Try our new research platform with insights from 80,000+ expert users

Trellix Network Detection and Response vs WatchGuard XTM [EOL] comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Trellix Network Detection a...
Average Rating
8.4
Reviews Sentiment
7.3
Number of Reviews
39
Ranking in other categories
Advanced Threat Protection (ATP) (14th), Network Detection and Response (NDR) (11th)
WatchGuard XTM [EOL]
Average Rating
8.0
Number of Reviews
34
Ranking in other categories
No ranking in other categories
 

Featured Reviews

BiswabhanuPanda - PeerSpot reviewer
Offers in-depth investigation capabilities, integrates well and smoothly transitioned from a lower-capacity appliance to a higher one
The in-depth investigation capabilities are a major advantage. When the system flags something as malicious, it provides a packet capture of that activity within the environment. That helps my team quickly identify additional context that most other tools wouldn't offer – like source IP or base64 encoded data. We can also see DNS requests and other details that aren't readily available in solutions like Check Point or others that we've tried. The detection itself is solid, and their sandboxing is powerful. There's a learning curve – you need a strong grasp of OS-level changes, process forking, registry changes, and the potential impact of those. But with that knowledge, the level of information Trellix provides is far greater than what we've seen elsewhere. The real-time response capability of Trellix has been quite effective, although it's not very fast. The key is this solution's concept of 'preference zero.' They don't immediately act on a zero-day. For example, the solution has seen a piece of malware for the first time. It'll let it in, then do sandboxing. Maybe after four or five minutes, it identifies that specific file's DNX Secure Store as malicious. At that point, they update the static analysis engine, and it gets detected if anything else tries to download the same file. There is that initial 'preference zero' concept, like with Panda. You may not hold traffic in the network. That's standard in the industry; we don't do much about it. To address that, we also have endpoint solutions. We use SentinelOne in our environment, which helps us identify threats like Western Bureaus and others.
it_user498942 - PeerSpot reviewer
Helps me create firewall policies for networks and services.
1. It is difficult to configure WatchGuard with your internet settings. Actually, a normal internet setting/configuration is easy. However, I had a problem with multi WAN and multi LAN. I have a few different LAN subnet and two WAN. What I want to do is to route traffic from LAN1 through WAN1 and use WAN2 as failover. And for LAN2, it would route through WAN2 and use WAN1 as failover. So all traffic from LAN1 supposed to go through WAN1 only unless WAN1 is down, then it will go WAN2. However, I still could see some packet from LAN1 go through WAN2 at the same times. I checked the Traffic Monitoring in WatchGuard and I figured it out that is because of default “Outgoings” policy. Unfortunately, I could not disable default “Outgoings” policy and if I do “all clients could not access the internet even if I created another Outgoing Policy to replace the default one”. I used to ask my Vendor to help with this problem, but they could not do it. 2. I would like to see more granularity on each IP bandwidth that is used. I want to check which IP consume internet Bandwidth the most, but it is not convenient to check the total bandwidth that one IP is consuming. I need to go to “Traffic Management” to see which group IP that used most of the bandwidth, and then I go to “Hostwatch” to check bandwidth of each IP and sum the consumed bandwidth by myself. 3. It cannot block Internet Download Manager nor the Torrent application “BitComet” Internet Download Manager and BitComet are two applications that I cannot block in “Application Control”. I used to ask my vendor for help, but they still could not do it. Other application (Messenger, other peer-to-peer application, social network, VOIP .. etc), WatchGuard can block them.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The solution can scale."
"Very functional and good for detecting malicious traffic."
"Its ability to find zero-day threats, malware and anything malicious has greatly improved my customer's organization, especially for protecting the users' browser."
"The installation phase was easy."
"Before FireEye, most of the times that an incident would happen nobody would be able to find out where or why the incident occurred and that the system is compromised. FireEye is a better product because if the incident already happened I know that the breach is there and that the system is compromised so we can take appropriate action to prevent anything from happening."
"Improved our systems and our customers' by providing better malware protection, defense against zero-day threats, and improved network security."
"If we are receiving spam emails, or other types of malicious email coming from a particular email ID, then we are able to block them using this solution."
"It is stable and quite protective. It has a lot of features to scan a lot of malicious things and vulnerabilities."
"Reputation Enabled Defense indicates that some websites are so infested that it's not even worth visiting them, and therefore saving the bandwidth of going through the detection process."
"I like the hostwatch because I can see what traffic uses the most bandwidth and I can block that site."
"There is a site-to-site VPN configuration between others people."
"We have used technical support for WatchGuard many times and overall, we are satisfied with it. They are always listening and there is a good reaction time to our findings. When there are issues, they really try to resolve them."
"They have a reporting system which can store data over a very long period of time. Not many other firewall vendors provide a reporting system, but if they do, like Fortinet does, then you've got buy that as an additional product and that can be more than twice as expensive as the initial investment in the firewall. And without reporting over a long-term period, you're just about wasting your time."
"It configures in all-in-one place.​"
"After installing the product, we achieved awareness of our data protection needs and email misuse."
"It is stable and does not require you to reboot all the time.​"
 

Cons

"It would be great if we could create granular reports based on the protocols, types of attacks, regions of attack, etc. Also we would like to easily be able to add exceptions to rules in cases of false positives."
"It doesn't connect with the cloud, advanced machine learning is not there. A known threat can be coming into the network and we would want the cloud to look up the problem. I would also like to see them develop more file replication and machine learning."
"Certain features in Trellix Network Detection and Response, such as using AL-type commands, may initially pose a challenge for those unfamiliar with such commands. However, once users become accustomed to the system, it becomes easier to use."
"It is very expensive, the price could be better."
"The solution's support needs to improve their support."
"Management of the appliance could be greatly improved."
"The problem with FireEye is that they don't allow VM or sandbox customization. The user doesn't have control of the VMs that are inside the box. It comes from the vendor as-is. Some users like to have control of it. Like what type of Windows and what type of applications and they have zero control over this."
"The initial setup was complex because of the nature of our environment. When it comes to the type of applications and functions which we were looking at in terms of identifying malicious threats, there would be some level of complexity, if we were doing it right."
"I would like them to improve the product's overall protections. This would be good for all product users."
"WatchGuard doesn't have a product that allows them to get into the data center. And that's just because there is no hardware to do the job. The software could do it, but there's no hardware that allows that to happen at the moment. So it doesn't scale as well as some other products, that's for sure."
"Sometimes we have had issues with stability of the product."
"One huge issue with WatchGuard XTM is that I'm not getting reports in a readable format. Readable means, I don't want Excel online. We repeat auditing when we trigger the report or setup calendar. That functionality is what we are looking for from WatchGuard XTM here."
"The VPN errors are not helpful when troubleshooting."
"Syslog (Dimension) is focused on presentation, but needs more focus on utility like SonicWall syslog (GMS/Analyzer)."
"The setting policies need improvement. It needs an easier way to do static NAT and check on what policy is being used for that specific traffic."
"The initial setup is neither simple nor complex. If you know the base in networking and how the firewall works, you will be able to figure it out.​"
 

Pricing and Cost Advice

"The user fee is not as high but the maintenance fee is expensive."
"Because of what the FireEye product does, it has significantly decreased our mean time in being able to identify and detect malicious threats. The company that I work with is a very mature organization, and we have seen the meantime to analysis decrease by at least tenfold."
"Its price is a bit high. A small customer cannot buy it. Its licensing is on a yearly basis."
"It's an expensive solution."
"There are some additional services that I understand the vendor provides, but our approach was to package all of the features that we were looking to use into the product."
"The pricing is fair, a little expensive, but fair. We've evaluated other products, and they're similarly priced."
"FireEye is comparable to other products, such as HX, but seems expensive. It may cause us to look at other products in the market."
"The tool is a bit pricey."
"Get at least a maintenance contract for the updates and take a larger WatchGuard than you need. A WatchGuard creates new ways to secure your network."
"Like all other manufacturers, there are a lot of features and different pricing. The best is to talk to a representative.​"
"It costs less than the SO works and others (like SonicWall, Cisco, and Barracuda) without increasing so much CPU use."
"The licensing and renewal is very expensive."
report
Use our free recommendation engine to learn which Advanced Threat Protection (ATP) solutions are best for your needs.
850,236 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
16%
Comms Service Provider
11%
Computer Software Company
10%
Manufacturing Company
10%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about FireEye Network Security?
We wanted to cross-reference that activity with the network traffic just to be sure there was no lateral movement. With Trellix, we easily confirmed that there was no lateral network involvement an...
What is your experience regarding pricing and costs for FireEye Network Security?
While I do not handle pricing directly, it is known that there is a variety of customers with different licensing needs, which depends on the organization's size and policy.
What needs improvement with FireEye Network Security?
The Trellix solution could be improved by enhancing the Central Management Console for faster visibility, which would help in network detection response. Networking often involves complexity that c...
Ask a question
Earn 20 points
 

Also Known As

FireEye Network Security, FireEye
No data available
 

Overview

 

Sample Customers

FFRDC, Finansbank, Japan Advanced Institute of Science and Technology, Investis, Kelsey-Seybold Clinic, Bank of Thailand, City of Miramar, Citizens National Bank, D-Wave Systems
AVG, Cyren, Kaspersky Lab, Lastline, NCP engineering, Trend Micro, Websense
Find out what your peers are saying about Microsoft, Palo Alto Networks, Fortinet and others in Advanced Threat Protection (ATP). Updated: May 2025.
850,236 professionals have used our research since 2012.