Try our new research platform with insights from 80,000+ expert users

Cisco Secure Cloud Analytics [EOL] vs Trellix Endpoint Security Platform comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cisco Secure Cloud Analytic...
Average Rating
8.6
Number of Reviews
7
Ranking in other categories
No ranking in other categories
Trellix Endpoint Security P...
Average Rating
7.8
Reviews Sentiment
7.2
Number of Reviews
159
Ranking in other categories
Endpoint Protection Platform (EPP) (7th), Endpoint Detection and Response (EDR) (11th), Extended Detection and Response (XDR) (11th)
 

Featured Reviews

SP
Security Analyst at Orange España
Efficiently generates alerts for suspicious activities and scales easily
There are two areas of improvement. Firstly, extend the log retrieval limit to at least three months. For example, there is a limit on the number of log messages that can be received. So, I would like to expand the log retrieval limit. And another thing, if we migrate these things to an event or send us an email if there is any critical event, I would like to configure these things on the initial launch. Because if a system is compromised, there will be a lot of data movement from one post to another post to the outside. Then, we should also get an alert on email as well. We have since we have integrated these things. But a direct email for critical alerts should be there. So, I would like to enhance the critical event configuration. If a new user wants to learn how it should work, how policies work, and where we can configure policies, there should be some learning material for this product.
Abhimanyu Das - PeerSpot reviewer
Senior Associate at a tech vendor with 10,001+ employees
Threat detection is effective, and the solution provides good control over device access, but it still needs better troubleshooting options for agent-related issues.
From an improvement perspective, I am looking for a way to troubleshoot situations where the endpoint agent becomes corrupted and requires reinstallation, as there is currently no option to resolve these issues without rebooting the system. I give it a rating of seven because, in today’s scenario, the portal is complicated to navigate. The Trellix Endpoint Security Platform dashboard is somewhat difficult to understand, and it takes considerable time to familiarize oneself with the tools and policies compared to other solutions. For on-premises deployment, I would also like to highlight that the architecture is quite complex, which is an area Trellix Endpoint Security Platform should consider improving.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Cisco Stealthwatch Cloud is scalable because it is on the cloud."
"Monitoring the traffic, making sure you have the visibility."
"The tool's best feature is its ability to monitor network traffic. It will also inform users whether the traffic generated by a network is legitimate. The tool helps to capture and analyze the network traffic."
"It tells you if there is any communication going to command and control servers, or if there is any traffic that violates your internal policy, or if any data hoarding is happening where data is being dumped from your machine to outside of the environment. It provides all such meaningful reports to help you understand what's happening."
"The logs in Cisco Stealthwatch Cloud are very good when doing the API integration in the team. It is able to give you important information for the correlations."
"The product helps me to see malware."
"When it comes to scalability, there's no size limit. It varies based on licenses and requirements."
"The agents are easy to deploy."
"It's good that it periodically scans all my drives. I can stay up to date with the status of my drivers and update them if needed."
"The performance is good."
"The platform's most valuable features are AI capabilities and its quick updates."
"The extendability is great."
"Their malware detection rate is excellent for all type of devices and the anti-theft products are good and easy to use."
"Automatic user recovery prior to Windows booting up."
"MVISION Endpoint is so much easier and so much simpler for the lay security personnel to handle."
 

Cons

"The initial setup of Cisco Stealthwatch Cloud is complex."
"The product needs to improve its user-friendliness. It is very tricky and you need to study it before using the standard functionalities."
"If we migrate these things to an event or send us an email if there is any critical event, I would like to configure these things on the initial launch. Because if a system is compromised, there will be a lot of data movement from one post to another post to the outside. Then, we should also get an alert on email as well. We have since we have integrated these things. But a direct email for critical alerts should be there. So, I would like to enhance the critical event configuration."
"Cisco Stealthwatch Cloud could improve the graphical user interface. It could be a more user-friendly graphical user interface. so that. Not everybody's a cyber security professional, most of the customers that I deal with are not very skilled. The terms that they use in the solution are quite understandable for a normal CIO."
"The product's price is high."
"The initial setup is a bit complex in terms of deployment and configuration"
"When I used to work on it, I just didn't see anything new happening for about a year and a half. Providing newer data and newer reports constantly would help. There should be more classifications and more interesting data."
"Signatures to protect against new attacks."
"Most of these types of solutions including others, such as Carbon Black and FortiEDR, all have the same features. However, Carbon Black is the leader when it comes to being robust and user-friendly and this solution should improve in those areas to stay more competitive."
"It is a bit technical. The user interface has some significant limitations, mainly when using HIPS on the server side, to protect files from being changed or deleted by hackers, users, or administrators."
"Trellix Endpoint Security needs some improvement in the dashboards. Artificial intelligence also requires improvement to further enhance the product."
"The product does not seem to be cloud-native and there are issues with automating it. Automation is not intuitive."
"The main area for improvement is the integration with Microsoft Windows Hello, which includes Face ID or fingerprint-based authentication. Currently, they don't support either, so users have to type in the username and password."
"The product needs to reduce the usage of RAM and CPU."
"The solution's documentation is not streamlined and is in bits and pieces, which should be in a single format."
 

Pricing and Cost Advice

"The price of Cisco Stealthwatch Cloud is expensive."
"Cisco Stealthwatch Cloud is an expensive enterprise solution."
"The solution is quite expensive."
"Trellix Endpoint Security is an inexpensive platform."
"The price of the solution is fair, we have a complete security package."
"I think Trellix is more on the higher side of the market, just on a general scale, but I also think it depends on what particular package you choose."
"I do licensing on an annual basis and this is what I always recommend to my clients over the monthly option."
"Trellix may cost around $46 to $47 for a single license without an EDR."
"Compared to Bitdefender, Trellix Endpoint Security is more expensive, but considering it comes with DLP, the solution's price is fine."
"When comparing the solution to others it is a bit expensive. We are on a monthly license."
"It is reasonably priced."
report
Use our free recommendation engine to learn which Intrusion Detection and Prevention Software (IDPS) solutions are best for your needs.
881,733 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
22%
Manufacturing Company
12%
Government
8%
University
8%
Manufacturing Company
13%
Government
12%
Financial Services Firm
8%
Computer Software Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business1
Midsize Enterprise2
Large Enterprise6
By reviewers
Company SizeCount
Small Business67
Midsize Enterprise36
Large Enterprise61
 

Questions from the Community

Ask a question
Earn 20 points
How does McAfee Endpoint Security compare with MVISION?
The flexible manageability of McAfee Endpoint Security is one of our favorite aspects of this solution. You can deploy various components as desired with McAfee Endpoint Security, whereas many othe...
How does Crowdstrike Falcon compare with FireEye Endpoint Security?
The Crowdstrike Falcon program has a simple to use user interface, making it both an easy to use as well as an effective program. Its graphical design is such that it makes an extremely useful too...
What do you like most about McAfee Endpoint Security?
It provides a robust defense against cybersecurity threats while offering user-friendly features like notifications and approval prompts.
 

Also Known As

Cisco Stealthwatch Cloud, Observable Networks
McAfee Endpoint Security, McAfee Endpoint Protection, Intel Security Total Protection for Endpoint, McAfee Complete Endpoint Protection, Trellix Endpoint Security (ENS)
 

Overview

 

Sample Customers

Options, Schneider Electric, Washington University in St Louis, Gotcha, Kraft Kennedy, PartnerRe, Sumologic, Veterans United, AFGE, Agraform, Artesys, Dynamic Ideas Financials, Department of Agriculture and Commerce
inHouseIT, Seagate Technology
Find out what your peers are saying about Fortinet, Darktrace, Check Point Software Technologies and others in Intrusion Detection and Prevention Software (IDPS). Updated: January 2026.
881,733 professionals have used our research since 2012.