Forescout Platform vs. Trellix Endpoint Security ENS

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Forescout Platform
Score 8.1 out of 10
N/A
Forescout Technologies headquartered in San Jose actively defends the Enterprise of Things by identifying, segmenting and enforcing compliance of every connected thing. Forescout boasts a widely deployed, enterprise-class platform at scale across IT, IoT, and OT managed and unmanaged devices. Forescout arms customers with device intelligence, in order to allow organizations across every industry to classify risk, detect anomalies and quickly remediate cyberthreats without disruption of critical…N/A
Trellix Endpoint Security ENS
Score 8.5 out of 10
N/A
Trellix Endpoint Security (ENS) solutions apply proactive threat intelligence and defenses across the entire attack lifecycle to keep organizations safer and more resilient.N/A
Pricing
Forescout PlatformTrellix Endpoint Security ENS
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Forescout PlatformTrellix Endpoint Security ENS
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
Forescout PlatformTrellix Endpoint Security ENS
Top Pros

No answers on this topic

Top Cons

No answers on this topic

Features
Forescout PlatformTrellix Endpoint Security ENS
Endpoint Security
Comparison of Endpoint Security features of Product A and Product B
Forescout Platform
-
Ratings
Trellix Endpoint Security ENS
8.5
14 Ratings
0% above category average
Anti-Exploit Technology00 Ratings8.812 Ratings
Endpoint Detection and Response (EDR)00 Ratings8.013 Ratings
Centralized Management00 Ratings9.014 Ratings
Hybrid Deployment Support00 Ratings8.18 Ratings
Infection Remediation00 Ratings8.013 Ratings
Vulnerability Management00 Ratings8.311 Ratings
Malware Detection00 Ratings9.014 Ratings
Best Alternatives
Forescout PlatformTrellix Endpoint Security ENS
Small Businesses

No answers on this topic

SentinelOne Singularity
SentinelOne Singularity
Score 9.1 out of 10
Medium-sized Companies
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
Score 8.8 out of 10
SentinelOne Singularity
SentinelOne Singularity
Score 9.1 out of 10
Enterprises
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
Score 8.8 out of 10
BeyondTrust Endpoint Privilege Management
BeyondTrust Endpoint Privilege Management
Score 8.7 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Forescout PlatformTrellix Endpoint Security ENS
Likelihood to Recommend
8.5
(10 ratings)
8.8
(25 ratings)
Support Rating
8.0
(1 ratings)
5.0
(6 ratings)
Ease of integration
-
(0 ratings)
10.0
(1 ratings)
User Testimonials
Forescout PlatformTrellix Endpoint Security ENS
Likelihood to Recommend
Forescout Technologies
I strongly recommend using it in networks where many machines enter, it is essential to have a capture of all ids, mac etc to prevent and detect unauthorized machines.We are in the technological era and there is a lot of technological robotization looking for weak systems to enter.Invest in greater security and that does not happen to you.
Read full review
Trellix (FireEye + McAfee)
It provides great web security and will protect your devices against viruses and malware when paired with other security software and hardware. For instance, we have multiple layers of security set up so if McAfee misses something then one of our other barriers will catch the infection or intrusion before it reaches the network. I would not suggest using this product as a standalone agent because I do not think it will be as effective when working by itself. The dashboard also makes it convenient to manage devices, policies, and settings from wherever you are so it's an ideal solution for any IT department to use. I would just suggest using something else as a backup so your network isn't left vulnerable.
Read full review
Pros
Forescout Technologies
  • Network Access Control does a great job of identifying unmanaged devices on the network and "quarantining" them.
  • The inventory feature of CounterAct is a handy place to see what version of applications are running on which machines on our network.
  • Policies can be very intricate.
Read full review
Trellix (FireEye + McAfee)
  • Provides high fidelity alerting.
  • Allows CSOC analysts to perform forensic triage and alert investigations through containment from a single pane of glass.
  • Provides alert telemetry across on-disk and in-memory attacks.
  • Supports many additional 'bolt-on' modules to provide additional alert context or capabilities.
Read full review
Cons
Forescout Technologies
  • They should have more training for the versions of applications they update.
  • It would be great if the GUI would be more aesthetic in appearance.
  • Nothing else as the application is amazing.
Read full review
Trellix (FireEye + McAfee)
  • The amount of false detections especially the negative ones needed to be reduced.
  • It requires more optimization. It tends to make the PCs slower.
  • It almost doesn't have the ability to heal. This is very important as we need our sensitive data to be recoverable.
  • It doesn't have any free scanning functionality. Our users using personal machines cannot scan in case of an incident. This could be added like Malwarebytes.
Read full review
Support Rating
Forescout Technologies
They are prompt in their response with a complete resolution once they have identified the problem. Other OEM's generally give stop-gap arrangements and then later come with new upgrade versions. This gives downtime tasks to customers often, which isn't appreciated. Given the criticality of this software, their support is prompt.
Read full review
Trellix (FireEye + McAfee)
The support of product was very good when we initially implemented the solution. We were getting fats replies and could see the customer approach. After a while the level of support was not following the SLA's and the replies were getting very confusing and late.
Read full review
Alternatives Considered
Forescout Technologies
Better intergration with patch management tools. Forescount Platfform (CounterAct) is easily compatible with diverse network infrastructure to offer better service and efficiently ensure seamless operations. Its automation capabilities have also enabled us to depend less on the operations teams hence saving time as it's faster and also saving the operational cost of having people around in case of threats.
Read full review
Trellix (FireEye + McAfee)
Unlike Trellix Endpoint Security Symantec Endpoint provides less information about events on the user side. Trellix give an opportunity to see information about virus detection on a user machine as quick as it possible, so we were able to catch the signs of virus propagation early and prevent the spread of damage
Read full review
Return on Investment
Forescout Technologies
  • We've managed to automate our cybersecurity to impressive extents, now the IT security team puts focus on more important things.
  • We've attained successful assets risk mitigation for our clients.
Read full review
Trellix (FireEye + McAfee)
  • From an auditing standpoint, we can show that our workstations/servers are protected.
  • Even though it cant identify more advanced/targeted malware, it is still good to identify the more obvious malware which occurs daily in my enterprise.
  • Since it can be easily deployed, the products can easily get deployed on all systems in the environment for optimal anti-malware protection.
Read full review
ScreenShots

Trellix Endpoint Security ENS Screenshots

Screenshot of The Monitoring workspace presents actionable endpoint threat detection without the noise.Screenshot of Automatically identify the key findings without requiring manual evaluation of each individual artifact.Screenshot of Visualization displays relationships and speeds analyst understanding.Screenshot of AI-guided investigations automatically provide answers to typical questions asked during a security incident and highlight the most relevant evidence.