

Trellix Endpoint Security Platform and VMware Carbon Black Cloud are competitors in the endpoint security market. Based on the data comparisons, VMware Carbon Black Cloud appears to have an advantage in threat hunting and detection capabilities.
Features: VMware Carbon Black Cloud stands out with its advanced threat intelligence, security analytics, and excellent threat-hunting capabilities. Trellix offers strong centralized management and integration, comprehensive data protection, and customizable enterprise solutions.
Room for Improvement: Trellix needs to enhance CPU and memory usage efficiency, simplify its user interface, and improve integration of advanced modules and support response time. VMware Carbon Black Cloud requires better vulnerability management support and improved customer service in the Middle East, along with enhancements in kernel-side protection.
Ease of Deployment and Customer Service: Trellix allows versatile deployment in on-premises, hybrid, and cloud environments but faces complexity in on-site deployments. Its customer service is generally favorable, though rapid issue resolution could improve. VMware Carbon Black Cloud is known for user-friendly integration with existing solutions and reliable technical support, appealing to users needing fast service.
Pricing and ROI: VMware Carbon Black Cloud is typically more expensive but offers a strong ROI due to robust features, making it suitable for larger enterprises. Trellix provides competitive pricing with volume discounts and inclusive package deals. Its ROI benefits from flexible deployment and preventive security measures that reduce operational workloads.
We have saved money and required fewer employees because of the complicated architecture.
There are two parts: one is the encryption which is standard and no AI is needed, but the data protection part could benefit from AI to detect new types of data and protect it.
We have observed tremendous return on investment after implementing Trellix Endpoint Security as it is a more cost-effective solution compared to other products.
I would rate their customer service nine out of ten.
When we implemented Trellix Endpoint Security in their network, multiple malwares were detected.
I rate the support from Trellix a perfect ten.
Trellix Endpoint Security is scalable.
I would rate the scalability of the solution as a six out of ten, indicating some challenges due to downtime requirements.
I would rate the stability of Trellix Endpoint Security as near perfect, close to ten out of ten.
I would rate its stability as nine out of ten.
I think it's stable enough; earlier it had glitches, but now it's stable enough.
Improvements are needed in forensic analytics to detect specific vulnerabilities.
The product does not seem to be cloud-native.
It doesn't support Microsoft Windows Hello authentication.
I recall we couldn't upgrade because the sensor was not compatible, and the latest VMware Carbon Black Cloud version was not compatible with the latest Red Hat version.
Trellix Endpoint Security is cost-effective and provides excellent value for money.
The license costs are very reasonable, around 1,000 to 1,200 rupees per year.
My experience with pricing, setup cost, and licensing is good; compared to other tools, Trellix Endpoint Security Platform provides lower costs.
Trellix Endpoint Security Platform has positively impacted our organization with strong protection against malware and ransomware, greatly improving our ability to detect and block threats in real time, and features like ATP and Exploit Prevention help reduce malware and zero-day attacks.
Trellix Endpoint Security has introduced the new MVISION solution, MVISION Endpoint, which works completely on AI and machine learning.
Trellix Endpoint Security is a proven, robust, and cost-effective solution that protects the organization from different types of ransomware and attacks.
| Product | Market Share (%) |
|---|---|
| Trellix Endpoint Security Platform | 3.7% |
| VMware Carbon Black Cloud | 0.4% |
| Other | 95.9% |

| Company Size | Count |
|---|---|
| Small Business | 67 |
| Midsize Enterprise | 36 |
| Large Enterprise | 61 |
| Company Size | Count |
|---|---|
| Small Business | 5 |
| Midsize Enterprise | 4 |
| Large Enterprise | 8 |
Trellix Endpoint Security Platform offers essential features like centralized management, threat prevention, and encryption, facilitating seamless scaling and integration with other systems while prioritizing user security.
This comprehensive platform focuses on endpoint protection, antivirus capabilities, and malware defense. It enhances cybersecurity with data loss prevention, advanced threat detection, and AI-driven features for reliable protection without impacting performance. Central management and advanced reporting streamline integration and ease of use. Flexible policy deployment through the management console and its robust security measures, such as DLP and device control, further increase protection. Challenges include high CPU and memory usage affecting performance, a complex interface, and lengthy deployment. Third-party integration and Windows Hello support need improvement. Additional concerns involve improved threat detection and faster technical support responses.
What are the key features of Trellix Endpoint Security Platform?Trellix Endpoint Security Platform is widely implemented in industries such as banking and government for securing mobile and desktop devices. Its capabilities cover network security, device control, and remote access protection, catering to diverse environments by offering robust cybersecurity management against advanced threats.
Fortify Endpoint and Workload Protection
Legacy approaches fall short as cybercriminals update tactics and obscure their actions. Get advanced cybersecurity fueled by behavioral analytics to spot minor fluctuations and adapt in response.
Recognize New Threats
Analyze attackers’ behavior patterns to detect and stop never-before-seen attacks with continuous endpoint activity data monitoring. Don’t get stuck analyzing only what’s worked in the past.
Simplify Your Security Stack
Streamline the response to potential incidents with a unified endpoint agent and console. Minimize downtime responding to incidents and return critical CPU cycles back to the business.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.