Try our new research platform with insights from 80,000+ expert users

Menlo Protect vs Trellix Collaboration Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Menlo Protect
Ranking in Email Security
58th
Average Rating
9.0
Reviews Sentiment
7.3
Number of Reviews
2
Ranking in other categories
Internet Security (15th), Enterprise Browsers (5th), Remote Browser Isolation (RBI) (4th)
Trellix Collaboration Security
Ranking in Email Security
11th
Average Rating
8.8
Reviews Sentiment
6.9
Number of Reviews
19
Ranking in other categories
Instant Communications Security and Compliance (2nd), Secure Email Gateway (SEG) (6th), AI Security (9th)
 

Mindshare comparison

As of January 2026, in the Email Security category, the mindshare of Menlo Protect is 0.4%, up from 0.3% compared to the previous year. The mindshare of Trellix Collaboration Security is 2.0%, down from 2.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security Market Share Distribution
ProductMarket Share (%)
Trellix Collaboration Security2.0%
Menlo Protect0.4%
Other97.6%
Email Security
 

Featured Reviews

reviewer1991553 - PeerSpot reviewer
Information Security Specialist at a financial services firm with 10,001+ employees
Decreased our security alerts without impacting employees' work
I can't say that there is one specific feature that is most valuable. It's the overall platform that is well-suited to our needs. It's something that is different from a lot of other products or platforms in the marketplace. It provides a single console for security policy and management. That is somewhat important because we used to have other products where you would have to log in to individual appliances, devices, or clusters. Having one spot to log in to or one area to go to for doing different tasks and viewing data sources, just makes it easier from a user perspective. Also, the fact that it's invisible to our end-users and doesn't affect their work is very important. Most companies don't want to have added friction or impact on their users. In addition, the combination of user-friendliness for admins, and security for the organization, works well. As a cloud-hosted solution, it provides ease of use.
Felipe Antoniazzi - PeerSpot reviewer
Cybersecurity Engineer Lead at Johnson & Johnson
Real-time threat response has boosted detection accuracy and reduces manual investigation work
I have had challenges in the past with Trellix Collaboration Security for implementation because of issues related to compatibility. Since we worked in a global company with different operating systems, it was necessary to create different plans and different actions to implement the product.One thing I really do not prefer in Trellix Collaboration Security is not related to the console. I am a McAfee fan since the McAfee tool, and I find the console of Trellix Collaboration Security to be very user-friendly and easy to use. However, I do not know if it is related to the architecture of the product. Of course, we have modern threats based on behaviors and zero days. We have today CrowdStrike and SentinelOne, where we have better results based on threats and behavior, where it is possible to create a simulation environment based on the file detected and based on it, confirm if it really is malicious or not. In general, I believe Trellix Collaboration Security improved the console based on the last console of McAfee, but I think it is possible to improve more. It really is a good product, but in my view, it needs to improve detection based on behaviors. Regarding automations, I have implemented Trellix Collaboration Security here at Johnson & Johnson, and I implemented it in the same situation at Santander Bank and BNP Paribas Bank, where I created automations to export data for different metrics, including malicious detections, compliance, baselines, scans, last scans based on the seven days, and checking of patterns. I export everything to CSV files. Based on that, I create Power BI dashboards, and in these Power BI dashboards, I have a more executive view for different metrics to provide to myself, my manager, or director to create an executive view based on it. Another important point we use here at Johnson & Johnson and other companies is a data hub or a SIEM solution, such as Elastic or ArcSight, where we select some logs to be sent and use it to build reports and metrics.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Menlo Security RBI's best feature is its threat isolation engine."
"I can't say that there is one specific feature that is most valuable. It's the overall platform that is well-suited to our needs. It's something that is different from a lot of other products or platforms in the marketplace."
"What I find most valuable with the solution is that it can integrate with cloud solutions, such as Google and Microsoft. Additionally, the solution is easy to use."
"In my experience, the best features related to Trellix Collaboration Security concern the protection against threats."
"Trellix Collaboration Security is valued for being a stable and comprehensive solution that fulfills customer needs."
"One of the valuable features of the product stems from the fact that it is easy to implement the tool in our environment."
"One of the most valuable features is the protection against vulnerabilities, particularly through virtual patching."
"Before installing, consider potential challenges with system performance, especially when integrating multiple tools, which could slow down performance."
"FireEye is good for malware depicting and security."
"FireEye Email Security is easy to use."
 

Cons

"Menlo Security RBI could be more cloud-friendly, and its mobility could be improved."
"There are several features, such as supporting web technologies, that the company is working on implementing in the platform. There are a lot of backend web technologies in use on various websites, for example, two-way audio/video and WebGL, for which support may not be fully implemented in the product."
"I would like the solution to be able to automatically quarantine the malicious emails before getting to the user's mailbox and continue with regular email operations. This could result in the user clicking the email before the purge operation is completed."
"In general, our company should make the tool more robust to protect our systems."
"The solution is not easy to set up. However, we have employees that have the knowledge that can do the difficult implementation. It would be better if the process was easier."
"It really is a good product, but in my view, it needs to improve detection based on behaviors."
"Sometimes especially zero-day spam emails can be passed to the user's inbox."
"The custom tailoring is limited."
"There is a need for improved integration with totally different products, such as a rapid server."
"Sometimes, integration can be challenging, impacting its stability, which is why I rate it a five out of ten."
 

Pricing and Cost Advice

"Menlo Security RBI can be very costly."
"The solution requires a license to be purchased for every user."
"The licensing is on a yearly basis."
"I rate the product price as nine out of ten, where ten is the most expensive, and one is the cheapest. There is no need to pay any extra charges apart from the licensing costs."
"The cost is very high."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
881,114 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
12%
Computer Software Company
11%
Manufacturing Company
9%
Government
8%
Manufacturing Company
17%
Healthcare Company
13%
Comms Service Provider
12%
Computer Software Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business8
Midsize Enterprise4
Large Enterprise10
 

Questions from the Community

Ask a question
Earn 20 points
What do you like most about FireEye Email Security?
One of the valuable features of the product stems from the fact that it is easy to implement the tool in our environment.
What needs improvement with FireEye Email Security?
I have had challenges in the past with Trellix Collaboration Security for implementation because of issues related to compatibility. Since we worked in a global company with different operating sys...
What is your primary use case for FireEye Email Security?
In my field, I have been in the information security area for 17 years, and I am currently working in my position for a year and a half.I have worked with Trellix Collaboration Security for several...
 

Also Known As

Menlo Security Email Security, Menlo Security Remote Browser Isolation
FireEye Email Security
 

Overview

 

Sample Customers

Macy's, HSBC, Bank of Hawaii
Northshore Utility District, Luz Technologies, Air Academy Federal Credit Union, Bank Gutmann, Bank of Thailand, Penn State Health Milton S. Hershey Medical Center, State of Missouri, City and County of San Francisco, Denver Public Schools, Vodafone, Go Auto, Stater Bros. Market
Find out what your peers are saying about Menlo Protect vs. Trellix Collaboration Security and other solutions. Updated: December 2025.
881,114 professionals have used our research since 2012.