Likelihood to Recommend It is well suited especially for users that access or store sensitive/confidential data on their computers. In the case of where users are accessing confidential data over the network, it is highly recommended to use Bitlocker to encrypt the computer. In the case where users are storing confidential data on their computer, it should be a requirement that BitLocker is used/enabled. It would be less appropriate if someone was using a computer and they were not dealing with any sensitive data, or in cases where the computer is used for recreational purposes (browsing the web, playing games, etc).
Read full review Trellix (FireEye + McAfee)
It provides great web security and will protect your devices against viruses and malware when paired with other security software and hardware. For instance, we have multiple layers of security set up so if McAfee misses something then one of our other barriers will catch the infection or intrusion before it reaches the network. I would not suggest using this product as a standalone agent because I do not think it will be as effective when working by itself. The dashboard also makes it convenient to manage devices, policies, and settings from wherever you are so it's an ideal solution for any IT department to use. I would just suggest using something else as a backup so your network isn't left vulnerable.
Read full review Pros Encrypts the entire drive and provides a high level of security. In an Active Directory environment, you can set up BitLocker to automatically save keys to AD. As part of Windows, no additional licensing costs. Set up and configuration is relatively easy. Uses TPM module to increase security. Read full review Trellix (FireEye + McAfee)
Provides high fidelity alerting. Allows CSOC analysts to perform forensic triage and alert investigations through containment from a single pane of glass. Provides alert telemetry across on-disk and in-memory attacks. Supports many additional 'bolt-on' modules to provide additional alert context or capabilities. Read full review Cons Encryption is not resumed after being suspended sometimes Sometimes it take a long time to encrypt a disk Encrypting secondary drives can be tricky Read full review Trellix (FireEye + McAfee)
The amount of false detections especially the negative ones needed to be reduced. It requires more optimization. It tends to make the PCs slower. It almost doesn't have the ability to heal. This is very important as we need our sensitive data to be recoverable. It doesn't have any free scanning functionality. Our users using personal machines cannot scan in case of an incident. This could be added like Malwarebytes. Read full review Support Rating I give it a nine because encryption always leaves room for improvement, and it must change as security threats evolve and improve, and having an ever-evolving system is essential.
Read full review Trellix (FireEye + McAfee)
The support of product was very good when we initially implemented the solution. We were getting fats replies and could see the customer approach. After a while the level of support was not following the SLA's and the replies were getting very confusing and late.
Read full review Alternatives Considered BitLocker Drive Encryption solution offering is cheaper than the one that
McAfee offers, it will help you with specific business concerns like "how many encrypted assets do I have?" it's easy to maintain, easy to deploy, and easy to track. It's best suited for companies that are not trying to go far away on the disk encryption matter
Read full review Trellix (FireEye + McAfee)
Unlike Trellix Endpoint Security Symantec Endpoint provides less information about events on the user side. Trellix give an opportunity to see information about virus detection on a user machine as quick as it possible, so we were able to catch the signs of virus propagation early and prevent the spread of damage
Read full review Return on Investment It allowed us to move to whole drive encryption without much effort Integrated in Windows Enterprise, so free With the right recovery key, it is really easy for IT to recover the data, backup or reset the user's password. Read full review Trellix (FireEye + McAfee)
From an auditing standpoint, we can show that our workstations/servers are protected. Even though it cant identify more advanced/targeted malware, it is still good to identify the more obvious malware which occurs daily in my enterprise. Since it can be easily deployed, the products can easily get deployed on all systems in the environment for optimal anti-malware protection. Read full review ScreenShots Trellix Endpoint Security ENS Screenshots