Trellix Endpoint Security Platform Primary Use Case
The primary use case for Trellix Endpoint Security is its customization capabilities, allowing me and my organization to create and deploy our policies autonomously. I prefer this because it offers flexibility. I use it for product types like Endpoint Security, Data Loss Prevention (DLP), and for integrating with Network Detection and Response (NDR) and Extended Detection and Response (XDR) solutions.
View full review »
HA
HameedAhmed
Sr. Deputy Director Information Technology at Pakistan Airpot Authority
I use Trellix Endpoint Security as the first line of defense for our users against any attack from outside.
View full review »VK
VenkatKrishnan
VP - Cyber Security at Olam International
We use it mainly for two purposes: one is for encryption of the laptops, and the other is for endpoint DLP.
Our biggest advantage is the compatibility with a variety of laptops. The compatibility with old laptops and new laptops is the most significant advantage.
We are not using the response automation functionality because we're only using it for encryption and for DLP, so there is no response automation we are utilizing.
View full review »Buyer's Guide
Trellix Endpoint Security Platform
June 2025

Learn what your peers think about Trellix Endpoint Security Platform. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,711 professionals have used our research since 2012.
KS
KarthiS
Technical Associate at VSecure Networks
Our customers primarily use Trellix Endpoint Security (ENS) only for endpoint security, with some cases where they prepare for Data Loss Prevention (DLP).
The main use case for Trellix Endpoint Security (ENS) is to protect the end user and to block USB and other devices, which is why they prefer to go with Trellix. They also use it for DLP to protect email and other things in their environment.
View full review »Our primary use case for Trellix Endpoint Security is to protect our customers' endpoints and servers from known malware and ransomware. We are also partners reselling Trellix solutions.
View full review »I use Trellix Endpoint Security on all of my Red Hat and Windows 11 endpoints.
View full review »
We have Trellix Endpoint Security available and are trying to do an upgrade. I am trying to figure out whether I can get rid of my SUSI manager, WSUS, or 'WaySUS' as we call it, the Windows patching environment.
View full review »
We use Trellix in an OT environment where it is being used as an orchestrator to deploy endpoint security and application controls in our network. We are using its DLP product in OT end points.
FireEye offers a great suite of tools. I like its threat analyzer and other features.
We have FireEye Endpoint Security installed on all our desktops, laptops, and servers throughout the network.
It's been crucial to monitor threats 24/7, both external and internal.
It's capable of stopping ransomware at the gateway, preventing malware, and it can even protect against zero-day attacks.
View full review »AS
Archie Scorgie
Information Security Senior Advisor at Eskom Ltd
We use the solution for malware, fall behavior, and data loss prevention.
View full review »The endpoint of Trellix itself should be placed within an enterprise with more than 200 or 300 endpoints. And then, an administration council should be used to administrate these endpoints and get the updates, including any virtual batching needed, and so on. This is the most usual case for this product. However, of course, there are other supportive add-ons, or sensors, to be added to this endpoint - including the EDR, the endpoint detection response, sensor.
View full review »MD
Mohit Dhingra
Senior Vice President IT at AS IT Consulting Pvt. Ltd.
The company is using it for cybersecurity, malware, and anti-malware.
View full review »Trellix Endpoint Security is a reliable and developed product and our company's customers are satisfied with the security offered by the product.
View full review »Previously, before the transition to Trellix, we used McAfee. Following a merger, FireEye now collaborates with McAfee, utilizing its console and threat intelligence.
In terms of endpoint security, I would recommend Trellix Endpoint Security, especially for users prioritizing threat intelligence and seeking an internal solution. Trellix has proven effective in areas such as blocking capabilities, device control, and application control.
View full review »For some of our engagements, we have used MVISION, including data protection, threat intelligence, and DPP also.
We use McAfee MVISION primarily for endpoint protection, antivirus, and understanding the threat intel for end users.
View full review »DM
Durai M
IT Head at a comms service provider with 51-200 employees
It is exclusively for Endpoint security. Besides that, we have subscribed to additional features such as MDX for mobile security and recently added ESL. Previously, we had Trend Micro, and at times we utilized it for malware. Comparing the three tools, I would recommend sticking with Trend Micro or Malwarebytes.
View full review »
Our company just started evaluating the solution for endpoint protection. We have tested it in a POC environment but have not deployed it to the production environment.
View full review »I'm working on a project for the Hong Kong library system under the Hong Kong government. They provide workstations in the library for citizens to access the Internet. The ENS needs to be installed on all the PCs in the library. Another part involves the CSWA for the server farm. They are upgrading the entire library system, including the rental system, book search, eBooks, multimedia, and other services. The CSWA modules are primarily for the backend servers, including Linux and Windows.
View full review »The tool is primarily used for endpoint detection. When an event occurs on an endpoint, alarms are generated. Colleagues from my company then investigate these alarms based on a playbook. Depending on the playbook and the specific customer contract, actions may be taken, such as informing the customer or implementing endpoint containment measures.
View full review »In my company, we use Trellix Endpoint Security for its endpoint security capabilities. Wherever there is a need for someone to comply with ISMS, we deploy Trellix Endpoint Security over there and support them in maintaining it.
We primarily use Trellix for drive encryption and malware prevention, but we also use some advanced features, such as centralized control and policy management.
View full review »We use Trellix Endpoint Security for endpoint protection, including virus protection for desktops, laptops, and servers. The solution includes special dedicated modules, such as those for Microsoft SharePoint security.
View full review »BS
Bhupesh-Sharma
Large account Manager at Softcell Technologies Limited
The solution is used, especially by those who want an antivirus product. It is also useful for those looking for tools that offer endpoint detection and response features. The product offers multiple features, one of which is endpoint security.
View full review »Customers use Trellix Endpoint Security as an anti-malware or antivirus solution that provides AI and machine learning features. The solution provides DAC (Dynamic Access Control) and HIPS (host intrusion prevention system) functionality in its firewall module. It also has a web control functionality, wherein we can allow, deny, or choose the category part and work it out.
View full review »We use the product to provide system security for shared data on the network.
View full review »My company uses Trellix Endpoint Security (ENS) for endpoint protection and scanning.
IA
Iancu Alexandru
Chief Technology Officer at S.C. Vault Apps S.R.L
The solution is used for drive encryption and as a policy orchestrator.
View full review »We are using McAfee MVISION Endpoint for our endpoints. It manages our antivirus and does antivirus deployments.
View full review »It serves as a comprehensive endpoint security solution that goes beyond traditional antivirus by incorporating features such as document scanning for sensitive information, approval workflows for document sharing, patch management, and advanced threat detection using AI and machine learning. It actively monitors various endpoints, including web interactions and email communications, to detect and prevent a wide range of attacks, even those that are not signature-based.
We primarily use the solution for our endpoints.
View full review »RS
Rahul Sawhney
Group Manager at HCL Technologies
We used it for a compromise assessment. That would be for our client. We deployed the agents. It was for endpoint security.
We had been using the solution previously for one of the clients. We were using it for six months, and we did a compromise assessment based on the FireEye Endpoints that were deployed across the group. At that point in time, there were a lot of ransomware attacks in the environment, and it was impossible to identify the source of the attack and where it came from. The tools didn't point to that visibility. We had to deploy these agents across the environment and also monitor the environment using the network security appliances provided by FireEye just to monitor.
We did monitor it for six months, so it was an assessment. In those six months, we did not have another ransomware attack. It was proven the environmental assessment was clean. That was the whole objective of the compromise assessment - to find out if there are any indicators or anything that has gained a foothold in the environment, trying to fend advanced persistent threats from that standpoint.
View full review »We use it for protecting our system nodes. It's run on Windows 7 and Windows 10.
DN
DuyNguyen4
Presales and product manager at Mi Mi Informatics Joint Stock Company
We use the product for EDR purposes.
View full review »HD
Hitesh Dand
Manager- Process Excellence at Datamatics Business Solutions
We use the solution for security purposes.
View full review »AV
AjaiVictoria
Information Technology Consultant at a outsourcing company with 501-1,000 employees
We build our own use cases and those provided by the vendor for specific upcoming attack scenarios. Configuring the rule set using Trellix Endpoint Security is very much flexible based on the IOCs.
View full review »We primarily use the solution as a basic antivirus. It's for protection. We centralize the management of 50 computers.
View full review »DM
David Mueller
Client Engineer at KSB
We use Trellix Endpoint Security for pattern-based scanning. We use it on all our handsets. We also use it for behavior-based adaptive threat prevention; it's a solution that will recognize malicious behavior.
View full review »We use Trellix to secure our customers' endpoint devices and the cloud. It was a McAfee solution before the Trellix acquisition. Trellix has a full portfolio for local and cloud protection. McAfee MVISION products are managed on the cloud, but some customers need an on-premise local management console.
It covers the AV and malware security piece.
WM
Wilfred Mwigio
ITOfficer at a educational organization with 201-500 employees
Our use case is pretty straightforward. We have the central ePO that's running, and clients connect to it. All the clients connect to the ePO for updates and the ePO is able to go out and get updates, so it's pretty much like a star topology where you have the ePO sitting at the middle and handling all the requests from the clients and the servers.
View full review »We primarily use the solution for endpoint security.
View full review »Trellix Endpoint Security (ENS) is useful as an endpoint security software.
This is an anti-virus and firewall solution. We have over 5,000 users and we are customers of Trellix.
View full review »MB
Marty_Barron
Regional Cyber Security Manager
We primarily use the solution for managed defense. It is a next-generation EDR, similar to Cylance and CrowdStrike. It's used for endpoint enforcement.
View full review »We deploy the solution on-premises but we have the roadmap to migrate it on cloud. Initially, everything was on-premises, but we are moving to the cloud, which will be our first cloud migration.
View full review »McAfee MVISION Endpoint is used for endpoint protection. Protects the files and network against viruses and malware.
View full review »We primarily use the solution for security. Sometimes we try to shift to other security sites, however, whenever we compare this solution with the others, we found that McAfee developing in more dynamic ways.
We are using all Trellix solutions, and we are also using all McAfee products. Our customers are using virus scan for the old platforms, Endpoint Security, MVISION, File and Folder Encryption, File and Folder Protection, and Device Control, but at the moment, I am really interested in the integration between the new Trellix solution like MVISION and FireEye.
View full review »McAfee is a security-based company. All of their products are related to the security of networking. We have approximately 15 to 20 customers working with McAfee Endpoint Security.
View full review »The solution is specifically used at the endpoints. We do a lot of integrations with various clients.
View full review »SK
Sabari Kumar
Senior Engineer at a comms service provider with 10,001+ employees
We are using McAfee Endpoint Security for network security.
View full review »We use McAfee Endpoint Security as a solution for workstations and laptops.
View full review »CM
Craig Meads
Managing Director at Computer Wise
We've only got two or three machines. The solution is simply used as an antivirus, however, we've rolled it out to all of our customers and we use it as a managed service.
OA
Obaseun Awoyinfa
Security Consultant at CS Africa
We are using the latest version at the moment because I'm managed by the MVISION tenants.
In the past, many people had issues with the utilization of detections and resources. ENS is actually very good for detection. When properly configured, especially when the prevention feature is activated, it integrates very well with the ATP, in respect of the endpoint. ATP offers very good protection and is a rich solution which helps to remove ransomware. I've been using the product for a while now and been able to secure a lot of environmental ransomware attacks, as well as some others, by integrating the ATP with the ENS.
We are using ePO Center Server to communicate with all the endpoints that are in the network. While I cannot be certain, I believe the relevant version is McAfee 8 or 9.
We make use of McAfee Agent version number 5.6.4.151. We utilize McAfee Data Exchange Layer.
The McAfee Endpoint Security version to which we refer is 10.7.
We use the solution for antivirus purposes.
View full review »AM
Aggry Motlhwa
IT Security Specialist at Commercial Bank of Ethiopia
We basically use the solution for threat detection. It's for security purposes.
View full review »VK
VenkatKrishnan
VP - Cyber Security at Olam International
The solution has three primary uses for us.
Our environment is Windows-based. We don't have Mac and very little space for Linux systems. We use the solution on all of our Windows devices as a basic antivirus protection. That's our first use case.
The second use case for the solution is to be able to have USB restrictions on my endpoints.
And the third would be the protection of machines when, especially now in this COVID-19 climate, users connect from home. There are a lot of network-based attacks. When users are connecting from other networks, they're protected from dangers with this solution
Trellix Endpoint Security is a cloud-based solution in which all the servers are installed with a McAfee Trellix agent, and that agent manages the server for any potential damage or threat.
View full review »In Trellix Endpoint Security, I use all modules, including firewall and web control, except for encryption.
View full review »PP
Prashant_Pawar
Project Manager at LTIMINDTREE
FireEye replaces our traditional antivirus solutions like Symantec and McAfee and covers multiple business use cases, including EDR.
View full review »We primarily use this solution as cover for mobile devices. I'm the manager of pre-sales and we are resellers and users of this solution. We are low-level partners of McAfee.
View full review »We're using MVISION Endpoint for the protection of our endpoint devices.
View full review »The solution enables me to monitor all my endpoints and ensure that our agents are reporting to the FireEye management server. That is key for allowing us to see any suspicious traffic coming in. I'm the delivery manager and we are customers of FireEye.
View full review »MC
Manoj Chitgopeker
Region Head - S1@Dimension Data India at a computer software company with 51-200 employees
McAfee MVISION Endpoint is used for endpoint security across all platforms, including mobile and desktop users.
All endpoint-related activities for which the company has a charter.
View full review »SF
Syed Faisal
ICT Manager at SecurEyes
We are using this solution for endpoint security against cyber attacks.
View full review »I use this solution for system security protection.
View full review »Overall, we handle the implementation of the solution, taking into account the policy required to secure the network.
We primarily use McAfee Endpoint Security for data loss and endpoint protection.
It can be used for ransomware detection and data exfiltration. It is also able to detect Remote Access Trojan (RAT).
View full review »MVISION Endpoint is the management software for McAfee that manages the Windows Defender. It manages the Windows Defender anti-malware, Windows Defender Exploit Guard, and Windows Defender Firewall. These are the three main components that McAfee manages centrally from an ePO, and that ePO can be an on-premises ePO management server, or it can be an MVISION ePO management server on McAfee cloud. So, management can be both on the cloud and on-premises.
KP
Kuldeep Patel
Senior System Administrator at a computer software company with 501-1,000 employees
We primarily use the solution for endpoint security.
View full review »MO
Manuel Ochoa
Support Security Engineer at a computer software company with 501-1,000 employees
I work for a company that is a McAfee partner. We sell the solution, and we have engineers that implement the solutions. Basically, I am part of the technical staff that implements the solution on-premise.
We use endpoint security for our clients. We configure policies to scan the computer every single day in some cases and every week or even every moment. Basically, it protects the endpoint, and we have policies to do advanced threat protection.
We use this product for endpoint server protection and content security.
View full review »We currently have around 50 servers. We aren't really a big company but we have 50 servers which we manage. We use McAfee for the web filtering portion of it. For example, if a user is doing a search on Google, there's a risk-rating web content filter built into McAfee. This alerts us if there are any threats present.
We have licensed McAfee ENS on a per-server basis. As of now, from memory, I think we have 56 endpoints running McAfee — 56 servers in total.
View full review »JD
Juan Davila
Managing Director at eyeT GmbH
We provide services. We mainly use this solution for endpoint security and protection. We have cloud, hybrid, and on-premises deployments.
View full review »SM
Syed Mohsin Ali
Team Leader Network and Mail Team at a energy/utilities company with 10,001+ employees
Our primary use case is for endpoint protection, to block malware and viruses.
View full review »We use this product for our endpoint security.
View full review »This product is mainly used for detecting viruses and malware on the laptops and also to scan older, existing files.
View full review »PV
Prasanna VA
Senior Technical Manager at Incedo Inc.
McAfee MVISION is security for integrated VMware and OpenSite cloud solutions.
View full review »We are a solution provider and McAfee MVISION Endpoint is one of the products that we implement for our clients. Our clients use it to help manage their security.
View full review »RC
Ritchelle Cortez
Technical Presales Consultant - Solutions Architect at Nexus Technologies,Inc.
We are a reseller and McAfee is one of the security solutions that we implement for our customers.
View full review »JB
Jorgen Bergstrom
Teamleader 2:nd line Security at Cygate AB
My company uses Trellix Endpoint Security (ENS) to protect our computers.
SR
Siddhika Rane
Talent Acquisition Specialist at Nine A Business Connect
McAfee is used to secure my laptop against online threats and malware. It detects and removes any potential issues from the laptop.
View full review »MA
Miguel Vergel Adajar
Systems Engineer at First Datacorp
Some of the solution's primary use cases include successfully adding devices through ESM GUI and setting up data storage via ELM.
View full review »We use McAfee MVISION Endpoint to protect our environment.
View full review »I used it in my previous company. From an end-user perspective, I was the manager of the Cyber Defense Center that was in charge of the whole deployment and daily operations. I was using it as a Site Media Operations Manager.
View full review »I am not liberty to describe our use cases, as this information is confidential.
View full review »We primarily use the solution for security. We use it to detect threats and cyber attacks.
View full review »We are using McAfee Endpoint Security to protect the business.
View full review »MV
Madhav Vishwakarma
Software Engineer at a computer software company with 10,001+ employees
The product is installed in the center and we install a product in it and give it to our customers.
View full review »We use the solution as a server and workstation.
View full review »We use the solution to protect our endpoint systems.
View full review »We primarily use the solution for endpoint security.
View full review »RT
Roberto Taborga
Manager at a tech company with 1,001-5,000 employees
The two primary use cases are towards the process monitor and malware detection for APT (Advanced Persistent Threat).
View full review »We are using it on our network as protection.
View full review »McAfee Endpoint Security can be used for threat protection, for malware protection, and for data loss prevention by encrypting the end user devices using full depth encryption.
We are using the latest version minus two because we generally update the antivirus to the current version after testing it. So generally it is two versions behind.
We have three versions in our network, one is the latest version, then we have a minus one on critical machines and minus two on the endpoints.
View full review »We use this solution for endpoint protection, CASB, and it is integrated with Office 365.
View full review »We use it for all Windows and MAC clients. We use it for endpoint protection, DLP, and disk encryption. We are using the latest version.
View full review »We want more protection for our servers. We would like to know if a real incident or something compromising is happening. Therefore, we have deployed this EDR solution.
View full review »SS
Suresh Sudarsenan
Senior Consultant at SCPD
This is part of our network security solution. We have it running on different servers and workstations that are on different platforms.
View full review »MO
Technicalconsult568
product manager at MCS
FireEye Endpoint Security is positioned as an Endpoint Detection and Response (EDR) product.
We are a distributor of the FireEye product. We offer a combination FireEye package. We offer the product in many sectors, like banking and government.
We use the latest version.
We offer it in a private cloud model for our customers who want to build a security operations centers in their environment.
View full review »HL
Hubert Luberek
Information Technology Security Architect at a financial services firm with 5,001-10,000 employees
We use this solution to enhance our internal defense system, protecting us against malware and advanced persistent threats.
We use the on-premises deployment model.
View full review »McAfee Complete Endpoint Protection is mature, tested, and usual: this is our policy. We don't go for the latest releases. We go for the release which is before the last.
View full review »MG
CompleteEnd677
General Manager (Corporate Services) with 1,001-5,000 employees
I am using McAfee Complete Endpoint Protection to control bandwidth. Any network administrator can do that easily. Control is the best part of Mcafee.
View full review »Our primary use case is to provide our customers with an endpoint security solution.
View full review »The primary use case is to locate unknown malware.
View full review »AJ
Alvaro Jiménez
operador central de monitoreo at a financial services firm with 501-1,000 employees
Our primary use case of this solution is for it to attack malware.
View full review »My primary use case of this solution is for the endpoint protection.
View full review »JD
Jitu Mani Das
Information Security Manager at SPXFLOW
We moved on to FireEye HX as an endpoint solution. Mainly, this is the next-generation endpoint protection where it protects the endpoints not just from the office network but also from roaming. Its capability seeing today's threat actors is the best one.
View full review »We primarily use this solution for antivirus and malware protection.
View full review »SA
Shahid Abuareeb
Delivery Manager at Jlogic Innovations
We receive good protection with this solution. We use this for internet protection on the end-point.
View full review »Our primary use case is for endpoint protection.
View full review »We use the platform for managing and securing endpoints in our organization.
View full review »We use the product mainly for security purposes.
View full review »SA
Sayed Ahmed
I-Security Engineer at Nhq Distribution Ltd
I use certain features of the solution, although I am not using the latest version, even though my colleagues do so a lot. They also use MVISION, although I do not.
We make use of Endpoint host level data loss prevention.
RP
RaghavaPrasad
Admin at a tech services company with 11-50 employees
We use the solution for security.
View full review »The primary use case of this solution is for intrusion prevention.
We are service providers.
View full review »We just run it in the background and potentially scan any wireless or malicious file. It must be the same setup.
View full review »MF
Mohd Fadhil
Security Engineer at Mavisco Resources Sdn Bhd
We use the tool for endpoint security.
View full review »Buyer's Guide
Trellix Endpoint Security Platform
June 2025

Learn what your peers think about Trellix Endpoint Security Platform. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,711 professionals have used our research since 2012.