No more typing reviews! Try our Samantha, our new voice AI agent.
AmgadYousry - PeerSpot reviewer
Head of Infrastructure at a tech services company with 11-50 employees
Real User
Leaderboard
Sep 12, 2022
Great sandboxing, good reliability, and helpful support
Pros and Cons
  • "The solution can scale."
  • "There are sandbox capabilities; you can submit malicious files and get great feedback, including if there is malware and what it is doing, and it can give you simulations in different operating systems and applications to provide real insights from the perspective of a real environment."
  • "It is an expensive solution."
  • "The product is pricey. We'd like it to cost less. Not all customers can afford it."

What is most valuable?

There are sandbox capabilities. You can submit malicious files and great feedback, including if there is malware, what it is doing, et cetera.

The way it works is better than others thanks to the sandbox. It can give you simulations in different operating systems and applications and give your real insights from the perspective of a real environment.  You gain insights into evasion techniques. 

It's not just running in the background on an endpoint. You can do tests and learn. You can do behavior analysis. That's the main feature. 

The solution can scale. 

What needs improvement?

There isn't something missing - even with HX. HX was in the box and was working EDR and antivirus. They just need to keep the updates running and the features stable, and that's it. No new thing is required.

The initial setup is not exactly easy. 

It is an expensive solution.

For how long have I used the solution?

We've been using the solution for six to eight years, since 2014. 

What do I think about the stability of the solution?

The stability is okay. It's something they always need to improve and manage. Yet it's quite good overall, so long as it stays updated. I'd rate it nine out of ten. 

Buyer's Guide
Trellix Network Detection and Response
April 2026
Learn what your peers think about Trellix Network Detection and Response. Get advice and tips from experienced pros sharing their opinions. Updated: April 2026.
893,311 professionals have used our research since 2012.

What do I think about the scalability of the solution?

The solution can scale well. It's not a problem.

We have one client with around 5,000 users, however, the user base varies from customer to customer. 

How are customer service and support?

We've dealt with technical support. 

They take some time to answer, however, they solve the issue.

Which solution did I use previously and why did I switch?

I compared this product with something like MD, for example, Forcepoint.

It's about how you are using the solution. If you don't have a Forcepoint Next Generation Firewall proxy you shouldn't go for MD. You should go for FireEye.If you need to use MD, you need to have the other solution as well. It's not working as a standalone. It feeds from other solutions.

How was the initial setup?

The initial setup is a bit complex. It's not simple. For example, in the box, the imaging is very complex.

What about the implementation team?

We implement the solution for our clients.

What's my experience with pricing, setup cost, and licensing?

The product is pricey. We'd like it to cost less. Not all customers can afford it.

What other advice do I have?

I am a deployment engineer. We are not using FireEye for ourselves. We are deploying it to our customers.

We are usually using the latest version since the database will be updated, and the images of the box itself will be updated regularly. It's always better in this kind of solution to have the latest update.

You can get it as a service provided by your cloud provider. With the on-premise, you will get the box, and each type of box has its deployment methodology or deployment technique. For example, if you are going to deploy the NX, you can make it online, and your networking can give it a motherboard from your switch.

I'd rate the solution nine out of ten. It's just a bit complex to set up.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Hamada Elewa - PeerSpot reviewer
System Engineer - Security Presales at Raya Integration
Real User
Top 5Leaderboard
Feb 19, 2022
Plenty of OS features, scalable, and useful sandboxing
Pros and Cons
  • "The sandbox feature of FireEye Network Security is very good. The operating system itself has many features and it supports our design."
  • "It's a very simple solution and a very effective product in my network."
  • "FireEye Network Security should have better integration with other vendors' firewalls or proxies, such as Palo Alto and Fortinet. Files that are being submitted should happen through the API or automatically."
  • "The support from FireEye Network Security is not very good."

What is our primary use case?

We use FireEye Network Security to secure the internet link. The solution works as an inline sandbox. Additionally, it can scan and monitor all uploads and downloads, and internet browsed links.

What is most valuable?

The sandbox feature of FireEye Network Security is very good. The operating system itself has many features and it supports our design.

What needs improvement?

FireEye Network Security should have better integration with other vendors' firewalls or proxies, such as Palo Alto and Fortinet. Files that are being submitted should happen through the API or automatically.

In the next release, they should add a multiple virtual context feature.

For how long have I used the solution?

I have been using FireEye Network Security for approximately two years.

What do I think about the stability of the solution?

The stability of FireEye Network Security is good, but I can face some problems in the memory and CPU. When I had the limited license to the SSL, I had to measure my SSL needs from day one so that I would not face any problems with the license.

What do I think about the scalability of the solution?

The solution is scalable, you only need to purchase more licenses to have more scalability.

How are customer service and support?

The support from FireEye Network Security is not very good. Palo Alto and Fortinet have better support.

I rate the support from FireEye Network Security a six out of ten.

Which solution did I use previously and why did I switch?

I have used Palo Alto and Fortinet solutions.

How was the initial setup?

The initial setup of FireEye Network Security is not complicated.

What about the implementation team?

We implement the solution for our customers.

What's my experience with pricing, setup cost, and licensing?

When you purchase FireEye Network Security NX, will need to purchase a megabit per second package. You must know your needs from day one.

What other advice do I have?

I would recommend those wanting to implement FireEye Network Security to take the needed small course from FireEye and they will master the solution. It's a very simple solution and a very effective product in my network.

I rate FireEye Network Security an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Integrator
PeerSpot user
Buyer's Guide
Trellix Network Detection and Response
April 2026
Learn what your peers think about Trellix Network Detection and Response. Get advice and tips from experienced pros sharing their opinions. Updated: April 2026.
893,311 professionals have used our research since 2012.
reviewer1581882 - PeerSpot reviewer
Sr Manager - Information Security & Researcher at a tech services company with 1,001-5,000 employees
Real User
Sep 9, 2021
Very functional with its own ecosystem of products integrated with an inbuilt SIEM
Pros and Cons
  • "Very functional and good for detecting malicious traffic."
  • "FireEye has created an ecosystem of products integrated with their own SIEM, which is cloud-based and integrates with network security, email security, host security and the like."
  • "Technical support could be improved."
  • "The support is somewhat lacking with long response times."

What is our primary use case?

The solution can be used for detecting malicious traffic based upon known IOCs and it's integrated with the artificial intelligent speed, so we're able to recognize which IOCs are matching and their threat attribution.

What is most valuable?

I think there are some very functional features in FireEye when you compare the solution to traditional SIEM solutions. Traditional SIEM solutions don't have their own IPS/IDS functionalities and they integrate with third party WANs. In contrast, FireEye has created an ecosystem of products integrated with their own SIEM, which is cloud-based and integrates with network security, email security, host security and the like. 

What needs improvement?

The support is somewhat lacking with long response times. The expectation is that when it comes to security response, technical support should be readily available.

For how long have I used the solution?

I've been using this solution for four years. 

What do I think about the stability of the solution?

The solution is stable. 

What do I think about the scalability of the solution?

The solution is scalable with different modules of NX appliance which is a passive IPS/IDs for different bandwidth capacities. It's a matter of using the appropriate ones. 

How was the initial setup?

The initial setup is straightforward. There is one template for location where we installed the virtual appliance and once that was up and running, it was fine. We had four or five people in the network team that set up the appliances.

What's my experience with pricing, setup cost, and licensing?

We pay an annual subscription fee. 

Which other solutions did I evaluate?

We evaluated three options and decided to go with FireEye.

What other advice do I have?

I would recommend this solution and rate it nine out of 10. 

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Sr Technical Consultant at a tech services company with 51-200 employees
Real User
May 23, 2021
A reliable and complete network protection solution that protects from signature-based and signature-less attacks and has powerful logging
Pros and Cons
  • "It protects from signature-based attacks and signature-less attacks. The sandboxing technology, invented by FireEye, is very valuable. Our customers go for FireEye because of the sandboxing feature. When there is a threat or any malicious activity with a signature, it can be blocked by IPS. However, attacks that do not have any signatures and are very new can only be blocked by using the sandboxing feature, which is available only in FireEye. So, FireEye has both engines. It has an IPS engine and a sandbox engine, which is the best part. You can get complete network protection by using FireEye."
  • "I also like its logging method. Its logging is very powerful and useful for forensic purposes. You can see the traffic or a specific activity or how something entered your network and where it went."
  • "Anyone who is looking for a complete network protection solution and does not have any budget issues should definitely go for it."
  • "Its documentation can be improved. The main problem that I see with FireEye is the documentation. We are an official distributor and partner of FireEye, and we have access to complete documentation about how to configure or implement this technology, but for customers, very limited documentation is available openly. This is the area in which FireEye should evolve. All documents should be easily available for everyone."
  • "They can maybe consider supporting some compliance standards. When we are configuring rules and policies, it can guide whether they are compliant with a particular compliance authority. In addition, if I have configured some rules that have not been used, it should give a report saying that these rules have not been used in the last three months or six months so that I disable or delete those rules."
  • "Its documentation can be improved. The main problem that I see with FireEye is the documentation."

What is our primary use case?

We implement this solution for our clients for the complete protection of their network.

What is most valuable?

It protects from signature-based attacks and signature-less attacks. The sandboxing technology, invented by FireEye, is very valuable. Our customers go for FireEye because of the sandboxing feature. When there is a threat or any malicious activity with a signature, it can be blocked by IPS. However, attacks that do not have any signatures and are very new can only be blocked by using the sandboxing feature, which is available only in FireEye. So, FireEye has both engines. It has an IPS engine and a sandbox engine, which is the best part. You can get complete network protection by using FireEye. 

I also like its logging method. Its logging is very powerful and useful for forensic purposes. You can see the traffic or a specific activity or how something entered your network and where it went.

What needs improvement?

Its documentation can be improved. The main problem that I see with FireEye is the documentation. We are an official distributor and partner of FireEye, and we have access to complete documentation about how to configure or implement this technology, but for customers, very limited documentation is available openly. This is the area in which FireEye should evolve. All documents should be easily available for everyone.

They can maybe consider supporting some compliance standards. When we are configuring rules and policies, it can guide whether they are compliant with a particular compliance authority. In addition, if I have configured some rules that have not been used, it should give a report saying that these rules have not been used in the last three months or six months so that I disable or delete those rules.

What do I think about the stability of the solution?

It is very reliable. Its hardware is also very robust. I have not heard anything about device failures. Its hardware can survive at 50-degree temperature.

What do I think about the scalability of the solution?

Its scalability is good, but it depends on the features you are using. If you are using all the features, you might have to upgrade the boxes. It can scale to a certain level. For example, if you have 100 users, it can cater to 120 or 150 users, but it cannot cater to over 200 users. A lot of time, because of money issues or some other issues, customers just buy the hardware for their current needs, and they don't consider the future requirements. It is not something that is related to the scalability of FireEye.

We do not use it in our company. We are a partner of FireEye, and we implement it for our customers. I have seen customers using it for maybe 4,000 or 5,000 users.

How are customer service and technical support?

Their tech support is based in India. They are very supportive.

How was the initial setup?

It is very user-friendly. You just plug in the serial console, and you'll just get all the options. You just type the question mark symbol in CLI, and it will show all available options. The setup was pretty straightforward. I was able to do the basic configuration within 30 minutes. Rules and policy optimization can take a long time, but the basic configuration is pretty smooth and quick.

What's my experience with pricing, setup cost, and licensing?

Its price is a bit high. A small customer cannot buy it. Its licensing is on a yearly basis.

What other advice do I have?

I would definitely recommend this solution. Anyone who is looking for a complete network protection solution and does not have any budget issues should definitely go for it.

I would rate FireEye Network Security a ten out of ten for technology and security.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
RSSI at SDIS49
Real User
Top 5
Oct 13, 2020
Stable threat protection that is easy to set up, and the appliances are good
Pros and Cons
  • "The server appliance is good."
  • "The initial setup was straightforward, you can do it by yourself, you don't have to find a partner or a FireEye expert."
  • "Technical packaging could be improved."
  • "The pricing is not reasonable. The user fee is not as high but the maintenance fee is expensive."

What is most valuable?

The server appliance is good.

What needs improvement?

Technical packaging could be improved.

It would be helpful to receive access to the administration of the product.

For how long have I used the solution?

We have been working with FireEye Network Security for one year.

What do I think about the stability of the solution?

It's a stable solution.

What do I think about the scalability of the solution?

If you choose a good appliance, it could be scalable. 

You have a login to your applications.

We are 600 users who are on the payroll, but in total, we have 3,000 and 2,400 of which are volunteers.

How are customer service and technical support?

Technical support is rather good. But it's very restrictive, it's false of maintenance. 

If you're don't authenticate it each month, you have to ask for another password and it's a little bit repressive.

Which solution did I use previously and why did I switch?

Previously, we have not used another solution, because it's a compliment to TruePoint Securities.

The CheckPoint product is very strong, but we have found that some cases on CheckPoint lessons are not on the list.

How was the initial setup?

The initial setup was straightforward, you can do it by yourself. 

You don't have to find a partner or a FireEye expert.

What's my experience with pricing, setup cost, and licensing?

The pricing is not reasonable. The user fee is not as high but the maintenance fee is expensive.

What other advice do I have?

For the next project, we will be doing comparisons for massive attacks.

We have been customers for five years and we have a very good relationship with them.

It's not the first line of defense. It's for us to subline of defense itself. It depends on the analysis of the threat.

An alternative tool could be Endpoint security.

I think we will put in service for Endpoint Security, soon. But network security is aligned more in your defense unison.

I would rate FireEye Network Security an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Lead Program Manager at a computer software company with 10,001+ employees
Real User
Dec 28, 2020
Stable, protective, easy to set up, and has a lot of features to scan vulnerabilities
Pros and Cons
  • "It is stable and quite protective. It has a lot of features to scan a lot of malicious things and vulnerabilities."
  • "It is stable and quite protective, and it has a lot of features to scan many malicious things and vulnerabilities."
  • "I heard that FireEye recently was hacked, and a lot of things were revealed. We would like FireEye to be more secure as an organization. FireEye has to be more protective because it is one of the most critical devices that we are using in our environment. They have a concept called SSL decryption, but that is only the packet address. We would like FireEye to also do a lot of decryption inside the packet. Currently, FireEye only does encryption and decryption of the header, but we would like them to do encryption and decryption of the entire packet."
  • "I heard that FireEye recently was hacked, and a lot of things were revealed."

What is our primary use case?

We are using it from the perspective of data protection. We have two types of data that is coming. One is the actual data or the customer data that comes into our premises, and the second is the internet traffic that comes into our organization. FireEye devices scan all the traffic that comes through the tools on which we have configured FireEye, and they also analyze a lot of traffic.

What is most valuable?

It is stable and quite protective. It has a lot of features to scan a lot of malicious things and vulnerabilities.

What needs improvement?

I heard that FireEye recently was hacked, and a lot of things were revealed. We would like FireEye to be more secure as an organization. FireEye has to be more protective because it is one of the most critical devices that we are using in our environment. 

They have a concept called SSL decryption, but that is only the packet address. We would like FireEye to also do a lot of decryption inside the packet. Currently, FireEye only does encryption and decryption of the header, but we would like them to do encryption and decryption of the entire packet.

For how long have I used the solution?

We have been using FireEye for a couple of years.

What do I think about the stability of the solution?

It is stable.

How are customer service and technical support?

They are very good. They follow the SLA and have two types of support. Premium support is available 24/7, and it is more customized.

Which solution did I use previously and why did I switch?

We were using an IBM product.

How was the initial setup?

Its installation is quite easy. It is a straightforward installation unless you are using multiple technologies in your environment. If you are using Radware and other stuff, your FireEye needs to understand all the technologies. It needs to understand the data coming in from the switch and the data sent from the hardware devices and the load balancer. It tends to take a little time to understand the data traffic, but it is easy to implement. It takes about an hour.

What about the implementation team?

We had a consultant. Configuring the device takes about an hour, but we also have the backend configuration related to our environment, which takes a bit more time.

We work across the globe. From the data center perspective, we have about 13 locations across the globe where we have implemented this solution. Two to three people are enough for its implementation.

What other advice do I have?

I would recommend this solution to others. We plan to keep using this solution. We have just migrated to the latest FireEye devices.

I would rate FireEye Network Security an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Professional Services Division Manager at 2Bsecure
Reseller
Dec 23, 2020
Agile, easy to scale, and the network security module is good
Pros and Cons
  • "The most valuable feature is the network security module."
  • "The most valuable feature is the network security module."
  • "It is very expensive, the price could be better."
  • "It is very expensive, the price could be better."

What is our primary use case?

We are using this solution for sandboxing on all channels.

What is most valuable?

The most valuable feature is the network security module. It is better than other solutions and it can make and find electrical movement.

Also, the attack vector is a feature that no one else offers.

Overall, it's a great solution.

What needs improvement?

It is very expensive, the price could be better. 

For how long have I used the solution?

I have been using FireEye Network Security for a couple of years.

We are using the latest version.

What do I think about the stability of the solution?

It's a stable solution. It's very agile.

What do I think about the scalability of the solution?

The scalability is great. 

You don't have to purchase another machine, but if you want, you can add another one. It goes through the cluster very smoothly.

I am part of the professional services with multiple organizations and multiple users.

How are customer service and technical support?

Technical support is great.

How was the initial setup?

The initial setup was complex because there were some bugs, but the professional service of FireEye was able to resolve them.

It took a long time to deploy.

What about the implementation team?

We are a reseller and the professional services of FireEye.

What's my experience with pricing, setup cost, and licensing?

It's an expensive solution.

Which other solutions did I evaluate?

We evaluated other solutions before choosing FireEye.

What other advice do I have?

I would recommend this solution to others interested in using it.

I would rate FireEye Network Security a nine out of ten.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
PeerSpot user
OT/ICS Information Security Specialist at SANS
Real User
May 19, 2020
Good support, easy to implement, and proactively tests incoming files for malicious behavior
Pros and Cons
  • "The most valuable feature is MVX, which tests all of the files that have been received in an email."
  • "The most valuable feature is MVX, which tests all of the files that have been received in an email, using virtual machines to test the behavior of the files and determine whether they are malicious in nature, blocking any abnormal activity and recording the hash value to submit to the cloud and add to the blacklist."
  • "It would be very helpful if there were better integration with other solutions from other vendors, such as Fortinet and Palo Alto."
  • "It would be very helpful if there were better integration with other solutions from other vendors, such as Fortinet and Palo Alto."

What is our primary use case?

We use FireEye to protect our web and email traffic.

What is most valuable?

The most valuable feature is MVX, which tests all of the files that have been received in an email. It uses virtual machines to test the behavior of the files and determine whether they are malicious in nature. If there is any abnormal activity then the file will be blocked. The corresponding hash value will then be recorded, submitted to the cloud, and added to the blacklist.

What needs improvement?

It would be very helpful if there were better integration with other solutions from other vendors, such as Fortinet and Palo Alto. They should be sharing their threat database and information. For example, if something is discovered by FortiSandbox or the Palo Alto Sandbox, it should be announced to all of the vendors so that they can take action and block these files.

FireEye can be improved in terms of network visibility. Some minor enhancements are needed.

For how long have I used the solution?

I have been working with FireEye for about three years.

What do I think about the stability of the solution?

The stability is very good.

What do I think about the scalability of the solution?

Scalability has been okay until now. If there is a major expansion in the future then we will proceed with that as it comes.

How are customer service and technical support?

I have been in contact with technical support and I find them to be good.

How was the initial setup?

I found the initial setup straightforward.

What about the implementation team?

We had assistance with the implementation.

What other advice do I have?

My advice to anybody who is implementing this solution is to fine-tune based on the use cases. Test the solution, monitor the alerts, and be proactive about anything that shows up. If there is any abnormal activity then be sure to take action quickly, and also, ensure that there is policy in place for other departments to act accordingly when malicious traffic is detected.

I would rate this solution an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Trellix Network Detection and Response Report and get advice and tips from experienced pros sharing their opinions.
Updated: April 2026
Buyer's Guide
Download our free Trellix Network Detection and Response Report and get advice and tips from experienced pros sharing their opinions.