Try our new research platform with insights from 80,000+ expert users

BeyondTrust Endpoint Privilege Management vs Trellix Endpoint Security Platform vs ZoneAlarm comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Mindshare comparison

Privileged Access Management (PAM)
Endpoint Protection Platform (EPP)
Anti-Malware Tools
 

Featured Reviews

Md Abdul Hakim - PeerSpot reviewer
Offers solid performance and user adaptability but needs better pricing options and local support
BeyondTrust is a strong, compliance-driven solution with excellent market recognition (Gartner, Peers, etc.), making it appealing for Bangladeshi enterprises. However, some key improvements could accelerate adoption: Areas for Improvement: Pricing & Local Affordability While the product’s capabilities justify its value, cost remains a barrier for many Bangladeshi organizations. Competitive pricing or regional discounts would make it more accessible. Local Support & Partnerships Currently, lack of local partners or trainers creates delays in support, implementation, and pricing negotiations. Establishing a Bangladesh-based support team or authorized resellers would improve responsiveness and trust. Enhanced Onboarding & Training Offering localized training programs (in Bengali/English) and documentation would help IT teams deploy and manage the solution more efficiently. Recommendations for Next Release: Introduce tiered pricing for emerging markets like Bangladesh. Develop a partner network in Bangladesh for faster service and sales. Add simplified dashboards for easier monitoring by non-technical staff. Final Note: BeyondTrust is already a top-tier PAM solution, but addressing these gaps would solidify its leadership in Bangladesh’s growing cybersecurity market.
Abdullah Al Hadi - PeerSpot reviewer
Customization capabilities allow clients to autonomously deploy policies
There are a few areas where Trellix Endpoint Security ( /categories/endpoint-protection-platform-epp ) can improve. Firstly, the high CPU utilization when agents are installed can negatively impact client systems. Another issue is with end-users outside the network, where the agent handler sometimes fails to deploy the product properly. Improvements are needed in forensic analytics to detect specific vulnerabilities. It would also help if detection specifics were identified more quickly and the problem-solving process accelerated, especially to meet larger clients' expectations.
Nagendra Nekkala - PeerSpot reviewer
A highly stable solution that protects computers from viruses, spyware, and hackers
ZoneAlarm doesn't require much maintenance. You only need to update the application when there are any latest updates. ZoneAlarm is deployed on-cloud in our organization. With an increase in the bring your own device concept, ZoneAlarm should be part of every device to help us make the operational work very easy. Overall, I rate ZoneAlarm a nine out of ten.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I'm a BeyondTrust partner and I have multiple deployments, four or five banks right now. The features that give us quite an edge compared to what our competitors are offering - like IBM or Thycotic - are the Session Management, that is quite a big one; also the recording of keystrokes. In addition, there is the password vaulting and state-of-the-art Password Management, which I haven't seen in other products."
"It scales easily and the product is stable."
"BeyondTrust has very good integrations with quite a lot of security vendors such as SailPoint, IBM, FortiGuard, Splunk, etc."
"Technical support is good."
"Reduces major vulnerabilities by removing local administrator privileges."
"What I liked about this solution is that it can also integrate for tracking malicious use or sending analytics to a host that can process them. I don't know if CyberArk, Centrify, or Thycotic can do that. The analytics was something the client really wanted, and they already had BeyondTrust. It is very scalable. The agent on the workstation is very thin, and the processing power required on a server is nothing out of the ordinary. It is also very stable and easy to deploy."
"I find the comprehensive Privilege Access Management features valuable, including automation, and the ability to integrate with applications and the Windows operating system."
"The notable aspect is its ability to capture the application's behavior comprehensively and this thorough analysis is crucial for effective policy management."
"The solution is stable."
"The most valuable feature of this solution is its simplicity."
"It's a stable solution with good performance."
"Trellix Endpoint Security is a proven, robust, and cost-effective solution that protects the organization from different types of ransomware and attacks."
"Initially, the DLP was very valuable for disabling access to USB drives."
"The threat scanning is excellent. It uses predictive technology and I can utilize attack data to help us fine-tune our systems and network infrastructure. This protects us against current and future attacks."
"The detection is great and the solution is constantly improving."
"The platform's most valuable features are AI capabilities and its quick updates."
"The solution maintains reasonable scalability."
"The solution really focused on giving more security than an antivirus."
"This antivirus is regularly updated, and the updates can be scheduled."
"ZoneAlarm protects all computers from viruses, spyware, and hackers."
"It is easy to use through interfaces and easy to configure each of the customizations we created based on the characteristics that we wanted."
"The product's most valuable feature is the detection engine due to its ability to identify threats."
"Personally, I find the Game Mode of the Firewall very useful."
"The phone access scan stands out as the most valuable feature for me."
 

Cons

"There is a need for better MQ integration with DevOps and improvements in architecture."
"There is room for improvement in having the solution align more with standards. We're always shoehorning the product into the standards. It's not that it doesn't work for standards, it does. But Quick Start Policies are pretty close to what we need. The vendor needs to keep looking at GDPR, 27001, and 27701. That's why our clients buy the product."
"Reporting analytics is one of the areas that can be improved. It is a new cloud-based solution. So, many more specific reports can come out natively. Currently, we get all the events, and we put them in plug-ins. From there, we generate our own design of reports. If there is a much more solid or robust reporting analytics framework within the product itself, it would be helpful."
"We use a program to automate all of this, but it's not a default feature of BeyondTrust Endpoint Privilege Management."
"A valuable enhancement could be the capability to deploy agents directly through the console."
"They need to come up with better integrative options which should be customer-centric."
"Their technical support could be more responsive and helpful."
"Improvements could focus on adding more AI features to automate processes that are currently manual or challenging for end users."
"The VirusScan needs to improve in order to detect ransomware and other advanced threats."
"It didn't work well for some of the use cases. We have different use cases for each entity. Their support is also not good and needs improvement."
"Upgrading to new versions isn't easy and it can take a long time. Also, other solutions' tamper protection features are better than FireEye's. Clients should have access to our local information, but they shouldn't change settings on the system itself."
"The price of the solution is high in Asia."
"The vendor should simplify the way they bundle the products because it's very hard to explain to customers what products contain which features."
"The solution can be expensive."
"The performance could be better. I noticed that it slows down a bit."
"Technical support is an area that can be improved because sometimes, the response time is a bit slow and the explanation is short."
"They should release a single update with all the necessary characteristics to avoid being in a cycle of consecutive updates."
"We'd like better performance of the network equipment. There are high-speed environments where an immediate response is required."
"Some of our users say that the interface is a little bit outdated for 2020, and want it to be more modern and cozy."
"Currently, the client is only available for the Windows Operating System but it would be good if it were released for Mac OS as well."
"Perhaps the primary area for potential enhancement is to make it faster, ensuring a more seamless experience while maintaining robust security features."
"I would like it to be integrated with the Check Point centralization solution like Infinity Portal. It would be great to be able to manage it through the same website."
"The support is not always so effective."
"They need to update and improve the features available for Mac."
 

Pricing and Cost Advice

"It was very expensive."
"Price-wise, it is very competitive. In our area, government entities and banks don't go for the monthly payment. It is a headache even for us in terms of finance and procurement to go for monthly payments. Quarterly might be more logical and reasonable, but the minimum that we go for is one year, and sometimes, we even try to compile and give one offering for three years."
"It is relatively more cost-effective compared to the competing product."
"The product’s licensing is different for Windows, Linux, and Mac. The tool’s licensing is yearly."
"This solution is expensive compared to its competitors."
"I'm sure everyone should have the cluster environment, which means more expensive, anyway, cheaper than the other solutions."
"Its pricing and licensing are okay. We were in the perpetual model when it was on-prem, and now, with the SaaS service, we have a subscription model. As a customer, I would always like to see a lower price, but it seems to be priced at the right model currently, and we are trying to get the maximum benefits out of it."
"PowerBroker for a Mac client is three times the price of the Windows version."
"Trellix may cost around $46 to $47 for a single license without an EDR."
"I do licensing on an annual basis and this is what I always recommend to my clients over the monthly option."
"The price of McAfee is pretty similar to Symantec, and there are no costs in addition to the standard licensing fees."
"I don't think there are any extra expenses besides its licensing costs."
"Annual license fee is good"
"It is based on an annual subscription."
"Its price is reasonable, but it could be made free."
"The pricing is reasonable."
"We use the free version of the software, but it can be upgraded to the paid Extreme Security edition."
"I rate the product pricing a seven out of ten."
"We have to pay a yearly licensing fee for ZoneAlarm, which is cheap."
"The pricing is reasonable, with a yearly renewal license costing seventy dollars."
"This is a freeware product and I recommend using it."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
862,289 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
19%
Computer Software Company
15%
Manufacturing Company
10%
Government
6%
Government
13%
Manufacturing Company
12%
Educational Organization
11%
Computer Software Company
10%
Computer Software Company
17%
Comms Service Provider
12%
Hospitality Company
9%
Educational Organization
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no sh...
What do you like most about BeyondTrust Endpoint Privilege Management?
The solution's least privilege enforcement has helped us ensure access is given to only the required people.
What is your experience regarding pricing and costs for BeyondTrust Endpoint Privilege Management?
BeyondTrust's pricing is premium but negotiable for Bangladesh. Expect 20-30% extra costs from currency/import factor...
How does McAfee Endpoint Security compare with MVISION?
The flexible manageability of McAfee Endpoint Security is one of our favorite aspects of this solution. You can deplo...
How does Crowdstrike Falcon compare with FireEye Endpoint Security?
The Crowdstrike Falcon program has a simple to use user interface, making it both an easy to use as well as an effec...
What do you like most about McAfee Endpoint Security?
It provides a robust defense against cybersecurity threats while offering user-friendly features like notifications a...
What do you like most about ZoneAlarm?
ZoneAlarm protects all computers from viruses, spyware, and hackers.
What needs improvement with ZoneAlarm?
As for improvements, ZoneAlarm enhances Check Point’s solution by having a very efficient engine. The engine checks a...
 

Also Known As

BeyondTrust PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix, Avecto Defendpoint
McAfee Endpoint Security, McAfee Endpoint Protection, Intel Security Total Protection for Endpoint, McAfee Complete Endpoint Protection, Trellix Endpoint Security (ENS)
No data available
 

Overview

 

Sample Customers

Aera Energy LLC, Care New England, James Madison University
inHouseIT, Seagate Technology
Terma, Optix, Samsung Research Amercia, SF Police Credit Union, Independence Care System, Mattias Thomsen, Carmel Partners, Desert Research Institute, CRIF, FXCM Inc, US State Agency
Find out what your peers are saying about CyberArk, Delinea, One Identity and others in Privileged Access Management (PAM). Updated: June 2025.
862,289 professionals have used our research since 2012.