Trellix Endpoint Security Platform and Symantec Endpoint Detection and Response both compete in the robust endpoint security solutions category. Trellix appears to have the upper hand due to its advanced centralized management and integration capabilities, whereas Symantec is favored for its customizable application and device control along with its cost-effectiveness in cloud deployments.
Features: Trellix offers centralized management, adaptability to new threats, and seamless suite integration. Its encryption and DLP functionalities are highly valued. Symantec is known for its immediate response capabilities and integrated detection features. It provides customizable application and device control, offering strong protection without additional agent installations.
Room for Improvement: Trellix faces challenges with high resource consumption and complex configuration, particularly in DLP policies. It also lacks Mac OS support and users find it technically challenging. Symantec requires improved integration and compatibility with platforms, and its reporting engine and support can be problematic. Pricing inconsistencies between on-premises and cloud deployments also present issues.
Ease of Deployment and Customer Service: Both solutions support hybrid, on-premises, and cloud deployments. Trellix is more resource-heavy and technically complex, slowing deployment. Symantec's deployment is straightforward in cloud environments, though technical support experiences are mixed. Symantec integrates well into existing systems with flexible support, whereas Trellix encounters delays in support response due to its recent transitions.
Pricing and ROI: Trellix's high pricing can deter smaller companies but its comprehensive package is viewed as worthwhile. Symantec's costs vary; while not seen as affordable, its effective threat management offers justifiable cost for some, especially with significant ROI in threat prevention. On-premises deployments for Symantec are more expensive but cloud options provide better value.
We have observed tremendous return on investment after implementing Trellix Endpoint Security as it is a more cost-effective solution compared to other products.
There are two parts: one is the encryption which is standard and no AI is needed, but the data protection part could benefit from AI to detect new types of data and protect it.
Clients appreciate the solution’s customization capabilities and ongoing product improvements.
I would rate their customer service nine out of ten.
The response time is a notable issue.
I rate the support from Trellix a perfect ten.
I would rate the scalability of the solution as a six out of ten, indicating some challenges due to downtime requirements.
Trellix Endpoint Security is scalable.
I would rate the stability of Trellix Endpoint Security as near perfect, close to ten out of ten.
I would rate its stability as nine out of ten.
I think it's stable enough; earlier it had glitches, but now it's stable enough.
It doesn't support Microsoft Windows Hello authentication.
It would also help if detection specifics were identified more quickly and the problem-solving process accelerated, especially to meet larger clients' expectations.
The product does not seem to be cloud-native.
Trellix Endpoint Security is cost-effective and provides excellent value for money.
The license costs are very reasonable, around 1,000 to 1,200 rupees per year.
Trellix Endpoint Security is a proven, robust, and cost-effective solution that protects the organization from different types of ransomware and attacks.
The detection capability of Trellix Endpoint Security is higher than traditional antivirus solutions.
Including options like Application Control (formerly Solidcore), integrated monitoring, change control, DLP, and advanced threat protection, the solution offers comprehensive security.
Product | Market Share (%) |
---|---|
Trellix Endpoint Security Platform | 4.4% |
Symantec Endpoint Detection and Response | 0.6% |
Other | 95.0% |
Company Size | Count |
---|---|
Small Business | 15 |
Midsize Enterprise | 7 |
Large Enterprise | 9 |
Company Size | Count |
---|---|
Small Business | 67 |
Midsize Enterprise | 36 |
Large Enterprise | 59 |
Symantec Endpoint Detection and Response (EDR) is a powerful security solution designed to help organizations proactively detect, investigate, and mitigate advanced threats across their endpoint environments. As part of Broadcom's cybersecurity portfolio, Symantec EDR provides comprehensive visibility into endpoint activities, enabling security teams to quickly identify and respond to threats that evade traditional defenses.
Symantec EDR leverages machine learning, behavioral analysis, and global threat intelligence from Symantec's vast network to detect sophisticated threats, including zero-day attacks, ransomware, and advanced persistent threats (APTs). This allows organizations to identify malicious activities early and respond swiftly to mitigate potential damage. The solution offers automated response options that enable security teams to contain and remediate threats quickly.
Symantec EDR provides detailed forensic capabilities, allowing security analysts to dive deep into endpoint data, investigate incidents thoroughly, and understand the scope and impact of attacks. Features such as timeline analysis, incident graphing, and the ability to isolate endpoints enhance investigative efforts and support effective remediation strategies.
With its centralized management console, Symantec EDR offers visibility across the entire endpoint environment, regardless of the operating systems or whether endpoints are on-premise or remote. Symantec EDR seamlessly integrates with other Symantec security solutions, enhancing its detection capabilities and enabling a unified approach to threat management. Its scalable architecture ensures that businesses of all sizes can benefit from its advanced security features without compromising performance.
Quickly discover and resolve threats with deep endpoint visibility and superior detection analytics, reducing mean time to remediation. Overcome cyber security skills shortages and streamline SOC operations with extensive automation and built-in integrations for sandboxing, SIEM, and orchestration.
Fortify security teams with the unmatched expertise and global scale of Symantec Managed Endpoint Detection and Response services.
Roll out Endpoint Detection and Response (EDR) across Windows, macOS, and Linux devices using Symantec Endpoint Protection (SEP)-integrated EDR or a dissolvable agent.
Trellix Endpoint Security Platform offers essential features like centralized management, threat prevention, and encryption, facilitating seamless scaling and integration with other systems while prioritizing user security.
This comprehensive platform focuses on endpoint protection, antivirus capabilities, and malware defense. It enhances cybersecurity with data loss prevention, advanced threat detection, and AI-driven features for reliable protection without impacting performance. Central management and advanced reporting streamline integration and ease of use. Flexible policy deployment through the management console and its robust security measures, such as DLP and device control, further increase protection. Challenges include high CPU and memory usage affecting performance, a complex interface, and lengthy deployment. Third-party integration and Windows Hello support need improvement. Additional concerns involve improved threat detection and faster technical support responses.
What are the key features of Trellix Endpoint Security Platform?Trellix Endpoint Security Platform is widely implemented in industries such as banking and government for securing mobile and desktop devices. Its capabilities cover network security, device control, and remote access protection, catering to diverse environments by offering robust cybersecurity management against advanced threats.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.