2019-03-11T07:21:00Z
it_user434868 - PeerSpot reviewer
Senior Director of Delivery at a tech services company with 51-200 employees
  • 0
  • 14

What advice do you have for others considering FireEye Endpoint Security?

If you were talking to someone whose organization is considering FireEye Endpoint Security, what would you say?

How would you rate it and why? Any other tips or advice?

7
PeerSpot user
7 Answers
SB
Sr Manager - Information Security & Researcher at a tech services company with 1,001-5,000 employees
Real User
Top 5Leaderboard
2021-05-25T16:00:34Z
May 25, 2021

Based on my two years of experience with this solution, I would comfortably recommend this solution. I would rate FireEye Endpoint Security an eight out of ten.

Search for a product comparison
RT
Manager at a tech company with 1,001-5,000 employees
Real User
Top 5
2021-02-02T17:08:00Z
Feb 2, 2021

I would recommend to check how they might pull reports. For example, where the customer modes fall because it's an independent investigation related to an IP. On a scale of one to ten, I would give FireEye Endpoint Security a ten, because it's the only good option.

MK
Deputy Technical Manager (SOC Operations) at a tech services company with 1,001-5,000 employees
Real User
Top 5
2020-08-30T08:33:50Z
Aug 30, 2020

If you are deploying on Windows or Mac, there will be minimal issues, and you can go for this solution. With Linux, you need to understand a few features. What you expect from Windows and Mac is not available in Linux. If your main technologies are open source, then probably rethink about FireEye Endpoint Security. You can go for FireEye Endpoint Security after they have the same capabilities in Linux. Most of the features are there in their roadmap. We mostly faced issues with Linux support. In the past, we also had issues related to communication between an agent and an endpoint where they didn't communicate, the communication got stopped automatically, or the data communication time didn't sync properly. In the later versions, they improved and resolved these issues. I would rate this solution a seven out of ten. It's gradually growing, and a few features that we require are not there. If these requirements are satisfied, I would rate them nine or ten.

MK
IT Security Engineer at Miltec
Reseller
2019-09-25T05:10:00Z
Sep 25, 2019

I will rate this solution an eight out of ten. In the next version I would like to see an improvement in the scalability and stability.

MO
product manager at MCS
Reseller
2019-09-19T08:40:00Z
Sep 19, 2019

It offers protection from the latest threats.

Hubert Luberek - PeerSpot reviewer
Information Technology Security Architect at a financial services firm with 5,001-10,000 employees
Real User
2019-08-05T06:24:00Z
Aug 5, 2019

I like FireEye products, and they have a huge portfolio for this solution. However, this is not a magic bullet where you can install it and your problems will disappear. The problem is with the people, rather than the tool. From my perspective, you can install every tool, but you need to have a security operations team involved in the process of analyzing, sorting, and eliminating threats. When we started our project, we had very few people and we have realized that this had to change. The system without human intervention is useless. We needed to build more complex security operation centers to handle false positives, the triage process, and eliminating threats. The biggest lesson that I have learned from this solution is that people need to be ready and the business needs to be ready to use it. This is not a toy. It is a very mature solution to protect the internals of the organization and it should be treated in this way. This is not the worse product that I have seen. I've seen many, many bad products. At the same time, this is not the best product that I have seen. I would rate this solution an eight out of ten.

Learn what your peers think about FireEye Endpoint Security. Get advice and tips from experienced pros sharing their opinions. Updated: December 2022.
655,994 professionals have used our research since 2012.
KS
Executive Officer at a tech services company with 10,001+ employees
Real User
2019-03-11T07:21:00Z
Mar 11, 2019

First, implement it. Then, see what is going on in your company. You will see that there are many risks which you have never seen. The product is not bad, but there may be somethings that need to be modified. The solution is very precise for detecting risks, but the operational quality has some issues.

Related Questions
Netanya Carmi - PeerSpot reviewer
Content Manager at PeerSpot (formerly IT Central Station)
Nov 6, 2021
Which would you choose and why?
See 2 answers
Dovid Gelber - PeerSpot reviewer
Tech blogger
Oct 14, 2021
The Crowdstrike Falcon program has a simple to use user interface, making it both an easy to use as well as an effective program. Its graphical design is such that it makes an extremely useful tool for securing computers from malware and viruses. All of the information that you need is gathered in a central location for careful analysis. It is also easy to navigate, which is a big plus in its favor. Crowdstrike Falcon also offers the ability to access its protective software anywhere on the planet that has a connection to the internet. This makes it an easily accessible anti-malware program. The cloud component of the program makes it especially useful for large organizations. In a world where remote work is a crucial addition to companies of various sizes, unlimited access to software that can secure the future of their organization is crucial. A large staff will now have the ability to continue their business without the fear of malicious actors. A further aspect of the program which is impressive is its ability to both provide real-time data and at the same time keep the hardware running at normal speed. It maximizes security while not sacrificing the speed of the work that the user is trying to accomplish. These two aspects make Crowdstrike Falcon the type of program that has a clear advantage over its competitors. FireEye Endpoint Security offers its users the ability to integrate itself with other environments and software. This provides a level of flexibility that is valuable in any sort of software, much less an anti-viral program. It also has a simplicity of use and precision in spotting unknown malware. All of these qualities make it a pretty effective piece of software. However, FireEye does not offer a cloud option like Crowdstrike Falcon does. This serves to limit its usefulness to companies that operate remotely. Conclusion Crowdstrike Falcon definitely offers a flexible and versatile program that has much to offer for the relatively low price being paid. FireEye Endpoint Security lacks the cloud compatibility of Crowdstrike Falcon. Overall, Crowdstrike Falcon seems to be the far more effective software.
John Johny Restrepo Hernández - PeerSpot reviewer
Solutions Architect at Controles Empresariales
Nov 6, 2021
Hello, I think it doesn't make sense to just compare device protection and automated response security solutions, it's missing to protect identities, devices, and insider access. I think: The best and most valuable option is Microsoft. Microsoft 365 Defender is a unified pre- and post-breach enterprise defense suite that natively coordinates detection, prevention, investigation, and response across endpoints, identities, email, and applications to provide integrated protection against sophisticated attacks. With the integrated Microsoft 365 Defender solution, security professionals can stitch together the threat signals that each of these products receive and determine the full scope and impact of the threat; how it entered the environment, what it's affected, and how it's currently impacting the organization. Microsoft 365 Defender takes automatic action to prevent or stop the attack and self-heal affected mailboxes, endpoints, and user identities. Microsoft 365 Defender services includes:1. Microsoft Defender for Endpoint, is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.2. Microsoft Defender for Office 365, Plan 1 protects email and collaboration from zero-day malware, phish, and business email compromise,  Plan 2 adds post-breach investigation, hunting, and response, as well as automation, and simulation (for training).3. Microsoft Defender for Identity, a cloud service that helps protect your enterprise hybrid environments from multiple types of advanced targeted cyber-attacks and insider threats.4. Microsoft Cloud App Security, is a Cloud Access Security Broker (CASB) that operates on multiple clouds. It provides rich visibility, control over data travel, and sophisticated analytics to identify and combat cyber threats across all your cloud services. If the end customer already has Microsoft 365 in companies or educational institutions, they already have the collaboration tools, only the security and endpoint management tools should be added, all with Microsoft 365 E5/A5, no more investment is being made, it is being consolidated, visibility is gained, responses are automated, the fatigue of operating so many security events that you do not have the time or personnel to review them decrease. I hope this has generated value for you.
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
Jul 5, 2022
Hi, We all know it's really hard to get good pricing and cost information. Please share what you can so you can help your peers.
2 out of 6 answers
MO
product manager at MCS
Sep 19, 2019
The current pricing is much better than before because they now offer product-related promotions along with some changes in product licensing. The new pricing model is better than before. It is a yearly subscription-based product, which includes the license and hardware. There is also a subscription for technical support up to five years. It is inexpensive with a competitive price.
RT
Manager at a tech company with 1,001-5,000 employees
Feb 2, 2021
If you compare your solution without the antivirus solution, and the price of the agent, it is a little bit expensive. But when you learn more about the value of forensic analysis, you will pay those costs. The price is expensive compared with other solutions, with the competitors. But it is really fast and really flexible and the user can research the information.
Download Free Report
Download our free FireEye Endpoint Security Report and get advice and tips from experienced pros sharing their opinions. Updated: December 2022.
DOWNLOAD NOW
655,994 professionals have used our research since 2012.