Try our new research platform with insights from 80,000+ expert users
Trellix Network Detection and Response Logo

Trellix Network Detection and Response pros and cons

Vendor: Trellix
4.2 out of 5

Pros & Cons summary

Buyer's Guide

Get pricing advice, tips, use cases and valuable features from real users of this product.
Get the report

Prominent pros & cons

PROS

Trellix Network Detection and Response significantly enhances malware protection, defense against zero-day threats, and improves network security.
MVX Engine is highly effective against threats, particularly in handling APTs.
Trellix provides valuable features such as MIR for inbound security checks and application filtering.
Trellix's sandboxing feature offers protection from signature-based and signature-less attacks, ensuring comprehensive network security.
Trellix aids in automatic incident response, seamlessly integrating with security tools like Palo Alto for enhanced organizational benefit.

CONS

There is significant room for improvement in pricing, detection capabilities, and reporting and policy management.
FireEye lacks proper integration with cloud services and advanced machine learning capabilities.
Documentation is limited for customers and needs significant improvement and accessibility.
Trellix Network Detection and Response faces challenges with technical support and integration capabilities with other vendor products.
There is a need for enhanced decryption capabilities and better technical packaging for network threats.
 

Trellix Network Detection and Response Pros review quotes

it_user792615 - PeerSpot reviewer
Security Consultant at a tech services company with 51-200 employees
Dec 21, 2017
Improved our systems and our customers' by providing better malware protection, defense against zero-day threats, and improved network security.
AK
PreSales Director at a marketing services firm with 51-200 employees
Nov 11, 2018
The features that I find most valuable are the MIR (Mandiant Incident Response) for checks on our inbound security.
SA
Technical lead at a tech services company with 51-200 employees
Feb 10, 2019
Before FireEye, most of the times that an incident would happen nobody would be able to find out where or why the incident occurred and that the system is compromised. FireEye is a better product because if the incident already happened I know that the breach is there and that the system is compromised so we can take appropriate action to prevent anything from happening.
Learn what your peers think about Trellix Network Detection and Response. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,310 professionals have used our research since 2012.
AE
System Engineer at IRIS
Feb 21, 2019
Application categorization is the most valuable feature for us. Application filtering is very interesting because other products don't give you full application filtering capabilities.
Sysengine0946 - PeerSpot reviewer
System Engineer at a tech services company with 1,001-5,000 employees
Feb 25, 2019
Its ability to find zero-day threats, malware and anything malicious has greatly improved my customer's organization, especially for protecting the users' browser.
DepAssist9876 - PeerSpot reviewer
Deputy Assistant Secretary with 201-500 employees
Feb 25, 2019
We see ROI in the sense that we don't have to react because it stops anything from hurting the network. We can stop it before we have a bigger mess to clean up.
Cpmef44 - PeerSpot reviewer
CPM at a comms service provider with 1,001-5,000 employees
Mar 11, 2019
The most valuable feature is the view into the application.
Security4668 - PeerSpot reviewer
Security Analyst at a financial services firm with 201-500 employees
Mar 11, 2019
It allows us to be more hands off in checking on emails and networking traffic. We can set up a bunch of different alerts and have it alert us.
CEO8280 - PeerSpot reviewer
CEO at a tech services company with 1-10 employees
Mar 11, 2019
The scalability has not been a problem. We have deployed the product in very high bandwidth networks. We have never had a problem with the FireEye product causing latency issues within our networks.
HK
Information Security Consultant at a financial services firm with 1,001-5,000 employees
Apr 23, 2019
Initially, we didn't have much visibility around what is occurring at our applications lower level. For instance, if we are exposed to any malicious attacks or SQL injections. But now we've integrated FireEye with Splunk, so now we get lots of triggers based on policy content associated with FireEye. The solution has allowed for growth and improvement in our information security and security operations teams.
 

Trellix Network Detection and Response Cons review quotes

it_user792615 - PeerSpot reviewer
Security Consultant at a tech services company with 51-200 employees
Dec 21, 2017
Management of the appliance could be greatly improved.
AK
PreSales Director at a marketing services firm with 51-200 employees
Nov 11, 2018
The world is currently shifting to AI, but FIreEye is not following suit.
SA
Technical lead at a tech services company with 51-200 employees
Feb 10, 2019
It doesn't connect with the cloud, advanced machine learning is not there. A known threat can be coming into the network and we would want the cloud to look up the problem. I would also like to see them develop more file replication and machine learning.
Learn what your peers think about Trellix Network Detection and Response. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,310 professionals have used our research since 2012.
AE
System Engineer at IRIS
Feb 21, 2019
Based on what we deployed, they should emphasize the application filtering and the web center. We need to look deeper into the SSM inspection. If we get the full solution with that module, we don't need to get the SSM database from another supplier.
Sysengine0946 - PeerSpot reviewer
System Engineer at a tech services company with 1,001-5,000 employees
Feb 25, 2019
The problem with FireEye is that they don't allow VM or sandbox customization. The user doesn't have control of the VMs that are inside the box. It comes from the vendor as-is. Some users like to have control of it. Like what type of Windows and what type of applications and they have zero control over this.
DepAssist9876 - PeerSpot reviewer
Deputy Assistant Secretary with 201-500 employees
Feb 25, 2019
Cybersecurity posture has room for improvement.
Cpmef44 - PeerSpot reviewer
CPM at a comms service provider with 1,001-5,000 employees
Mar 11, 2019
A better depth of view, being able to see deeper into the management process, is what I'd like to see.
Security4668 - PeerSpot reviewer
Security Analyst at a financial services firm with 201-500 employees
Mar 11, 2019
I would love to see better reporting. Because you can't export some of the reports in proper formats, it is hard to extract the data from reports.
CEO8280 - PeerSpot reviewer
CEO at a tech services company with 1-10 employees
Mar 11, 2019
The initial setup was complex because of the nature of our environment. When it comes to the type of applications and functions which we were looking at in terms of identifying malicious threats, there would be some level of complexity, if we were doing it right.
HK
Information Security Consultant at a financial services firm with 1,001-5,000 employees
Apr 23, 2019
Improvements could be achieved through greater integration capabilities with different firewall solutions. Integrating with the dashboard itself for different firewalls so users can also pull tags into their firewall dashboard.