Try our new research platform with insights from 80,000+ expert users

NNT Log Tracker Enterprise vs Trellix ESM comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 18, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

NNT Log Tracker Enterprise
Ranking in Security Information and Event Management (SIEM)
62nd
Average Rating
8.2
Number of Reviews
4
Ranking in other categories
Log Management (65th)
Trellix ESM
Ranking in Security Information and Event Management (SIEM)
24th
Average Rating
7.4
Reviews Sentiment
7.4
Number of Reviews
36
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2025, in the Security Information and Event Management (SIEM) category, the mindshare of NNT Log Tracker Enterprise is 0.1%, up from 0.1% compared to the previous year. The mindshare of Trellix ESM is 0.9%, up from 0.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Security Information and Event Management (SIEM)
 

Featured Reviews

JT
Good file integrity monitoring and change tracking tools but the knowledge base needs to be available online
For the NNT Log Tracker and Change Tracker, they have to make their knowledge base available online because there is very little information available on the internet. I would like to see the integration of AI technology, so rather than manually monitoring the logs, the tool will understand it and take care of it.
Daniel Durian - PeerSpot reviewer
Helps to monitor and detect cyberattacks
The tool's effectiveness depends on how you define your log sources. To build visibility of incoming and outgoing traffic, you need logs from perimeter defense, firewalls, web application firewalls, and endpoint protection. With good traffic visibility, incident response time is really quick. Trellix ESM provides situation awareness. On the dashboard, I can see outbound and inbound communications to known threat hosts, IPS/IDS activity, and threat intelligence of the perimeter defense in the firewall. This information helps preempt attacks.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature is the predefined reports for PCI compliance."
"This is a very easy-to-use interface with a quick ramp-up time."
"The FIM features in the Change Tracker and the Log Tracker are the most valuable."
"File integrity monitoring is a very important function."
"Compared to other solutions, the user interface is good."
"The most valuable feature is for the security operation center because it provides visibility of all traffic within the company infrastructure."
"Trellix ESM is very user-friendly."
"It has performed well and delivered the results that I have been looking for."
"The most valuable feature in ESM is its search and reporting feature. It's really nice."
"The tool's effectiveness depends on how you define your log sources. To build visibility of incoming and outgoing traffic, you need logs from perimeter defense, firewalls, web application firewalls, and endpoint protection. With good traffic visibility, incident response time is really quick."
"This solution integrates easily and very well with other technologies."
"We are now able to completely monitor our environment so we can review what is there, which is a big win for us."
 

Cons

"It is able to identify the vulnerability, however, they need an option to auto-mitigate."
"I would like to see the integration of AI technology, so rather than manually monitoring the logs, the tool will understand it and take care of it."
"The correlation suite needs to be improved."
"Only one minor deployment issue came up and it was resolved quickly. No other areas of improvement come to mind yet."
"The user interface could be more user-friendly."
"We acquired the IBM product because McAfee is slightly confusing to use, and it's broader."
"The only drawback is that they don't have any packet capturing or network behavior analysis."
"The support from McAfee ESM could improve. They could improve the speed."
"Product-wise, adding accounts on a single data source by batch would be a really great help."
"The only issue I have with McAfee is the amount of computer resources that it takes... it's definitely impacting some of the other applications that are running on a computer at the same time."
"McAfee is no more providing security updates on this product, and the enhancements to this product seem to have stopped. Moreover, we don't get proper support, and we struggle to get its support. It would be good if they can add some AI engine and out of the box use cases because it is currently limited to the same scenario and the same setup. I have done a POC for Securonix, LogRhythm. These products are much more ahead as compared to McAfee ESM. They have included multiple modules in the same solution. Correlation is very easy. If McAfee ESM can improve, especially in such implementations, then I believe it would be much better."
"I have to purchase a new box now. Its existing box is not scalable and I can't use it anymore."
 

Pricing and Cost Advice

"We have selected a perpetual license along with support."
"NNT's pricing is moderate - I would rate their pricing two-and-a-half out of ten."
"Consider both their on-premises solution and their hosted solution. Both are reasonably priced."
"The licensing cost is based on EPS."
"The product is slightly expensive."
"We pay for our licensing fees on a yearly basis, and there are no costs in addition to the standard licensing fees."
"We renew our license annually."
"Regarding pricing, Trellix ESM is not that expensive. It's less than half the cost of IBM QRadar."
"It is an inexpensive product. We purchase its yearly license."
"McAfee is the right choice for a low-budget solution."
"The cost is dependent on the customer's environment and requirements."
report
Use our free recommendation engine to learn which Security Information and Event Management (SIEM) solutions are best for your needs.
850,236 professionals have used our research since 2012.
 

Comparison Review

VS
Feb 26, 2015
HP ArcSight vs. IBM QRadar vs. ​McAfee Nitro vs. Splunk vs. RSA Security vs. LogRhythm
We at Infosecnirvana.com have done several posts on SIEM. After the Dummies Guide on SIEM, we are following it up with a SIEM Product Comparison – 101 deck. So, here it is for your viewing pleasure. Let me know what you think by posting your comments below. The key products compared here are…
 

Top Industries

By visitors reading reviews
No data available
Educational Organization
70%
Financial Services Firm
5%
Computer Software Company
4%
Comms Service Provider
4%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

Ask a question
Earn 20 points
What do you like most about McAfee ESM?
The solution's technical support is great.
What is your experience regarding pricing and costs for McAfee ESM?
Regarding pricing, Trellix ESM is not that expensive. It's less than half the cost of IBM QRadar.
What needs improvement with McAfee ESM?
The product is mature and needs little improvement, but we could enhance the customized dashboarding based on use cases.
 

Also Known As

No data available
McAfee ESM, NitroSecurity, McAfee Enterprise Security Manager
 

Overview

 

Sample Customers

Wonga, WHSmith
San Francisco Police Credit Union, Wªstenrot Gruppe, Volusion, California Department of Corrections & Rehabilitation, Government of New Brunswick, State of Colorado, Macquarie Telecom, Texas Tech University Health Sciences Center, Cologne Bonn Airport
Find out what your peers are saying about NNT Log Tracker Enterprise vs. Trellix ESM and other solutions. Updated: April 2025.
850,236 professionals have used our research since 2012.