We performed a comparison between Cynet and Trellix Endpoint Security based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Cynet offers strong ransomware protection and an intuitive interface. Trellix Endpoint Security users like the ePolicy Orchestrator, the solution’s robust central management console. Cynet needs to expand device support and add customization options. Users suggest improving network monitoring and strengthening integration with other tools. Trellix could improve by reducing resource usage, enhancing stability, and making the solution more user-friendly.
Service and Support: Cynet's customer service is consistently lauded for its excellence. They have a dedicated support team that is available round the clock, and they also have a contingency plan for urgent incidents. Some users say Trellix support is helpful and responsive, while others believe there is room for improvement in communication and resolution times.
Ease of Deployment: Cynet’s setup is highly efficient, with the ability to configure thousands of devices quickly. Setting up Trellix Endpoint Security is simple if the user has some expertise.
Pricing: Customers generally view Cynet's pricing and licensing experience as affordable and a good value for its features.Trellix Endpoint Security’s pricing is considered flexible, competitive, and about average compared to other solutions.
ROI: Cynet yields an excellent ROI by preventing cyberattacks and safeguarding sensitive data. Users reported saving time by implementing Trellix Endpoint Security.
"The ability to hunt that IM data set or the identity data set at the same time is valuable. As incident response professionals, we are very used to EDRs and having device process registry telemetry, but a lot of times, we do not have that identity data right there with us, so we have to go search for it in some other silo. Being able to cross-correlate via both datasets at the same time is something that we can only do in Def"
"We also use Microsoft Sentinel, Defender for Cloud, Defender for Identity, and Microsoft Defender for Cloud Apps. They are all integrated and it was very easy to integrate them. In my experience with the integrations, it was just a click of a button and things were integrated. It's just a button."
"The EDR features are valuable. By getting the EDR features, we have more control over the device. We have information about events in real-time and more protection against zero-day threats and zero-day vulnerabilities. We can monitor every event or action that a device is going through. We can get an idea if it is something malicious or if we have to take any actions."
"Another noteworthy feature that I find appealing in Microsoft Defender is the credit-backed simulation. This feature enables organizations to train their users on effectively responding to phishing emails through a simulated training environment."
"We are able to consolidate licences and make use of many Microsoft products using this solution. If we have any Microsoft customers, we encourage them to use this solution for enterprise defence."
"Microsoft 365 Defender is simple to upgrade."
"The most valuable feature of the solution stems from the fact that Microsoft Defender XDR is easy to integrate with other Microsoft platforms or products."
"The most valuable aspect is undoubtedly the exploration capability"
"It can be deployed in autonomous mode, and then it automatically blocks malware threats."
"Cynet's most valuable features are laptop and server performance, internal network monitoring, and external firewall lock management."
"A reliable security system that automatically quarantines anything suspicious."
"The initial setup is very fast and very easy."
"We are using almost all of the features and we find it quite good overall."
"Cynet is unique in that it has almost everything included and it was built up from the ground, instead of a bundle of purchased and composed modules. It gives you easier very good visibility than Sentinel One as well as a lower maintenance burden."
"I like the Cynet Correlator™ feature."
"I like that you can implement it in the managed service portfolio."
"We really like the dashboard from Trellix and we've found that it's pretty informative."
"It has been protecting us for many years, and we hope it will continue to do so for many years to come."
"This product has the capability to check a wide range of vulnerabilities and devices."
"The central management console is powerful. You can manage endpoints, DLP, encryption, and all the other features from a single console."
"It has a very simple like multi-tenancy option and scalability is outstanding."
"Would benefit with the addition of DLP features."
"We can manage everything from the central console and it is very easy."
"Communication with all Mcafee products (also 3rd parties) by DXL infrastructure."
"At times, when we have an incident email and we click on the link for that incident, it opens a pop-up, but there is nothing. It has happened a couple of times."
"A simple dashboard without having to use MS Sentinel would be a welcome improvement."
"Stability could be improved by avoiding frequent changes to the interface."
"There should be better information for experts on features in the solution. What I see when reading about features in Microsoft 365 Defender is that it is always general information. If Microsoft could go deeper into details for the experts about how to use the tools, usage of it would be more familiar and it would be easier to use."
"Generally, antivirus products provide a central control to manage every device in terms of who is installing it or who is trying to disable it, but Microsoft doesn't have such a control center for the antivirus product it provides."
"The interface could be improved. For example, if you want to do a phishing simulation for your employees, it can take a while to figure out what to do. The interface is a bit messy and could be updated. It isn't too bad, but doing some things can be a long process."
"The cost can be high if you want to build custom license packages. Another area for improvement is the policies. In Azure, we need to implement policies in JSON format, but in 365 Defender 365, it would be helpful to use a different format so we can customize the platform."
"Intrusion detection and prevention would be great to have with 365 Defender."
"In future releases, I would like to see cloud security aspects included."
"Its dashboard is not so good. On the dashboard, they don't show the count for client endpoints, which is a failure of this product. This count should be shown on the dashboard. I have 1,000 clients, but I can't see it anywhere on the dashboard."
"Could have better integration with other security applications."
"Cynet could improve when a reverse proxy is being used to connect to the servers. There could be an easier configuration because it is not plug-and-play."
"I cannot provide more details about Cynet's automation features. While Cynet claims to be automated, the specifics of this automation are unclear. They claim to have a high capability to detect and block attacks, but I am cautious about companies that claim to solve every problem without limitations. It does help in identifying malware on the network but doesn't specifically identify vulnerabilities."
"Management of the console could be simplified and made more user-friendly because right now it's not very easy to use."
"I think the technical support could be better."
"There are some shortcomings in Cynet's integration capabilities that need improvement."
"Signatures to protect against new attacks."
"The tool could provide more advanced protection."
"The solution could use better updates and fewer bugs."
"The VirusScan needs to improve in order to detect ransomware and other advanced threats."
"When it runs in the background of the endpoint, the devices get slowed down for some applications."
"The management console is a little bit difficult to understand for admins. You need a lot of time in order to become familiar with that. It is a little bit complicated and not too easy to understand. Its price can also be improved. Its price is higher than its competitors. McAfee also needs to have better cloud integration and more data centers in the EU. The cloud center should be in Europe or in Germany. In Germany, it is really important to have access to your data within the same country. Customer data needs to be placed and processed in the same country."
"The DAC (Dynamic Application Containment) component of this product needs improvement."
"We experienced some bad behavior when we first installed the product. The system also starts slowly in some instances. If for some reason this solution crashes, we could lose all our data."
Cynet is ranked 17th in Endpoint Protection Platform (EPP) with 35 reviews while Trellix Endpoint Security is ranked 10th in Endpoint Protection Platform (EPP) with 94 reviews. Cynet is rated 8.8, while Trellix Endpoint Security is rated 8.0. The top reviewer of Cynet writes "Provides memory protection, device control, and vulnerability management". On the other hand, the top reviewer of Trellix Endpoint Security writes "Good user behavioral analysis and helpful patching but needs better support services". Cynet is most compared with CrowdStrike Falcon, SentinelOne Singularity Complete, Microsoft Defender for Endpoint, ESET Endpoint Protection Platform and Cortex XDR by Palo Alto Networks, whereas Trellix Endpoint Security is most compared with Microsoft Defender for Endpoint, Trellix Endpoint Security (ENS), CrowdStrike Falcon, Cortex XDR by Palo Alto Networks and Trend Micro Deep Security. See our Cynet vs. Trellix Endpoint Security report.
See our list of best Endpoint Protection Platform (EPP) vendors, best Extended Detection and Response (XDR) vendors, and best Endpoint Detection and Response (EDR) vendors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.