Try our new research platform with insights from 80,000+ expert users

Microsoft Defender Vulnerability Management vs Trellix Network Detection and Response comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 1, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
5.6
Determining ROI from Microsoft Defender Vulnerability Management is challenging due to package inclusion and unclear financial benefits.
Sentiment score
8.5
Trellix Network Detection and Response exceeded expectations by improving threat prevention and detection, boosting productivity and reducing response times.
As a Microsoft partner, we receive significant discounts, making the solution affordable for us.
 

Customer Service

Sentiment score
7.6
Microsoft Defender's customer service receives mixed reviews, highlighting inconsistent support and varying effectiveness in technical assistance.
Sentiment score
6.8
Trellix's support is praised for responsiveness, but improvements in expertise and incident response promptness are suggested by some.
They are sometimes responsive, however, often issues cannot be reproduced on their end, making it challenging.
The support we receive from Microsoft is declining, and for example, after taking advanced support, we have not received satisfactory answers.
My team raised multiple support tickets for the product, and we were able to get responses from Microsoft support team.
Technical support needs improvement as sometimes engineers are not available promptly, especially during high-severity incidents.
 

Scalability Issues

Sentiment score
8.4
Microsoft Defender Vulnerability Management is praised for its high scalability and seamless integration, receiving consistently high user ratings.
Sentiment score
7.8
Trellix Network Detection and Response scales effectively in various industries, performing well in large enterprises without latency issues.
It is scalable; I evaluated the product and decided to use Defender on over 700 of our company servers.
 

Stability Issues

Sentiment score
6.6
Microsoft Defender is rated highly stable with 99% availability, despite minor portal, compatibility, logging, and memory issues.
Sentiment score
7.7
Trellix Network Detection and Response is stable and reliable, with consistent performance and high user satisfaction despite occasional minor issues.
It is very resource-intensive, consuming a lot of memory and CPU.
There are compatibility issues occasionally arising with false positives when other security tools are not whitelisted in Microsoft Defender.
Regarding the stability of Microsoft Defender Vulnerability Management, it is a stable solution.
 

Room For Improvement

Microsoft Defender needs improvements in accuracy, customization, integration, resource efficiency, macOS support, user-friendliness, and affordability.
Trellix Network Detection needs improved customization, integration, AI capabilities, support services, and a more user-friendly interface at reduced pricing.
This scoring should be for specific industries as well. If I belong to the healthcare industry using Microsoft Defender Vulnerability Management, it should provide me with a risk score and show how I fare against the risk score of my industry.
Sometimes, it takes one week, when it should ideally take only one to two hours.
A vulnerability I patch within 15 minutes takes 24 additional hours for an update.
There should be improvements in AI intelligence, faster decision-making, and a more responsive technical support team.
 

Setup Cost

Microsoft Defender offers varying pricing; complex licensing may incur additional costs, but security benefits can justify the investment.
Trellix Network Detection is costly but effective, with yearly licensing, discounts, and competitive pricing against some competitors like Palo Alto.
For non-partners, however, the cost could be seen as higher, between seven to ten.
Overall, every organization wishes for cheaper options, but we look at the security side as well, so we are good for now.
The pricing is reasonable, and it's included in the whole Microsoft E5 bundle, so it's all-inclusive.
 

Valuable Features

Microsoft Defender Vulnerability Management excels in integration, compliance, risk prioritization, and real-time assessments, enhancing security across diverse environments.
Trellix excels in threat protection with AI-driven analysis, automation, and enhanced visibility, benefiting security operations and incident management.
The benefits my customers have gained from Microsoft Defender Vulnerability Management include a single point of visibility of entire risk exposure, complete assessment of risk assessment from the cloud, real-time assessment, and the ability to immediately remediate the risk by applying patches.
It shows us the recommended plan, along with vulnerabilities and remediation options, which is one of my favorite parts.
The integration with Sentinel has been one of the most valuable features for my organization.
Trellix NDR provides an essential defense by automatically responding to network incidents that firewalls may not catch.
 

Categories and Ranking

Microsoft Defender Vulnerab...
Ranking in Advanced Threat Protection (ATP)
16th
Average Rating
8.0
Reviews Sentiment
6.9
Number of Reviews
15
Ranking in other categories
Vulnerability Management (12th), Microsoft Security Suite (20th), Risk-Based Vulnerability Management (5th)
Trellix Network Detection a...
Ranking in Advanced Threat Protection (ATP)
12th
Average Rating
8.4
Reviews Sentiment
7.3
Number of Reviews
39
Ranking in other categories
Network Detection and Response (NDR) (10th)
 

Mindshare comparison

As of July 2025, in the Advanced Threat Protection (ATP) category, the mindshare of Microsoft Defender Vulnerability Management is 0.7%, up from 0.2% compared to the previous year. The mindshare of Trellix Network Detection and Response is 5.3%, up from 4.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Advanced Threat Protection (ATP)
 

Featured Reviews

NaySan @ Suraj Verma - PeerSpot reviewer
Provides actionable vulnerability insights and recommendations with notable efficiency
They may need to improve the portal refresh rate for Microsoft Defender Vulnerability Management because it takes time for recommendations to disappear after mitigation; sometimes, it takes one week, when it should ideally take only one to two hours. Overall, everything is good with Microsoft Defender Vulnerability Management, but the portal refresh rate can take up to seven days in some cases and three or four days in others to reflect changes.
BiswabhanuPanda - PeerSpot reviewer
Offers in-depth investigation capabilities, integrates well and smoothly transitioned from a lower-capacity appliance to a higher one
The in-depth investigation capabilities are a major advantage. When the system flags something as malicious, it provides a packet capture of that activity within the environment. That helps my team quickly identify additional context that most other tools wouldn't offer – like source IP or base64 encoded data. We can also see DNS requests and other details that aren't readily available in solutions like Check Point or others that we've tried. The detection itself is solid, and their sandboxing is powerful. There's a learning curve – you need a strong grasp of OS-level changes, process forking, registry changes, and the potential impact of those. But with that knowledge, the level of information Trellix provides is far greater than what we've seen elsewhere. The real-time response capability of Trellix has been quite effective, although it's not very fast. The key is this solution's concept of 'preference zero.' They don't immediately act on a zero-day. For example, the solution has seen a piece of malware for the first time. It'll let it in, then do sandboxing. Maybe after four or five minutes, it identifies that specific file's DNX Secure Store as malicious. At that point, they update the static analysis engine, and it gets detected if anything else tries to download the same file. There is that initial 'preference zero' concept, like with Panda. You may not hold traffic in the network. That's standard in the industry; we don't do much about it. To address that, we also have endpoint solutions. We use SentinelOne in our environment, which helps us identify threats like Western Bureaus and others.
report
Use our free recommendation engine to learn which Advanced Threat Protection (ATP) solutions are best for your needs.
860,168 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
12%
Financial Services Firm
12%
Government
9%
Manufacturing Company
7%
Financial Services Firm
13%
Comms Service Provider
11%
Manufacturing Company
10%
Computer Software Company
10%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What is your experience regarding pricing and costs for Microsoft Defender Vulnerability Management?
I would rate the price as a three for us due to the partnership discounts. For non-partners, however, the cost could be seen as higher, between seven to ten.
What needs improvement with Microsoft Defender Vulnerability Management?
I have not thought about improvements for Microsoft Defender Vulnerability Management as of now, but this is typically an operational maintenance process. The operational maintenance process refers...
What do you like most about FireEye Network Security?
We wanted to cross-reference that activity with the network traffic just to be sure there was no lateral movement. With Trellix, we easily confirmed that there was no lateral network involvement an...
What is your experience regarding pricing and costs for FireEye Network Security?
While I do not handle pricing directly, it is known that there is a variety of customers with different licensing needs, which depends on the organization's size and policy.
What needs improvement with FireEye Network Security?
The Trellix solution could be improved by enhancing the Central Management Console for faster visibility, which would help in network detection response. Networking often involves complexity that c...
 

Also Known As

No data available
FireEye Network Security, FireEye
 

Overview

 

Sample Customers

Information Not Available
FFRDC, Finansbank, Japan Advanced Institute of Science and Technology, Investis, Kelsey-Seybold Clinic, Bank of Thailand, City of Miramar, Citizens National Bank, D-Wave Systems
Find out what your peers are saying about Microsoft Defender Vulnerability Management vs. Trellix Network Detection and Response and other solutions. Updated: June 2025.
860,168 professionals have used our research since 2012.