Trellix Endpoint Security (ENS) is a comprehensive solution designed to protect organizations from advanced cyber threats. With its advanced threat detection capabilities, ENS provides real-time visibility into endpoint activities, enabling proactive threat hunting and response.
Customers have reported that the pricing for Trellix Endpoint Security (ENS) is reasonable and affordable. The cost of the license is based on the number of devices, with discounts available for adding more devices. The pricing is comparable to other solutions, such as Crowdstrike. Some customers have experienced complaints at renewal time due to an annual increase in cost. Standard support is included for the first year, but deployment costs are separate.
Some users have experienced a positive return on investment.
The primary use case of Trellix Endpoint Security (ENS) is drive encryption, malware prevention, centralized control, and policy management. It is also used as an antivirus and firewall solution for endpoint protection. Additionally, it is utilized for managed defense, endpoint enforcement, and as cover for mobile devices. It has been deployed for compromise assessments to identify and prevent advanced persistent threats.
The solution is used to monitor endpoints, protect files and networks against viruses and malware, and detect threats and cyber attacks. It is used across different platforms, including mobile and desktop users. It is also offered as a managed service for customers.
The most valuable features of Trellix Endpoint Security are its integration with SIEM and data classification solutions, its endpoint security protection against malware, and its positive experience, good pricing, reliability, centralized management, scalability, stability, and easy initial setup.
It also offers more plugins for endpoints, extendability, and scalability. Additionally, the independent modules, simple setup and deployment, advanced threat protection, web filtering, removable storage devices in the DLP, seamless deployment, good mobile device protection, compatibility, and cloud-based instance deployment are highly valued.
Users appreciate the user-friendly interface, ability to respond to threats better, ePolicy orchestrator for single management, containment feature, strong performance, response capabilities, containment and triage abilities, ease of use, stability, good performance, scalability, reduced false positives, good ransomware detection, deployment across mobile devices, managed service push deployment, flexibility, minimal effect on performance, and excellent technical support.
Improvements needed for Trellix Endpoint Security (ENS) include limited access to features on the web interface, challenges with sales support leading to potential missed opportunities, lack of documentation on custom features, absence of database activity monitoring, and a clearer roadmap for integrating critical solutions. Users also reported a negative impact on server performance, a desire for a simplified and improved user interface on the management screen, and difficulty in upgrading to new versions.
Users have noted subpar tamper protection compared to other solutions. Additionally, users mentioned high memory consumption, the need for easier deployment of advanced modules, and the desire for more features or ATP in advanced modules.
Other suggestions included overall simplification, better dashboard quality and central monitoring, extended mobile connection, improved stability, device control, and cost reduction.
Users also expressed the need for automation, enhanced reporting, improved GUI aesthetics, better email protection with DLP features, user-friendly searches, improved integration between ePolicy Orchestrator and FireEye console, and better security measures. Some users highlighted inaccuracies in detection and false positive detections, as well as the need for improved signature functionality and local integration.
The initial setup for Trellix Endpoint Security (ENS) can vary depending on the size and complexity of the environment. Some customers find it easy to deploy if they have sufficient skills, while others struggle with misconfigurations and license renewals.
There may be some challenges when working with advanced modules or policies, however, once familiar with the system, it becomes easier over time. The agent installation is generally okay, yet there can be challenges on the network side. Despite these initial complexities, once set up, the solution is easy to manage and doesn't require a lot of manpower. It can be deployed remotely from a central location.
The reviews suggest that the scalability of Trellix Endpoint Security (ENS) is generally positive. Some reviewers recommend it specifically for small or medium-sized businesses, while others mention that it can be easily expanded as needed.
The customer service and support of Trellix Endpoint Security (ENS) have received mixed feedback. Some users have praised the promptness and excellence of FireEye's support, while others have found the technical support to be average or not fantastic.
Users consistently mention that Trellix Endpoint Security (ENS) is stable and reliable. They highlight that it doesn't crash or freeze, and there are no bugs or glitches. The solution's performance is generally good, although some users believe there is room for improvement and development. It is also mentioned that the stability of the solution depends on the interaction with Microsoft patches.
Customers have reported that the pricing for Trellix Endpoint Security (ENS) is reasonable and affordable. The cost of the license is based on the number of devices, with discounts available for adding more devices. The pricing is comparable to other solutions, such as Crowdstrike. Some customers have experienced complaints at renewal time due to an annual increase in cost. Standard support is included for the first year, but deployment costs are separate.
Some users have experienced a positive return on investment.
The primary use case of Trellix Endpoint Security (ENS) is drive encryption, malware prevention, centralized control, and policy management. It is also used as an antivirus and firewall solution for endpoint protection. Additionally, it is utilized for managed defense, endpoint enforcement, and as cover for mobile devices. It has been deployed for compromise assessments to identify and prevent advanced persistent threats.
The solution is used to monitor endpoints, protect files and networks against viruses and malware, and detect threats and cyber attacks. It is used across different platforms, including mobile and desktop users. It is also offered as a managed service for customers.
The most valuable features of Trellix Endpoint Security are its integration with SIEM and data classification solutions, its endpoint security protection against malware, and its positive experience, good pricing, reliability, centralized management, scalability, stability, and easy initial setup.
It also offers more plugins for endpoints, extendability, and scalability. Additionally, the independent modules, simple setup and deployment, advanced threat protection, web filtering, removable storage devices in the DLP, seamless deployment, good mobile device protection, compatibility, and cloud-based instance deployment are highly valued.
Users appreciate the user-friendly interface, ability to respond to threats better, ePolicy orchestrator for single management, containment feature, strong performance, response capabilities, containment and triage abilities, ease of use, stability, good performance, scalability, reduced false positives, good ransomware detection, deployment across mobile devices, managed service push deployment, flexibility, minimal effect on performance, and excellent technical support.
Improvements needed for Trellix Endpoint Security (ENS) include limited access to features on the web interface, challenges with sales support leading to potential missed opportunities, lack of documentation on custom features, absence of database activity monitoring, and a clearer roadmap for integrating critical solutions. Users also reported a negative impact on server performance, a desire for a simplified and improved user interface on the management screen, and difficulty in upgrading to new versions.
Users have noted subpar tamper protection compared to other solutions. Additionally, users mentioned high memory consumption, the need for easier deployment of advanced modules, and the desire for more features or ATP in advanced modules.
Other suggestions included overall simplification, better dashboard quality and central monitoring, extended mobile connection, improved stability, device control, and cost reduction.
Users also expressed the need for automation, enhanced reporting, improved GUI aesthetics, better email protection with DLP features, user-friendly searches, improved integration between ePolicy Orchestrator and FireEye console, and better security measures. Some users highlighted inaccuracies in detection and false positive detections, as well as the need for improved signature functionality and local integration.
The initial setup for Trellix Endpoint Security (ENS) can vary depending on the size and complexity of the environment. Some customers find it easy to deploy if they have sufficient skills, while others struggle with misconfigurations and license renewals.
There may be some challenges when working with advanced modules or policies, however, once familiar with the system, it becomes easier over time. The agent installation is generally okay, yet there can be challenges on the network side. Despite these initial complexities, once set up, the solution is easy to manage and doesn't require a lot of manpower. It can be deployed remotely from a central location.
The reviews suggest that the scalability of Trellix Endpoint Security (ENS) is generally positive. Some reviewers recommend it specifically for small or medium-sized businesses, while others mention that it can be easily expanded as needed.
The customer service and support of Trellix Endpoint Security (ENS) have received mixed feedback. Some users have praised the promptness and excellence of FireEye's support, while others have found the technical support to be average or not fantastic.
Users consistently mention that Trellix Endpoint Security (ENS) is stable and reliable. They highlight that it doesn't crash or freeze, and there are no bugs or glitches. The solution's performance is generally good, although some users believe there is room for improvement and development. It is also mentioned that the stability of the solution depends on the interaction with Microsoft patches.
It leverages machine learning algorithms to identify and block sophisticated malware, ransomware, and zero-day attacks. ENS also offers robust data loss prevention (DLP) features, preventing sensitive information from being leaked or stolen. With its centralized management console, ENS allows administrators to easily deploy, monitor, and manage security policies across all endpoints.
ENS provides seamless integration with existing security infrastructure, ensuring a layered defense approach. With Trellix ENS, organizations can enhance their security posture and safeguard their critical assets from evolving cyber threats.
Trellix Endpoint Security (ENS) was previously known as McAfee MVISION Endpoint, Trellix Endpoint Security (HX).
Trellix Endpoint Security (ENS) is the #18 ranked solution in endpoint security software and EDR tools. PeerSpot users give Trellix Endpoint Security (ENS) an average rating of 7.4 out of 10. Trellix Endpoint Security (ENS) is most commonly compared to Trellix Endpoint Security: Trellix Endpoint Security (ENS) vs Trellix Endpoint Security. Trellix Endpoint Security (ENS) is popular among the large enterprise segment, accounting for 64% of users researching this solution on PeerSpot. The top industry researching this solution are professionals from a computer software company, accounting for 15% of all views.Tech Resources Limited, Globe Telecom, Rizal Commercial Banking Corporation