IT Central Station is now PeerSpot: Here's why

Cynet vs Trellix Endpoint Security comparison

Cancel
You must select at least 2 products to compare!
Featured Review
Buyer's Guide
Cynet vs. Trellix Endpoint Security
July 2022
Find out what your peers are saying about Cynet vs. Trellix Endpoint Security and other solutions. Updated: July 2022.
621,327 professionals have used our research since 2012.
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"Everything from Microsoft is integrated. You receive regular reports on them all. You can push your reports, logs, and security alerts, which are all integrated. It is crucial that these solutions work natively together to deliver coordinated detection and response across our environment.""Threat detection is its key feature, and that's why we use this tool. It gives an alert if a PC is attacked or there is any kind of anomaly, such as there is a spike in sending emails or we see an unauthorized website being accessed. So, it keeps us on our toes. We get to know that there is something wrong, and we can isolate the user and find any issues with it. So, threat detection is very robust in this tool.""If your business requirements are relatively simple, it can get the job done.""I like the web GUI/the management interface. I also like the security of Microsoft. As compared to other manufacturers, it's less complex and easy to understand and work with.""The solution does not affect a user's workflow.""It is very easy to use, which is what we look for in these types of solutions.""It's very easy to install and it includes the Intune portal from Microsoft where I can control all the devices from one place.""There are a lot of features with benefits, including discovery, investigation, and putting controls around things. You can't say that you like the investigation part but not the discovery. Everything is correlated; that's how the tool works."

More Microsoft Defender for Cloud Apps Pros →

"The dashboard is beautiful, overall easy of use, and the UBA and NBA features are valued.""I like that you can implement it in the managed service portfolio.""The most valuable feature is the monitored support behind it.""It provides good protection from ransomware and malware attacks. It is very good as compared to other products. If any threat is there, their support is very good. They immediately respond to the users and do a follow-up. They call us and also provide email support.""It can be deployed in autonomous mode, and then it automatically blocks malware threats.""It's transparent, so it's not something where every user has to press a button to download or do the thing. It is centralized, in fact. Personally, I use Malwarebytes and other tools, which are fine for home use. Cynet is also relatively silent in terms of operation, except when it's required to act.""Advanced detection and protection against ransomware paired with SOC monitoring are the most valuable features. They have 24/7 SOC monitoring and file activity. It is a very robust tool.""The level of automation is very good because the majority of the time, it blocks the attacks without requiring anything from our side. The technicians don't have to do anything. They are just alerted about what happened. So, the user intelligence works quite well."

More Cynet Pros →

"The solution provides dashboard control, so we can centrally monitor the entire status of our organization.""I think the costing is fine compared to other products. Cost-wise you definitely get value for your money.""It's easy to use and it's very powerful. It offers nice endpoint protection.""I have found many of the features to be useful.""The solution is stable.""The most valuable feature is the centralized console where everything can be controlled by the administration.""It's easy to use.""We like the management of the ePO, and we like the management console."

More Trellix Endpoint Security Pros →

Cons
"Currently, reporting is not very straightforward and it needs to be enhanced. Specific reports are not included and you need to run a query, drill down, and then export it and share it. I would love to have reports with more fine-tuning or granularity, and more predefined reports.""There are some features, such as user navigation content filtering, that are disabled by default, and it probably makes sense to enable them by default.""We would like to get more information from the endpoint. I don't get enough detailed information right now on why something failed. There is not enough visibility.""The integration with macOS operating systems needs to be better.""They should continue integration with all other Microsoft security-related products. The integration with all the other products is still ongoing.""I want them to enhance in-session policy.""This service would be better if it had a separate license, only for this service, that could be used to track usage.""There are challenges with detection and there are challenges with false-positive rates."

More Microsoft Defender for Cloud Apps Cons →

"The reporting is a little weak and could be improved. The other downside is that Cynet does not use the local time zone. It's based off of Greenwich Mean Time.""Cynet could improve when a reverse proxy is being used to connect to the servers. There could be an easier configuration because it is not plug-and-play.""The solution just needs to keep maturing and they need to keep up with the threat landscape to ensure they're protecting clients well as time passes.""Sometimes, it is necessary for me to make important changes to a hard drive of a computer, and because Cynet does not allow me to do that, I have to go to the console and remove the computer from the security group just for Cynet. After that, I have to wait for 10 or 15 minutes for that to take effect. I would like to be able to disable Cynet locally. I shouldn’t have to go to the console to find the PC and then take it out of the group and then add it again to the group. I should locally be able to disable Cynet on a computer with a password or something like that, but it is currently not possible.""I'd like to see more data loss prevention within the product.""It is an endpoint agent, but they don't have a probe for checking the network traffic. They could improve from this point of view.""They have some things in the pipeline, we understand, and they're going to be able to support Android and all these other devices soon. The key is the devices - which is an aspect that is lacking right now. Every company has that problem, not just Cynet.""They have automated response capability, and they're moving more and more into SOAR capability. They have built-in deception technology with host-file users, phantoms, etc. We used to call them honeypots. So, they're on target. They're doing a really good job, and they should continue to improve with SOAR."

More Cynet Cons →

"An area of improvement for this solution is to make it easier to manage.""An area in need of improvement involves the overview, which usually does not enable one to get the value in reports.""The solution has problematic encryption, which needs reforming.""It would be nice if the solution were to allow not just on-cloud management, but on-premises, as well.""There is room to improve with scalability.""The solution takes up a high amount of memory and can cause the system to hang.""The management console is a little bit difficult to understand for admins. You need a lot of time in order to become familiar with that. It is a little bit complicated and not too easy to understand. Its price can also be improved. Its price is higher than its competitors. McAfee also needs to have better cloud integration and more data centers in the EU. The cloud center should be in Europe or in Germany. In Germany, it is really important to have access to your data within the same country. Customer data needs to be placed and processed in the same country.""The product could do more to keep administration alerted to detected threats on endpoints."

More Trellix Endpoint Security Cons →

Pricing and Cost Advice
  • "Our clients normally use the Microsoft E1 licensing, which is renewed yearly."
  • "The pricing is a little bit high but right now, we are okay with it because of the compatibility with Office 365, Teams, and Azure AD."
  • "I'm not totally involved in the pricing part, but I think its pricing is quite aggressive, and its price is quite similar to Netskope. Netskope has separate licensing fees or additional charges if you want to monitor certain SaaS services, whereas, with MCAS, you get 5,000 applications with their Office 365. It is all bundled, and there's no cost for using that. You only have the operational costs. In the country I am in, it is a bit difficult to get people with the required skill sets."
  • "Its pricing is on the higher side. Its price is definitely very high for a small-scale company. As an enterprise client, we do get benefits from Microsoft. We get a discounted price because of the number of users we have in our company. We have a premier package, and with that, we do get a lot of discounts. There are no additional costs. It only comes in the top-tier packages. Generally, the top-tier license is the best license that you can get for your organization. If you want, you can buy it separately, but that's not a good idea."
  • "The price could be better and should be reconsidered."
  • "It is a little bit expensive. When you want to have the complete package with Office 365, Defender, and everything else, it is expensive."
  • "We are an MST and we do not pay for the solution. However, the price of the solution could be better."
  • "The cost could be improved when you need to pay for anything. For example, refreshing files takes time to load, though it may be my Internet. To improve the refresh time, Microsoft says that we need to pay for a Premium license, and I don't like paying for things that help make a solution better."
  • More Microsoft Defender for Cloud Apps Pricing and Cost Advice →

  • "Our billing is on a quarterly basis, but they have monthly or annual billing availability."
  • "The price should not be less than $100 which is quite reasonable for this solution because you are getting multiple components."
  • "Its licensing is on a monthly basis."
  • "Pricing wise, Cynet seems to be very competitive. The cost is probably lower than that offered by many of its competitors for all the functions and features it offers."
  • "The pricing was good."
  • "It costs us 20,000 to 28,000 per year."
  • "There is an extra cost if you want the support of Cynet."
  • "It is extremely affordable. I'll give it a five out of five in terms of price. It was half the cost of the next closest competitor, and the competitor didn't provide SOC services."
  • More Cynet Pricing and Cost Advice →

  • "Pricing is reasonable and runs at a cost per user per year."
  • "It is not that expensive. There is no additional cost. We got the entire bundle together."
  • "The price of this product is good."
  • "The price of McAfee is pretty similar to Symantec, and there are no costs in addition to the standard licensing fees."
  • "Its price is very high. It is higher than its competitors, and it should be less."
  • "The pricing is great and licensing fees are billed on a yearly basis."
  • "Since the maintenance is done by our own team, the price of the subscription should really be cheaper."
  • "We pay 650 Rand for a license. It is a perpetual license which we normally run for two years."
  • More Trellix Endpoint Security Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Extended Detection and Response (XDR) solutions are best for your needs.
    621,327 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:Cisco Umbrella is an integral component of the Cisco SASE architecture. It integrates security in a single, cloud-native… more »
    Top Answer:It's very easy to install and it includes the Intune portal from Microsoft where I can control all the devices from one… more »
    Top Answer:It's expensive because we have to pay for an M365 license and it is included in the package.
    Top Answer:The support team that stands behind the detection and response.  Is there adequate expertise and are they behind you… more »
    Top Answer:I have found the continued support and pretty much all the features to be valuable. They all stand out as being… more »
    Top Answer:Pricing wise, Cynet seems to be very competitive. The cost is probably lower than that offered by many of its… more »
    Top Answer:The flexible manageability of McAfee Endpoint Security is one of our favorite aspects of this solution. You can deploy… more »
    Top Answer:We can manage everything from the central console and it is very easy.
    Top Answer:We pay for the solution on a yearly basis. It is affordable. I don't exactly know the amount as it is maintained by… more »
    Comparisons
    Also Known As
    MS Cloud App Security, Microsoft Cloud App Security
    McAfee Endpoint Security, McAfee Complete Endpoint Protection, McAfee Endpoint Protection, Total Protection for Endpoint, Intel Security Total Protection for Endpoint, MCAFEE Complete Endpoint Protection
    Learn More
    Overview

    Microsoft Defender for Cloud Apps is a cloud access security broker (CASB) that provides multifunction visibility, control over data travel, and sophisticated analytics. With Microsoft Cloud App Security, you can: 

    - Manage, control, and audit apps to streamline cloud access security

    - Mange your access to resources to discover shadow IT and understand your digital information estate

    - Use real-time controls to enable threat protection on all the access points that touch your environment

    To learn more about our solution, ask questions, and share feedback, join our Microsoft Security, Compliance and Identity Community.

    Cynet has pioneered the security industry’s first all-in-one security platform purposely built for organizations that need the ability to effortlessly identify, block and respond to all types of attacks inside the perimeter - defending endpoints, network, files and users - without the heavy burden of deep cyber expertise and the overhead of integrating and managing multiple products. Our approach converges and brings synergy with technology: endpoint protection, EDR, vulnerability management, deception, threat intelligence and network and end-user analytics, and expertise: a 24/7 cyber SWAT team for incident response, malware analysis, threat hunting and forensics. Cynet deploys in hours and simplifies management with automated monitoring to complement any sized staff.

    Cynet Consists Of:

    • Next-generation AV (NGAV)
    • Endpoint Detection Response (EDR)
    • UBA Rules
    • Network Detection Rules
    • Intelligent Deception

    With Cynet You Can:

    • Consolidate network and endpoint protection in one central place
    • Protect against a very wide range of attacks, including common attacks as well as complex multi-layered attacks
    • Have access to a team of world-class cybersecurity experts available around the clock that complements whatever expertise you have in place

    Cynet Supports:

    Four different deployment methods:

    1. On-premise
    2. IAAS
    3. SAAS
    4. Hybrid mode

    Cynet Benefits and Features:

    • Advanced threat detection
    • Incident response capabilities
    • Extended detection and response(XDR)
    • Managed detection and response (MDR)
    • Response automation
    • Network-specific playbook
    • Multi-layer protection
    • Alerts delivered to a single point for visibility
    • In-house SOC for clientele

    Features Users Find Most Valuable:

    • IT hygiene: By scanning assets, including endpoints, users, files, and network traffic to render a dashboard of security issues, Cynet is able to quickly map an entire IT infrastructure.
    • Prevention: Various prevention capabilities include UBA, deception, and traditional endpoint protection.
    • Detection: This includes traditional endpoint security, EDR, UBA, deception and network analytics, which helps detect malicious behavior, ransomware, exploitation, user login anomalies, DNS tunneling, and much more.
    • Vulnerability management: Cynet can find Windows vulnerabilities, unauthorized and outdated applications, and security policy violations.
    • Response: Cynet includes various analyses, response and remediation capabilities, across endpoints, files, users and networks.
    • Automated response: Users can create an automatic remediation rule for each alert Cynet creates, which helps improve the incident response process and can prevent a real-time threat.
    • 24/7 Support: For no additional cost, Cynet includes CyOp, a 24/7 operations team available to you at all times.

    Reviews from Real Users

    “I have found the continued support and pretty much all the features to be valuable. They all stand out as being positive. It continues to detect unusual activity when it's supposed to, and so far we haven't had any issues.” - Ken S., Director InfoSec and Audit at a manufacturing company

    "The feature that I have found most valuable is that the configuration and the usage of the product are not so complicated. For people responsible for using this infrastructure for the first line of workstation monitoring, it's quite easy to use." - Senior Cyber Security Manager at a financial services firm

    "The dashboard is beautiful, overall ease of use, and the UBA and NBA features are valued." - Harsh P., Cyber Security Operations Center Analyst at Vincacyber

    Trellix Endpoint Security provides aggressive robust protection for every endpoint in an enterprise organization. Trellix uses dynamic threat intelligence and mounts a superb defense across the complete threat lifecycle. This solution will keep your organization more secure and resistant to any possible threat of risks. Trellix offers an amalgamated suite of next-generation endpoint security tools. These tools give users the benefit of machine learning, intuitive intelligence, and greater assistance to ensure their networks are being protected non-stop against threats - potential or realized - and can stop attacks before they happen. Trellix uses MDR (managed detection and response) and XDR (extended detection and response) to give users a comprehensive endpoint security solution.

    Trellix Endpoint Security Benefits

    • Intuitive Protection: Trellix Endpoint Security learns and matures to ensure organizations are continuously protected in today’s aggressive threat environment. Users have full visibility and greater control of all endpoints and are able to utilize Trellix Endpoint Security’s potent threat detection, prevention, investigation, and response to keep their enterprises safe and secure.

    • Streamlined Security Protection: Users have a single view of full transparency into how their networks are performing and the overall effectiveness of the security. Users can access the solution from anywhere and manage automated workflows. The solution allows for a streamlined security process to improve the overall reliability of the organization's security and can effortlessly scan through hundreds of thousands of endpoints in minutes.

    • Robust Risk Management: Stop attacks before they occur and keep abreast of potential threats with intuitive threat prioritization. Receive easy to understand risk assessment and repair guidance without delay to prevent any possible lapses in security. Test scenarios will allow users to see how the organization would respond to a threat scheme.

    Trellix Endpoint Security Top Features

    • Consolidated Management: Trellix offers numerous deployment options. The unique consolidated management process provides full transparency, cost-effective processes, improved IT functionality, and streamlined operations.

    • Intuitive Processes: Trellix can identify zero-day threats using machine learning and develop workable risk assessment to prevent attacks. Trellix intuitively creates protocols to recognize problematic processes that could lead to future attacks.
    • Reduced Impact on Resources: Trellix learns to focus on suspicious or anomalous activities by quickly identifying trusted activities to greatly reduce CPU consumption.

    Reviews from Real Users

    “It has a great console. We can manage everything from the central console and it is very easy. Every year we are getting the benefits of legacy also. It's easy to set up.” - S Fazlul H., IT Lead Engineer, Information Technology at Banglalink

    “There is a new feature where you can set thresholds for all the CPU consumption allowing for no consumption on the servers when the scans happen. It is a separate plugin or addon, and if we have it on all the virtual machines it automatically checks the resources, and based on that, it will schedule the scans. That is something that I have not seen in other antivirus solutions, such as Symantec.” - Sabari K. Senior Engineer at a comms service provider

    Offer
    Learn more about Microsoft Defender for Cloud Apps
    Learn more about Cynet
    Learn more about Trellix Endpoint Security
    Sample Customers
    Customers for Microsoft Defender for Cloud Apps include Accenture, St. Luke’s University Health Network, Ansell, and Nakilat.
    Meuhedet, East Boston Neighborhood Health Center
    inHouseIT, Seagate Technology
    Top Industries
    REVIEWERS
    Educational Organization29%
    Government14%
    Construction Company14%
    Computer Software Company14%
    VISITORS READING REVIEWS
    Computer Software Company24%
    Comms Service Provider19%
    Financial Services Firm8%
    Government6%
    REVIEWERS
    Manufacturing Company20%
    Financial Services Firm20%
    Cloud Provider13%
    Comms Service Provider13%
    VISITORS READING REVIEWS
    Computer Software Company23%
    Comms Service Provider22%
    Government6%
    Financial Services Firm5%
    REVIEWERS
    Financial Services Firm25%
    Computer Software Company15%
    Government13%
    Comms Service Provider10%
    VISITORS READING REVIEWS
    Computer Software Company25%
    Comms Service Provider18%
    Government9%
    Manufacturing Company7%
    Company Size
    REVIEWERS
    Small Business21%
    Midsize Enterprise37%
    Large Enterprise42%
    VISITORS READING REVIEWS
    Small Business20%
    Midsize Enterprise16%
    Large Enterprise64%
    REVIEWERS
    Small Business45%
    Midsize Enterprise27%
    Large Enterprise27%
    VISITORS READING REVIEWS
    Small Business32%
    Midsize Enterprise22%
    Large Enterprise46%
    REVIEWERS
    Small Business36%
    Midsize Enterprise21%
    Large Enterprise43%
    VISITORS READING REVIEWS
    Small Business19%
    Midsize Enterprise17%
    Large Enterprise64%
    Buyer's Guide
    Cynet vs. Trellix Endpoint Security
    July 2022
    Find out what your peers are saying about Cynet vs. Trellix Endpoint Security and other solutions. Updated: July 2022.
    621,327 professionals have used our research since 2012.

    Cynet is ranked 4th in Extended Detection and Response (XDR) with 17 reviews while Trellix Endpoint Security is ranked 3rd in Extended Detection and Response (XDR) with 37 reviews. Cynet is rated 8.6, while Trellix Endpoint Security is rated 8.0. The top reviewer of Cynet writes "A complete, transparent, and centralized solution ". On the other hand, the top reviewer of Trellix Endpoint Security writes "Protect your business against a wide variety of threats". Cynet is most compared with SentinelOne, Microsoft Defender for Endpoint, CrowdStrike Falcon, Darktrace and Rapid7 InsightVM, whereas Trellix Endpoint Security is most compared with McAfee MVISION Endpoint, Microsoft Defender for Endpoint, Symantec Endpoint Security, Cortex XDR by Palo Alto Networks and CrowdStrike Falcon. See our Cynet vs. Trellix Endpoint Security report.

    See our list of best Extended Detection and Response (XDR) vendors.

    We monitor all Extended Detection and Response (XDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.