Reviews from AWS customer

4 AWS reviews

External reviews

83 reviews
from and

External reviews are not included in the AWS star rating for the product.


    Ashish G.

Value for money for Mid-market segment

  • April 02, 2024
  • Review provided by G2

What do you like best about the product?
This tool is good value for money for the mid-market segment. It is not as mature and doesn't have third-party OEM information on processing the logs or making some information out of Logs like its competitors such as Splunk, Datadog etc but still for the miod market segment whose aim is point products. The requirement is quite simple, is it reliable able to provide a response to query and store/collect the logs reliably - that is can do with 99.9999% availability which is good enough for them.
What do you dislike about the product?
They have kept this product in a cvery close loop instead of partnering with other third-party vendors who ghenerate these logs. If they have solid relationship or have a way to process the information better, avoiding false positives then the tool could have better market share.
What problems is the product solving and how is that benefiting you?
There are loads of data that my organisation is producing and we don't know where the problem is, especially when we are talking about intermittent issues. For such issues, McAfee Enterprise Log Search has been of great help.


    Vijay Mohan

Monitors our systems 24/7, offers robust threat scanning features and easy to use

  • March 27, 2024
  • Review provided by PeerSpot

What is our primary use case?

FireEye offers a great suite of tools. I like its threat analyzer and other features.

We have FireEye Endpoint Security installed on all our desktops, laptops, and servers throughout the network.

It's been crucial to monitor threats 24/7, both external and internal.

It's capable of stopping ransomware at the gateway, preventing malware, and it can even protect against zero-day attacks.

How has it helped my organization?

When I implemented it for one of our clients, it improved their security by almost 70 to 80%. They were using a different solution before, but after implementing Trellix Endpoint Security, they were able to block threats that the earlier solution couldn't handle.

There are only about two to three percent false positives, which isn't much. So, this solution handles false positives quite well and minimizes disruption.

What is most valuable?

The threat scanning is excellent. It uses predictive technology and I can utilize attack data to help us fine-tune our systems and network infrastructure. This protects us against current and future attacks.

Trellix Endpoint Security is a really good product. It comes from industry veterans in the US, so their technology, ease of use, and support are all excellent.

When it comes to real-time analysis capabilities, I've seen many benefits.

Integration is very easy with any system, like firewalls or any network. I can also integrate it with our mobile client.

What needs improvement?

There is room for improvement in the pricing. The price should be improved, it's high.

For how long have I used the solution?

I have a lot of experience with FireEye. It's a solid product with several components. It was acquired by another company.

We've been using it for the last few years.

What do I think about the stability of the solution?

It is a very stable product. It has been a well-known name in the industry for the last 30 years or so.

Trellix has a lot of top investors in the company.

What do I think about the scalability of the solution?

The scalability is very good. We can scale it anytime.

There are around 350 end users in our company.

How are customer service and support?

Support is very good; they have local partners everywhere, so there's no issue there.

For people who still use trellis, there's a toll-free number for each country. Support is accessible 24/7.

If you buy a normal license, gold support is included. There's no need to buy platinum support. The normal support lets you talk to any Trellix Endpoint Security (ENS) technical person 24/7.

How was the initial setup?

The initial setup is very straightforward and user-friendly.

It takes about 20 minutes to configure and run it.

For the deployment process, the product team itself provides a file. I get a download link in an email from the web browser. Once I start downloading, a key will be attached. You provide the names of your domains. We integrate it with Active Directory (AD), so it pulls all the users automatically.

What about the implementation team?

It's a good in-house solution; we can do it yourself. Deploying this doesn't need more than one person.

An L2 technician can manage the installation in a maximum of thirty minutes if they have access to Active Directory (AD) and the main server.

Everything is on the cloud now, so you can control and log in from anywhere, anytime. Alerts via email and mobile are easy to set up.

What was our ROI?

The return on investment is very good if you choose a three-year license.

What's my experience with pricing, setup cost, and licensing?

The license is a bit expensive.

What other advice do I have?

Overall, I would rate the solution an eight out of ten. If you are evaluating this product, go ahead and buy it. It's a very good product. There's nothing lacking – great technology, great approach, great support, great availability.


    Patricio I.

Powerful and robust SIEM solution

  • February 27, 2024
  • Review provided by G2

What do you like best about the product?
- Very efficient for threat prevention and identifying them on the network, providing real-time visibility.
- It has a lightweight and intuitive interface.
- Allows integrations with other McAfee products and third-party products.
What do you dislike about the product?
- Improve the appearance to make administration simpler; despite having a simple interface for end users, the administration is quite cumbersome.
- The brand's support has many opportunities to improve in knowledge and response times; escalations also tend to be quite painful.
What problems is the product solving and how is that benefiting you?
- Centralization of event logs for analysis and control.
- Real-time management for the IT Monitoring and Security area.
- Compliance with corporate security policies.


    Peter Antoni

Offers endpoint protection and generates alarms for events

  • February 19, 2024
  • Review provided by PeerSpot

What is our primary use case?

The tool is primarily used for endpoint detection. When an event occurs on an endpoint, alarms are generated. Colleagues from my company then investigate these alarms based on a playbook. Depending on the playbook and the specific customer contract, actions may be taken, such as informing the customer or implementing endpoint containment measures.

What is most valuable?

The tool has contributed to improving our security posture. While it's just one part of our overall solution, it plays a crucial role. As we continue to evolve, we anticipate it becoming even more important alongside other aspects like network behavior and additional metrics.

The tool's most valuable feature is containment. Last year, a German company faced an external attack. We installed the product on every machine, totaling hundreds of endpoints. The Trellix agent collected information, allowing us to check the entire IT infrastructure.

What needs improvement?

The product is consolidating its portfolio into one product. It is difficult at the moment.

For how long have I used the solution?

I have been using the product for three years.

What do I think about the scalability of the solution?

The solution's scalability is easy. If you have Trellix Endpoint Security on-premises, you need to define how many agents you will support and consider future scaling. Different appliances are available for various scenarios. If you plan to have hundreds or thousands of agents in the future, hardware considerations become important. However, if it is deployed in the cloud, scaling up or down is easily manageable.

How are customer service and support?

My experience with the product's tech support is good.

How was the initial setup?

Trellix Endpoint Security (ENS)'s deployment is not difficult. There are different options available, such as using an on-prem hardware box or a virtual machine in the cloud. Setting up the virtual machine in the cloud is easy, requiring only a connection to the customer's system.

If you plan to install the solution on-premises, you bring the box to the customer and connect it to their system. This involves some configuration, such as opening a port on the firewalls. Deploying agents on the endpoints is straightforward and can be done from a central management point. The entire process takes around a day to configure, and then you are up and running.

What's my experience with pricing, setup cost, and licensing?

Microsoft Defender is not cheap and from a cost perspective, Trellix Endpoint Security (ENS) is a better option.

What other advice do I have?

We integrate the product into our system using API. The information, in the form of messages or alarms, is received in our system. We further process this information and incorporate it into our complete solution.

I rate the product an eight out of ten.


    Felix Nyasudi

Efficient safeguarding of endpoints that provides robust protection, user-friendly features and significant cost savings

  • January 29, 2024
  • Review provided by PeerSpot

What is our primary use case?

It serves as a comprehensive endpoint security solution that goes beyond traditional antivirus by incorporating features such as document scanning for sensitive information, approval workflows for document sharing, patch management, and advanced threat detection using AI and machine learning. It actively monitors various endpoints, including web interactions and email communications, to detect and prevent a wide range of attacks, even those that are not signature-based.

What is most valuable?

One of the standout features of this solution is its encryption capabilities and DLP functionality. It provides a robust defense against cybersecurity threats while offering user-friendly features like notifications and approval prompts. The encryption feature provides peace of mind in the event of a lost or stolen device, safeguarding sensitive conversations and data from unauthorized access. This level of protection significantly reduces the risk of extortion attempts or data breaches, making it a valuable asset for any organization. So far, I haven't experienced any security breaches or attacks.

What needs improvement?

I've encountered minor challenges related to encryption.

For how long have I used the solution?

I have been using it for a year.

What do I think about the scalability of the solution?

We have a user base of over one hundred individuals who use the software.

Which solution did I use previously and why did I switch?

The decision to implement endpoint security software like Trellix is made at a company-wide level, involving discussions and agreements between various entities, including our parent company and potentially other subsidiaries like the one in Sweden. This decision isn't made independently by individual branches like Kenya; rather, it's coordinated and negotiated at a higher level.

How was the initial setup?

I operate within a managed environment where the IT team handles the installation and setup of endpoint security software. Once installed, they provide me with the necessary details, such as login credentials and instructions for changing passwords. My role primarily involves using the machines provided to me, without needing to delve into the setup process.

What was our ROI?

Compared to the solutions, it helped us to save at least ten to twenty percent, if not more.

What's my experience with pricing, setup cost, and licensing?

I would emphasize its affordability rather than merely focusing on cheapness. It provides good value by striking a balance between cost-effectiveness and feature richness.

What other advice do I have?

I would recommend conducting a proof of concept to explore the features firsthand. It's essential to understand what you currently have in place, as that will help determine whether the solution is the right fit for your needs. After that, ensure that the POC is conducted efficiently so that you can make an informed decision about whether to proceed with the solution or consider other options. Overall, , I would rate it an eight out of ten. It's a good solution that meets my needs satisfactorily.


    Harsh Bhardwaj

A stable anti-malware solution that provides DLP (data loss prevention) and DAC (Dynamic Access Control)

  • January 10, 2024
  • Review provided by PeerSpot

What is our primary use case?

Customers use Trellix Endpoint Security as an anti-malware or antivirus solution that provides AI and machine learning features. The solution provides DAC (Dynamic Access Control) and HIPS (host intrusion prevention system) functionality in its firewall module. It also has a web control functionality, wherein we can allow, deny, or choose the category part and work it out.

What is most valuable?

Trellix Endpoint Security provides a single umbrella kind of architecture. A lot of different solutions come under a single umbrella and a single console. The most valuable features of the solution include DLP (data loss prevention), CASB (cloud access security broker) functionality, endpoint encryption, and cloud workload security. The solution also has features like application control, device control, and cloud DLP.

What needs improvement?

The solution's documentation is not streamlined and is in bits and pieces, which should be in a single format.

Trellix Endpoint Security should include the virtual patching feature in the next release.

For how long have I used the solution?

I have been working with Trellix Endpoint Security for one year.

What do I think about the stability of the solution?

I rate Trellix Endpoint Security a nine out of ten for stability.

What do I think about the scalability of the solution?

Trellix Endpoint Security has good scalability. Our customers for the solution are most enterprise businesses and government entities.

I rate the solution a nine out of ten for scalability.

How was the initial setup?

The solution’s initial setup is easy.

I rate Trellix Endpoint Security ten out of ten for the ease of its initial setup.

What about the implementation team?

The solution's deployment on the cloud is very fast because we give the requirement and get the solution. On-premises, the basic initial setup of the server takes about half an hour or one hour.

What's my experience with pricing, setup cost, and licensing?

Trellix Endpoint Security is neither a cheap nor an expensive solution.

On a scale from one to ten, where one is cheap and ten is expensive, I rate the solution's pricing a four out of ten.

What other advice do I have?

I am working with the latest version of Trellix Endpoint Security. We provide our customers with on-premises, on-cloud, and hybrid cloud deployment models for Trellix Endpoint Security.

Overall, I rate Trellix Endpoint Security an eight out of ten.


    DuyNguyen4

Has robust integration with ePO, enabling centralized management capabilities

  • January 05, 2024
  • Review provided by PeerSpot

What is our primary use case?

We use the product for EDR purposes.

What is most valuable?

The product has robust integration with ePO (ePolicy Orchestrator), offering centralized management capabilities. It also allows multifunctionality within a single platform. They offer endpoint and NLP protection as well.

What needs improvement?

The platform needs improvement in terms of handling heavy databases. We encounter database unavailability for a prolonged period. Its integration capabilities with security platforms like FireEye could be enhanced.

For how long have I used the solution?

We have been using Trellix Endpoint Security for over a decade.

What do I think about the stability of the solution?

It is a stable product.

What do I think about the scalability of the solution?

We manage around 20,000 endpoints for our enterprise customers. It is a scalable product.

How are customer service and support?

The technical support works fast and is knowledgeable and customer-friendly.

How was the initial setup?

We have to follow a step-by-step process to implement Trellix Endpoint Security. It can be deployed in the cloud and on-premises.

What about the implementation team?

I recommend product deployment assistance from a consultant, distributor, or reseller.

What's my experience with pricing, setup cost, and licensing?

Trellix Endpoint Security is an inexpensive platform.

What other advice do I have?

I recommend Trellix Endpoint Security to people looking for endpoint protection. I rate it a nine out of ten.


    Durai M

Endpoint Security solution that protects the productivity with a common service layer and our new anti-malware core engine that helps reduce the amount of resources and power required by a user's sys

  • January 03, 2024
  • Review provided by PeerSpot

What is our primary use case?

It is exclusively for Endpoint security. Besides that, we have subscribed to additional features such as MDX for mobile security and recently added ESL. Previously, we had Trend Micro, and at times we utilized it for malware. Comparing the three tools, I would recommend sticking with Trend Micro or Malwarebytes.

What is most valuable?

Trellix Security Endpoint can promptly isolate any host machines directly from the console. If alerts are received and isolation is necessary, it can be accomplished through the console. The console itself holds significant value, accessible through a browser and allowing remote actions via cloud login.

What needs improvement?

If there's a possibility for remote assistance or investigation support in the future, it would be beneficial. Currently, we use another remote software for such purposes. If this feature could be included in the next version, that would be an improvement. The feature is called Remote Administration.

I'm somewhat satisfied, but there's an issue I recently encountered. When attempting to scan a suspected host machine, Symantec Endpoint Security did not provide any alerts. However, when we installed Malwarebytes and ran a scan, it detected a threat that wasn't identified by Symantec. We raised this concern with the team for resolution, and the investigation is still ongoing.

For how long have I used the solution?

I have used Trellix Endpoint Security for the last two years.

What do I think about the stability of the solution?

It is stable and I would rate it 8 out of 10.

What do I think about the scalability of the solution?

Scalability is 8 out of 10.

How are customer service and support?

The issue with technical support lies in the response time. When submitting a complaint, there is a delay, sometimes taking one or two days for a response. This extended timeframe is considered quite lengthy.

How was the initial setup?

The initial deployment of Trellix Endpoint Security involves some time to install agents on host machines. However, once in use, adding new versions and deploying agents to GPO becomes straightforward. It's possible to manually install agents on various devices, and the current process of deploying agents through GPO policies typically takes around ten to fifteen minutes per agent. The duration may vary based on internet connectivity, and it's generally faster when the machine is on the network.

I would rate it 8 out of 10 and it is very straightforward.

What's my experience with pricing, setup cost, and licensing?

It is reasonably priced.

What other advice do I have?

I would recommend it. I rate the solution an eight out of ten.


    Hitesh Dand

A cloud solution for security purposes but performs slowly during usage

  • December 06, 2023
  • Review provided by PeerSpot

What is our primary use case?

We use the solution for security purposes.

What is most valuable?

The solution is valuable for security aspects.

What needs improvement?

The solution should respond faster. Whenever Trelix runs, the system slows down.

For how long have I used the solution?

I have been using Trellix for two years. We are using the latest version of the solution.

What do I think about the stability of the solution?

The product’s stability is good.

I rate the solution’s stability a seven out of ten.

What do I think about the scalability of the solution?

The solution is scalable. Around 3,000 users are using this solution.

I rate the solution’s scalability an eight out of ten.

How are customer service and support?

Technical support is good. They respond faster.

How was the initial setup?

The initial setup is simple.

What other advice do I have?

Ten people are required for maintenance.

You should monitor how efficiently the solution functions, how it will impact your system, and how many files will be processed. The more files your system has, the more security time is needed to scan them daily. Due to this, your system may become slower. Trelix ensures the system does not slow down even when Trelix runs in the background.

Overall, I rate the solution a seven out of ten.


    GANESAN K

Protects the productivity of users with a common service layer and our new anti-malware core engine that helps reduce the amount of resources and power required by a user

  • November 29, 2023
  • Review provided by PeerSpot

What is our primary use case?

Previously, before the transition to Trellix, we used McAfee. Following a merger, FireEye now collaborates with McAfee, utilizing its console and threat intelligence.

In terms of endpoint security, I would recommend Trellix Endpoint Security, especially for users prioritizing threat intelligence and seeking an internal solution. Trellix has proven effective in areas such as blocking capabilities, device control, and application control.

What is most valuable?

Trellix Endpoint Security offers robust access protection, addressing major concerns in prevention. It provides both application control and user access control within its access protection features.

What needs improvement?

Recently, Trellix has introduced a CDR, which involves more manual response than automatic. I believe they should enhance the system by adding features like automated response and the ability to create custom playbooks. This is crucial for an EDR solution, and currently, Trellix lacks this feature while other products offer it.

For how long have I used the solution?

I have been using this solution for the past five years.

What do I think about the stability of the solution?

Previously, I would have rated it around ten, but now it's more like seven. They need to enhance the EDR part and put in more effort.

What do I think about the scalability of the solution?

For on-premise implementation, I would rate it a six as there is a need for more scalable options during the initial setup. On the other hand, for cloud implementation, I would give it a nine because it offers enabled scalability options.

How are customer service and support?

I acknowledge their technical expertise in the product, but the support has not been as satisfactory as it was with McAfee. I believe there is a need for improvement, whether it's the team's capacity or response time. Previously, the response time was excellent, but now it has increased, causing frustration among customers and creating potential issues. Reducing this delay would be beneficial.

Which solution did I use previously and why did I switch?

If someone asks for a bundled solution with strong threat detection, I would recommend Trellix because it stands out as the only bundle solution with a decent amount of threat detection. While there are other bundled solutions in the market, Trellix excels in both access and detection capabilities.

How was the initial setup?

Regarding the initial setup of Trellix Endpoint Security, I am accustomed to executing it accurately. I would rate it around 8.5 or 9.I have successfully implemented Trellix Endpoint Security for up to five thousand endpoints, and the process took approximately four days. For smaller enterprises, it can be completed in about one day.

What's my experience with pricing, setup cost, and licensing?

I would rate the cost as four to five, considering it's normal compared to other products. I find it nominal and worth the money.

What other advice do I have?

The support phase needs improvement, specifically in reducing the time taken to respond to calls. Additionally, the EDR functionality in Intelix requires enhancement. While McAfee fulfilled product functionality even without strong support, the introduction of EDR seems to be partial and lacks automated response capabilities. The overall rating for Trellix Endpoint Security would be an eight.