

Trellix ESM and Logpoint are two notable products in the cybersecurity space. Logpoint seems to have the upper hand due to its advanced analytics and scalable design, despite Trellix ESM's robust threat detection.
Features: Trellix ESM is known for its comprehensive threat detection, detailed threat intelligence, and easy integration with various platforms. Logpoint stands out with its scalable architecture, sophisticated analytics capabilities, and extensive feature set.
Room for Improvement: Trellix ESM could enhance its reporting capabilities, improve integration with newer technologies, and add more customization options. Logpoint needs better customization, more intuitive navigation, and improvements in reporting functionalities.
Ease of Deployment and Customer Service: Trellix ESM is praised for its straightforward deployment process and proactive customer support. Logpoint, while more complex to deploy, offers comprehensive support throughout the deployment phase.
Pricing and ROI: Trellix ESM offers competitive pricing focused on delivering a high return on investment. Logpoint, with slightly higher pricing, justifies its cost with extensive features and scalability, providing significant long-term value.
The technical support for Logpoint is very good, and I would rate it as nine out of ten.
Logpoint's customer support is not sufficient with only one engineer in the US.
I recommend a submission to Logpoint because I worked with it before.
I would rate support for Trellix ESM 10 out of 10 because if we connect with the support in the UK, we get excellent support.
It's rare for me to need them unless it's an issue with licensing, and they are the best in that regard.
It is web-based and accommodates the expansion of our organization.
Logpoint is scalable and capable of expanding.
Scalability is quite easier with Trellix ESM, because all we need to do is add more receivers to it, so it can go to any point.
I have received reports indicating glitches and downtimes with Logpoint.
Dealing with foreign entities for support was a challenge, leading us to switch providers due to lack of adequate support.
Logpoint's UEBA is a weak point, while Exabeam's UEBA has extra AI through automation.
Logpoint needs to be cloud-native, as currently, it is not.
If there is any device which is not covered, there should not be any additional charges for writing the custom parsers on that.
I rate the pricing at eight, suggesting it's relatively good or affordable.
The UEBA enables us to monitor at the device level, and SOAR provides playbooks and templates that we can modify and incorporate into the platform.
Exabeam's advantage is its AI-driven network AI; this AI feature is available, and Exabeam is powerful.
It effectively facilitates logging and log storage and assists in security event management by ingesting security events.
In case of other ESM solutions, there are no parsers required, and almost every device is covered within the license, so there is no hidden cost as custom parsers.
| Product | Mindshare (%) |
|---|---|
| Logpoint | 1.2% |
| Trellix ESM | 1.2% |
| Other | 97.6% |

| Company Size | Count |
|---|---|
| Small Business | 18 |
| Midsize Enterprise | 3 |
| Large Enterprise | 4 |
| Company Size | Count |
|---|---|
| Small Business | 15 |
| Midsize Enterprise | 6 |
| Large Enterprise | 25 |
Logpoint offers a robust SIEM system tailored for compliance with regulations like PCI DSS and GDPR, enhancing security monitoring and enabling efficient incident response.
Logpoint strengthens cybersecurity by offering essential tools for log collection, security monitoring, and forensic analysis. Its features include an intuitive dashboard, a powerful correlation engine, and extensive third-party integrations, making it a versatile asset for security operations centers. Despite its advantages, areas for improvement include ransomware protection, cloud-native deployment, and more flexible pricing. Improvements in features like SOAR and UEBA functionality can boost its competitiveness.
What are the most important features of Logpoint?Many organizations utilize Logpoint across industries as part of their security infrastructure. It supports standard compliance, orchestrating incident responses and security threat monitoring. Logpoint empowers businesses by integrating and correlating security data, improving cybersecurity posture in varied environments.
Trellix ESM is an innovative tool designed to enhance security management through its seamless integration, user-friendly deployment, customizable dashboards, and robust threat detection capabilities.
Trellix ESM is essential for comprehensive security management, ensuring effective threat detection and analysis. It integrates seamlessly with third-party systems and provides advanced correlation and security visualization. Capable of managing logs and monitoring network traffic, it enhances security across diverse environments, making it indispensable for security operations. Despite needing improved SaaS integration, API documentation, and addressing stability issues, it remains crucial for user-friendly deployment and incident analysis. Its benefits are complemented by comprehensive reporting and real-time malware protection.
What Are Trellix ESM's Most Important Features?In diverse industries, Trellix ESM is deployed for central log management and security operations, monitoring servers, virtual machines, and hybrid-cloud environments. Companies use it for managed security services and threat detection, analyzing logs and securing data. It finds great use in monitoring network vulnerabilities and event correlation, enabling service providers and MSSPs to effectively manage endpoints and hybrid-cloud setups as well as gather logs from servers and firewalls, offering abundant transparency into security threats and network activities.
We monitor all Security Information and Event Management (SIEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.