don't have multiple agents to install, just one agent and it's complete.

What do I think about the stability of the solution?

I think it's stable enough; earlier it had glitches, but now it's stable enough.

They have fixed the previous issues.

What do I think about the scalability of the solution?

Trellix Endpoint Security is scalable; there are no issues there.

How are customer service and support?

The technical support from Trellix is average - it's neither good nor bad. I would give it five or six points out of ten for support.

Which solution did I use previously and why did I switch?

We are not using threat detection capabilities from the McAfee set of products or Trellix products.

What was our ROI?

AI would be needed, especially because of the data protection part. There are two parts: one is the encryption which is standard and no AI is needed, but the data protection part could benefit from AI to detect new types of data and protect it.

What's my experience with pricing, setup cost, and licensing?

I don't have visibility on pricing because it is negotiated by a different team, as I look after the technical side.

Which other solutions did I evaluate?

I have not seen anything connected with AI in Trellix.

What other advice do I have?

The implementation is neither straightforward nor very difficult. It's somewhere in between.

It has more to do with enhancements of features and functionality. There's nothing much which has come out, and it's been a product that we are running for so long with not many support cases that open up for us.

I would rate Trellix Endpoint Security overall as six and a half out of ten, closer to seven rather than six points.