Try our new research platform with insights from 80,000+ expert users

Dell Data Protection - Endpoint Security Suite [EOL] vs Trellix Endpoint Security Platform comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 14, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
108
Ranking in other categories
Endpoint Protection Platform (EPP) (5th), Endpoint Detection and Response (EDR) (7th), Extended Detection and Response (XDR) (6th), Ransomware Protection (2nd), AI-Powered Cybersecurity Platforms (2nd)
Dell Data Protection - Endp...
Average Rating
8.0
Reviews Sentiment
3.9
Number of Reviews
6
Ranking in other categories
No ranking in other categories
Trellix Endpoint Security P...
Average Rating
7.8
Reviews Sentiment
7.1
Number of Reviews
160
Ranking in other categories
Endpoint Protection Platform (EPP) (7th), Endpoint Detection and Response (EDR) (11th), Extended Detection and Response (XDR) (10th)
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
Alexander Zhuravel - PeerSpot reviewer
Head of Network and Server infrastructure department at JSC Alfa Bank Ukraine
A highly scalable tool that ensures its users face no problems while using it as a backup system
The tool is scalable and is currently being used on over 2,000 nodes. So, our company doesn't count the number of clients we have, but we do count the number of nodes, specifically referring to file system nodes, backup nodes, database nodes, virtual machine nodes, and blockchain nodes, which we use for file-based applications. According to the traffic, a backup of five petabytes of data can be done for a month.
PankajKumar24 - PeerSpot reviewer
IT Manager at Gigabit Technologies Pvt Ltd
Advanced threat prevention has strengthened incident response and customized security workflows
The biggest advantage of Trellix Endpoint Security Platform is the ATP solution, which provides advanced threat prevention. Machine learning algorithms are available in the product as part of the threat anti-malware, including predictive machine learning and behavioral analysis, which are integral to the anti-malware module of EPP. In terms of my experience with the machine learning algorithms for analysis and threat detection, we are analyzing logs provided by Trellix, but we are not able to conduct specific machine learning analysis on those logs. The automated response mechanisms in the products help with incident management because we have to create playbooks in Trellix console for automation, which we need to enable. The customizable dashboard of Trellix Endpoint Security Platform definitely contributes to the decision-making process, as we customize the dashboard according to customer requirements. When it comes to integration aspects, we are able to integrate Trellix Endpoint Security Platform with SIEM or SOAR solutions using the ePO console, which enhances threat detection capabilities. Reporting and analytics aspects have an impact on security posture assessment, as we are able to fetch reports in the ePO console customized according to customer requirements for downloading and sending via email.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable features are incident creation, policy-based protection, IP whitelisting, and device encryption. These are beneficial for endpoint and server security."
"The best feature of Cortex XDR by Palo Alto Networks is that it collects logs from different sections such as the endpoint, the network, and the cloud, making it easy to investigate alerts, collect some of the investigation packages related to the infected machines, and provide live response."
"The main benefit of using Cortex XDR by Palo Alto Networks while employing Palo Alto Firewall at the internet edge is that it improves security on our endpoint devices, integrating seamlessly with Palo Alto Firewalls to deliver comprehensive network, analyst, and security details all in a single dashboard, which allows us to manage everything from our network devices."
"It is an easy-to-use tool."
"Has great threat detection capabilities."
"Traps pays for itself within the first 16 months of a three-year subscription."
"After deploying Traps, we saw the performance of the network improve by 65 to 70 percent."
"The dashboard is customizable."
"The security engine is effective at catching potential threats."
"The backup speed and deduplication are the most valuable features."
"There's a really they have a really nice way to test it first. Before you adopt it. And so I would suggest trying to they they create a test site for you, and they give you a link to it, and you can basically try out all the features on your own for I think we did it for a month."
"Technical support is excellent."
"Dell Data Protection has a decent service and integrates well with users' active directories."
"It is a stable solution. Our company faces no problems with the backup system…The initial setup wasn't complex."
"The most valuable features of the solution are its speed, backup speed, and restore speed."
"It is a stable solution."
"I think McAfee is the best solution; anyone can use it, the protection is good, and they have all of the features."
"We really like the dashboard from Trellix and we've found that it's pretty informative."
"The solution is a reliable and mature product. Its reporting function is robust, and the user interface is easy to use. End users can create customized reports with detailed reporting for any computer and export them in PDF or other formats. This reporting capability is very robust."
"It provides a robust defense against cybersecurity threats while offering user-friendly features like notifications and approval prompts."
"We are sure that our endpoints are safe; they are protected by McAfee, and as IT, we can monitor centrally how safe the endpoints are and what threats have occurred."
"McAfee Endpoint Security 10.5 has improved our security and made our customers more effective."
"The product has a robust reporting feature"
"Trellix Security Endpoint can promptly isolate any host machines directly from the console. If alerts are received and isolation is necessary, it can be accomplished through the console. The console itself holds significant value, accessible through a browser and allowing remote actions via cloud login."
 

Cons

"We would also like to have advanced tech protection and email scanning."
"There is a severe gap in functionality between Windows, Linux, and Mac versions."
"The price could be a little lower."
"In general, the price could be more competitive."
"I feel that it should not be a licensed activity because a feature should allow us to see applications running on end devices."
"In an upcoming release, the solution could improve by proving hard disk encryption. If it could support this it would be a complete solution."
"The downsides of Cortex XDR by Palo Alto Networks are that in many incidents, when I enter the causality chain, there are numerous logs."
"The solution should offer more dashboards and they should be better customized."
"Whenever we talk about reporting, I have a chance to look at the reporting, and in my opinion, it's not user-friendly."
"The backup speed and deduplication are the most valuable features."
"The solution could be more user-friendly."
"I consider the product pretty expensive, so from an improvement perspective, I would like the pricing to be better."
"The solution’s user interface should be made more user-friendly."
"Implementation in a beta environment is necessary before rollout to the larger community."
"The restore feed needs improvement."
"If you have another endpoint product running on the same machine, you have to fine tune functions from FireEye to avoid performance and user experience issues."
"The initial setup is complex. It is a very complex product. You must have experience with it."
"McAfee GW Security and McAfee Child Safety need some improvement as they are relatively new."
"Support-wise they need to be better."
"Some agents become old and then they don't communicate well any longer."
"The product does not seem to be cloud-native and there are issues with automating it. Automation is not intuitive."
"The DAC (Dynamic Application Containment) component of this product needs improvement."
"Performance is a problematic area in the solution needing improvement."
 

Pricing and Cost Advice

"I don't like that they have different types of licenses."
"The solution is expensive. It's pricing is on a yearly-basis."
"The price was fine."
"The solution has one subscription for endpoint protection and one subscription for detection and response. The two licenses combined give you the BRO version."
"I feel it is fairly priced."
"It is "expensive" and flexible."
"Our license will require renewal in August, after which the maintenance will continue as usual."
"It has a higher cost than other solutions, like CrowdStrike or Microsoft’s EDR tools, but it reduces the cost of our operations because it’s a new generation antivirus tool."
"It is more expensive than one of its competitors."
"You'll need to pay more than the product's original price for the support."
"It is an expensive solution."
"I rate Trellix Endpoint Security a nine out of ten for pricing."
"The price of McAfee is pretty similar to Symantec, and there are no costs in addition to the standard licensing fees."
"The price of the product is similar to the ones in the market that offer the same features."
"The price of the solution is in the middle range compare to others and could be reduced. There are not any additional costs."
"There is a one-year and a three-year license available for this solution, we are currently on a three-year license."
"The price of the solution is fair, we have a complete security package."
"It is reasonably priced."
"Customers would need to purchase a license. If a customer purchases an MVISION Endpoint license, he may use that license to install ENS. It's a flexible license where you have the option to either use the McAfee security software or the Windows Defender managed by McAfee, which is MVISION Endpoint."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
884,933 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
9%
Manufacturing Company
9%
Financial Services Firm
9%
Comms Service Provider
7%
No data available
Manufacturing Company
13%
Government
11%
Financial Services Firm
8%
Computer Software Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business44
Midsize Enterprise20
Large Enterprise47
By reviewers
Company SizeCount
Small Business5
Midsize Enterprise1
Large Enterprise2
By reviewers
Company SizeCount
Small Business68
Midsize Enterprise36
Large Enterprise62
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
Ask a question
Earn 20 points
How does McAfee Endpoint Security compare with MVISION?
The flexible manageability of McAfee Endpoint Security is one of our favorite aspects of this solution. You can deplo...
How does Crowdstrike Falcon compare with FireEye Endpoint Security?
The Crowdstrike Falcon program has a simple to use user interface, making it both an easy to use as well as an effec...
What is your experience regarding pricing and costs for McAfee Endpoint Security?
I don't have visibility on pricing because it is negotiated by a different team, as I look after the technical side.
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
DDP, ESS
McAfee Endpoint Security, McAfee Endpoint Protection, Intel Security Total Protection for Endpoint, McAfee Complete Endpoint Protection, Trellix Endpoint Security (ENS)
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
MEIZU, TBG West, Ackerman Charter School District, Church of the Highlands
inHouseIT, Seagate Technology
Find out what your peers are saying about CrowdStrike, Microsoft, SentinelOne and others in Endpoint Protection Platform (EPP). Updated: February 2026.
884,933 professionals have used our research since 2012.