SafeBreach vs Trellix Network Detection and Response comparison

Cancel
You must select at least 2 products to compare!
SafeBreach Logo
2,055 views|1,163 comparisons
100% willing to recommend
Trellix Logo
1,942 views|1,376 comparisons
100% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between SafeBreach and Trellix Network Detection and Response based on real PeerSpot user reviews.

Find out what your peers are saying about Pentera, Cymulate, Picus Security and others in Breach and Attack Simulation (BAS).
To learn more, read our detailed Breach and Attack Simulation (BAS) Report (Updated: April 2024).
768,857 professionals have used our research since 2012.
Featured Review
Archie Scorgie
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The most valuable feature is the reporting database and attack protection.""The most valuable feature is the huge library of hack attacks and breach methods."

More SafeBreach Pros →

"It protects from signature-based attacks and signature-less attacks. The sandboxing technology, invented by FireEye, is very valuable. Our customers go for FireEye because of the sandboxing feature. When there is a threat or any malicious activity with a signature, it can be blocked by IPS. However, attacks that do not have any signatures and are very new can only be blocked by using the sandboxing feature, which is available only in FireEye. So, FireEye has both engines. It has an IPS engine and a sandbox engine, which is the best part. You can get complete network protection by using FireEye.""Support is very helpful and responsive.""The sandbox feature of FireEye Network Security is very good. The operating system itself has many features and it supports our design.""The features that I find most valuable are the MIR (Mandiant Incident Response) for checks on our inbound security.""Before FireEye, most of the times that an incident would happen nobody would be able to find out where or why the incident occurred and that the system is compromised. FireEye is a better product because if the incident already happened I know that the breach is there and that the system is compromised so we can take appropriate action to prevent anything from happening.""Very functional and good for detecting malicious traffic.""Application categorization is the most valuable feature for us. Application filtering is very interesting because other products don't give you full application filtering capabilities.""The product is very easy to configure."

More Trellix Network Detection and Response Pros →

Cons
"I would like to see some integration on the customization and customer support.""There is room for improvement in the interface. It is not always easy to find the options that you need and not everything is customizable."

More SafeBreach Cons →

"There is a lot of room for Improvement in the offering, from cost to functionality. It is pretty straightforward to implement which is an advantage. However, it falls short in pricing, detection capabilities, and, most importantly, reporting and policy management.""Technical support could be improved.""The initial setup was complex because of the nature of our environment. When it comes to the type of applications and functions which we were looking at in terms of identifying malicious threats, there would be some level of complexity, if we were doing it right.""It is not a very secure product.""Cybersecurity posture has room for improvement.""FireEye Network Security should have better integration with other vendors' firewalls or proxies, such as Palo Alto and Fortinet. Files that are being submitted should happen through the API or automatically.""It would be a good idea if we could get an option to block based upon the content of an email, or the content of a file attachment.""Stability issues manifested in terms of throughput maximization."

More Trellix Network Detection and Response Cons →

Pricing and Cost Advice
  • "The price starts from about $140,000 so this solution is expensive in my opinion. Maintenance and support is included in the license cost."
  • "The pricing is more expensive than other options on the market today."
  • More SafeBreach Pricing and Cost Advice →

  • "Pricing and licensing are reasonable compared to competitors."
  • "The pricing is a little high."
  • "Because of what the FireEye product does, it has significantly decreased our mean time in being able to identify and detect malicious threats. The company that I work with is a very mature organization, and we have seen the meantime to analysis decrease by at least tenfold."
  • "There are some additional services that I understand the vendor provides, but our approach was to package all of the features that we were looking to use into the product."
  • "We're partners with Cisco so we get a reasonable price. It's cheaper than Palo Alto in terms of licensing."
  • "FireEye is comparable to other products, such as HX, but seems expensive. It may cause us to look at other products in the market."
  • "When I compare this solution to its competitors in the market, I find that it is a little expensive."
  • "The user fee is not as high but the maintenance fee is expensive."
  • More Trellix Network Detection and Response Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Breach and Attack Simulation (BAS) solutions are best for your needs.
    768,857 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The most valuable feature is the reporting database and attack protection.
    Top Answer:The pricing is more expensive than other options on the market today.
    Top Answer:I would like to see some integration on the customization and customer support.
    Top Answer:Over the thirteen years of using the product, we have not experienced a single compromise in our environment. During the COVID period, we faced numerous DDoS attacks, and the tool proved highly… more »
    Top Answer:Certain features in Trellix Network Detection and Response, such as using AL-type commands, may initially pose a challenge for those unfamiliar with such commands. However, once users become… more »
    Ranking
    Views
    2,055
    Comparisons
    1,163
    Reviews
    1
    Average Words per Review
    178
    Rating
    8.0
    Views
    1,942
    Comparisons
    1,376
    Reviews
    5
    Average Words per Review
    381
    Rating
    8.4
    Comparisons
    Also Known As
    FireEye Network Security, FireEye
    Learn More
    Trellix
    Video Not Available
    Overview

    SafeBreach is the world's most widely used continuous security validation platform in enterprise companies. The company's patented platform empowers CISOs and their teams to validate security controls, maximize their effectiveness, and drive down risk. 

    SafeBreach provides a "hacker's view" of an enterprise's security posture by continuously validating security controls and presenting findings in customized dashboards to enable stakeholders to cleanly focus on the biggest risk to the organization. SafeBreach automatically and safely executes thousands of attack methods to validate network, endpoint, cloud, container, and email security controls against the Hacker's Playbook, the world's largest collection of attack data broken down by methods, tactics, and threat actors. Data from SafeBreach validations can improve SOC team responses and empower management to make smarter decisions to better manage risk and invest resources.

    Detect the undetectable and stop evasive attacks. Trellix Network Detection and Response (NDR) helps your team focus on real attacks, contain intrusions with speed and intelligence, and eliminate your cybersecurity weak points.

    Sample Customers
    PayPal, ICON, Netflix, Johnson & Johnson, CVS Health, Pepsi, Kellogg's, Cisco, Deloitte
    FFRDC, Finansbank, Japan Advanced Institute of Science and Technology, Investis, Kelsey-Seybold Clinic, Bank of Thailand, City of Miramar, Citizens National Bank, D-Wave Systems
    Top Industries
    VISITORS READING REVIEWS
    Financial Services Firm21%
    Computer Software Company12%
    Manufacturing Company9%
    Insurance Company6%
    REVIEWERS
    Financial Services Firm22%
    Computer Software Company13%
    Government9%
    University9%
    VISITORS READING REVIEWS
    Financial Services Firm18%
    Computer Software Company9%
    Manufacturing Company8%
    Government7%
    Company Size
    VISITORS READING REVIEWS
    Small Business18%
    Midsize Enterprise17%
    Large Enterprise65%
    REVIEWERS
    Small Business39%
    Midsize Enterprise18%
    Large Enterprise43%
    VISITORS READING REVIEWS
    Small Business18%
    Midsize Enterprise12%
    Large Enterprise70%
    Buyer's Guide
    Breach and Attack Simulation (BAS)
    April 2024
    Find out what your peers are saying about Pentera, Cymulate, Picus Security and others in Breach and Attack Simulation (BAS). Updated: April 2024.
    768,857 professionals have used our research since 2012.

    SafeBreach is ranked 6th in Breach and Attack Simulation (BAS) with 2 reviews while Trellix Network Detection and Response is ranked 9th in Advanced Threat Protection (ATP) with 35 reviews. SafeBreach is rated 8.0, while Trellix Network Detection and Response is rated 8.6. The top reviewer of SafeBreach writes "Breach and attach simulation solution used to test security tools with a valuable library of hacking data". On the other hand, the top reviewer of Trellix Network Detection and Response writes "Blocks traffic and DDoS attacks ". SafeBreach is most compared with Picus Security, Cymulate, Pentera, AttackIQ and XM Cyber, whereas Trellix Network Detection and Response is most compared with Fortinet FortiSandbox, Palo Alto Networks WildFire, Zscaler Internet Access, Fortinet FortiGate and Vectra AI.

    We monitor all Breach and Attack Simulation (BAS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.