


Trellix Endpoint Security Platform and Red Canary are both strong contenders in the endpoint security category. Trellix has a competitive edge in scalability and advanced threat detection, whereas Red Canary shines with threat intelligence and ease of deployment.
Features: Trellix Endpoint Security Platform includes advanced threat prevention, machine learning analytics, and automated incident response tools. Red Canary offers in-depth threat analysis, real-time alerting, and a strong focus on threat hunting.
Room for Improvement: Trellix could enhance its user-friendliness and ease of automation, which some users find not intuitive. Its cloud integration can also be refined. Red Canary might improve by expanding its feature set beyond threat intelligence and providing more granular control over policy settings.
Ease of Deployment and Customer Service: Trellix requires significant configuration and may need additional expert support for setup. In contrast, Red Canary offers a streamlined deployment process supported by proactive customer service. Red Canary’s approach gives it an advantage in this area.
Pricing and ROI: Trellix offers scalable, cost-effective solutions with competitive pricing focusing on long-term ROI. Red Canary presents a transparent pricing model seen as offering high immediate value and ROI due to its quick implementation effectiveness. Users note Red Canary's pricing aligns well with its service quality.
They appreciate the rich telemetry data from the solution, as it provides in-depth threat identification.
Cortex XDR by Palo Alto Networks helps to reduce my total cost of ownership significantly.
In Cortex XDR by Palo Alto Networks, most of the remediation is automated and the accuracy is quite good.
We have probably spent maybe 15% of the time that we were spending on incident investigation and system monitoring, demonstrating a return on investment.
We have observed tremendous return on investment after implementing Trellix Endpoint Security as it is a more cost-effective solution compared to other products.
Clients appreciate the solution’s customization capabilities and ongoing product improvements.
There are two parts: one is the encryption which is standard and no AI is needed, but the data protection part could benefit from AI to detect new types of data and protect it.
The technical support from Palo Alto deserves a mark of ten because they reach out within an hour whenever assistance is needed.
There is no back and forth, and they know what we are asking for and come up with the best resolution for a solution.
If any of these services are missed, it becomes a problem in terms of support tickets, follow-up, or special configuration that needs to be done in the system.
In emergencies, there is an on-call person available to resolve issues immediately.
Their customer support is excellent.
The response time is a notable issue.
I would rate their customer service nine out of ten.
When we implemented Trellix Endpoint Security in their network, multiple malwares were detected.
You can onboard 10,000 endpoints in just hours, which demonstrates the excellent scalability of this product.
Cortex XDR by Palo Alto Networks can be expanded anytime by purchasing another license without any issues related to scalability.
I think scalability for Cortex XDR by Palo Alto Networks is good.
We've been able to connect and throw all of the data that we have access to over to their systems to parse, process, and monitor without issue.
There are no limitations; the solution is easily scalable.
I would rate the scalability of the solution as a six out of ten, indicating some challenges due to downtime requirements.
Trellix Endpoint Security is scalable.
Cortex remains fast and responsive, even with increasing data and alerts.
The thresholds we've seen on our firewall boxes at some instances reached 80% to 85%, but even at that level of utilization, we don't observe any latency or any issues reported with respect to accessing the application.
Cortex XDR is stable, offering high quality and reliable performance.
I would rate its stability as nine out of ten.
I would rate the stability of Trellix Endpoint Security as near perfect, close to ten out of ten.
I think it's stable enough; earlier it had glitches, but now it's stable enough.
Improving reporting and dashboard customization, along with the addition of real-time and exportable reports, would help SOC teams greatly.
The inclusion of this feature would allow the application of DLP policies alongside antivirus policies via a single agent and console, making it more competitive as other OEMs often offer DLP solutions as part of their antivirus products.
If the per GB data could be provided at a certain level free of cost or at the same cost which the customer is taking for the entire bundle, that would be better.
Red Canary can be improved by continuing to add new features and capabilities.
Red Canary's pricing spectrum may not be ideal for smaller financial institutions.
What needs improvement in Trellix Endpoint Security is the reduction of resource consumption by the scanning feature.
Improvements are needed in forensic analytics to detect specific vulnerabilities.
The product does not seem to be cloud-native.
The pricing on SentinelOne is far more reasonable and cheaper than Cortex XDR by Palo Alto Networks.
I would say it is definitely not a cheap product, considering how mature it is and how scalable all Palo Alto products are together.
Cortex XDR is perceived as expensive by some customers, yet offers dynamic pricing.
The services are higher priced.
The license costs are very reasonable, around 1,000 to 1,200 rupees per year.
Trellix Endpoint Security is cost-effective and provides excellent value for money.
My experience with pricing, setup cost, and licensing is good; compared to other tools, Trellix Endpoint Security Platform provides lower costs.
It incorporates AI for normal behavior detection, distinguishing unusual operations.
The product provides automation responses in case of a threat attack, severity assessments, centralized manageability, and comprehensive compliance features, resulting in reduced costs.
It includes machine learning to easily analyze data and detect complex threats across endpoints, networks, or clouds.
Red Canary detects threats and attack patterns, allowing us to assess any significant damage caused to the banking environment, particularly if protected data has been damaged or corrupted.
In my experience, the best features Red Canary offers are their team, their monitoring team, their expertise at incident investigation, and a focus on suspicious or actual indicators of compromise to ensure that we're not spending time just reviewing logs, but that we're actually looking at things that may indicate we have broader issues.
Trellix Endpoint Security is a proven, robust, and cost-effective solution that protects the organization from different types of ransomware and attacks.
Including options like Application Control (formerly Solidcore), integrated monitoring, change control, DLP, and advanced threat protection, the solution offers comprehensive security.
The detection capability of Trellix Endpoint Security is higher than traditional antivirus solutions.
| Product | Mindshare (%) |
|---|---|
| Cortex XDR by Palo Alto Networks | 3.4% |
| Trellix Endpoint Security Platform | 3.3% |
| Red Canary | 0.6% |
| Other | 92.7% |


| Company Size | Count |
|---|---|
| Small Business | 44 |
| Midsize Enterprise | 20 |
| Large Enterprise | 47 |
| Company Size | Count |
|---|---|
| Small Business | 6 |
| Large Enterprise | 2 |
| Company Size | Count |
|---|---|
| Small Business | 68 |
| Midsize Enterprise | 36 |
| Large Enterprise | 62 |
Cortex XDR by Palo Alto Networks provides advanced threat detection with AI-driven endpoint protection and seamless integration, ensuring multi-layered security and automatic threat response.
Cortex XDR is designed to safeguard endpoints against malware and suspicious activities. It offers advanced threat detection and response capabilities using behavioral analysis, AI, and machine learning. It seamlessly integrates with security infrastructures, providing endpoint security, firewall integration, and enhanced visibility in both cloud-based and on-premises environments.
What are the key features of Cortex XDR?Organizations in diverse sectors deploy Cortex XDR to protect against malware, leveraging its advanced threat detection capabilities. Its integration with existing security infrastructures appeals to those seeking comprehensive protection in both cloud and on-premises environments, providing enhanced visibility and threat intelligence.
Red Canary Managed Detection and Response (MDR) offers robust threat detection, rapid response capabilities, continuous security monitoring, and seamless integration with existing tools. Valued for its actionable reporting and proactive threat intelligence, it streamlines operations and enhances organizational efficiency and security.
Trellix Endpoint Security Platform offers essential features like centralized management, threat prevention, and encryption, facilitating seamless scaling and integration with other systems while prioritizing user security.
This comprehensive platform focuses on endpoint protection, antivirus capabilities, and malware defense. It enhances cybersecurity with data loss prevention, advanced threat detection, and AI-driven features for reliable protection without impacting performance. Central management and advanced reporting streamline integration and ease of use. Flexible policy deployment through the management console and its robust security measures, such as DLP and device control, further increase protection. Challenges include high CPU and memory usage affecting performance, a complex interface, and lengthy deployment. Third-party integration and Windows Hello support need improvement. Additional concerns involve improved threat detection and faster technical support responses.
What are the key features of Trellix Endpoint Security Platform?Trellix Endpoint Security Platform is widely implemented in industries such as banking and government for securing mobile and desktop devices. Its capabilities cover network security, device control, and remote access protection, catering to diverse environments by offering robust cybersecurity management against advanced threats.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.