Try our new research platform with insights from 80,000+ expert users

Qualys Multi-Vector EDR vs Trend Vision One Endpoint Security comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Qualys Multi-Vector EDR
Ranking in Endpoint Detection and Response (EDR)
73rd
Average Rating
8.0
Reviews Sentiment
7.1
Number of Reviews
1
Ranking in other categories
Network Detection and Response (NDR) (32nd)
Trend Vision One Endpoint S...
Ranking in Endpoint Detection and Response (EDR)
6th
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
132
Ranking in other categories
Endpoint Protection Platform (EPP) (5th), Endpoint Compliance (1st)
 

Mindshare comparison

As of July 2025, in the Endpoint Detection and Response (EDR) category, the mindshare of Qualys Multi-Vector EDR is 0.1%, up from 0.1% compared to the previous year. The mindshare of Trend Vision One Endpoint Security is 2.0%, down from 2.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Detection and Response (EDR)
 

Featured Reviews

reviewer1668453 - PeerSpot reviewer
Provides contextual alerts and risk ratings on findings
It's kind of difficult to quantify areas for improvement. In the larger picture, one challenge is that the NDR space is very crowded today. I can mention half a dozen names just off the top of my head. There are at least 12 to 20 different players. All of them are well-known brand names, and it's difficult to compare them. They all claim to be giving you the same network difference capability: catching malware, dealing with all the minor taxonomy of attack, all that. Still, it's very difficult to compare them side by side because they all do things a little differently, and they all have different presentations and output. We haven't deployed it, so I can't give you what we felt about it exactly. But in the larger perspective, the critical feature is really giving a clear separation between a low, high, and medium criticality. You need a rating that is really true to the actual attack. There's one other capability we are evaluating them for, and it's for custom alerts detection. A lot of these products are trying to profile the threats that are already out there in the industry. They're very well known and published. Today, there are targeted acts being played against organizations, so you have to be sensitive to how your firewalls, protocols, and your HTTP are all operating. You might have some fine-tuned threats that are targeting you, and you should be able to build custom defenses. They should have some openness in terms of how you specify your threats. You get a standard library of threats. On top of it, every organization builds its own.
Ágoston DEIM - PeerSpot reviewer
Works wonderfully to defend endpoints against malware, ransomware, and malicious scripts
It would be much easier if the solution added the allowed USB for pen drives and USB drives. You can import an Excel CSV file with 500 devices, but it will be allowed globally. That would be helpful if you want to allow it only in one policy. If you want to enable these pen drives only for one group or an organization's security group, you have to add them manually one by one. That could be easier. It's a user experience, but you can add not just the serial but also the vendor. If you only have a Kingston pen drive, you can say that you want to allow all Kingston, or you can add the model number. If you know that you have a specific model of the Kingston pen drive, you can just allow Kingston and that model. The serial number is not important. You will not filter by serial number. However, if you want to filter by serial number and add only the given devices with the serial number, you have to add them one by one. You have to do this if you don't want to allow them globally. It's enough if you know that you bought a Kingston pen drive and you just put in that you want to allow the Kingston and the model number. Then, all pen drives of the given model will be allowed for a given security group on a given number of computers. In that case, you can attach only pen drives and no external hard drives from Kingston. That could be fast. If you want to add a given serial number, you add it one by one for a specific group. If you want to allow them globally, you say that everybody can use the pen drive on every computer. You can do it from a CSV. Let's say the CSV imports for security groups only and not company-wide. I think this is the more punctual way. If you want to allow it only for the security group or Active Directory group of users, you must manually edit it to limit the serial numbers. The solution's user experience regarding device control could be more friendly or straightforward.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"They can provide you very contextual alerts on if something bad is happening—coming into your network or going out of your network. As part of that, they gather a lot of threat intelligence and map your connections against that. The larger benefit is that they give you a risk rating on their findings."
"It's easier to integrate Apex One than Kaspersky. It also performs well, and the customer feedback has been positive."
"The initial setup is very easy."
"The main benefit is the threat intelligence network of Trend Micro."
"I think this is the best solution in the category of endpoint protection, it's really excellent. It's better than McAfee."
"The end user perspective is very good because the solution isn't complex to learn and support is readily available."
"Its database is better than most of the endpoint protection solutions."
"I like Apex One's USB port blocking. We implement different policies for each client. For example, a client might ask us to block certain USB devices or require us to restart a desktop on the network."
"They have a wide range of products, including a couple for virtual patching, which is very important."
 

Cons

"My challenge is actually comparing offerings from different vendors across a threat spectrum that is very large. We are talking about millions of threats. How are you confident that Blue Hexagon is catching all one million of them and Palo Alto is doing the same thing? They all have their strengths. Within that, Blue Hexagon might cover 990,000 of them. Palo Alto might cover another 990,000. It's a bit difficult to compare them and say, "Oh, are they catching the same 990,000?" I don't know."
"The solution can be improved to utilize fewer system resources, like memory and hard disk, during scanning."
"In the next release, I would like to see IBS included in OfficeScan."
"The EDR feature is difficult to use and could be made more user-friendly."
"Whether the license is monthly or annual depends on the deal of the company."
"The console can be better in terms of management and viewing the hierarchy of devices. Currently, setting up the hierarchy OU-wise is a bit cumbersome. It can be made a bit easier. If that can be more user-friendly and easier to manage, it would be great."
"For primary use cases, we required DLP solutions with application control and web control, which is not provided by Trend Vision One Endpoint Security."
"Occasionally, the system may be a bit slow."
"We have found that this product is a bit heavy on the endpoints."
 

Pricing and Cost Advice

"It's difficult to state the setup cost. All the NDRs range anywhere between $500,000, plus or minus, to $2 million. There's a spread of pricing here, depending on who you are talking to. Obviously the major brand names want more money. They typically bundle it with their other offerings. With Cisco, for example, you don't just buy an NDR. So, typically it gets rolled into the cost."
"It's an annual subscription."
"On a yearly basis, it's about $50,000. There are no costs in addition to the standard licensing fees."
"We have the smallest package of Trend Micro Apex One. The full package is expensive, and it was more expensive than we thought."
"Pricing and licensing are competitive with other solutions on the market."
"Trend Micro has very aggressive pricing, but it is also very good."
"Licensing costs depend completely on the number of users or licenses. They have a specific pricing structure. For example, if you are looking for 100 users to be on the product, in the Indian market (we're based in India), the cost is nearly $2,500 to $3,000 maximum for one three-year license."
"Its pricing should be improved."
"If I compare Trend Micro Apex One with other solutions there are a few challenges for customers who have do not need more licenses. Sometimes the customers struggle because this product is totally an enterprise solution, and the price for the licenses can be expensive for individuals or small organizations."
report
Use our free recommendation engine to learn which Endpoint Detection and Response (EDR) solutions are best for your needs.
859,579 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
13%
Computer Software Company
11%
Comms Service Provider
9%
Retailer
7%
Educational Organization
29%
Computer Software Company
13%
Manufacturing Company
7%
Financial Services Firm
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

Ask a question
Earn 20 points
What's the difference between Trend Micro Deep Security and Trend Micro Apex One?
Trend Micro Deep Security offers a lot of features. It guarantees security for your data center, cloud, and containers - all with a unified and comprehensive SaaS solution and without compromising ...
What do you like most about Trend Micro Apex One?
It is updated automatically without much intervention from our side. We can also get some reports easily.
What is your experience regarding pricing and costs for Trend Micro Apex One?
The pricing is very high, despite the solution’s capabilities.
 

Also Known As

Blue Hexagon
Trend Micro Apex One, OfficeScan, Trend Micro OfficeScan
 

Overview

 

Sample Customers

Pacific Dental Services, Greenhill and Co, Heffernan Insurance Brokers
Atma Jaya Catholic University of Indonesia, A&W Food Services of Canada, Babou, Beth Israel Deaconess Care Organization (BO), DCI Donor Services, Evalueserve, Gulftainer, Hiroshima Prefectural Government, MEDHOST
Find out what your peers are saying about CrowdStrike, SentinelOne, Microsoft and others in Endpoint Detection and Response (EDR). Updated: January 2025.
859,579 professionals have used our research since 2012.