No more typing reviews! Try our Samantha, our new voice AI agent.

DataDome vs Trellix Collaboration Security comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

DataDome
Ranking in AI Security
19th
Average Rating
8.0
Reviews Sentiment
4.4
Number of Reviews
2
Ranking in other categories
Bot Management (4th)
Trellix Collaboration Security
Ranking in AI Security
11th
Average Rating
8.8
Reviews Sentiment
6.9
Number of Reviews
19
Ranking in other categories
Email Security (11th), Instant Communications Security and Compliance (2nd), Secure Email Gateway (SEG) (6th)
 

Mindshare comparison

As of May 2026, in the AI Security category, the mindshare of DataDome is 0.6%. The mindshare of Trellix Collaboration Security is 0.7%. It is calculated based on PeerSpot user engagement data.
AI Security Mindshare Distribution
ProductMindshare (%)
Trellix Collaboration Security0.7%
DataDome0.6%
Other98.7%
AI Security
 

Featured Reviews

AM
Sr. Executive Engineer at a tech services company with 51-200 employees
Automated bot detection has protected logins and preserved accurate analytics insights
The best features in DataDome include AI-powered bot detection, which is crucial for real-time protection and high accuracy with low friction. It offers protection against multiple attack types, full visibility, and an analytics dashboard that supports scalability and performance. The AI-powered real-time bot detection feature is relied upon daily as it eliminates the need for constant manual intervention, saving us from manually digging through logs and writing custom rules to address sudden traffic spikes, login failures, and slower response times. With fewer security incidents, reduced infrastructure load, and cleaner analytics, I noticed an improved user experience and time saved across teams during high-risk times.
Felipe Antoniazzi - PeerSpot reviewer
Cybersecurity Engineer Lead at Johnson & Johnson
Real-time threat response has boosted detection accuracy and reduces manual investigation work
I have had challenges in the past with Trellix Collaboration Security for implementation because of issues related to compatibility. Since we worked in a global company with different operating systems, it was necessary to create different plans and different actions to implement the product.One thing I really do not prefer in Trellix Collaboration Security is not related to the console. I am a McAfee fan since the McAfee tool, and I find the console of Trellix Collaboration Security to be very user-friendly and easy to use. However, I do not know if it is related to the architecture of the product. Of course, we have modern threats based on behaviors and zero days. We have today CrowdStrike and SentinelOne, where we have better results based on threats and behavior, where it is possible to create a simulation environment based on the file detected and based on it, confirm if it really is malicious or not. In general, I believe Trellix Collaboration Security improved the console based on the last console of McAfee, but I think it is possible to improve more. It really is a good product, but in my view, it needs to improve detection based on behaviors. Regarding automations, I have implemented Trellix Collaboration Security here at Johnson & Johnson, and I implemented it in the same situation at Santander Bank and BNP Paribas Bank, where I created automations to export data for different metrics, including malicious detections, compliance, baselines, scans, last scans based on the seven days, and checking of patterns. I export everything to CSV files. Based on that, I create Power BI dashboards, and in these Power BI dashboards, I have a more executive view for different metrics to provide to myself, my manager, or director to create an executive view based on it. Another important point we use here at Johnson & Johnson and other companies is a data hub or a SIEM solution, such as Elastic or ArcSight, where we select some logs to be sent and use it to build reports and metrics.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature of DataDome is the traffic analysis."
"The biggest positive impact of using DataDome has been stability, efficiency, and trust in our traffic all at the same time."
"The initial setup is simple."
"It is one of the greatest solutions to have or to complement any other security solution such as Proofpoint or IronPort."
"The solution offers almost every feature that customers need in one solution, for example, spam filtering, antivirus, et cetera, with almost zero false positives."
"I rely on Trellix Collaboration Security because the sensors are highly reliable and high-performance sensors that can handle traffic efficiently."
"Trellix Collaboration Security is valued for being a stable and comprehensive solution that fulfills customer needs."
"What I find most valuable with the solution is that it can integrate with cloud solutions, such as Google and Microsoft, and the solution is easy to use."
"FireEye Email Security helps us prevent spam and phishing emails and all other business-compromised email attacks."
"The accessibility is one of the features that I love; we can control it from the cloud and we can access it from anywhere."
 

Cons

"DataDome does not catch legitimate IPs during traffic analysis, even when the traffic exceeds the threshold value."
"Needed improvements could focus on specific aspects that impact my workflow, enabling even more streamlined processes."
"The solution needs better support."
"If you really need something powerful to handle multiple routes and delivery points then this solution might not be for you."
"The solution must provide features to scan QR codes for threats."
"I observe that the return on investment is hindered by the lack of adequate training opportunities, with Trellix's own training being quite costly, ranging from 2,000 to 4,000 dollars, which many small or medium-sized businesses cannot afford."
"I would like the solution to be able to automatically quarantine the malicious emails before getting to the user's mailbox and continue with regular email operations. This could result in the user clicking the email before the purge operation is completed."
"Sometimes especially zero-day spam emails can be passed to the user's inbox."
"The solution is not easy to set up. However, we have employees that have the knowledge that can do the difficult implementation. It would be better if the process was easier."
"I would like to see this solution become more flexible."
 

Pricing and Cost Advice

Information not available
"The licensing is on a yearly basis."
"The cost is very high."
"I rate the product price as nine out of ten, where ten is the most expensive, and one is the cheapest. There is no need to pay any extra charges apart from the licensing costs."
"The solution requires a license to be purchased for every user."
report
Use our free recommendation engine to learn which AI Security solutions are best for your needs.
894,738 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
9%
Financial Services Firm
9%
University
9%
Comms Service Provider
7%
Manufacturing Company
14%
Construction Company
12%
Comms Service Provider
11%
Healthcare Company
11%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business8
Midsize Enterprise4
Large Enterprise13
 

Questions from the Community

What needs improvement with DataDome?
The solution catches and perfectly blocks traffic from malicious IPs. DataDome does not catch legitimate IPs during traffic analysis, even when the traffic exceeds the threshold value.
What is your primary use case for DataDome?
We are DataDome in SOC for cybersecurity. We use the solution to perform traffic analysis on any website or server to see whether there is a lot or little traffic.
What advice do you have for others considering DataDome?
Using the solution depends on your purpose. DataDome is a good tool for analyzing traffic in a SOC project. It is easy for a new user to learn to use the solution for the first time. Overall, I rat...
What do you like most about FireEye Email Security?
One of the valuable features of the product stems from the fact that it is easy to implement the tool in our environment.
What needs improvement with FireEye Email Security?
I have had challenges in the past with Trellix Collaboration Security for implementation because of issues related to compatibility. Since we worked in a global company with different operating sys...
What is your primary use case for FireEye Email Security?
In my field, I have been in the information security area for 17 years, and I am currently working in my position for a year and a half.I have worked with Trellix Collaboration Security for several...
 

Also Known As

DataDome Bot Protect with Agent Trust
FireEye Email Security
 

Overview

 

Sample Customers

Rakuten, TripAdvisor, Adevinta, Classmates, BlaBlaCar, Veepee, ...
Northshore Utility District, Luz Technologies, Air Academy Federal Credit Union, Bank Gutmann, Bank of Thailand, Penn State Health Milton S. Hershey Medical Center, State of Missouri, City and County of San Francisco, Denver Public Schools, Vodafone, Go Auto, Stater Bros. Market
Find out what your peers are saying about Checkmarx, TrendAI, Orca Security and others in AI Security. Updated: May 2026.
894,738 professionals have used our research since 2012.