We performed a comparison between Fortinet FortiEDR, Trellix Advanced Threat Defense, and Trellix Network Detection and Response based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, SentinelOne, CrowdStrike and others in Endpoint Detection and Response (EDR)."It is very easy to set up. I would rate my experience with the initial setup a ten out of ten, with ten being very easy to set up."
"NGAV and EDR features are outstanding."
"The solution was relatively easy to deploy."
"The setup is pretty simple."
"This is stable and scalable."
"The features that I have found most valuable are the ability to customize it and to reduce its size. It lets you run in a very small window in terms of memory and resources on legacy cash registers."
"The price is low and quite competitive with others."
"Fortinet FortiEDR's firewalling, rule creation, monitoring, and inspection profiles are great."
"I recommend this solution because of its ease of use."
"It is stable and reliable."
"It stops in excess of twenty-five malware events per month, all of which could be critical to the business."
"The most valuable features are the administration console and its detection and response module."
"Its greatest strength is the DXL client which can rapidly disseminate attack information to all clients via the McAfee Agent instead of going through the ePO server."
"Provides good exfiltration, and is an all-in-one product."
"It is very scalable."
"The features that I find most valuable are the MIR (Mandiant Incident Response) for checks on our inbound security."
"If we are receiving spam emails, or other types of malicious email coming from a particular email ID, then we are able to block them using this solution."
"It is stable and quite protective. It has a lot of features to scan a lot of malicious things and vulnerabilities."
"We see ROI in the sense that we don't have to react because it stops anything from hurting the network. We can stop it before we have a bigger mess to clean up."
"The most valuable feature is the network security module."
"The product has helped improve our organization by being easy to use and integrate. This saves time, trouble and money."
"We wanted to cross-reference that activity with the network traffic just to be sure there was no lateral movement. With Trellix, we easily confirmed that there was no lateral network involvement and that nothing else was infected. It helped us correlate the events and feel confident in our containment."
"It allows us to be more hands off in checking on emails and networking traffic. We can set up a bunch of different alerts and have it alert us."
"Making the portal mobile friendly would be helpful when I am out of office."
"ZTNA can improve latency."
"The solution's installation from a central installation server could be improved because the engineers had a little bit of trouble getting it installed from a central location."
"I would like the solution to extend beyond endpoint protection and include other attack surfaces such as other network components."
"The solution is not stable."
"The SIEM could be improved."
"It takes about two business days for initial support, which is too slow in urgent situations."
"FortiEDR could add a separate scanning dashboard. In incident management, we prefer to remove the endpoint system from the environment and scan the system. We typically use Symantec for that, but if we want to use FortiEDR for that, then we need a scanning tab to clarify things."
"Lacks remote capabilities not dependent on the internet."
"Make the ATD system a part of the whole product and take the whole thing onto the cloud. While it is there already, it is not to the same level as the on-premise version."
"We'd like them to be better at dealing with script threats."
"I would like to see future versions of the solution incorporate artificial intelligence technology."
"The initial setup was industry standard complex. It takes awhile and has a lot of planning involved. It could be simplified with product redesign."
"There could be a tool that automatically updates all-new Microsoft IPs, which are available for free to connect to the client."
"This solution needs to be made "cloud ready"."
"They can maybe consider supporting some compliance standards. When we are configuring rules and policies, it can guide whether they are compliant with a particular compliance authority. In addition, if I have configured some rules that have not been used, it should give a report saying that these rules have not been used in the last three months or six months so that I disable or delete those rules."
"It would be a good idea if we could get an option to block based upon the content of an email, or the content of a file attachment."
"The initial setup was complex because of the nature of our environment. When it comes to the type of applications and functions which we were looking at in terms of identifying malicious threats, there would be some level of complexity, if we were doing it right."
"As far as future inclusions, it would be useful to display more threat intelligence, such as the actual area of the threat and the origin of the web crawling (Tor and Dark Web)."
"Stability issues manifested in terms of throughput maximization."
"I would love to see better reporting. Because you can't export some of the reports in proper formats, it is hard to extract the data from reports."
"Management of the appliance could be greatly improved."
"It is not a very secure product."
More Trellix Advanced Threat Defense Pricing and Cost Advice →
More Trellix Network Detection and Response Pricing and Cost Advice →