Try our new research platform with insights from 80,000+ expert users

FileAudit vs Trellix ESM comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 18, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

FileAudit
Ranking in Security Information and Event Management (SIEM)
45th
Average Rating
9.0
Reviews Sentiment
7.3
Number of Reviews
3
Ranking in other categories
Log Management (37th)
Trellix ESM
Ranking in Security Information and Event Management (SIEM)
20th
Average Rating
7.4
Reviews Sentiment
7.0
Number of Reviews
38
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of August 2025, in the Security Information and Event Management (SIEM) category, the mindshare of FileAudit is 0.2%, up from 0.1% compared to the previous year. The mindshare of Trellix ESM is 1.1%, up from 0.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Security Information and Event Management (SIEM)
 

Featured Reviews

AntoSebastin - PeerSpot reviewer
A scalable SIEM solution for monitoring a user's activity in the file server
The most valuable features of the solution are its quick and simple features related to advanced permissions for files, allowing for what permission needs to be granted to the users when it comes to the monitoring folder in the solution. If someone who has been denied permission to use a particular folder tries to go to that folder, then the administrator gets a notification. In general, the administrator can easily gather and maintain records if a person who has been denied permission to a particular confidential folder tries to access it.
Daniel Durian - PeerSpot reviewer
Helps to monitor and detect cyberattacks
The tool's effectiveness depends on how you define your log sources. To build visibility of incoming and outgoing traffic, you need logs from perimeter defense, firewalls, web application firewalls, and endpoint protection. With good traffic visibility, incident response time is really quick. Trellix ESM provides situation awareness. On the dashboard, I can see outbound and inbound communications to known threat hosts, IPS/IDS activity, and threat intelligence of the perimeter defense in the firewall. This information helps preempt attacks.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Our customer acquires the complete report which is kept for future auditing purposes."
"Alerting upon file changes is the most valuable aspect of the product."
"It is a good and stable solution...It is a scalable solution."
"The tool's effectiveness depends on how you define your log sources. To build visibility of incoming and outgoing traffic, you need logs from perimeter defense, firewalls, web application firewalls, and endpoint protection. With good traffic visibility, incident response time is really quick."
"The solution is 100% stable. We really have had a great time working with it. It hasn't let us down."
"It enables us to detect malicious threats, issues, or vulnerabilities in our network."
"The most valuable feature is the correlation rules."
"The product’s most valuable feature is log monitoring."
"Compared to other solutions, the user interface is good."
"We are now able to completely monitor our environment so we can review what is there, which is a big win for us."
"The most valuable feature in ESM is its search and reporting feature. It's really nice."
 

Cons

"The updates management and central management console could be improved."
"Whenever someone cuts and paste, it shows as "file is deleted"."
"The DLP function, including installation of the agent on the workstation and controlling the DLP restrictions, are areas where the product lacks."
"There are always multiple bugs in the product. For example, the console page was hanging multiple times. Afterwards, they released multiple upgrades for the same, multiple patches from McAfee."
"It is not a very advanced solution, and it is for very generic use cases. It cannot cope with the advanced requirements that we're going to have. For example, for multiple authentication failures, it is still based on Windows events for detecting multiple login failures, whereas other companies are going beyond and working on implementing two-factor authentication. It is time to correlate the two-factor authentication results with authentification failures, which is not happening with McAfee ESM. The performance of the tool should be improved because it is very slow. The data display on the console is very slow in McAfee ESM. Its data storage is still old-fashioned, and it should be improved and upgraded to the latest versions. They have to come up with some new ideas to match what other leaders in the same domain are doing. For example, in Splunk, when you search for information for the last 60 days or five months, it quickly shows the information, but that is not the case with McAfee. The results should be quicker and faster on the console. They should integrate some additional features such as User Behavior Analytics (UBA) and automation. The threat intelligence part should also be improved on McAfee."
"It seems McAfee does test its product before releasing. When we - not only us, other companies also - deploy McAfee, we face multiple issues from the customer side, after which, McAfee reacts and fixes the bugs."
"Cloud integration has room for improvement because they're not full-fledged to integrate with the cloud solutions that come. They use different integration platforms to bring in data, and that needs to be improved."
"I would like to see improvements to the user interface."
"Product-wise, adding accounts on a single data source by batch would be a really great help."
"We acquired the IBM product because McAfee is slightly confusing to use, and it's broader."
"Tech support is required each time there is a system update of the solution."
 

Pricing and Cost Advice

"FileAudit provides a trial license for 30 days, and after that, customers can choose between perpetual licensing or the annual-based licensing option offered by FileAudit."
"When compared to IBM Security QRadar and other similar platforms, the pricing of McAfee ESM is reasonable and comparatively less expensive."
"The cost is all included. The finance department handles the financial part, and we mostly don't get involved in it."
"The pricing is fair."
"You should buy the distributed option instead of the all-in-one for environments with more than 1000 end points."
"The pricing is good, and they are competitive compared to providers such as RSA and IBM QRadar."
"The licensing cost is based on EPS."
"We pay for our licensing fees on a yearly basis, and there are no costs in addition to the standard licensing fees."
"Regarding pricing, Trellix ESM is not that expensive. It's less than half the cost of IBM QRadar."
report
Use our free recommendation engine to learn which Security Information and Event Management (SIEM) solutions are best for your needs.
865,384 professionals have used our research since 2012.
 

Comparison Review

VS
Feb 26, 2015
HP ArcSight vs. IBM QRadar vs. ​McAfee Nitro vs. Splunk vs. RSA Security vs. LogRhythm
We at Infosecnirvana.com have done several posts on SIEM. After the Dummies Guide on SIEM, we are following it up with a SIEM Product Comparison – 101 deck. So, here it is for your viewing pleasure. Let me know what you think by posting your comments below. The key products compared here are…
 

Top Industries

By visitors reading reviews
No data available
Comms Service Provider
14%
Financial Services Firm
12%
Computer Software Company
12%
Manufacturing Company
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about FileAudit?
It is a good and stable solution...It is a scalable solution.
What needs improvement with FileAudit?
The DLP function, including installation of the agent on the workstation and controlling the DLP restrictions, are areas where the product lacks. It would be great if the aforementioned details wer...
What is your primary use case for FileAudit?
My company uses FileAudit as an SIEM solution, and it is used for monitoring the file server activity to find out what users did in the file server, which may include modifying the file, deleting i...
What do you like most about McAfee ESM?
The solution's technical support is great.
What is your experience regarding pricing and costs for McAfee ESM?
When discussing Trellix ESM pricing and licensing, if you consider some premium product, the pricing also has to be premium, however, enterprise customers who look for a premium product, alongside ...
What needs improvement with McAfee ESM?
Areas of Trellix ESM that could be improved or enhanced include checking on the clients who are still on-prem, especially banks, as most are not moving everything to the cloud due to confidentialit...
 

Also Known As

No data available
McAfee ESM, NitroSecurity, McAfee Enterprise Security Manager
 

Overview

 

Sample Customers

CommuniCare Health Centre, DP World, BAE Systems, Moet Hennessy, Ernst & Young, Honda, Volswagon, VTech, GlakoSmithKline, Lockheed Martin, US Navy, University of Alabama, Ministry of Interior Saudi Arabia, Total
San Francisco Police Credit Union, Wªstenrot Gruppe, Volusion, California Department of Corrections & Rehabilitation, Government of New Brunswick, State of Colorado, Macquarie Telecom, Texas Tech University Health Sciences Center, Cologne Bonn Airport
Find out what your peers are saying about FileAudit vs. Trellix ESM and other solutions. Updated: July 2025.
865,384 professionals have used our research since 2012.