

Microsoft Defender XDR and Trellix Endpoint Security compete in the cybersecurity solutions market. Trellix Endpoint Security currently holds an edge due to its advanced features and capabilities in customization and integration.
Features: Microsoft Defender XDR offers comprehensive security features with robust antivirus and firewall capabilities, seamless integration with Microsoft 365, and centralized management for better threat protection. Trellix Endpoint Security boasts extensive features such as data loss prevention, encryption, and endpoint detection and response, making it a more feature-rich solution.
Room for Improvement: Microsoft Defender XDR could benefit from enhancements in threat intelligence customization, real-time updates, and a more user-friendly interface. Trellix Endpoint Security should work on reducing its resource consumption and simplifying integration with other enterprise tools, as well as creating more intuitive dashboards and policy management processes.
Ease of Deployment and Customer Service: Microsoft Defender XDR is known for its seamless integration within cloud environments due to its alignment with Microsoft 365 services, complemented by strong customer support. On the other hand, Trellix Endpoint Security tends to require complex on-premises deployment while offering reliable customer service, though response times need improvement for complex issues.
Pricing and ROI: Microsoft Defender XDR is often viewed as expensive but justifiable due to its integration and extensive features, delivering ROI via enhanced security and reduced risk. Trellix Endpoint Security's pricing is competitive and perceived as offering a solid ROI mainly through its customization power and efficiency in managing endpoint security.
We can quarantine and isolate a device within minutes.
Microsoft Defender XDR has saved me at least 50% of my time.
It helped stop multiple intrusion points where we would have had millions in lost revenue if the attackers got in.
We have observed tremendous return on investment after implementing Trellix Endpoint Security as it is a more cost-effective solution compared to other products.
Clients appreciate the solution’s customization capabilities and ongoing product improvements.
There are two parts: one is the encryption which is standard and no AI is needed, but the data protection part could benefit from AI to detect new types of data and protect it.
You get stuck in low-level support for way longer than you should, instead of them escalating the issue up the chain.
It's critical to escalate SEV B issues immediately to a domestic engineer.
Once issues are escalated to the second or third layer, the support is much better.
The response time is a notable issue.
I would rate their customer service nine out of ten.
When we implemented Trellix Endpoint Security in their network, multiple malwares were detected.
My concern is about the scale of events and alerts being generated, and the product is doing a very good job of only surfacing the important items for us.
Microsoft Defender XDR shows tremendous scalability, much more so than on-premises solutions.
Microsoft Defender XDR scales pretty well.
I would rate the scalability of the solution as a six out of ten, indicating some challenges due to downtime requirements.
Trellix Endpoint Security is scalable.
The service has remained consistently online, with any issues isolated to specific components, suggesting a well-designed and modular architecture.
The services within our ecosystem have been reliable, meeting their SLAs.
It provides high-fidelity signals.
I would rate its stability as nine out of ten.
I would rate the stability of Trellix Endpoint Security as near perfect, close to ten out of ten.
I think it's stable enough; earlier it had glitches, but now it's stable enough.
The licensing process needs improvement and clarification.
Improvements are needed in automated response capabilities.
Some inconsistencies exist between blades, which could be improved for a more seamless user and UI experience.
What needs improvement in Trellix Endpoint Security is the reduction of resource consumption by the scanning feature.
Improvements are needed in forensic analytics to detect specific vulnerabilities.
The product does not seem to be cloud-native.
There are certainly savings when using Microsoft Defender XDR, which can range from 30%, 40%, and even up to 50%.
I would rate the pricing as eight out of ten, indicating it is a reasonable cost for the product.
Microsoft purposefully obfuscates this through marketing ploys to hide costs.
The license costs are very reasonable, around 1,000 to 1,200 rupees per year.
Trellix Endpoint Security is cost-effective and provides excellent value for money.
My experience with pricing, setup cost, and licensing is good; compared to other tools, Trellix Endpoint Security Platform provides lower costs.
With Microsoft threat intelligence information, it detects various types of threats, including insider attacks, malicious content, and data exfiltration.
This allows us to secure our systems in advance and proactively improve security, rather than waiting for incidents to occur.
Once we have it on the security dashboard, we can see a real-time storyline.
Trellix Endpoint Security is a proven, robust, and cost-effective solution that protects the organization from different types of ransomware and attacks.
Including options like Application Control (formerly Solidcore), integrated monitoring, change control, DLP, and advanced threat protection, the solution offers comprehensive security.
The detection capability of Trellix Endpoint Security is higher than traditional antivirus solutions.
| Product | Market Share (%) |
|---|---|
| Microsoft Defender XDR | 2.7% |
| Trellix Endpoint Security Platform | 4.0% |
| Other | 93.3% |

| Company Size | Count |
|---|---|
| Small Business | 47 |
| Midsize Enterprise | 25 |
| Large Enterprise | 38 |
| Company Size | Count |
|---|---|
| Small Business | 67 |
| Midsize Enterprise | 36 |
| Large Enterprise | 61 |
Microsoft Defender XDR is a comprehensive security solution designed to protect against threats in the Microsoft 365 environment.
It offers robust security measures, comprehensive threat detection capabilities, and an efficient incident response system. With seamless integration with other Microsoft products and a user-friendly interface, it simplifies security management tasks.
Users have found it effective in detecting and preventing various types of attacks, such as phishing attempts, malware infections, and data breaches.
Watch the Microsoft demo video here: Microsoft Defender XDR demo video.
Trellix Endpoint Security Platform offers essential features like centralized management, threat prevention, and encryption, facilitating seamless scaling and integration with other systems while prioritizing user security.
This comprehensive platform focuses on endpoint protection, antivirus capabilities, and malware defense. It enhances cybersecurity with data loss prevention, advanced threat detection, and AI-driven features for reliable protection without impacting performance. Central management and advanced reporting streamline integration and ease of use. Flexible policy deployment through the management console and its robust security measures, such as DLP and device control, further increase protection. Challenges include high CPU and memory usage affecting performance, a complex interface, and lengthy deployment. Third-party integration and Windows Hello support need improvement. Additional concerns involve improved threat detection and faster technical support responses.
What are the key features of Trellix Endpoint Security Platform?Trellix Endpoint Security Platform is widely implemented in industries such as banking and government for securing mobile and desktop devices. Its capabilities cover network security, device control, and remote access protection, catering to diverse environments by offering robust cybersecurity management against advanced threats.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.