We performed a comparison between SafeBreach and Trellix Network Detection and Response based on real PeerSpot user reviews.
Find out what your peers are saying about Pentera, Cymulate, Picus Security and others in Breach and Attack Simulation (BAS)."The most valuable feature is the reporting database and attack protection."
"The most valuable feature is the huge library of hack attacks and breach methods."
"It protects from signature-based attacks and signature-less attacks. The sandboxing technology, invented by FireEye, is very valuable. Our customers go for FireEye because of the sandboxing feature. When there is a threat or any malicious activity with a signature, it can be blocked by IPS. However, attacks that do not have any signatures and are very new can only be blocked by using the sandboxing feature, which is available only in FireEye. So, FireEye has both engines. It has an IPS engine and a sandbox engine, which is the best part. You can get complete network protection by using FireEye."
"Support is very helpful and responsive."
"The sandbox feature of FireEye Network Security is very good. The operating system itself has many features and it supports our design."
"The features that I find most valuable are the MIR (Mandiant Incident Response) for checks on our inbound security."
"Before FireEye, most of the times that an incident would happen nobody would be able to find out where or why the incident occurred and that the system is compromised. FireEye is a better product because if the incident already happened I know that the breach is there and that the system is compromised so we can take appropriate action to prevent anything from happening."
"Very functional and good for detecting malicious traffic."
"Application categorization is the most valuable feature for us. Application filtering is very interesting because other products don't give you full application filtering capabilities."
"The product is very easy to configure."
"I would like to see some integration on the customization and customer support."
"There is room for improvement in the interface. It is not always easy to find the options that you need and not everything is customizable."
"There is a lot of room for Improvement in the offering, from cost to functionality. It is pretty straightforward to implement which is an advantage. However, it falls short in pricing, detection capabilities, and, most importantly, reporting and policy management."
"Technical support could be improved."
"The initial setup was complex because of the nature of our environment. When it comes to the type of applications and functions which we were looking at in terms of identifying malicious threats, there would be some level of complexity, if we were doing it right."
"It is not a very secure product."
"Cybersecurity posture has room for improvement."
"FireEye Network Security should have better integration with other vendors' firewalls or proxies, such as Palo Alto and Fortinet. Files that are being submitted should happen through the API or automatically."
"It would be a good idea if we could get an option to block based upon the content of an email, or the content of a file attachment."
"Stability issues manifested in terms of throughput maximization."
More Trellix Network Detection and Response Pricing and Cost Advice →
SafeBreach is ranked 6th in Breach and Attack Simulation (BAS) with 2 reviews while Trellix Network Detection and Response is ranked 9th in Advanced Threat Protection (ATP) with 35 reviews. SafeBreach is rated 8.0, while Trellix Network Detection and Response is rated 8.6. The top reviewer of SafeBreach writes "Breach and attach simulation solution used to test security tools with a valuable library of hacking data". On the other hand, the top reviewer of Trellix Network Detection and Response writes "Blocks traffic and DDoS attacks ". SafeBreach is most compared with Picus Security, Cymulate, Pentera, AttackIQ and XM Cyber, whereas Trellix Network Detection and Response is most compared with Fortinet FortiSandbox, Palo Alto Networks WildFire, Zscaler Internet Access, Fortinet FortiGate and Vectra AI.
We monitor all Breach and Attack Simulation (BAS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.