Try our new research platform with insights from 80,000+ expert users
reviewer1427199 - PeerSpot reviewer
Information Security Officer at a tech services company with 51-200 employees
MSP
It is easy to use and deploy, but it lacks proper support
Pros and Cons
  • "It is easy to use and deploy. It comes with user-friendly manuals."
  • "McAfee is no more providing security updates on this product, and the enhancements to this product seem to have stopped. Moreover, we don't get proper support, and we struggle to get its support. It would be good if they can add some AI engine and out of the box use cases because it is currently limited to the same scenario and the same setup. I have done a POC for Securonix, LogRhythm. These products are much more ahead as compared to McAfee ESM. They have included multiple modules in the same solution. Correlation is very easy. If McAfee ESM can improve, especially in such implementations, then I believe it would be much better."

What is our primary use case?

We use McAfee ESM for IT operations and a few security-related things. 

What is most valuable?

It is easy to use and deploy. It comes with user-friendly manuals.

What needs improvement?

McAfee is no more providing security updates on this product, and the enhancements to this product seem to have stopped. Moreover, we don't get proper support, and we struggle to get its support.

It would be good if they can add some AI engine and out of the box use cases because it is currently limited to the same scenario and the same setup. I have done a POC for Securonix, LogRhythm. These products are much more ahead as compared to McAfee ESM. They have included multiple modules in the same solution. Correlation is very easy. If McAfee ESM can improve, especially in such implementations, then I believe it would be much better.

For how long have I used the solution?

I have been using McAfee ESM for maybe the last six years. 

Buyer's Guide
Trellix ESM
April 2025
Learn what your peers think about Trellix ESM. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
851,491 professionals have used our research since 2012.

What do I think about the stability of the solution?

It has very good stability.

What do I think about the scalability of the solution?

So far, we haven't tried scaling. Because it is on-premises, it is almost a setup environment. We don't do any major changes on the same site because it is quite critical and gets alerts. We don't want to mess up with our configuration.

How are customer service and support?

They take a long time, and the technical person who comes from support doesn't seem to be knowledgeable. When something goes wrong on the hardware or the application side, or we need some technical support in filling up use cases, it takes a long time.

We always struggle to get proper support from their technical support team. It seems that there is only one person who is handling the Middle East technical support, and when we don't get that person, we struggle a lot.

How was the initial setup?

The initial setup was straightforward. There were no complications in its deployment.

What about the implementation team?

Its deployment was done by an engineer in our company. 

We are a security team of five members. Whoever a ticket is assigned to handles the cases.

What's my experience with pricing, setup cost, and licensing?

The cost is all included. The finance department handles the financial part, and we mostly don't get involved in it.

What other advice do I have?

We are quite happy with the product and its stability, but the problem is the lack of support, which is one of the major issues that we are facing. I really look forward to them providing proper technical support.

I would rate McAfee ESM a seven out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Business8c2a - PeerSpot reviewer
Business System Analyst at a consultancy with 5,001-10,000 employees
Real User
An easy way to protect my privacy if I lose my computer
Pros and Cons
  • "It is easy to use."
  • "I would like to see fingerprint recognition included in the next release of this solution."

What is our primary use case?

My primary use case for this solution is to secure the data on my laptop.

How has it helped my organization?

If I lost my computer somewhere then hopefully the software will protect my data from anyone.

What is most valuable?

The ability to secure my data is the most important feature.

It is easy to use. I just need to enter the username and the password and it protects my data.

What needs improvement?

I would like to see fingerprint recognition included in the next release of this solution.

How are customer service and technical support?

I have not used technical support for the product.

Which solution did I use previously and why did I switch?

My company did use another product previous to this one but I do not know why they switched.

How was the initial setup?

The installation and setup of this solution is straightforward.

What about the implementation team?

I handled the deployment myself.

What other advice do I have?

This is a product that I would recommend to a colleague at another company.

I would rate this solution an eight out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Trellix ESM
April 2025
Learn what your peers think about Trellix ESM. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
851,491 professionals have used our research since 2012.
it_user374493 - PeerSpot reviewer
Security Consultant, Presale and System Engineer at a tech services company with 501-1,000 employees
Consultant
If you provide it with the Advanced Correlation Engine and Global Threat Intelligence, you can raise your infrastructure to be a complete advanced SOC.

What is most valuable?

Doing Incident analysis in my opinion with ESM is easier than other solutions. There are a lot of ways to build queries and a great filter engine; if you provide ESM with the Advanced Correlation Engine and Global Threat Intelligence you can raise your infrastructure to be a complete advanced SOC.

How has it helped my organization?

I work for a System Integrator.

What needs improvement?

I have almost no complaints with this solution because it's almost a complete solution, but I do hope to have more stability in the next upgrade and to have the interface re-engineered to be HTML5-based rather than Flash-based.

I'd also like some Splunk-like ELM (Log Manager) enterprise functions.

For how long have I used the solution?

I've used it for three years, from versions 9.1 to 9.5

What was my experience with deployment of the solution?

Yes, sometimes it seems that versions with major upgrades come with some bugs and regressions that affected deployment.

What do I think about the stability of the solution?

Yes, sometimes it seems that versions with major upgrades come with some bugs and regressions that affected stability.

What do I think about the scalability of the solution?

It has scaled to our needs.

How are customer service and technical support?

Customer Service:

Customer service is very good and very professional.

Technical Support:

Technical support is very good and very professional.

Which solution did I use previously and why did I switch?

I also work with with RSA and McAfee SIEM solutions.

How was the initial setup?

If you buy the all-in-one solution (Virtual or Hardware), the setup takes a couple of hours.

What's my experience with pricing, setup cost, and licensing?

SIEM is not a Log Manager; ESM is meant for people who need advanced SOC functionality and not only to satisfy compliance rules.

Disclosure: My company has a business relationship with this vendor other than being a customer: We're a partner.
PeerSpot user
reviewer1614318 - PeerSpot reviewer
Vice President Cyber Security Practice Head at a tech services company with 1,001-5,000 employees
Real User
Does not integrate well, and scalability needs improvement but it's fairly priced
Pros and Cons
  • "I like the ease of deployment."
  • "I would like to see good analytics in future releases."

What is our primary use case?

We use this solution for correlation, alerting, and log management.

We are integrators.

What is most valuable?

I like the ease of deployment.

What needs improvement?

I would like to see good analytics in future releases.

McAfee has many issues with integration. I am looking for an end-to-end integration such as EDR, and Next-Generation SOC 2.0. 

For how long have I used the solution?

I have been working with McAfee ESM for 20 years.

What do I think about the scalability of the solution?

We are looking for horizontal and verticle expansion. McAfee has issues with scalability. Other ESM solutions, don't have the same issues.

How are customer service and technical support?

We have not contacted technical support in quite some time. We had issues with the parsing.

How was the initial setup?

The deployment is easy, but because it is a hybrid deployment which makes it complex. It is partly in the cloud and partly an on-premises deployment. The device will have to access the cloud and on-premises data.

What about the implementation team?

We have an internal team to maintain this solution.

What's my experience with pricing, setup cost, and licensing?

The pricing is fair.

What other advice do I have?

I would recommend this solution to others who are interested in using it.

I would rate McAfee ESM a five out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
IT Security Analyst at Ingenium Group
Real User
A good central viewpoint for issues, but it requires Flash
Pros and Cons
  • "It is a good central viewpoint for issues. These can then be investigated in more detail on the subnet server(s)/endpoints."
  • "Product currently requires Flash."
  • "Update to user interface from version 9 is cosmetic in some aspects, and after a few clicks you are back on the old interface."
  • "We would welcome integrations with some of the new McAfee acquisitions, e.g., behavioural analytics."

What is our primary use case?

  • To gain transparency into potential vulnerabilities within the network. 
  • To monitor problems, e.g., failure to update packages within the back-end security environment.

How has it helped my organization?

It is a good central viewpoint for issues. These can then be investigated in more detail on the subnet server(s)/endpoints.

What is most valuable?

Ability to create own views. Statistical (normalised) views help to highlight inconsistencies, which may need further investigation

What needs improvement?

  • Product currently requires Flash. 
  • Update to user interface from version 9 is cosmetic in some aspects, and after a few clicks you are back on the old interface.
  • Some filters are still very low level "magic numbers", which do not make sense on the high level user interface. 
  • We would welcome integrations with some of the new McAfee acquisitions, e.g., behavioral analytics.

For how long have I used the solution?

Less than one year.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Trellix ESM Report and get advice and tips from experienced pros sharing their opinions.
Updated: April 2025
Buyer's Guide
Download our free Trellix ESM Report and get advice and tips from experienced pros sharing their opinions.