My customer's usual use case for Trellix ESM involves one client, as most of the users have moved to ESM. Nowadays, they don't use IPS only, since McAfee IPS is standalone; they incorporate firewall and IPS on the same device, and we have two clients only.
They usually use ESM for their gateway.
The most valuable feature of Trellix ESM, for detecting, is that it detects malware and viruses, such as a particular virus that was critical in Kenya. We used ESM to detect and block that particular virus completely.
My impression on the real-time threat detection feature of Trellix ESM is that it's perfect. In terms of real-time, when you put it on inline, everything is supposed to pass by the ESM first and then go to the LAN, allowing the ESM to detect if it's a virus or a clean file.
Assessing the integration capabilities of Trellix ESM with existing security tools in my customers' environments, when you use a totally different solution, such as putting a firewall in front of an ESM, the firewall tries to detect any malicious file. After it has been quarantined or dropped by the firewall, if it doesn't recognize the file, it allows it, but with Trellix ESM, it will block that file if it's malicious or not recognized. Geo-fencing is also possible, allowing you to block traffic from specific regions such as China or Russia.
My impression on the reporting and compliance management capabilities of Trellix ESM is that when you integrate ESM and Trellix EPO, the reporting is perfect because you can see what you want and even refine and customize your reporting. For compliance, regarding standards such as PCI, it's something most banks are using, and it is working great for the two banks that are using Trellix ESM.
The customizable dashboards provided by Trellix ESM are indeed customizable, as there's an option to adjust them to fit your analysis. For example, if you want to check specific applications running in your environment, you can customize that view.
Areas of Trellix ESM that could be improved or enhanced include checking on the clients who are still on-prem, especially banks, as most are not moving everything to the cloud due to confidentiality and accessibility during network outages. They need to ensure that the service meets customer needs.
I have been working with Trellix ESM for 20 years, and I can even show you the first ESM I used to install.
I haven't faced any challenges during the initial setup.
I evaluate the overall stability of the solution as stable. I haven't had any issues, and I think it is a good solution.
I would evaluate the scalability of Trellix ESM by giving it a nine on a scale from one to ten. I rate it this way because when it is alone, there won't be any performance issues, as it relieves the burden on the firewall handling the APS, with most functions being managed by ESM.
My experience with the customer service and technical support of Trellix ESM is that since I've stayed with the product for long, I normally don't use support often. It's rare for me to need them unless it's an issue with licensing, and they are the best in that regard.
My usual experience with the initial setup and deployment of Trellix ESM is that most of the setup is automated and straightforward; it's not hard to deploy or configure.
The actions I usually need to perform to deploy Trellix ESM start with licensing. After that, everything is straightforward, and I can say it is a plug and play solution.
I am also a consultant for Trellix ESM. I usually work with the latest version. I find the hybrid deployment capability of Trellix ESM important for my customers, but I haven't used the hybrid one; we normally use the on-premise solution. I'm not knowledgeable about pricing because I'm just an engineer. I rate Trellix ESM a ten out of ten.