Try our new research platform with insights from 80,000+ expert users

Open EDR vs Trellix Endpoint Security Platform comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 14, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Open EDR
Ranking in Endpoint Detection and Response (EDR)
37th
Average Rating
8.0
Number of Reviews
1
Ranking in other categories
No ranking in other categories
Trellix Endpoint Security P...
Ranking in Endpoint Detection and Response (EDR)
10th
Average Rating
8.0
Reviews Sentiment
7.2
Number of Reviews
158
Ranking in other categories
Endpoint Protection Platform (EPP) (9th), Extended Detection and Response (XDR) (8th)
 

Mindshare comparison

As of October 2025, in the Endpoint Detection and Response (EDR) category, the mindshare of Open EDR is 1.0%, up from 0.8% compared to the previous year. The mindshare of Trellix Endpoint Security Platform is 4.2%, down from 4.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Detection and Response (EDR) Market Share Distribution
ProductMarket Share (%)
Trellix Endpoint Security Platform4.2%
Open EDR1.0%
Other94.8%
Endpoint Detection and Response (EDR)
 

Featured Reviews

Timothy Muriithi - PeerSpot reviewer
I also like the ability to remotely manage update packages on your systems, and the fact that there is an open source version
Setting OpenEDR was challenging at first, but I got it done by following their documentation and online videos. You need to install the client and configure it to work with their online open platform. Next, you have to configure it on the device if it's a phone. You input a cloud link to the EDR, so you can monitor it from the cloud. There isn't any maintenance aside from updating the client. It's mostly on the cloud.
Abdullah Al Hadi - PeerSpot reviewer
Customization capabilities allow clients to autonomously deploy policies
There are a few areas where Trellix Endpoint Security can improve. Firstly, the high CPU utilization when agents are installed can negatively impact client systems. Another issue is with end-users outside the network, where the agent handler sometimes fails to deploy the product properly. Improvements are needed in forensic analytics to detect specific vulnerabilities. It would also help if detection specifics were identified more quickly and the problem-solving process accelerated, especially to meet larger clients' expectations.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Comodo includes a firewall and antivirus in one solution. I also like the ability to remotely manage update packages on your systems. Comodo can even find a lost device and secure it remotely."
"The solution is reliable."
"The initial setup is straightforward, not complex."
"The most valuable feature of Trellix Endpoint Security is its extensive customization capability, which allows me to create and deploy policies autonomously, suiting my individual needs."
"Threat prevention is valuable because most clients use other solutions like antivirus as part of web protection. I don't find that kind of solution useful."
"The solution is broken down into different components from the portals. Web filtering, which is an added feature has been great for us."
"The most valuable features are reporting from the ePO console and the advanced threat protection (ATP)."
"I think the costing is fine compared to other products. Cost-wise you definitely get value for your money."
"When Intel acquired McAfee they worked on the protocol so that all vendors can work on the same platform. It's a very big improvement in McAfee. All McAfee products talk to each other. Other vendor's products can join this platform as well so it makes it more powerful on the enterprise side for McAfee."
 

Cons

"Comodo includes a firewall and antivirus in one solution. I also like the ability to remotely manage update packages on your systems. Comodo can even find a lost device and secure it remotely."
"The product is consolidating its portfolio into one product. It is difficult at the moment."
"Tech support is not as helpful as they were in the past."
"We would like to solution to offer better security."
"The vendor should simplify the way they bundle the products because it's very hard to explain to customers what products contain which features."
"It didn't work well for some of the use cases. We have different use cases for each entity. Their support is also not good and needs improvement."
"The security of this solution needs improvement."
"The solution takes up a high amount of memory and can cause the system to hang."
"There are times the solution has some additional software added that is not fully integrated properly, such as Exchange Group Sheild. It is quite old and is not fully integrated properly and could be improved."
 

Pricing and Cost Advice

Information not available
"The price of the solution is fair, we have a complete security package."
"When comparing the solution to others it is a bit expensive. We are on a monthly license."
"Annual license fee is good"
"They should reduce the cost or make it free, open-source software."
"The pricing is mid-ranged and quite reasonable compared to other similar products."
"It was an annual fee. There was just one overall fee."
"Its price is reasonable, but it could be made free."
"The solution is not an expensive tool. Compared to other options, it's mostly average-priced. I've deployed it for customers ranging from 100 nodes to over 5,000 nodes. Its renewal prices are very low, and it offers both perpetual and subscription licenses. With a perpetual license, the product will keep working as long as it's not end-of-life, which benefits companies."
report
Use our free recommendation engine to learn which Endpoint Detection and Response (EDR) solutions are best for your needs.
872,019 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
19%
Retailer
9%
Manufacturing Company
8%
Comms Service Provider
8%
Government
13%
Manufacturing Company
13%
Computer Software Company
11%
Financial Services Firm
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business67
Midsize Enterprise36
Large Enterprise59
 

Questions from the Community

Ask a question
Earn 20 points
How does McAfee Endpoint Security compare with MVISION?
The flexible manageability of McAfee Endpoint Security is one of our favorite aspects of this solution. You can deploy various components as desired with McAfee Endpoint Security, whereas many othe...
How does Crowdstrike Falcon compare with FireEye Endpoint Security?
The Crowdstrike Falcon program has a simple to use user interface, making it both an easy to use as well as an effective program. Its graphical design is such that it makes an extremely useful too...
What do you like most about McAfee Endpoint Security?
It provides a robust defense against cybersecurity threats while offering user-friendly features like notifications and approval prompts.
 

Also Known As

No data available
McAfee Endpoint Security, McAfee Endpoint Protection, Intel Security Total Protection for Endpoint, McAfee Complete Endpoint Protection, Trellix Endpoint Security (ENS)
 

Overview

 

Sample Customers

Information Not Available
inHouseIT, Seagate Technology
Find out what your peers are saying about CrowdStrike, SentinelOne, Microsoft and others in Endpoint Detection and Response (EDR). Updated: January 2025.
872,019 professionals have used our research since 2012.