Try our new research platform with insights from 80,000+ expert users

LogRhythm NDR [EOL] vs Trellix Network Detection and Response comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 26, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

LogRhythm NDR [EOL]
Average Rating
8.0
Reviews Sentiment
7.0
Number of Reviews
3
Ranking in other categories
No ranking in other categories
Trellix Network Detection a...
Average Rating
8.4
Reviews Sentiment
7.3
Number of Reviews
40
Ranking in other categories
Advanced Threat Protection (ATP) (12th), Network Detection and Response (NDR) (10th)
 

Featured Reviews

AshishDubey - PeerSpot reviewer
Product manager at Tata Communications Ltd
A scalable and stable tool that offers users a great GUI
Though I have not extensively worked on LogRhythm NDR, I know the need for a compute side since, in the past, we had required the compute side to deploy the solution in one of our company's client's infrastructure. The product's setup phase was easy and not complicated. The deployment process of LogRhythm NDR can vary between three and four weeks, depending on the skill set of the people involved in the deployment process. For deployment of the product, you have to purchase the license from LogRhythm, and you have to ensure that the compute side is ready for LogRhythm. After you deploy NDR and sensors in the premises of our company's customer on the SPAN and TAP port, and once the logs go through throughput, you can see the logs coming to LogRhythm NDR's console.
Jose Vargas - PeerSpot reviewer
Agente De Servicios Técnicos at a computer software company with 11-50 employees
Has improved threat detection workflows and supports seamless customer monitoring
The best features Trellix Network Detection and Response offers include very good threat detection, and I believe that it is one of the best XDR tools. For example, ePO and XDR components are very comfortable and similar to many other tools for this type of monitoring, and I have received very good feedback for this tool. What makes Trellix Network Detection and Response stand out for me compared to other tools is the way you can detect threats. It is very easy and comfortable to use, and the detection shows clearly on the screen, which is very easy to understand. Regarding the features, I think that the integration with other platforms is very comfortable with the customer because we can integrate it with any switch or firewall, and it is comfortable to add this tool. Trellix Network Detection and Response has positively impacted my organization as I have improved my knowledge about detection and response. I have already used some other tools such as CrowdStrike and Umbrella, but Trellix is one of the best that I have tested. I believe that for my organization, Trellix has helped a lot with detection and supported our customers effectively. Trellix Network Detection and Response is a great tool that integrates with a lot of security tools such as Palo Alto, which is a good firewall. If you have these types of tools, your organization would benefit greatly.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It's an excellent security tool with a user-friendly interface that's easy for anyone to use."
"It is a stable solution...It is a scalable solution."
"The solution doesn't require the creation of rules or use cases from scratch, which assists our delivery team in installation and deployment. Its dashboard is user-friendly."
"The product is very easy to configure."
"The sandbox feature of FireEye Network Security is very good. The operating system itself has many features and it supports our design."
"It protects from signature-based attacks and signature-less attacks. The sandboxing technology, invented by FireEye, is very valuable. Our customers go for FireEye because of the sandboxing feature. When there is a threat or any malicious activity with a signature, it can be blocked by IPS. However, attacks that do not have any signatures and are very new can only be blocked by using the sandboxing feature, which is available only in FireEye. So, FireEye has both engines. It has an IPS engine and a sandbox engine, which is the best part. You can get complete network protection by using FireEye."
"The most valuable feature is the network security module."
"Very functional and good for detecting malicious traffic."
"Before FireEye, most of the times that an incident would happen nobody would be able to find out where or why the incident occurred and that the system is compromised. FireEye is a better product because if the incident already happened I know that the breach is there and that the system is compromised so we can take appropriate action to prevent anything from happening."
"The most valuable feature is the view into the application."
"The server appliance is good."
 

Cons

"From an improvement perspective, I would like LogRhythm NDR to reduce the compute size. I would also like LogRhythm NDR to improve the pricing model."
"The tool has one limitation compared to its competitors. It does have a mobile app for NDR monitoring. Moreover, there is only operational training and not deployment training."
"There are opportunities for improvement, particularly in upgrading the expertise of local professionals and addressing support issues, which could potentially lead to cost reduction."
"The world is currently shifting to AI, but FIreEye is not following suit."
"The analytics could be better. It seems heavily influenced by the McAfee and FireEye integration, and that integration still isn't seamless."
"Improvements could be achieved through greater integration capabilities with different firewall solutions. Integrating with the dashboard itself for different firewalls so users can also pull tags into their firewall dashboard."
"As far as future inclusions, it would be useful to display more threat intelligence, such as the actual area of the threat and the origin of the web crawling (Tor and Dark Web)."
"It is an expensive solution."
"Based on what we deployed, they should emphasize the application filtering and the web center. We need to look deeper into the SSM inspection. If we get the full solution with that module, we don't need to get the SSM database from another supplier."
"Cybersecurity posture has room for improvement."
"We'd like the potential for better scaling."
 

Pricing and Cost Advice

"The tool costs are two million rupees for 5000 users."
"There are certain payments to be made towards the licensing costs attached to the product yearly. The pricing of LogRhythm NDR falls under the mid-range, in my opinion."
"When looking at the market and comparing it with other vendors, the cost seems relatively high."
"The user fee is not as high but the maintenance fee is expensive."
"Pricing and licensing are reasonable compared to competitors."
"Because of what the FireEye product does, it has significantly decreased our mean time in being able to identify and detect malicious threats. The company that I work with is a very mature organization, and we have seen the meantime to analysis decrease by at least tenfold."
"The pricing is fair, a little expensive, but fair. We've evaluated other products, and they're similarly priced."
"We're partners with Cisco so we get a reasonable price. It's cheaper than Palo Alto in terms of licensing."
"When you purchase FireEye Network Security NX, will need to purchase a megabit per second package. You must know your needs from day one."
"It's an expensive solution."
"Its price is a bit high. A small customer cannot buy it. Its licensing is on a yearly basis."
report
Use our free recommendation engine to learn which Network Detection and Response (NDR) solutions are best for your needs.
881,227 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Comms Service Provider
13%
Manufacturing Company
12%
Financial Services Firm
11%
Government
10%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business20
Midsize Enterprise8
Large Enterprise19
 

Questions from the Community

What needs improvement with LogRhythm NDR?
The tool has one limitation compared to its competitors. It does have a mobile app for NDR monitoring. Moreover, there is only operational training and not deployment training.
What is your primary use case for LogRhythm NDR?
Our use cases are mostly for mining, telco, finance, and banking industries.
What do you like most about FireEye Network Security?
We wanted to cross-reference that activity with the network traffic just to be sure there was no lateral movement. With Trellix, we easily confirmed that there was no lateral network involvement an...
What is your experience regarding pricing and costs for FireEye Network Security?
My experience with pricing, setup cost, and licensing for Trellix Network Detection and Response is very great.
What needs improvement with FireEye Network Security?
I would like to see in Trellix Network Detection and Response more explanation about some details of the threat, and I wish it had more actions that you can take to contain the host or move it some...
 

Also Known As

LogRhythm MistNet
FireEye Network Security, FireEye
 

Overview

 

Sample Customers

EMW, Conduent, University of Massachusetts, Deloitte Canada, Central Bank of Barbados, Coalfire
FFRDC, Finansbank, Japan Advanced Institute of Science and Technology, Investis, Kelsey-Seybold Clinic, Bank of Thailand, City of Miramar, Citizens National Bank, D-Wave Systems
Find out what your peers are saying about Darktrace, Vectra AI, Trend Micro and others in Network Detection and Response (NDR). Updated: January 2026.
881,227 professionals have used our research since 2012.