Try our new research platform with insights from 80,000+ expert users

Anomali vs Trellix Endpoint Security Platform comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Jun 9, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Anomali
Ranking in Extended Detection and Response (XDR)
28th
Average Rating
7.8
Reviews Sentiment
7.2
Number of Reviews
4
Ranking in other categories
Security Information and Event Management (SIEM) (34th), User Entity Behavior Analytics (UEBA) (19th), Advanced Threat Protection (ATP) (22nd), Threat Intelligence Platforms (7th)
Trellix Endpoint Security P...
Ranking in Extended Detection and Response (XDR)
10th
Average Rating
8.0
Reviews Sentiment
7.2
Number of Reviews
158
Ranking in other categories
Endpoint Protection Platform (EPP) (9th), Endpoint Detection and Response (EDR) (10th)
 

Mindshare comparison

As of June 2025, in the Extended Detection and Response (XDR) category, the mindshare of Anomali is 0.3%, up from 0.2% compared to the previous year. The mindshare of Trellix Endpoint Security Platform is 3.2%, down from 3.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Extended Detection and Response (XDR)
 

Featured Reviews

CC
Enables automated threat intelligence sorting and enhances proactive threat hunting capabilities
You have to have at least a threat intelligence background or a SOC analyst background to use it, as that's the information you'll dig around with in there. If you don't have that kind of knowledge, it probably can be a little hard to use, but they do provide training. They offer training not only for how to use the platform but also some basic threat intelligence training to explain what these things are and what these terms mean. My company is a customer of Anomali. I would recommend it to other people. I would advise making sure you don't pick it without testing other products and have your use cases well thought out and documented before testing, so you know it will solve the problems you're trying to address. Keep an open mind with it and realize that whatever you can dream of, you can probably do with the platform. Overall, I would rate Anomali an eight out of ten.
Abdullah Al Hadi - PeerSpot reviewer
Customization capabilities allow clients to autonomously deploy policies
There are a few areas where Trellix Endpoint Security ( /categories/endpoint-protection-platform-epp ) can improve. Firstly, the high CPU utilization when agents are installed can negatively impact client systems. Another issue is with end-users outside the network, where the agent handler sometimes fails to deploy the product properly. Improvements are needed in forensic analytics to detect specific vulnerabilities. It would also help if detection specifics were identified more quickly and the problem-solving process accelerated, especially to meet larger clients' expectations.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"We now have a very robust collection of threat intelligence based on the capabilities that Anomali provides."
"The feature I have found most valuable is credential monitoring. This feature is easy and quick."
"I have found Cyber threat intelligence (CTI) very useful and concise. The solution is easy to use."
"The most valuable aspect of Anomali is the threat modeling capability."
"Trellix Endpoint Security offers robust access protection, addressing major concerns in prevention. It provides both application control and user access control within its access protection features."
"It provides a lot of information and great visibility, with really great options for managing the environment."
"The most valuable feature of this solution is its simplicity."
"The most valuable feature is ease of use."
"Dynamic Application Containment."
"It has a very simple like multi-tenancy option and scalability is outstanding."
"McAfee Complete Endpoint Protection is stable. We don't have any bugs being reported."
"The endpoint protection and disk encryption features are the most valuable."
 

Cons

"A lot of tools can give you many features, such as CTI intelligence and a tax service reduction. However, many people are combining different tools together to have more capabilities. It is up to the consumer whether they want to have multiple tools or have one tool that serves the purpose. Anomali Enterprise could improve by combining all the other tools' features into one solution."
"An area for improvement is the intelligence sharing within the Anomali community. The tagging system can be inconsistent, as any company can use any tags for their reporting."
"Support in the past has been top-notch, but recent trends indicate that it has taken a back seat, as we often don't get answers for days."
"Less code in integration would be nice when building blocks."
"The solution needs to work on memory consumption. It is too high."
"Continued available training is important for people coming in to use it."
"The solution takes up a high amount of memory and can cause the system to hang."
"I would like to see more local integration for the applications that we use."
"The local technical support could be better."
"It is a bit technical. The user interface has some significant limitations, mainly when using HIPS on the server side, to protect files from being changed or deleted by hackers, users, or administrators."
"There is room for improvement in the pricing. The price should be improved, it's high."
"We experienced some bad behavior when we first installed the product. The system also starts slowly in some instances. If for some reason this solution crashes, we could lose all our data."
 

Pricing and Cost Advice

"When comparing the price of Anomali Enterprise to other solutions it is in the medium to high range. However, I am satisfied with the price."
"We had a discount when purchasing the solution because of the size of our company and we are happy with the price."
"It provides good value by striking a balance between cost-effectiveness and feature richness."
"The price of this product is good."
"Licensing fees are billed on a yearly basis."
"They should reduce the cost or make it free, open-source software."
"It is a yearly subscription-based product, which includes the license and hardware. There is also a subscription for technical support up to five years."
"I rate Trellix Endpoint Security a nine out of ten for pricing."
"For each computer that is connected to the server McAfee charges us for each computer based on our license agreement."
report
Use our free recommendation engine to learn which Extended Detection and Response (XDR) solutions are best for your needs.
859,129 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
17%
Computer Software Company
13%
Government
9%
Manufacturing Company
7%
Educational Organization
23%
Government
12%
Manufacturing Company
10%
Computer Software Company
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What needs improvement with Anomali ThreatStream?
An area for improvement is the intelligence sharing within the Anomali community. The tagging system can be inconsistent, as any company can use any tags for their reporting. Combining all aliases ...
What is your primary use case for Anomali ThreatStream?
I use Anomali ( /products/anomali-reviews ) for threat hunting, threat collection, operationalization of intelligence, such as indicators of compromise (IOCs), and dissemination of reports for repo...
What advice do you have for others considering Anomali ThreatStream?
For new users, I recommend taking the training provided by Anomali as it is very well articulated. I advise reading the user manual and taking the instructor-led training sessions from the customer...
How does McAfee Endpoint Security compare with MVISION?
The flexible manageability of McAfee Endpoint Security is one of our favorite aspects of this solution. You can deploy various components as desired with McAfee Endpoint Security, whereas many othe...
How does Crowdstrike Falcon compare with FireEye Endpoint Security?
The Crowdstrike Falcon program has a simple to use user interface, making it both an easy to use as well as an effective program. Its graphical design is such that it makes an extremely useful too...
What do you like most about McAfee Endpoint Security?
It provides a robust defense against cybersecurity threats while offering user-friendly features like notifications and approval prompts.
 

Also Known As

Match, Lens, ThreatStream, STAXX, Anomali Security Analytics
McAfee Endpoint Security, McAfee Endpoint Protection, Intel Security Total Protection for Endpoint, McAfee Complete Endpoint Protection, Trellix Endpoint Security (ENS)
 

Overview

 

Sample Customers

Bank of England, First Energy, UBISOFT, Bank of Hope, Blackhawk Network
inHouseIT, Seagate Technology
Find out what your peers are saying about Anomali vs. Trellix Endpoint Security Platform and other solutions. Updated: June 2025.
859,129 professionals have used our research since 2012.