

Trellix Endpoint Security Platform and Jamf Protect are competing in the enterprise security market. Trellix has the upper hand in support and pricing satisfaction, while Jamf Protect leads in feature set, particularly in Apple device integration.
Features: Trellix Endpoint Security Platform offers threat intelligence, advanced malware protection, and endpoint detection and response capabilities. Jamf Protect integrates well with Apple devices, delivering excellent threat monitoring and automated compliance tools. Its focus on Apple ecosystems enhances its functionality for macOS environments.
Room for Improvement: Trellix could improve its integration with Apple-specific environments and streamline its user interface for easier management. Enhancing real-time threat analysis and automated updates would also be beneficial. Jamf Protect could expand its capabilities beyond Apple products and improve its pricing to be more competitive. A more robust reporting system and enhanced threat detection accuracy are also areas for growth.
Ease of Deployment and Customer Service: Trellix provides a flexible deployment model with extensive customization and comprehensive support options. Jamf Protect is praised for its straightforward deployment in Apple environments, with efficient customer service that complements its ease of use. Trellix allows broader deployment options, whereas Jamf simplifies Apple integrations.
Pricing and ROI: Trellix Endpoint Security Platform is generally more competitively priced, offering a flexible cost structure that underpins a favorable ROI. Conversely, Jamf Protect's higher setup cost is justified by its specialized Apple-focused features, appealing to organizations dedicated to the Apple ecosystem. The pricing difference highlights Trellix's cost-effectiveness compared to Jamf's premium pricing for advanced Apple capabilities.
We have saved money and required fewer employees because of the complicated architecture.
Clients appreciate the solution’s customization capabilities and ongoing product improvements.
There are two parts: one is the encryption which is standard and no AI is needed, but the data protection part could benefit from AI to detect new types of data and protect it.
I would rate their customer service nine out of ten.
I rate the support from Trellix a perfect ten.
The response time is a notable issue.
I would rate the scalability of the solution as a six out of ten, indicating some challenges due to downtime requirements.
Trellix Endpoint Security is scalable.
I would rate its stability as nine out of ten.
I would rate the stability of Trellix Endpoint Security as near perfect, close to ten out of ten.
I think it's stable enough; earlier it had glitches, but now it's stable enough.
It would also help if detection specifics were identified more quickly and the problem-solving process accelerated, especially to meet larger clients' expectations.
The dashboard of Trellix Endpoint Security Platform is a bit difficult to understand, and it takes a lot of time to comprehend the tools and policies compared to other tools.
The product does not seem to be cloud-native.
My experience with pricing, setup cost, and licensing is good; compared to other tools, Trellix Endpoint Security Platform provides lower costs.
Trellix Endpoint Security is cost-effective and provides excellent value for money.
The license costs are very reasonable, around 1,000 to 1,200 rupees per year.
The detection capability of Trellix Endpoint Security is higher than traditional antivirus solutions.
Trellix Endpoint Security Platform has positively impacted our organization with strong protection against malware and ransomware, greatly improving our ability to detect and block threats in real time, and features like ATP and Exploit Prevention help reduce malware and zero-day attacks.
Including options like Application Control (formerly Solidcore), integrated monitoring, change control, DLP, and advanced threat protection, the solution offers comprehensive security.
| Product | Market Share (%) |
|---|---|
| Trellix Endpoint Security Platform | 3.7% |
| Jamf Protect | 1.0% |
| Other | 95.3% |

| Company Size | Count |
|---|---|
| Small Business | 4 |
| Midsize Enterprise | 2 |
| Large Enterprise | 4 |
| Company Size | Count |
|---|---|
| Small Business | 67 |
| Midsize Enterprise | 36 |
| Large Enterprise | 61 |
Jamf Protect provides comprehensive security for Apple devices, aiding in malware protection, threat prevention, CIS benchmarks, and USB blockages while supporting local accounts and password sync.
Designed for managing Apple devices, Jamf Protect offers robust security features, such as malware detection and prevention, unauthorized data transfer blocks, and enhanced security profiles. It allows seamless deployment and upgrades of applications, coupled with efficient endpoint management. The tool ensures zero performance impact while providing real-time notifications for password updates and comprehensive data protection across all Mac OS versions.
What are Jamf Protect's most notable features?Industries such as education, healthcare, and finance leverage Jamf Protect to maintain stringent security standards, streamline application deployment, and ensure devices meet compliance requirements. They benefit from real-time threat alerts, comprehensive data protection, and zero-touch integration, enhancing overall operational efficiency.
Trellix Endpoint Security Platform offers essential features like centralized management, threat prevention, and encryption, facilitating seamless scaling and integration with other systems while prioritizing user security.
This comprehensive platform focuses on endpoint protection, antivirus capabilities, and malware defense. It enhances cybersecurity with data loss prevention, advanced threat detection, and AI-driven features for reliable protection without impacting performance. Central management and advanced reporting streamline integration and ease of use. Flexible policy deployment through the management console and its robust security measures, such as DLP and device control, further increase protection. Challenges include high CPU and memory usage affecting performance, a complex interface, and lengthy deployment. Third-party integration and Windows Hello support need improvement. Additional concerns involve improved threat detection and faster technical support responses.
What are the key features of Trellix Endpoint Security Platform?Trellix Endpoint Security Platform is widely implemented in industries such as banking and government for securing mobile and desktop devices. Its capabilities cover network security, device control, and remote access protection, catering to diverse environments by offering robust cybersecurity management against advanced threats.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.