Try our new research platform with insights from 80,000+ expert users

Blackberry UEM vs Trellix Endpoint Security Platform comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Microsoft Intune
Sponsored
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
304
Ranking in other categories
Configuration Management (2nd), Remote Access (1st), Enterprise Mobility Management (EMM) (1st), Unified Endpoint Management (UEM) (1st), Microsoft Security Suite (1st)
Blackberry UEM
Average Rating
7.0
Reviews Sentiment
5.7
Number of Reviews
1
Ranking in other categories
Unified Endpoint Management (UEM) (20th)
Trellix Endpoint Security P...
Average Rating
8.0
Reviews Sentiment
7.2
Number of Reviews
158
Ranking in other categories
Endpoint Protection Platform (EPP) (9th), Endpoint Detection and Response (EDR) (10th), Extended Detection and Response (XDR) (8th)
 

Mindshare comparison

Unified Endpoint Management (UEM) Market Share Distribution
ProductMarket Share (%)
Blackberry UEM0.7%
Microsoft Intune31.0%
Workspace ONE UEM13.0%
Other55.3%
Unified Endpoint Management (UEM)
Endpoint Protection Platform (EPP) Market Share Distribution
ProductMarket Share (%)
Trellix Endpoint Security Platform3.9%
Microsoft Defender for Endpoint9.9%
CrowdStrike Falcon7.9%
Other78.3%
Endpoint Protection Platform (EPP)
 

Featured Reviews

AkashKamble - PeerSpot reviewer
Enables management of multiple operating systems with a single license
The best feature is that it's a Microsoft product, so if anything goes wrong, we get quick support for anything required. Remote system functionality allows us to sit anywhere and take control of any device via remote management. We can enhance security for clients' laptops with built-in Microsoft Defender, which is available with the Microsoft Intune license. We use it for reporting purposes through endpoint analytics. When pushing scripting, there are two types available: remediation script and reservation script. Through endpoint analytics, you can push defender policies to clients. It helps with reporting, inventory updates, and monitoring tenant status health.
reviewer2247477 - PeerSpot reviewer
An affordable solution to control BlackBerry applications but has latency issues
The solution is complicated for new users. There are a lot of buttons on the first page. It can be very confusing if you’re not aware of the terms they use. For example, a button labelled ‘edit device’ doesn't explain exactly what it does or how to use it. Setup is difficult, time-consuming, and a lot of procedures are involved. There are latency issues on the application.
Abdullah Al Hadi - PeerSpot reviewer
Customization capabilities allow clients to autonomously deploy policies
There are a few areas where Trellix Endpoint Security can improve. Firstly, the high CPU utilization when agents are installed can negatively impact client systems. Another issue is with end-users outside the network, where the agent handler sometimes fails to deploy the product properly. Improvements are needed in forensic analytics to detect specific vulnerabilities. It would also help if detection specifics were identified more quickly and the problem-solving process accelerated, especially to meet larger clients' expectations.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"When comparing Microsoft Intune to Jamf, Microsoft Intune is superior."
"These capabilities have made a significant impact in my work, providing a comprehensive view of all devices and features in a single platform."
"The performance of Microsoft Intune is good."
"It has helped with compliance. It has helped to ensure that devices comply with the organization's policy. If they are not compliant and secure, they cannot access the resources."
"It's really easy to access."
"For our office workers who are not based in Norway, when we order the PC, we can do some of the settings for them. These are standardized settings. We can set them up exactly as they are in Norway so that they're the same."
"Microsoft Intune policies, remote wipe, and using corporate and private profiles are valuable features, but MFA is the most valuable feature as it ensures that the end user is authentic."
"The Autopilot feature is the most valuable because it saves significant time on managing devices. We can ship devices globally, and users can set them up on their own. It's convenient."
"The solution has a lot of features, such as adding different applications and devices to one platform. This allowed us to manage many devices and applications from a single platform."
"The most valuable features of Trellix Endpoint Security include its protection capabilities such as DNS and endpoint security, DNS threat prevention, as well as advanced threat prevention."
"The compatibility with a variety of laptops is our biggest advantage."
"The threat scanning is excellent. It uses predictive technology and I can utilize attack data to help us fine-tune our systems and network infrastructure. This protects us against current and future attacks."
"The detection capability of Trellix Endpoint Security is higher than traditional antivirus solutions."
"We have a cloud-based instance, so we can deploy all our configurations through the cloud. That's the beauty of FireEye."
"It can be deployed quickly, and it's scalable. Those are the two advantages of it."
"There is a new feature where you can set thresholds for all the CPU consumption allowing for no consumption on the servers when the scans happen. It is a separate plugin or addon, and if we have it on all the virtual machines it automatically checks the resources, and based on that, it will schedule the scans. That is something that I have not seen in other antivirus solutions, such as Symantec."
"The central management console is powerful. You can manage endpoints, DLP, encryption, and all the other features from a single console."
 

Cons

"There should be more predictability in the release cycle. We don't feel we have any control over when new updates come out, and whether there are changes to the backend functionality or to the user interface. Updates just happen."
"There are some issues using the solution with macOS and iOS, and it offers limited granular control with them. Intune works better on Windows and Android."
"I have a lot of Apple products in my environment. It would be nice to have an improved integration of Apple products with Microsoft Intune without Jam."
"It would be interesting to integrate the server side of Intune. Some group policy updates we have on the Windows Server side and possibly some on the client side could also be included."
"There is room for improvement in the reporting capabilities, specifically app reporting. It is challenging to report which apps are installed on which device."
"I would like to see better integration with Microsoft. There are a few things I can still do with Jamf that I am unable to do with Intune yet."
"It would be better if I could integrate it with my core group policy. I would like to have a group policy in my current environment, which has strict control, but those things are still missing. Although it has maximum compliance and security, it's not available on-premise."
"I wish Microsoft would keep up with their documentation. They make changes so quickly to these platforms that they do not update the documentation properly in a timely manner."
"The solution is complicated for new users. There are a lot of buttons on the first page. It can be very confusing if you’re not aware of the terms they use. For example, a button labelled ‘edit device’ doesn't explain exactly what it does or how to use it."
"The product’s on-premise version is costly in terms of extra charges for SQL database and Windows server licenses."
"Patch management is unavailable"
"The product is not easy to use."
"The endpoint has room for improvement because it's restrictive, it's very sensitive. Sometimes it can delete something that you need and so sometimes you have to disable the antivirus."
"The solution could provide open XDR in addition to EDR."
"We don't like the solution since it requires much memory consumption and consumes much CPU resources."
"The security of this solution needs improvement."
"The technical support needs some improvement. When product distribution errors occur, we have to contact technical support, which is a very tedious task."
 

Pricing and Cost Advice

"The price is very reasonable."
"Microsoft Intune is pretty reasonable. We have difficulty with Azure, which is probably why we have not put many assets in Azure. Everything we put there is very expensive."
"Based on the features that it gives, it is cost-efficient. It is not necessarily on the expensive side of the scale. It provides a hefty number of features that any organization would want. It is in a good price range."
"They have categorized the licenses according to the size of the business. So, if it's a smaller organization, we can choose the license accordingly. If it's a big organization, then we can choose accordingly. Everything is clearly mentioned, and we can decide. It's suitable for all kinds of infrastructure, and that's very goo"
"The pricing is competitive, but it is not cheap."
"The E5 license is expensive."
"Intune is cost-effective as it is included in some of the Office 365 packages."
"Intune is inexpensive. It also comes bundled in some Office 365 licenses, so you can choose to purchase it separately or as a package."
Information not available
"The pricing is more or less the same as the other tools in the market."
"The pricing is great and licensing fees are billed on a yearly basis."
"We are on an annual subscription for McAfee MVISION Endpoint. The cost for the license could be less expensive."
"When comparing the solution to others it is a bit expensive. We are on a monthly license."
"The tool is affordable"
"Pricing is fair."
"Trellix Endpoint Security is an inexpensive platform."
"It is reasonably priced."
report
Use our free recommendation engine to learn which Unified Endpoint Management (UEM) solutions are best for your needs.
870,701 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
12%
Financial Services Firm
10%
Manufacturing Company
9%
Government
8%
Government
15%
Manufacturing Company
15%
Financial Services Firm
10%
Performing Arts
8%
Government
13%
Manufacturing Company
13%
Computer Software Company
11%
Financial Services Firm
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business116
Midsize Enterprise46
Large Enterprise152
No data available
By reviewers
Company SizeCount
Small Business67
Midsize Enterprise36
Large Enterprise59
 

Questions from the Community

How does Microsoft Intune compare with VMware Workspace One?
Microsoft Intune is a great tool for managing a mobile device fleet while keeping access control. The solution makes ...
What are the pros and cons of Microsoft Intune?
Microsoft Intune is a great configuration management tool and has a lot of good things going for it. Here are some of...
How does Google Cloud Identity compare with Microsoft Intune?
Microsoft Intune offers not only an easy-to-deploy data protection and productivity management solution, but also ...
Ask a question
Earn 20 points
How does McAfee Endpoint Security compare with MVISION?
The flexible manageability of McAfee Endpoint Security is one of our favorite aspects of this solution. You can deplo...
How does Crowdstrike Falcon compare with FireEye Endpoint Security?
The Crowdstrike Falcon program has a simple to use user interface, making it both an easy to use as well as an effec...
What do you like most about McAfee Endpoint Security?
It provides a robust defense against cybersecurity threats while offering user-friendly features like notifications a...
 

Also Known As

Intune, MS Intune, Microsoft Endpoint Manager
No data available
McAfee Endpoint Security, McAfee Endpoint Protection, Intel Security Total Protection for Endpoint, McAfee Complete Endpoint Protection, Trellix Endpoint Security (ENS)
 

Overview

 

Sample Customers

Mitchells and Buzzers, Callaway
Information Not Available
inHouseIT, Seagate Technology
Find out what your peers are saying about Microsoft, ManageEngine, Omnissa and others in Unified Endpoint Management (UEM). Updated: September 2025.
870,701 professionals have used our research since 2012.