No more typing reviews! Try our Samantha, our new voice AI agent.

Trellix Endpoint Security Platform vs Zscaler Client Connector comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Mar 22, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Ranking in Endpoint Detection and Response (EDR)
6th
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
110
Ranking in other categories
Endpoint Protection Platform (EPP) (4th), Extended Detection and Response (XDR) (5th), Ransomware Protection (2nd), AI-Powered Cybersecurity Platforms (1st)
Trellix Endpoint Security P...
Ranking in Endpoint Detection and Response (EDR)
9th
Average Rating
7.8
Reviews Sentiment
7.1
Number of Reviews
164
Ranking in other categories
Endpoint Protection Platform (EPP) (7th), Extended Detection and Response (XDR) (9th)
Zscaler Client Connector
Ranking in Endpoint Detection and Response (EDR)
24th
Average Rating
8.8
Reviews Sentiment
5.9
Number of Reviews
6
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2026, in the Endpoint Detection and Response (EDR) category, the mindshare of Cortex XDR by Palo Alto Networks is 3.4%, down from 4.0% compared to the previous year. The mindshare of Trellix Endpoint Security Platform is 3.1%, down from 4.2% compared to the previous year. The mindshare of Zscaler Client Connector is 0.7%, up from 0.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Detection and Response (EDR) Mindshare Distribution
ProductMindshare (%)
Cortex XDR by Palo Alto Networks3.4%
Trellix Endpoint Security Platform3.1%
Zscaler Client Connector0.7%
Other92.8%
Endpoint Detection and Response (EDR)
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
PankajKumar24 - PeerSpot reviewer
IT Manager at Gigabit Technologies Pvt Ltd
Advanced threat prevention has strengthened incident response and customized security workflows
The biggest advantage of Trellix Endpoint Security Platform is the ATP solution, which provides advanced threat prevention. Machine learning algorithms are available in the product as part of the threat anti-malware, including predictive machine learning and behavioral analysis, which are integral to the anti-malware module of EPP. In terms of my experience with the machine learning algorithms for analysis and threat detection, we are analyzing logs provided by Trellix, but we are not able to conduct specific machine learning analysis on those logs. The automated response mechanisms in the products help with incident management because we have to create playbooks in Trellix console for automation, which we need to enable. The customizable dashboard of Trellix Endpoint Security Platform definitely contributes to the decision-making process, as we customize the dashboard according to customer requirements. When it comes to integration aspects, we are able to integrate Trellix Endpoint Security Platform with SIEM or SOAR solutions using the ePO console, which enhances threat detection capabilities. Reporting and analytics aspects have an impact on security posture assessment, as we are able to fetch reports in the ePO console customized according to customer requirements for downloading and sending via email.
DA
IT Support Admin at Kuehne & Nagel Inc.
Client activity has been monitored efficiently through in-depth log analysis and traffic filtering
I use the Zscaler speed test, and it is very nice. We use some logs from Zscaler Client Connector to collect data and see what is happening, such as if there is an interruption or something. There is a specific tunnel version that we have to use because, depending on the internet provider, some of them have lower speed, so we have some issues. This is because of the provider, not from Zscaler. We use Office 365 services and Office applications, and because some connections are slow and they do not have full coverage from the internet provider, we have some issues. If the speed is slow for Zscaler Client Connector connection, then we have issues because if the speed is not good, then Zscaler Client Connector goes down. This may be because they put some policy. Of course, if you use Office 365 services such as Outlook, the minimum bandwidth is 5 megabits and more, so this causes issues if the users do not have a good remote connection. This depends on the companies and the users, so they need to fix it. This is not from us or our company. It is very useful, and the logs are very helpful. When we go to logs, we understand what is happening.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"They did what they said. This solution could apply to any scenario."
"It is an easy-to-use tool."
"It collects and caches and the knowledge of machine learning from different customers to take to the cloud. It makes it better to use for everybody. It allows for quick learning and updates and can, therefore, offer zero-day malware security. This sharing of metadata helps make the solution very safe."
"It integrates well into the environment."
"What I like about Cortex XDR by Palo Alto Networks is that it is a comprehensive solution that contains everything the organization may need when using endpoints."
"It can automatically correlate events and logs, which is very helpful for an IT administrator. It can correlate different kinds of malware activities over a network, agent, or host system. You do not need to do it manually. It is a good feature. It is also a user-friendly solution. We have deployed it on the cloud because our space does not provide any flexibility for on-premises deployment, but Palo Alto has added some flexibility to install it on-premises. It must be like the same Cortex XDR agent for all the VPN services, web filtering services, and everything else."
"Palo Alto is constantly adding new features."
"Cortex is a very good total solution on the endpoints."
"The solution includes a good combination of features for both signature and signature-less."
"FireEye Endpoint Security is easy to use and lightweight compared to others."
"I found the initial setup to be easy."
"The solution provides dashboard control, so we can centrally monitor the entire status of our organization."
"McAfee Complete Endpoint Protection is stable, and we don't have any bugs being reported."
"Trellix Endpoint Security offers robust access protection, addressing major concerns in prevention. It provides both application control and user access control within its access protection features."
"I would recommend this product."
"The centralized management of the solution is valuable since we are a diverse organization."
"The solution operates in the background seamlessly without the user noticing."
"It is very important to see what is happening between the user and the applications that we have, and to filter the traffic from outbound traffic and inside traffic."
"I'd rate the solution nine out of ten."
"It is very useful, and the logs are very helpful; when we go to logs, we understand what is happening."
"The best features of Zscaler Client Connector are that it gives the client a much more transparent experience, as they don't have to worry about connecting to a VPN."
"The real-time analytics feature in Zscaler Client Connector is another valuable feature called Digital Experience, or ZDX, which can easily identify the root cause of issues accessing public or internal resources and provide good analysis so relevant teams can quickly resolve them, making it a very good tool that helps customers."
"It is very important to see what is happening between the user and the applications that we have, and to filter the traffic from outbound traffic and inside traffic."
"It is very useful, and the logs are very helpful; when we go to logs, we understand what is happening."
 

Cons

"It is a complex solution to implement."
"They've been having some issues with updating their endpoint agents, and it has been quite frustrating."
"In general, the price could be more competitive."
"The GUI could be improved."
"It's more focused on network communication. If a customer wants to increase the level of protection and start working with documents, it's impossible to integrate these features into the system. It's more of a communication-oriented system than a content security-oriented system."
"Impact on system performance is horrible, adding a lot of delays for users."
"We have found that there are times Cortex XDR by Palo Alto Networks does not detect some of the viruses, we have to use another protection solution called Kaspersky."
"Previously, the endpoint would leave the environment, not being on our VPN, essentially unable to interact with the server to upload files. It was unable to retrieve new file verdicts. It was using a thing called "local analysis" to determine if something was a malicious file or not. There was no dynamic analysis."
"There is room to improve with scalability."
"Signatures to protect against new attacks."
"Support-wise they need to be better."
"We have had some of our clients not happy with McAfee Endpoint Security because it blocks some of the applications they are trying to use."
"One suggestion is they should reduce the constant notifications. Whenever I open my laptop, there are too many notifications from McAfee, and it gets annoying."
"Sometimes when it runs in the background of the endpoint, the devices get slowed down for some software applications."
"Technical support from the vendor is very bad."
"It didn't work well for some of the use cases. We have different use cases for each entity. Their support is also not good and needs improvement."
"If the speed is slow for Zscaler Client Connector connection, then we have issues because if the speed is not good, then Zscaler Client Connector goes down."
"If the speed is slow for Zscaler Client Connector connection, then we have issues because if the speed is not good, then Zscaler Client Connector goes down."
"If the speed is slow for Zscaler Client Connector connection, then we have issues because if the speed is not good, then Zscaler Client Connector goes down."
"There is a hard learning curve for Zscaler Client Connector; their support isn't the greatest all the time."
"Zscaler Client Connector is not low in cost; it is definitely on the higher side."
"If the speed is slow for Zscaler Client Connector connection, then we have issues because if the speed is not good, then Zscaler Client Connector goes down."
"There is room for improvement regarding the price of Zscaler Client Connector, as it is one of the most expensive solutions available."
"There is room for improvement regarding the price of Zscaler Client Connector, as it is one of the most expensive solutions available."
 

Pricing and Cost Advice

"In terms of the cost Cortex XDR by Palo Alto Networks is very expensive because we are a Mexican company and when you translate dollars to pesos the cost is very high. The solution is very expensive for Mexican companies. I understand that they have international prices, but I do not think it offsets the price enough for many companies in countries, such as Mexico. The amount it is reduced is not a massive percentage."
"I don't recall what the cost was, but it wasn't really that expensive."
"The pricing seems fair, and I do like the licensing model. You use wherever they are, and it is elastic."
"Cortex XDR’s pricing is very reasonable."
"I don't have any issues with the pricing. We are satisfied with the price."
"The pricing is okay, although direct support can be expensive."
"It is present, but when compared to other competitive products, I would say it is not less expensive; however, when all of the other added values are considered, the price is reasonable."
"Cortex XDR by Palo Alto Networks is an expensive solution."
"The price of McAfee is pretty similar to Symantec, and there are no costs in addition to the standard licensing fees."
"Trellix Endpoint Security is neither a cheap nor an expensive solution."
"There is a one-year and a three-year license available for this solution, we are currently on a three-year license."
"When comparing the solution to others it is a bit expensive. We are on a monthly license."
"It was an annual fee. There was just one overall fee."
"I think Trellix is more on the higher side of the market, just on a general scale, but I also think it depends on what particular package you choose."
"The tool is affordable"
"The product is expensive."
Information not available
report
Use our free recommendation engine to learn which Endpoint Detection and Response (EDR) solutions are best for your needs.
893,244 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
12%
Construction Company
12%
Comms Service Provider
9%
Manufacturing Company
8%
Manufacturing Company
12%
Government
10%
Financial Services Firm
9%
Comms Service Provider
8%
Manufacturing Company
21%
Financial Services Firm
11%
Government
10%
Construction Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business45
Midsize Enterprise21
Large Enterprise48
By reviewers
Company SizeCount
Small Business68
Midsize Enterprise40
Large Enterprise65
By reviewers
Company SizeCount
Small Business2
Large Enterprise5
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
How does McAfee Endpoint Security compare with MVISION?
The flexible manageability of McAfee Endpoint Security is one of our favorite aspects of this solution. You can deplo...
How does Crowdstrike Falcon compare with FireEye Endpoint Security?
The Crowdstrike Falcon program has a simple to use user interface, making it both an easy to use as well as an effec...
What is your experience regarding pricing and costs for McAfee Endpoint Security?
I don't have visibility on pricing because it is negotiated by a different team, as I look after the technical side.
What is your experience regarding pricing and costs for Zscaler Client Connector?
My experience with pricing, setup cost, and licensing is that the pricing is fair, though it is a bit costly. It oper...
What needs improvement with Zscaler Client Connector?
For Zscaler Client Connector, I would appreciate more granular control over the client update rollout and slightly fa...
What is your primary use case for Zscaler Client Connector?
My main use case of Zscaler Client Connector is to provide secure, seamless access to the internet and internal appli...
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
McAfee Endpoint Security, McAfee Endpoint Protection, Intel Security Total Protection for Endpoint, McAfee Complete Endpoint Protection, Trellix Endpoint Security (ENS)
No data available
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
inHouseIT, Seagate Technology
Information Not Available
Find out what your peers are saying about Trellix Endpoint Security Platform vs. Zscaler Client Connector and other solutions. Updated: April 2026.
893,244 professionals have used our research since 2012.