Try our new research platform with insights from 80,000+ expert users

Huntress Managed ITDR vs Trellix Endpoint Security Platform comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Huntress Managed ITDR
Average Rating
10.0
Reviews Sentiment
8.8
Number of Reviews
3
Ranking in other categories
Identity Threat Detection and Response (ITDR) (11th)
Trellix Endpoint Security P...
Average Rating
8.0
Reviews Sentiment
7.2
Number of Reviews
158
Ranking in other categories
Endpoint Protection Platform (EPP) (9th), Endpoint Detection and Response (EDR) (10th), Extended Detection and Response (XDR) (9th)
 

Featured Reviews

Kevin - PeerSpot reviewer
Peace of mind in identifying compromises in your M365 tenants
Huntress Managed ITDR examines various signals from the M365 tenants. If anything suspicious is identified, their SOC analysts can take a closer look and subsequently take action. It's a comprehensive solution covering endpoints and cloud tenants, offering peace of mind. I recognized its benefits immediately, as it provides protection against M365 identity compromises, like admin account breaches.
Abdullah Al Hadi - PeerSpot reviewer
Customization capabilities allow clients to autonomously deploy policies
There are a few areas where Trellix Endpoint Security ( /categories/endpoint-protection-platform-epp ) can improve. Firstly, the high CPU utilization when agents are installed can negatively impact client systems. Another issue is with end-users outside the network, where the agent handler sometimes fails to deploy the product properly. Improvements are needed in forensic analytics to detect specific vulnerabilities. It would also help if detection specifics were identified more quickly and the problem-solving process accelerated, especially to meet larger clients' expectations.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Implementing Huntress Managed ITDR has improved our business by allowing us to be more proactive with our security posture."
"The initial setup was very easy."
"The centralized management with the EDR and ITDR is beneficial."
"I rate the overall solution as a ten out of ten."
"Huntress Managed ITDR examines various nulls from the M365 tenants. If anything suspicious is identified, their SOC analysts can take a closer look and subsequently take action."
"The endpoint security, antivirus and firewall are the most valuable features of Trellix Endpoint Security."
"The performance is good."
"We really like the dashboard from Trellix and we've found that it's pretty informative."
"I recommend Trellix Endpoint Security to others as it seems like one of the industry standards and is fairly stable."
"It is scalable and stable and the initial setup is the easiest part of using the product."
"The solution is broken down into different components from the portals. Web filtering, which is an added feature has been great for us."
"HIPS protects server files from being modified or deleted by unauthorized users. It's primarily deployed in the web tier."
"The solution is stable."
 

Cons

"If anything, it's created more work, but that's because we're now seeing things that we weren't seeing before."
"More in-depth reporting could be beneficial for the solution."
"The product needs further maturity, with some improvements in the user interface."
"The product needs further maturity, with some improvements in the user interface."
"More in-depth reporting could be beneficial for the solution."
"There are more secure featured solutions from McAfee on the market but for smaller companies like ours, they are too expensive."
"A policy-editing console should be added."
"There are times the solution has some additional software added that is not fully integrated properly, such as Exchange Group Sheild. It is quite old and is not fully integrated properly and could be improved."
"Trellix Endpoint Security needs some improvement in the dashboards. Artificial intelligence also requires improvement to further enhance the product."
"The agent is very heavy, so we have to ensure that we have a lightweight agent for Windows systems."
"I would like to see more integration with third-party products."
"Technical support from the vendor is very bad."
"Looking at the current ePolicy orchestrator, and the transition of most vendors to the cloud, they need to do an improvement with the current dashboard or the overall aesthetic of their GUI."
 

Pricing and Cost Advice

Information not available
"The solution is not an expensive tool. Compared to other options, it's mostly average-priced. I've deployed it for customers ranging from 100 nodes to over 5,000 nodes. Its renewal prices are very low, and it offers both perpetual and subscription licenses. With a perpetual license, the product will keep working as long as it's not end-of-life, which benefits companies."
"We pay 650 Rand for a license. It is a perpetual license which we normally run for two years."
"They should reduce the cost or make it free, open-source software."
"It's fairly priced compared to other products on the market."
"The initial price is very good as they give good initial discounts, but it seems a little expensive once you renew the license."
"When comparing the solution to others it is a bit expensive. We are on a monthly license."
"I am happy with the pricing."
"It is not so cheap in comparison to Sophos and other solutions."
report
Use our free recommendation engine to learn which Identity Threat Detection and Response (ITDR) solutions are best for your needs.
861,803 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
20%
Insurance Company
15%
University
9%
Performing Arts
6%
Government
13%
Manufacturing Company
11%
Educational Organization
11%
Computer Software Company
10%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What needs improvement with Huntress Managed ITDR?
More in-depth reporting could be beneficial for the solution.
What is your primary use case for Huntress Managed ITDR?
I use Huntress Managed ITDR for 365 protection, monitoring log run events, security, and abnormal logons.
How does McAfee Endpoint Security compare with MVISION?
The flexible manageability of McAfee Endpoint Security is one of our favorite aspects of this solution. You can deploy various components as desired with McAfee Endpoint Security, whereas many othe...
How does Crowdstrike Falcon compare with FireEye Endpoint Security?
The Crowdstrike Falcon program has a simple to use user interface, making it both an easy to use as well as an effective program. Its graphical design is such that it makes an extremely useful too...
What do you like most about McAfee Endpoint Security?
It provides a robust defense against cybersecurity threats while offering user-friendly features like notifications and approval prompts.
 

Also Known As

No data available
McAfee Endpoint Security, McAfee Endpoint Protection, Intel Security Total Protection for Endpoint, McAfee Complete Endpoint Protection, Trellix Endpoint Security (ENS)
 

Overview

 

Sample Customers

Information Not Available
inHouseIT, Seagate Technology
Find out what your peers are saying about Microsoft, CrowdStrike, SentinelOne and others in Identity Threat Detection and Response (ITDR). Updated: June 2025.
861,803 professionals have used our research since 2012.