Try our new research platform with insights from 80,000+ expert users

ESET Inspect vs Trellix Endpoint Detection and Response (EDR) comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

ESET Inspect
Ranking in Endpoint Detection and Response (EDR)
32nd
Average Rating
7.6
Reviews Sentiment
7.4
Number of Reviews
7
Ranking in other categories
No ranking in other categories
Trellix Endpoint Detection ...
Ranking in Endpoint Detection and Response (EDR)
22nd
Average Rating
7.4
Reviews Sentiment
7.2
Number of Reviews
23
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of October 2025, in the Endpoint Detection and Response (EDR) category, the mindshare of ESET Inspect is 1.3%, up from 0.7% compared to the previous year. The mindshare of Trellix Endpoint Detection and Response (EDR) is 1.2%, up from 0.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Detection and Response (EDR) Market Share Distribution
ProductMarket Share (%)
Trellix Endpoint Detection and Response (EDR)1.2%
ESET Inspect1.3%
Other97.5%
Endpoint Detection and Response (EDR)
 

Featured Reviews

Cees Van Den Haak - PeerSpot reviewer
A product with an easy setup phase that helps manage attacks and vulnerabilities
The most valuable features of the solution stem from the fact that you can manage and react to vulnerabilities and attacks on all the workstations or laptops. You can put certain workstations and isolation. With ESET PROTECT, you see only one machine that is protected, but with ESET Inspect, you see all the machines that are protected in an environment.
CESARCASTRO - PeerSpot reviewer
Enhancements needed for security alerts while ongoing training strengthens defenses
This year, I am going to improve some tools to be installed or maybe acquire some services to better manage our web services and work with my coworkers. Application fiber also needs attention. Nowadays I am making applications that are publicly seen on the Internet. I need some protection, possibly multi-factor authentication improvements. I am seeing, for workflows, some sort of ethical hacking to test our environment. Knowledge of everything, not only the product - maybe some kind of alerts - needs to emerge. I see the current ones as very low-tier, and they must improve.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Scalability-wise, it is a very good solution."
"The rules are the best and most useful features."
"I find the multilayered endpoint security the most valuable feature."
"Rules are the most valuable feature of ESET Inspect. They are created through XML language, and they track and filter events from endpoints. If the event matches the rule, the rule is triggered. Exceptions are the second most valuable feature because it gives you the power to filter false positives in large numbers. The third most valuable feature is the Learning mode that facilitates making exceptions for known processes with a good reputation."
"The product's most valuable features are its performance and stability."
"ESET Enterprise Inspector's most valuable feature is EDR."
"ESET Enterprise Inspector's greatest asset lies in its user-friendly interface, which allows for easy navigation and thorough analysis of incidents."
"The most valuable features of the solution are the ability to isolate or quarantine devices and block or detect Ransomware and other well-known tools that are used to exploit vulnerabilities on devices."
"The product and the services we have are quite good."
"If there is any malicious behavior in the workstation or server, the tool stops or isolates it automatically and generates alerts."
"Blocking browser navigation is a feature of the solution with which we have experienced success."
"This is a stable product."
"The product is user-friendly."
"Trellix has a user-friendly interface."
"The product provides a one-click recovery of encrypted files."
 

Cons

"The platform's price could be better."
"The solution could improve the consumption of resources. The RAM and CPU usage increases during usage which can cause issues. We have three separate services and it would be beneficial if all were executed from one agent limiting the over usage of system resources."
"It may be difficult for a first-time customer to understand all of the functions that are available to him."
"The product is complex to configure, and there are too many errors that are not errors, making it an area that can be considered for improvement."
"It is not a stable product. We were disappointed in the stability of this product in comparison to McAffee."
"One area that needs improvement for the product is ransomware protection, which does not offer complete security."
"Every vendor is working on making the job of SOC analysts easier, with fewer false positives and more precise detections. ESET uses LiveGrid technology that provides feedback on the reputation of files and operations. It's hard to eliminate all of the false positives, but hopefully, we'll see some improvement with the advances in AI."
"When it comes to some unknown fileless attacks, the tool is not able to detect them properly, making it an area where improvements are required."
"The CPU utilization of the product is quite high compared to its competitors."
"The solution lacks the ability to integrate with external platforms. In future releases of the solution, I would like to see the solution increase its integration capabilities with external platforms."
"The searching capabilities for the IOCs can be further improved"
"I need some protection, possibly multi-factor authentication improvements."
"The technical support must be improved."
"I'd like the tool to become more like an XDR, with one management system and endpoint activation."
"An area for improvement in McAfee MVISION Endpoint Detection and Response is the historical search. For example: when you have information on the artifact and a precedent, you want to do a search, and that is a bit lacking in the tool."
 

Pricing and Cost Advice

"The platform's licensing is affordable and straightforward."
"I feel it is a very expensive product."
"The platform is expensive; it could be cheaper."
"This is true in the case of licensing, we do not have the most expensive products, and we don't have the cheapest product, it's somewhere in the middle. Perhaps a little higher from the middle, but we are known for what we provide to our customers, and they are pleased."
"The pricing and licensing are the big issue now, in my opinion. If the price was less than other companies, or a one-time charge for service was available, I think there would be more users of this solution."
"Pricing for McAfee MVISION Endpoint Detection and Response is not that expensive, but it's not something that a startup could buy. Pricing for it is for midsized businesses. There's an additional payment if you want data retention for more than thirty days. They gave us data retention for thirty days. Then if you want longer data retention, they have the paid option for a three-month data retention period and for a one-year data retention period."
"Speaking about the price, you must use the product to find the product's cost for you."
"The licensing costs attached to the solution are very easy to manage. There is a need to make yearly payments towards the licensing costs."
"McAfee MVISION Endpoint Detection and Response is reasonable in terms of cost. It's a tool my company has been using for a few years now. It costs $25,000 to $30,000 for six hundred users."
"The cost is okay, compared to other products."
"The price is reasonable."
"On a scale of one to ten, where one is low and ten is high, I rate the solution's pricing an eight out of ten."
"Pricing is a problem in South Africa. It could be cheaper here. The rand-to-dollar exchange rate makes it expensive for us. A 25 dollar endpoint cost becomes quite significant when converted to rand."
report
Use our free recommendation engine to learn which Endpoint Detection and Response (EDR) solutions are best for your needs.
869,760 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
14%
Comms Service Provider
12%
Financial Services Firm
9%
Manufacturing Company
7%
Computer Software Company
12%
Financial Services Firm
12%
Government
11%
Manufacturing Company
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business5
Large Enterprise2
By reviewers
Company SizeCount
Small Business11
Midsize Enterprise3
Large Enterprise9
 

Questions from the Community

What do you like most about ESET Inspect?
Scalability-wise, it is a very good solution.
What is your experience regarding pricing and costs for ESET Inspect?
The platform's licensing is affordable and straightforward. We purchase soft keys, install them, and manage the license through their portal. There are no hidden or extra costs involved.
What needs improvement with ESET Inspect?
One area that needs improvement for the product is ransomware protection, which does not offer complete security.
What is your experience regarding pricing and costs for McAfee MVISION Endpoint Detection and Response?
I haven't had any really great problems with pricing in the past two or three years.
What needs improvement with McAfee MVISION Endpoint Detection and Response?
This year, I am going to improve some tools to be installed or maybe acquire some services to better manage our web services and work with my coworkers. Application fiber also needs attention. Nowa...
 

Also Known As

ESET Enterprise Inspector
McAfee MVISION EDR, MVISION EDR, MVISION Endpoint Detection and Response
 

Overview

 

Sample Customers

Mitsubishi Motors, Allianz Suisse, Cannon, T-Mobile
Sutherland Global Services
Find out what your peers are saying about ESET Inspect vs. Trellix Endpoint Detection and Response (EDR) and other solutions. Updated: September 2025.
869,760 professionals have used our research since 2012.