We performed a comparison between ESET PROTECT Enterprise and Trellix Endpoint Security based on real PeerSpot user reviews.
Find out in this report how the two Extended Detection and Response (XDR) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable feature depends on the scenario. For compliance, I like Microsoft Purview Information Protection and Data Loss Prevention. Sentinel is the most helpful feature for security. 365 Defender helps us prioritize threats across an enterprise. It's a crucial feature for the managed services team."
"Microsoft 365 Defender is simple to upgrade."
"The threat intelligence is excellent."
"The most valuable features of Microsoft 365 Defender are the combination of all the capabilities and centralized management."
"The integration between all the Defender products is the most valuable feature."
"Microsoft Defender XDR is scalable."
"We are able to consolidate licences and make use of many Microsoft products using this solution. If we have any Microsoft customers, we encourage them to use this solution for enterprise defence."
"We also use Microsoft Sentinel, Defender for Cloud, Defender for Identity, and Microsoft Defender for Cloud Apps. They are all integrated and it was very easy to integrate them. In my experience with the integrations, it was just a click of a button and things were integrated. It's just a button."
"I like the dynamic groups feature. They give the ability to filter endpoint machines by any parameter, software, or hardware inventory, and that's a significant advantage when you need to, for example, automate a secondary firewall profile for endpoints outside your network. Or if you want to automatically isolate the computer from the rest of the network if the ransomware is found."
"The most valuable feature of ESET Protect is the security while accessing any transaction, such as online banking systems. When I access a banking website a new browser opens which is more secure, which I find very useful."
"The solution offers a lot of configuration capabilities."
"We can easily manage resources, disable or enable clients and update them."
"The solution doesn't have high memory usage."
"It's helped us with restrictions and knowing which users we can provide permissions to and which users we need to restrict."
"ESET is better in some ways than other vendors because it fulfills many areas where we'd otherwise have to use different products."
"The most valuable features of ESET File Security are the performance and it doesn't take too many resources."
"I feel McAfee Endpoint Security to be a good, mature product."
"The solution offers very good endpoint security."
"The most valuable features are the prevention layer that detects the signature value and prevents threats in the network."
"We can manage everything from the central console and it is very easy."
"When Intel acquired McAfee they worked on the protocol so that all vendors can work on the same platform. It's a very big improvement in McAfee. All McAfee products talk to each other. Other vendor's products can join this platform as well so it makes it more powerful on the enterprise side for McAfee."
"Dynamic Application Containment."
"Communication with all Mcafee products (also 3rd parties) by DXL infrastructure."
"Technical support is always available and very helpful."
"At times, there may be delays in the execution of certain actions and their effects."
"Microsoft 365 Defender does not have a unique package with emerging endpoint security technologies, such as EDR and XDR."
"My client would like the solution to be more customizable without using code. You can only build on the default console, but we're not allowed to change it."
"A simple dashboard without having to use MS Sentinel would be a welcome improvement."
"The only problem I find is that the use cases are built-in. There is no template available that you can modify according to your organization's standards. What they give is very generic, the market standard, but that might not be applicable to every organization."
"The interface could be improved. For example, if you want to do a phishing simulation for your employees, it can take a while to figure out what to do. The interface is a bit messy and could be updated. It isn't too bad, but doing some things can be a long process."
"The Defender agent itself is more compatible with Windows 10 and Windows 11. Other than these two lines, there are so many compatibility issues. Security is not only about Microsoft. The core technical aspects of it are quite good, but it would be good if they can better support non-Microsoft solutions in terms of putting the agents directly into VMware and other virtualization solutions. There should be more emphasis on RHEL and other operating systems that we use, other than Windows, in the server category."
"The abundance of sub-dashboards and sub-areas within the main dashboard can be confusing, even if it all technically makes sense."
"The availability and sustainability could also be improved."
"In the current version of ESET File Security, you cannot download a file, it always wants the real-time upload which you have to wait until the file is ready. This is annoying. In previous versions, you were able to use the downloaded engine."
"Sometimes, the connection to the machine requires troubleshooting."
"The tool is complex and expensive."
"The solution can be quite technical and therefore is challenging for new users."
"ESET Protect could improve the performance. The performance of the home computers and laptops becomes slow due to their heavy software load. It would be a benefit to make a lighter version of the software which does not have any impact on the performance of the computer's hardware."
"In terms of management accounts, there's a lot of manuals that seem to be mixed up. Sometimes, it's a little bit confusing."
"I would like to see more features on the reporting side of things."
"The initial setup isn't so easy. You need to know what you are doing."
"McAfee Endpoint Protection could improve the word control feature."
"The solution needs to offer better local technical support."
"There are times the solution has some additional software added that is not fully integrated properly, such as Exchange Group Sheild. It is quite old and is not fully integrated properly and could be improved."
"One of the drawbacks is that it is not 100% secure."
"There are more secure featured solutions from McAfee on the market but for smaller companies like ours, they are too expensive."
"Technical support is an area that can be improved because sometimes, the response time is a bit slow and the explanation is short."
"It can be quite complicated to learn McAfee Endpoint Security and to feel comfortable with the environment."
ESET PROTECT Enterprise is ranked 16th in Extended Detection and Response (XDR) with 10 reviews while Trellix Endpoint Security is ranked 10th in Extended Detection and Response (XDR) with 94 reviews. ESET PROTECT Enterprise is rated 9.0, while Trellix Endpoint Security is rated 8.0. The top reviewer of ESET PROTECT Enterprise writes "Constantly improving their online resources to make it easier for new users to work with it". On the other hand, the top reviewer of Trellix Endpoint Security writes "Good user behavioral analysis and helpful patching but needs better support services". ESET PROTECT Enterprise is most compared with ESET Endpoint Protection Platform, Wazuh, Microsoft Defender for Endpoint, Avira Antivirus and Cybereason Next-Generation Antivirus, whereas Trellix Endpoint Security is most compared with Microsoft Defender for Endpoint, Trellix Endpoint Security (ENS), CrowdStrike Falcon, Cortex XDR by Palo Alto Networks and Trend Micro Deep Security. See our ESET PROTECT Enterprise vs. Trellix Endpoint Security report.
See our list of best Extended Detection and Response (XDR) vendors.
We monitor all Extended Detection and Response (XDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.