Try our new research platform with insights from 80,000+ expert users

Abnormal Security vs Trellix Collaboration Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Abnormal Security
Ranking in Email Security
4th
Ranking in Secure Email Gateway (SEG)
3rd
Average Rating
9.4
Reviews Sentiment
7.5
Number of Reviews
11
Ranking in other categories
No ranking in other categories
Trellix Collaboration Security
Ranking in Email Security
16th
Ranking in Secure Email Gateway (SEG)
8th
Average Rating
8.8
Reviews Sentiment
6.9
Number of Reviews
19
Ranking in other categories
Instant Communications Security and Compliance (3rd), AI Security (9th)
 

Mindshare comparison

As of December 2025, in the Email Security category, the mindshare of Abnormal Security is 6.0%, down from 6.2% compared to the previous year. The mindshare of Trellix Collaboration Security is 1.9%, down from 2.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security Market Share Distribution
ProductMarket Share (%)
Abnormal Security6.0%
Trellix Collaboration Security1.9%
Other92.1%
Email Security
 

Featured Reviews

William Schellhaas - PeerSpot reviewer
Senior Director of IT at Crunch Fitness West Florida and Atlanta (CR Fitness)
Provides comprehensive email security management, effective in detecting a wide range of email threats
The ideal scenario would be for Abnormal Security to work in tandem with Microsoft to analyze incoming emails. This means Abnormal Security would assess emails before they reach my inbox, even if it happens slightly after Microsoft's initial scan. Currently, the process isn't seamless. Microsoft analyzes emails and delivers legitimate ones to my inbox. Abnormal Security then scans these delivered emails, and if flagged as malicious, they disappear. This creates a problem for our ticketing system mailbox, which is a third-party service. Emails sent to the ticketing system address are automatically forwarded by Microsoft. However, if these emails are malicious, Abnormal Security only cleans them from my Outlook mailbox after they've been forwarded. Since we primarily rely on the ticketing system and not the Outlook mailbox, these malicious emails still reach the ticketing system.
FA
Cybersecurity Engineer Lead at Johnson & Johnson
Real-time threat response has boosted detection accuracy and reduces manual investigation work
I have had challenges in the past with Trellix Collaboration Security for implementation because of issues related to compatibility. Since we worked in a global company with different operating systems, it was necessary to create different plans and different actions to implement the product.One thing I really do not prefer in Trellix Collaboration Security is not related to the console. I am a McAfee fan since the McAfee tool, and I find the console of Trellix Collaboration Security to be very user-friendly and easy to use. However, I do not know if it is related to the architecture of the product. Of course, we have modern threats based on behaviors and zero days. We have today CrowdStrike and SentinelOne, where we have better results based on threats and behavior, where it is possible to create a simulation environment based on the file detected and based on it, confirm if it really is malicious or not. In general, I believe Trellix Collaboration Security improved the console based on the last console of McAfee, but I think it is possible to improve more. It really is a good product, but in my view, it needs to improve detection based on behaviors. Regarding automations, I have implemented Trellix Collaboration Security here at Johnson & Johnson, and I implemented it in the same situation at Santander Bank and BNP Paribas Bank, where I created automations to export data for different metrics, including malicious detections, compliance, baselines, scans, last scans based on the seven days, and checking of patterns. I export everything to CSV files. Based on that, I create Power BI dashboards, and in these Power BI dashboards, I have a more executive view for different metrics to provide to myself, my manager, or director to create an executive view based on it. Another important point we use here at Johnson & Johnson and other companies is a data hub or a SIEM solution, such as Elastic or ArcSight, where we select some logs to be sent and use it to build reports and metrics.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Initial auto-remediation allows us to auto-remediate before the email lands in the end user's inbox for a split second."
"I have never encountered any stability issues with Abnormal."
"Their ability to take things out of the mailbox and catch things much faster than users is excellent."
"I like Abnormal's threat protection with auto-remediation, but I also love its abuse mailbox feature, which automatically responds to the end user. That feature has a super-valuable security component and helps improve the user experience."
"What I like about Abnormal Security is that it notifies me if any of my partners or suppliers are experiencing a security breach by analyzing their database and identifying potential cyber threats."
"Ease of use is undoubtedly one of the most valuable features of Abnormal Security."
"It protects us from being business email compromised, which is invaluable for maintaining our security."
"The features that appeal to me most are the combination of auto-remediation and Detection 360."
"The initial setup is simple."
"The product helps reduce the number of malicious emails reaching the user's inbox."
"We can control this solution from the cloud and are able to access it from wherever we are."
"What I find most valuable with the solution is that it can integrate with cloud solutions, such as Google and Microsoft. Additionally, the solution is easy to use."
"FireEye is good for malware depicting and security."
"I rely on Trellix Collaboration Security because the sensors are highly reliable and high-performance sensors that can handle traffic efficiently."
"The solution's most valuable feature is its simplicity. It's very user-friendly."
"Before installing, consider potential challenges with system performance, especially when integrating multiple tools, which could slow down performance."
 

Cons

"There could be more selectable options and more granular selections available."
"The biggest pain point for us is the lack of support for on-premise email systems."
"One feature I'd love to see is outbound scanning."
"I would like to have the ability to customize the auto-remediation feature."
"Abnormal should add more automatic reports. I have an open request to our account team for more notification and report types that can be sent automatically. For example, they have an awesome report that gets sent weekly, and I also want them monthly, so I don't need to do so much adding up when my director wants numbers over time."
"I, as such, do not have anything that I do not like or would like to add, but you could argue that because they are doing it API-based, there is a chance that something could slip through temporarily before they are able to pull it out. In theory, it could happen just because of the nature of the system. They are not in line with the delivery of the mail. They are kind of asynchronous, which is a pro as well as a con. If it is synchronous, then I know it would always stop them, but because it is asynchronous, things could get through temporarily or because of some system issues on the Microsoft side or their side. It is the nature of the beast, but it is a little bit of a con."
"There could be room for improvement in enhancing integration with other cybersecurity tools."
"When we're working on something as engineers, and we find an idea or a method of doing something that would be greatly improved by doing it another way, there should be an ability for me to click the ideas button, type in an idea that I have, and submit it to a product review team or developers to have them think through the process a little bit more."
"If they want to be the primary or best solution, they need to have better email management features."
"I chose a nine out of ten because some improvements are required, especially concerning East-West traffic or zero-day vulnerabilities."
"I would like to see this solution become more flexible."
"Trellix Collaboration Security can be improved by making the reporting and analysis tools more detailed."
"There is a need for improved integration with totally different products, such as a rapid server."
"The spam detection feature could be better."
"FireEye needs single sign-on. They say it's on their roadmap. They should also implement support for Microsoft Authenticator app for 2FA."
"The solution must provide features to scan QR codes for threats."
 

Pricing and Cost Advice

"The license is based on the user count, so the number of users that have an email address in the organization."
"Overall, we'd certainly prefer lower pricing, but Abnormal Security doesn't seem unreasonable compared to similar offerings in the market."
"Abnormal Security, on the other hand, provides the same level of functionality for just over $60,000 – that's half the price!"
"The pricing appears fair, and they demonstrate a genuine willingness to work with us on it."
"The licensing is on a yearly basis."
"I rate the product price as nine out of ten, where ten is the most expensive, and one is the cheapest. There is no need to pay any extra charges apart from the licensing costs."
"The cost is very high."
"The solution requires a license to be purchased for every user."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
879,259 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
13%
Financial Services Firm
10%
Manufacturing Company
8%
Government
7%
Manufacturing Company
17%
Healthcare Company
12%
Comms Service Provider
11%
Computer Software Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business1
Midsize Enterprise2
Large Enterprise8
By reviewers
Company SizeCount
Small Business8
Midsize Enterprise4
Large Enterprise10
 

Questions from the Community

What do you like most about Abnormal Security?
The features that appeal to me most are the combination of auto-remediation and Detection 360.
What is your experience regarding pricing and costs for Abnormal Security?
I find the pricing to be favorable, but I did not disclose the exact cost.
What needs improvement with Abnormal Security?
Ease of use is important, and Abnormal Security's responsiveness and ability to deliver solutions when issues arise are crucial. However, there is always room for improvement, as achieving a perfec...
What do you like most about FireEye Email Security?
One of the valuable features of the product stems from the fact that it is easy to implement the tool in our environment.
What needs improvement with FireEye Email Security?
I have had challenges in the past with Trellix Collaboration Security for implementation because of issues related to compatibility. Since we worked in a global company with different operating sys...
What is your primary use case for FireEye Email Security?
In my field, I have been in the information security area for 17 years, and I am currently working in my position for a year and a half.I have worked with Trellix Collaboration Security for several...
 

Also Known As

No data available
FireEye Email Security
 

Overview

 

Sample Customers

Foot Lcoker, Xerox, Liberty Mutual, Mattel, Boston Scientific
Northshore Utility District, Luz Technologies, Air Academy Federal Credit Union, Bank Gutmann, Bank of Thailand, Penn State Health Milton S. Hershey Medical Center, State of Missouri, City and County of San Francisco, Denver Public Schools, Vodafone, Go Auto, Stater Bros. Market
Find out what your peers are saying about Abnormal Security vs. Trellix Collaboration Security and other solutions. Updated: December 2025.
879,259 professionals have used our research since 2012.