

Trellix Endpoint Security Platform and VMware Carbon Black Endpoint compete in the field of endpoint security, each providing strong features. Trellix is noted for its integration flexibility and centralized management, while Carbon Black stands out due to its detailed threat analysis and alerting capabilities.
Features: Trellix Endpoint Security Platform includes comprehensive data loss prevention tools, effective malware detection, and strong threat intelligence exchange. VMware Carbon Black Endpoint offers advanced detection capabilities, live incident response, and process monitoring without heavily relying on signature-based definitions. Both integrate machine learning for better threat insights.
Room for Improvement: Trellix may need to reduce resource consumption and improve onboarding for new users. Enhancing technical documentation could also be beneficial. VMware Carbon Black could simplify setup and integration with third-party tools, especially SIEM solutions, and expand support for mobile devices and container environments. Both could improve technical support response times.
Ease of Deployment and Customer Service: Trellix offers flexible deployment across on-premises, public, and hybrid cloud environments, adapting to various needs. Their customer service is generally responsive, but some regions experience support delays. VMware Carbon Black emphasizes cloud integration with both private and public options. While customer service is efficient, there is room for improvement in handling complex installations.
Pricing and ROI: Trellix is seen as cost-effective with its feature set, though its subscription sees annual price increases. Users cite positive ROI due to reduced recovery costs. VMware Carbon Black is generally a higher-cost option, attributed to its robust features, yet users report a positive ROI through enhanced security and risk mitigation. Trellix is noted for better licensing flexibility within competitive pricing.
We have saved money and required fewer employees because of the complicated architecture.
There are two parts: one is the encryption which is standard and no AI is needed, but the data protection part could benefit from AI to detect new types of data and protect it.
We have observed tremendous return on investment after implementing Trellix Endpoint Security as it is a more cost-effective solution compared to other products.
I would rate their customer service nine out of ten.
When we implemented Trellix Endpoint Security in their network, multiple malwares were detected.
I rate the support from Trellix a perfect ten.
Regarding the technical support of Broadcom, they are responsive and helpful.
Trellix Endpoint Security is scalable.
I would rate the scalability of the solution as a six out of ten, indicating some challenges due to downtime requirements.
I would rate the stability of Trellix Endpoint Security as near perfect, close to ten out of ten.
I would rate its stability as nine out of ten.
I think it's stable enough; earlier it had glitches, but now it's stable enough.
Improvements are needed in forensic analytics to detect specific vulnerabilities.
The product does not seem to be cloud-native.
It doesn't support Microsoft Windows Hello authentication.
Trellix Endpoint Security is cost-effective and provides excellent value for money.
The license costs are very reasonable, around 1,000 to 1,200 rupees per year.
My experience with pricing, setup cost, and licensing is good; compared to other tools, Trellix Endpoint Security Platform provides lower costs.
Trellix Endpoint Security Platform has positively impacted our organization with strong protection against malware and ransomware, greatly improving our ability to detect and block threats in real time, and features like ATP and Exploit Prevention help reduce malware and zero-day attacks.
Trellix Endpoint Security has introduced the new MVISION solution, MVISION Endpoint, which works completely on AI and machine learning.
Trellix Endpoint Security is a proven, robust, and cost-effective solution that protects the organization from different types of ransomware and attacks.
I assess VMware Carbon Black Endpoint's machine learning capabilities in detecting unknown threats as fantastic.
| Product | Market Share (%) |
|---|---|
| Trellix Endpoint Security Platform | 3.7% |
| VMware Carbon Black Endpoint | 1.8% |
| Other | 94.5% |

| Company Size | Count |
|---|---|
| Small Business | 67 |
| Midsize Enterprise | 36 |
| Large Enterprise | 61 |
| Company Size | Count |
|---|---|
| Small Business | 31 |
| Midsize Enterprise | 9 |
| Large Enterprise | 31 |
Trellix Endpoint Security Platform offers essential features like centralized management, threat prevention, and encryption, facilitating seamless scaling and integration with other systems while prioritizing user security.
This comprehensive platform focuses on endpoint protection, antivirus capabilities, and malware defense. It enhances cybersecurity with data loss prevention, advanced threat detection, and AI-driven features for reliable protection without impacting performance. Central management and advanced reporting streamline integration and ease of use. Flexible policy deployment through the management console and its robust security measures, such as DLP and device control, further increase protection. Challenges include high CPU and memory usage affecting performance, a complex interface, and lengthy deployment. Third-party integration and Windows Hello support need improvement. Additional concerns involve improved threat detection and faster technical support responses.
What are the key features of Trellix Endpoint Security Platform?Trellix Endpoint Security Platform is widely implemented in industries such as banking and government for securing mobile and desktop devices. Its capabilities cover network security, device control, and remote access protection, catering to diverse environments by offering robust cybersecurity management against advanced threats.
VMware Carbon Black Endpoint enhances endpoint security with its robust EDR, threat detection, and live response features. The cloud-based architecture supports remote management and easy setup while behavioral monitoring and dynamic grouping minimize security risks.
VMware Carbon Black Endpoint is designed for those seeking comprehensive endpoint protection. With its cloud-based deployment, organizations experience streamlined remote control and simplified rollout processes. Its behavioral monitoring, incident response capabilities, and firewall integration deliver advanced security measures. Although it addresses many security challenges, areas like manual alert management, on-demand scanning, and integration with systems like AlienVault USM require refinement. Improved UI, EDR components, and flexible pricing models would enhance user satisfaction. On-premise deployment infrastructure and compatibility issues with some operating systems need attention. Enhanced reporting, container security, and multi-tenancy support are also essential for fulfilling industry needs. AI-driven analysis and threat isolation empower companies by fostering proactive management.
What are the key features of VMware Carbon Black Endpoint?
What benefits should users look for when evaluating VMware Carbon Black Endpoint?
VMware Carbon Black Endpoint finds extensive application in industries focused on stringent security requirements. Managed security service providers leverage its capabilities to deliver comprehensive protection to multiple clients worldwide. Organizations use it primarily for antivirus protection and incident management, integrating it with their existing security frameworks to strengthen endpoint visibility and real-time threat prevention. Its advanced detection and application control features make it a preferred choice in industries that prioritize robust security measures. However, it requires improvements in terms of system compatibility and customization flexibility to better serve diverse industry environments.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.