We performed a comparison between Code42 Incydr and Trellix ESM based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Forcepoint, Broadcom and others in Data Loss Prevention (DLP)."t has a very user friendly status bar with common errors and has logs built in to the console so we can review the issues or status of CrashPlan."
"It required very little ongoing maintenance once setup."
"It has quite a bit of flexibility in configuring backup sets."
"There are a couple of things. One of them is that they have what they call Incydr. Their detection and response solution to the insider threat area is called Incydr. That gives visibility to the clients that have widely dispersed employee bases due to work from home, or that had a dispersed workforce predating any of the work from home requirements. Even though they might not be inside the organization physically, they're inside the organization. It allows us to get some visibility into what people are doing, what the context is, and how to control what might be the potential for intellectual property theft or file exposure."
"Risk factors can be adjusted for all intricate details."
"Works in the background and users are able to perform restores."
"It had the ability to preseed by sending in a data drive and could restore by sending the user a data drive."
"Backup and recovery have been great, but I love having the ability to keep the hybrid type build which they offer."
"I like the ease of deployment."
"Trellix ESM is very user-friendly."
"It blocks the things which are not to be allowed. It has an adaptive mode where it learns for itself."
"It can be easily deployed with the other solutions."
"The most valuable feature is that if the scanning does find something, it quarantines it. Then you can decide what you are going to do with it."
"Compared to other solutions, the user interface is good."
"The most valuable feature is the correlation rules."
"The support I have received from the vendor has been great."
"Reporting could use an overhaul. It is very limited."
"What I think could be improved is how I get support."
"You can't always filter out data that you'd like to."
"The application, written in Java, required far more system resources on a Client than other solutions."
"I think one we can improve is the compression."
"There doesn't seem to be any feature that is lacking."
"More security would be nice, I would love to be able to remotely brick a stolen laptop and it's hard disk drive (HDD)."
"Java, please get rid of Java."
"I would like to see improvements to the user interface."
"I would like to see fingerprint recognition included in the next release of this solution."
"Product currently requires Flash."
"The support from McAfee ESM could improve. They could improve the speed."
"It cannot integrate with our Next-Generation Firewall and few applications such as Cisco ACI."
"The only issue I have with McAfee is the amount of computer resources that it takes... it's definitely impacting some of the other applications that are running on a computer at the same time."
"The initial setup is difficult and could improve."
"There should be support for multitenancy in the product."
Code42 Incydr is ranked 15th in Data Loss Prevention (DLP) with 78 reviews while Trellix ESM is ranked 19th in Security Information and Event Management (SIEM) with 34 reviews. Code42 Incydr is rated 9.0, while Trellix ESM is rated 7.4. The top reviewer of Code42 Incydr writes "Provides comprehensive visibility and protection, helps in identifying the gaps in security, and comes with excellent onboarding support". On the other hand, the top reviewer of Trellix ESM writes "Provides visibility of all the traffic within the company infrastructure". Code42 Incydr is most compared with Threat Detection, Investigation & Response (TDIR) Platform, Microsoft Purview Data Loss Prevention, Morphisec, Forcepoint Data Loss Prevention and Backup and Restore for SharePoint & Microsoft Office 365, whereas Trellix ESM is most compared with ArcSight Enterprise Security Manager (ESM), IBM Security QRadar, LogRhythm SIEM, Splunk Enterprise Security and Trellix Helix.
We monitor all Data Loss Prevention (DLP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.