We performed a comparison between Datto Endpoint Detection and Response (EDR) and Trellix Endpoint Security (ENS) based on real PeerSpot user reviews.
Find out in this report how the two Endpoint Detection and Response (EDR) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."he solution is an anti-malware product that integrates well with other vendor products such as firewalls, SIEM, etc. It captures threat intelligence and gives you better visibility. The product also has sandboxing features."
"The features that I have found most valuable are the ability to customize it and to reduce its size. It lets you run in a very small window in terms of memory and resources on legacy cash registers."
"The ease of deployment and configuration is valuable. It's very easy compared to other vendors like Sophos. Sophos' configuration is complex. Fortinet is a lot easier to understand. You don't need a lot of admin knowledge to do the configuration."
"NGAV and EDR features are outstanding."
"Ability to get forensics details and also memory exfiltration."
"This is stable and scalable."
"The most valuable feature is the analysis, because of the beta structure."
"It notifies us if there's any suspicious file on any PC. If any execution or similar kind of thing is happening, it just alerts us. It doesn't only alert. It also blocks the execution until we allow it. We check whether the execution is legitimate or not, and then approve it or keep it blocked. This gives us a little bit of control over this mechanism. Fortinet FortiEDR is also very straightforward and easy to maintain."
"Datto Endpoint Detection and Response is a perfect product for endpoint security."
"The insight that the solution provides is the most valuable aspect. The security scanning they do is excellent."
"The most valuable feature of Datto EDR is the visibility of the endpoints."
"The most valuable feature of this solution is its simplicity."
"The most valuable network security feature is the network sandbox solution. This sandbox feature works on traffic flow."
"Provides good mobile device protection."
"It is very valuable in finding out unknown malware."
"FireEye Endpoint Security's scalability is awesome. I think it is one of the best on that front."
"If the network has seen something, we can use that to put a block to all the endpoints."
"The features we have found most valuable have been containment as well as the ability to triage agent activities."
"The exploit guard and malware protection features are very useful. The logon tracker feature is also very useful. They have also given new modules such as logout backup, process backup. We ordered these modules from the FireEye market place, and we have installed these modules. We are currently exploring these features."
"The dashboard isn't easy to access and manage."
"We've encountered challenges during API deployment, occasionally resulting in unstable environments."
"The amount of usage, the number of details we get, or the number of options that can be tweaked is limited in comparison to that with other EDR solutions"
"We'd like to see more one-to-one product presentations for the distribution channels."
"The security should be strong for the cloud. Some applications are on-prem and some are on the cloud. Fortinet should also have strong security for the cloud. There should be more security for the cloud."
"To improve Fortinet, we need to see more features and technology areas at the endpoint level introduced."
"The support needs improvement."
"It takes about two business days for initial support, which is too slow in urgent situations."
"The deployment of the solution right now is terrible. We find it to be very bad. It could be improved enormously."
"The solution should allow the automation of playbooks."
"The solution could improve by having more deployment methods."
"The solution needs to work on memory consumption. It is too high."
"The customization capabilities of the solution are an area where it lacks, so it would be great if our company could customize the solution to meet the demands of our customers."
"The performance could be better. I noticed that it slows down a bit."
"They could also increase or improve the scalability because to my knowledge the biggest bandwidth can only support up to 10 gigs of input."
"The price of McAfee MVISION Endpoint could improve."
"So far, McAfee MVISION Endpoint ticks off all of our boxes, but its pricing could always be better."
"You do not have access to all the features when you use the Trellix web interface. For example, you cannot do device or drive encryption from the web interface. Also, when we're working with customers, it's sometimes challenging to get sales support. Delays mean we might lose an opportunity. Lastly, Trellix lacks some documentation about custom features."
"If you have another endpoint product running on the same machine, you have to fine tune functions from FireEye to avoid performance and user experience issues."
More Datto Endpoint Detection and Response (EDR) Pricing and Cost Advice →
More Trellix Endpoint Security (ENS) Pricing and Cost Advice →
Datto Endpoint Detection and Response (EDR) is ranked 45th in Endpoint Detection and Response (EDR) with 3 reviews while Trellix Endpoint Security (ENS) is ranked 18th in Endpoint Detection and Response (EDR) with 48 reviews. Datto Endpoint Detection and Response (EDR) is rated 7.6, while Trellix Endpoint Security (ENS) is rated 7.6. The top reviewer of Datto Endpoint Detection and Response (EDR) writes "Good security scanning, but has a complex setup and the stability isn't ideal". On the other hand, the top reviewer of Trellix Endpoint Security (ENS) writes "It integrates well with other solutions, but the vendor needs more of a local presence and faster response". Datto Endpoint Detection and Response (EDR) is most compared with SentinelOne Singularity Complete, CrowdStrike Falcon, Bitdefender GravityZone EDR, Huntress and Microsoft Defender for Endpoint, whereas Trellix Endpoint Security (ENS) is most compared with Trellix Endpoint Security, Microsoft Defender for Endpoint, CrowdStrike Falcon, Trellix Endpoint Detection and Response (EDR) and Open EDR. See our Datto Endpoint Detection and Response (EDR) vs. Trellix Endpoint Security (ENS) report.
See our list of best Endpoint Detection and Response (EDR) vendors.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.