Trellix ESM and Wazuh are competitors in the security solutions category. Trellix ESM has the edge with its robust real-time threat detection and seamless integration with third-party systems.
Features: Trellix ESM offers real-time threat detection, customizable dashboards, and advanced correlation capabilities, enhancing network security. Its ease of configuration and integration with third-party systems are also valuable features. Wazuh, on the other hand, is an open-source model highlighting file integrity monitoring, compliance reporting, and strong integration capabilities with both cloud and on-premises environments.
Room for Improvement: Trellix ESM faces challenges such as high resource consumption, integration issues, and requires better case management and documentation clarity. Wazuh should enhance its scalability, integrate deeper threat intelligence, and improve its user interface and AI/ML capabilities.
Ease of Deployment and Customer Service: Trellix ESM is flexible in deployment across hybrid, private cloud, and on-premises environments, with mostly positive technical support reviews, though regional support can vary. Wazuh provides easy deployment, benefiting from community support, yet complex integrations might demand significant effort.
Pricing and ROI: Trellix ESM, while expensive, offers comprehensive SOC functionalities providing good ROI for enterprises. Its features justify its higher costs compared to competitors. Wazuh, being open-source, is a cost-effective choice with no licensing fees, appealing to budget-conscious organizations, although it requires investment in infrastructure and support.
I have seen value in security cost savings with Wazuh, as using proprietary EDR versions could save us substantial money.
It's rare for me to need them unless it's an issue with licensing, and they are the best in that regard.
I would rate support for Trellix ESM 10 out of 10 because if we connect with the support in the UK, we get excellent support.
They responded quickly, which was crucial as I was on a time constraint.
There is no dedicated technical support for Wazuh as it is open source.
The documentation is good and provides clear instructions, though it's targeted at those with technical backgrounds.
Scalability is quite easier with Trellix ESM, because all we need to do is add more receivers to it, so it can go to any point.
It can accommodate thousands of endpoints on one instance, and multiple instances can run for different clients.
Currently, I don't see any limitations in terms of scalability as Wazuh can still connect many endpoints.
Scalability depends on the configuration and the infrastructure resources like compute and memory we allocate.
The indexer frequently times out, requiring system restarts.
The stability of Wazuh is largely dependent on maintenance.
The stability of Wazuh is strong, with no issues stemming from the solution itself.
If there is any device which is not covered, there should not be any additional charges for writing the custom parsers on that.
Machine learning is needed along with understanding user behavior and behavioral patterns.
The integration modules are insufficiently developed, necessitating the creation of custom integration solutions using tools like Logstash and PubSub.
I think Wazuh should improve by introducing AI functionalities, as it would be beneficial to see AI incorporated in the threat hunting and detection functionalities.
Wazuh is completely free of charge.
I would definitely recommend Wazuh, especially considering Fortinet's licensing model which is confusing and overpriced in my opinion.
Wazuh is free to use, but there are licensing fees for third parties.
The weakest point is it doesn't cover almost all the devices, so the customer has to be more dependent on the parsers to be written by the Professional Services team.
The fact that it is open source means it is always being expanded, which is beneficial for customizing solutions for individual client requests.
With this open source tool, organizations can establish their own customized setup.
The system allows us to monitor endpoints effectively and collect security data that can be utilized across other platforms such as SOAR.
Product | Market Share (%) |
---|---|
Wazuh | 10.2% |
Trellix ESM | 1.1% |
Other | 88.7% |
Company Size | Count |
---|---|
Small Business | 15 |
Midsize Enterprise | 6 |
Large Enterprise | 24 |
Company Size | Count |
---|---|
Small Business | 26 |
Midsize Enterprise | 15 |
Large Enterprise | 8 |
Make your organization more resilient and confident with Trellix Security Operations. Filter out the noise and cut complexity to deliver faster, more effective SecOps. Integrate your existing security tools and connect with over 650 Trellix solutions and third-party products.
Wazuh offers comprehensive security features like MITRE ATT&CK correlation, log monitoring, and cloud-native infrastructure. It ensures compliance and provides intrusion detection with high scalability and open-source flexibility, ideal for businesses seeking robust SIEM capabilities.
Wazuh stands out in security information and event management by providing efficient log aggregation, vulnerability scanning, and event correlation against MITRE ATT&CK. Its capability to integrate seamlessly with environments, manage compliance, and monitor files makes it suitable for cloud-native infrastructures and financial sectors. Despite its technical support needing enhancement and opportunities for improving AI integration and threat intelligence, its open-source nature and cost-effectiveness make it appealing. Users can leverage custom dashboards powered by Elasticsearch for precise data analysis, even though there is a desire for a more user-friendly interface and better enterprise solution integration. Deployment may be complex, but its features contribute significantly to fortified security postures.
What are the essential features of Wazuh?Industries like finance and cloud infrastructure heavily utilize Wazuh for its security strengths. By monitoring endpoints and ensuring compliance with frameworks, companies can improve security posture and swiftly detect anomalies. The platform's focus on event correlation and alerts for security incidents is particularly beneficial.
We monitor all Security Information and Event Management (SIEM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.