Cyber Defense Advisor | Founder Executive at a tech services company with 1-10 employees
Real User
2022-02-21T09:43:20Z
Feb 21, 2022
The response part of EDR was most valuable. We used that to separate the endpoint from the network. We utilized the solution during the instant response. We were also utilizing advanced malware detection capabilities, but we benefited the most from its help with the response.
Learn what your peers think about Trellix Endpoint Security Platform. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
Sr Manager - Information Security & Researcher at a tech services company with 1,001-5,000 employees
Real User
2021-05-25T16:00:34Z
May 25, 2021
It is easy to use, flexible, and stable. Because it is a cloud-based solution and it integrates all endpoints of the cloud, we can do an IOC-based search. It can search the entire enterprise and tell us the endpoints that are possibly compromised.
The exploit guard and malware protection features are very useful. The logon tracker feature is also very useful.
They have also given new modules such as logout backup, process backup. We ordered these modules from the FireEye market place, and we have installed these modules. We are currently exploring these features.
Trellix Endpoint Security Platform offers essential features like centralized management, threat prevention, and encryption, facilitating seamless scaling and integration with other systems while prioritizing user security.This comprehensive platform focuses on endpoint protection, antivirus capabilities, and malware defense. It enhances cybersecurity with data loss prevention, advanced threat detection, and AI-driven features for reliable protection without impacting performance. Central...
We have a cloud-based instance, so we can deploy all our configurations through the cloud. That's the beauty of FireEye.
The extendability is great.
If the network has seen something, we can use that to put a block to all the endpoints.
It is a really strong solution for endpoint security.
The response part of EDR was most valuable. We used that to separate the endpoint from the network. We utilized the solution during the instant response. We were also utilizing advanced malware detection capabilities, but we benefited the most from its help with the response.
The features we have found most valuable have been containment as well as the ability to triage agent activities.
It's a stable solution with good performance.
FireEye Endpoint Security is easy to use and lightweight compared to others.
It is easy to use, flexible, and stable. Because it is a cloud-based solution and it integrates all endpoints of the cloud, we can do an IOC-based search. It can search the entire enterprise and tell us the endpoints that are possibly compromised.
FireEye Endpoint Security's scalability is awesome. I think it is one of the best on that front.
The exploit guard and malware protection features are very useful. The logon tracker feature is also very useful.
They have also given new modules such as logout backup, process backup. We ordered these modules from the FireEye market place, and we have installed these modules. We are currently exploring these features.
The most valuable feature is the integration between environments.
The most valuable network security feature is the network sandbox solution. This sandbox feature works on traffic flow.
The most valuable feature of this solution is its simplicity.
It is very valuable in finding out unknown malware.