Try our new research platform with insights from 80,000+ expert users
AndyChan3 - PeerSpot reviewer
General manager at a tech services company with 201-500 employees
Real User
Top 10
Easy to use, the dashboard is good, and it offers better coverage than similar products
Pros and Cons
  • "The most valuable feature is ease of use."
  • "I would like to see more integration with third-party products."

What is our primary use case?

We use this solution for endpoint protection, CASB, and it is integrated with Office 365.

What is most valuable?

The most valuable feature is ease of use.

The dashboard is quite good.

What needs improvement?

I would like to see more integration with third-party products.

Pricing is always something that can be improved.

In the future, this product should make use of artificial intelligence and machine learning technology.

For how long have I used the solution?

We have been using McAfee Endpoint Security for more than 10 years.

Buyer's Guide
Trellix Endpoint Security Platform
October 2025
Learn what your peers think about Trellix Endpoint Security Platform. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
872,019 professionals have used our research since 2012.

What do I think about the stability of the solution?

The stability is good and we haven't had any issues.

What do I think about the scalability of the solution?

Scalability-wise, McAfee is a good product.

How are customer service and support?

The technical support from McAfee is about average.

Which solution did I use previously and why did I switch?

We use Symantec as well as McAfee for endpoint protection.

We have found that McAfee has better coverage when compared to Symantec.

What's my experience with pricing, setup cost, and licensing?

The price of McAfee is pretty similar to Symantec, and there are no costs in addition to the standard licensing fees.

What other advice do I have?

In summary, this is a good product and they have most aspects covered. That said, it needs better integration with third-party products. Even the integration with other McAfee products can be improved further.

I would rate this solution an eight out of ten.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Murali Krishnan L - PeerSpot reviewer
Technical Manager (SOC Operations) at Novac Technology Solutions
Real User
Top 20Leaderboard
Comes with useful protection features, but lacks Linux support
Pros and Cons
  • "The exploit guard and malware protection features are very useful. The logon tracker feature is also very useful. They have also given new modules such as logout backup, process backup. We ordered these modules from the FireEye market place, and we have installed these modules. We are currently exploring these features."
  • "The Linux support is very poor. I use base detection. Currently, they are providing malware protection and logon track features in Windows and Mac. These features aren't available in Linux. It will be helpful to extend these capabilities to Linux. We would also like assets grouping and device lock protection features, which are included in their roadmap."

What is our primary use case?

We want more protection for our servers. We would like to know if a real incident or something compromising is happening. Therefore, we have deployed this EDR solution.

What is most valuable?

The exploit guard and malware protection features are very useful. The logon tracker feature is also very useful. 

They have also given new modules such as logout backup, process backup. We ordered these modules from the FireEye market place, and we have installed these modules. We are currently exploring these features. 

What needs improvement?

The Linux support is very poor. I use base detection. Currently, they are providing malware protection and logon track features in Windows and Mac. These features aren't available in Linux. It will be helpful to extend these capabilities to Linux.

We would also like assets grouping and device lock protection features, which are included in their roadmap.

For how long have I used the solution?

We have been using FireEye Endpoint Security for the past two years.

What do I think about the stability of the solution?

The current version is more stable than the previous ones.

What do I think about the scalability of the solution?

It is easily scalable.

How are customer service and technical support?

My experience was 50/50. Sometimes, it was good. Sometimes, they took some time.

Which solution did I use previously and why did I switch?

We were using McAfee AV. We switched to FireEye Endpoint Security because we had some performance issues with McAfee AV. We are not facing those issues with FireEye Endpoint Security.

How was the initial setup?

It is easy to deploy. It took us a month to deploy. 

Deployment may take more time based on the architecture and the environment. With some vendors, it took us some time to analyze because there were things that we wanted to monitor, which depended on the production. Therefore, we installed it step by step, not in one step at full force.

What other advice do I have?

If you are deploying on Windows or Mac, there will be minimal issues, and you can go for this solution. With Linux, you need to understand a few features. What you expect from Windows and Mac is not available in Linux. If your main technologies are open source, then probably rethink about FireEye Endpoint Security. You can go for FireEye Endpoint Security after they have the same capabilities in Linux. Most of the features are there in their roadmap.

We mostly faced issues with Linux support. In the past, we also had issues related to communication between an agent and an endpoint where they didn't communicate, the communication got stopped automatically, or the data communication time didn't sync properly. In the later versions, they improved and resolved these issues.

I would rate this solution a seven out of ten. It's gradually growing, and a few features that we require are not there. If these requirements are satisfied, I would rate them nine or ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Trellix Endpoint Security Platform
October 2025
Learn what your peers think about Trellix Endpoint Security Platform. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
872,019 professionals have used our research since 2012.
it_user1383900 - PeerSpot reviewer
Senior Project Manager at a computer software company with 1,001-5,000 employees
Real User
Has the ability to check a wide range of vulnerabilities and devices
Pros and Cons
  • "This product has the capability to check a wide range of vulnerabilities and devices."
  • "The product could do more to keep administration alerted to detected threats on endpoints."

What is our primary use case?

This product is mainly used for detecting viruses and malware on the laptops and also to scan older, existing files.  

What is most valuable?

The ability to check a wide range of vulnerabilities and devices is a very valuable feature in this product. This is not really a user interface or manually driven product. VirusScan gives an alert to the user that a scan should be performed on their device and the user has to click it to initiate the scan. Then McAfee scans the device and it gives a report saying that it has run a scan of the system and now everything is fine. It runs for the user rather than manual scanning.  

What needs improvement?

We are using it so the company is providing better security coverage end-to-end. I am not sure how to improve on that because it already achieves that goal and updates constantly.  

One thing I think it should do is alert administration if some attack is happening in local systems. I am not seeing that kind of alert. When users run a scan on their own system and nothing is found, that is fine. But ideally, VirusScan also has to send a notification of the source of an attack if one is detected.  

For example, if the threat came from opening an email attachment, an alert could be broadcast to warn other users on the system not to open the same attachment and McAfee could do that automatically. Something like that. Or at least it should make a report or alert for the administrator so that they can take the proper action.  

For how long have I used the solution?

For the last six to eight years we have been using McAfee VirusScan Enterprise.  

What do I think about the stability of the solution?

The stability of the solution is fine, actually, and we are satisfied. It does not have a problem working with the 10,000+ users in our organization. It checks and updates everything every day and the stability is there.  

What do I think about the scalability of the solution?

The scalability with McAfee is good. We currently have about 10,000 laptops which we are using it to secure. It is globally distributed and everybody uses the data scanning to ensure data security is a high priority.  

The people are using it with roles that range from the top to the bottom of the corporation. It is mandatory to use McAfee to ensure that we are in compliance with security regulations as well as preventing data loss on our local systems.  

We have plans to increase the usage of this product as the employee base and the number of devices increases.  

How are customer service and technical support?

I did not have a chance to interact with the technical support team at McAfee because our local internal IT takes care of everything when it comes to the maintenance. Some issues that we have occur because the product is not upgrading locally for whatever reason. Our IT people will handle that type of minor support issue for us.  

Which solution did I use previously and why did I switch?

As far as I know, before this company used McAfee VirusScan as a solution for these past six to seven years, there was not another endpoint security protection product in place.   

How was the initial setup?

The initial setup is straightforward for the administration. The end-user should not have to do anything. There is an automatic trigger and it scans devices on the network along with their files and automatically generates a report. That is all there is to it. It is updated through the central station which tracks the upgrades and the devices that it scans.  

What about the implementation team?

The implementation is kind of done in incremental steps because it is a cloud solution. It is just being pushed from the system to the central location. The agent runs on every laptop and we either manually click it when it issues a notice that it is time to scan the device, or it triggers by itself. It automatically runs these processes without intervention.  

What's my experience with pricing, setup cost, and licensing?

As always, the cost of the licenses has to be paid and it will be per user per year. But the cost is minimal because we have taken a sort of deal with McAfee for a site license.  

What other advice do I have?

I recommend McAfee VirusScan to everyone in an enterprise environment. Part of the reason is that nowadays everyone is working from home. Their systems and devices have to be secure when they are connecting externally to the internal network with whatever device they are using. They should have at least one security solution in their system so that they can avoid vulnerabilities that they may encounter outside of the secure internal network. VirusScan ensures that is happening.  

On a scale from one to ten where one is the worst and ten is the best, I would rate McAfee VirusScan Enterprise as a nine-out-of-ten. It is a very good solution and gives good blanket protection.  

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user1395708 - PeerSpot reviewer
Technical Executive at Digitaltrack
Real User
User-based policies offer fine granularity, and the technical support is reponsive
Pros and Cons
  • "The most valuable feature is user-based policy provision."
  • "A policy-editing console should be added."

What is our primary use case?

We are a solution provider and McAfee MVISION Endpoint is one of the products that we implement for our clients. Our clients use it to help manage their security.

What is most valuable?

The most valuable feature is user-based policy provision. It allows for greater granularity.

Our clients use the VPN to create secure connections to their servers.

What needs improvement?

A policy-editing console should be added.

Having automatic updates would be helpful.

For how long have I used the solution?

We have been dealing with this product for about two years.

What do I think about the stability of the solution?

We are completing two deployments each week and I don't have any comments with regards to stability. I would say that it's stable enough.

What do I think about the scalability of the solution?

We have about 20 clients who are using this solution and it is easy to scale. I would estimate the number of users to be about 400.

How are customer service and technical support?

McAfee has good support and they are very responsive.

Which solution did I use previously and why did I switch?

We deal with endpoint solutions from several vendors including Sophos, Symantec, and CrowdStrike. We are still using Symantec in parallel with McAfee.

The capabilities of these products are similar and the real difference is in the support. McAfee has the best support nowadays, as Symantec takes too long to respond.

How was the initial setup?

The initial setup sometimes has to be done manually because of issues with Active Directory. That said, it is not normally complex. Complexity can come from using export files because McAfee does not have a policy-editing console.

One of the recent deployments we completed required three of us 15 days. This including training people in different locations.

What about the implementation team?

We implement and deploy this product for our clients.

What's my experience with pricing, setup cost, and licensing?

Licensing fees are billed on a yearly basis.

What other advice do I have?

I would rate this solution an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
it_user1097622 - PeerSpot reviewer
Technical Lead Specialist at a computer software company with 1,001-5,000 employees
Real User
Intrusion prevention that detects threats and protects your network, with good support
Pros and Cons
  • "The most valuable features are the prevention layer that detects the signature value and prevents threats in the network."
  • "The resolution time should be faster."

What is our primary use case?

The primary use case of this solution is for intrusion prevention.

We are service providers.

What is most valuable?

The most valuable features are the prevention layer that detects the signature value and prevents threats in the network.

What needs improvement?

The reporting could be improved, by providing more reporting features.

The resolution time should be faster.

For how long have I used the solution?

I have been working with McAfee Endpoint for more than ten years.

What do I think about the stability of the solution?

We have experienced a few issues.

How are customer service and technical support?

I have contacted technical support and they are good.

How was the initial setup?

The initial setup was straightforward.

It takes two days to deploy.

What about the implementation team?

We did not use a vendor or an integrator, we have our own team.

What other advice do I have?

I have experience with multiple vendors and this is a product I recommend.

I would rate this solution an eight out of ten.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Senior Consultant at SCPD
Consultant
A stable solution with good technical support
Pros and Cons
  • "McAfee EndPoint Security has a lot of good features that work well if they are implemented properly."
  • "I would like this solution to do what Palo Alto traps does because I would only need to run this one product."

What is our primary use case?

This is part of our network security solution. We have it running on different servers and workstations that are on different platforms.

What is most valuable?

McAfee EndPoint Security has a lot of good features that work well if they are implemented properly.

What needs improvement?

This solution is difficult to implement. There are lots of features but it has to be implemented the right way.

I would like this solution to do what Palo Alto traps does because I would only need to run this one product.

For how long have I used the solution?

I have been using McAfee Endpoint Security for perhaps the last ten years.

What do I think about the stability of the solution?

It is stable, once it is configured and set up properly.

How are customer service and technical support?

The technical support is good but the local people are bad.

How was the initial setup?

On the workstation, the initial setup is easy.

For the server, it takes a long time for your people to implement it.

What other advice do I have?

I would rate this solution an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
IT Security Engineer at MILLENNIUM TECHNOLOGIES
Reseller
Offers good integration between the environments
Pros and Cons
  • "The most valuable feature is the integration between environments."
  • "I would like to see simple processing and reporting online."

What is most valuable?

The most valuable feature is the integration between environments.

What needs improvement?

Something that needs to improve is the interface. I would also like to see simple processing and reporting online. 

For how long have I used the solution?

I've been using this solution for six months now.

What do I think about the stability of the solution?

The stability of the solution was not very good.

What do I think about the scalability of the solution?

We had some issues with the scalability but it was taken care of. It can be improved, however. 

What other advice do I have?

I will rate this solution an eight out of ten. In the next version I would like to see an improvement in the scalability and stability. 

Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller.
PeerSpot user
product manager at MCS
Reseller
Detects malicious behavior across all common and controlled traffic throughputs
Pros and Cons
  • "The most valuable network security feature is the network sandbox solution. This sandbox feature works on traffic flow."
  • "The investigation and forensic analysis have been most helpful."
  • "They could also increase or improve the scalability because to my knowledge the biggest bandwidth can only support up to 10 gigs of input."
  • "If you have another endpoint product running on the same machine, you have to fine tune functions from FireEye to avoid performance and user experience issues."

What is our primary use case?

FireEye Endpoint Security is positioned as an Endpoint Detection and Response (EDR) product. 

We are a distributor of the FireEye product. We offer a combination FireEye package. We offer the product in many sectors, like banking and government.

We use the latest version.

We offer it in a private cloud model for our customers who want to build a security operations centers in their environment.

What is most valuable?

The most valuable network security feature is the network sandbox solution. This sandbox feature works on traffic flow. Detects multi stages attacks based on MVX analytics engine which detects zero-day, multi-flow and other evasive attacks with dynamic, signature-less analysis in a safe, virtual environment. It stops infection and compromise phases of the cyber-attack kill chain by identifying never-before-seen exploits and malware.

It has capabilities like machine learning and endpoint protection as an antivirus.

The investigation and forensic analysis have been most helpful.

What needs improvement?

They could use a Host Intrusion Prevention System (HIPS) and application control module.

If you have another endpoint product running on the same machine, you have to fine tune functions from FireEye to avoid performance and user experience issues.

What do I think about the stability of the solution?

It is stable. There are zero false positive solutions, not like other solutions.

What do I think about the scalability of the solution?

We plan to increase our usage.

How are customer service and technical support?

They have a strong technical support.

Which solution did I use previously and why did I switch?

Before FireEye, we used McAfee Endpoint Protection and Trend Micro.

How was the initial setup?

The setup was straightforward.

Our deployment and implementation strategies have to remain agile. Every customer requirement is different. Some implementations require a direct connection and so it will take, for SMB customers, a day more or less. For larger enterprises according to the distribution and the need for more trenches with lots of internet gateways, it could take up to five days. E.g., the deployment could take two to three days with 500 users.

What about the implementation team?

Our technical team does the implementation.

We require two to three people for deployment and maintenance.

What's my experience with pricing, setup cost, and licensing?

The current pricing is much better than before because they now offer product-related promotions along with some changes in product licensing. The new pricing model is better than before.

It is a yearly subscription-based product, which includes the license and hardware. There is also a subscription for technical support up to five years.

It is inexpensive with a competitive price.

Which other solutions did I evaluate?

We also looked at Palo Alto Networks Traps and Trend Micro.

What other advice do I have?

It offers protection from the latest threats.

Disclosure: My company has a business relationship with this vendor other than being a customer. Distributor.
PeerSpot user
Buyer's Guide
Download our free Trellix Endpoint Security Platform Report and get advice and tips from experienced pros sharing their opinions.
Updated: October 2025
Buyer's Guide
Download our free Trellix Endpoint Security Platform Report and get advice and tips from experienced pros sharing their opinions.