Intruder vs. Trellix ePolicy Orchestrator

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Intruder
Score 8.7 out of 10
N/A
Intruder, from Intruder Systems in London, is a cloud-based vulnerability scanner that finds cyber security weaknesses in digital infrastructure, to avoid costly data breaches.
$127
per month 1 infrastructure target
Trellix ePolicy Orchestrator
Score 7.2 out of 10
N/A
Trellix ePolicy Orchestrator (formerly McAfee ePolicy Orchestrator) software centralizes and streamlines management of endpoint, network, data security, and compliance solutions.N/A
Pricing
IntruderTrellix ePolicy Orchestrator
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
IntruderTrellix ePolicy Orchestrator
Free Trial
YesNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
YesNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
IntruderTrellix ePolicy Orchestrator
Top Pros

No answers on this topic

Top Cons

No answers on this topic

Features
IntruderTrellix ePolicy Orchestrator
Threat Intelligence
Comparison of Threat Intelligence features of Product A and Product B
Intruder
-
Ratings
Trellix ePolicy Orchestrator
6.6
1 Ratings
19% below category average
Network Analytics00 Ratings5.01 Ratings
Threat Recognition00 Ratings6.01 Ratings
Vulnerability Classification00 Ratings7.01 Ratings
Automated Alerts and Reporting00 Ratings7.01 Ratings
Threat Analysis00 Ratings8.01 Ratings
Threat Intelligence Reporting00 Ratings7.01 Ratings
Automated Threat Identification00 Ratings6.01 Ratings
Vulnerability Management Tools
Comparison of Vulnerability Management Tools features of Product A and Product B
Intruder
-
Ratings
Trellix ePolicy Orchestrator
6.0
1 Ratings
31% below category average
IT Asset Realization00 Ratings7.01 Ratings
Authentication00 Ratings5.01 Ratings
Configuration Monitoring00 Ratings6.01 Ratings
Web Scanning00 Ratings6.01 Ratings
Vulnerability Intelligence00 Ratings6.01 Ratings
Best Alternatives
IntruderTrellix ePolicy Orchestrator
Small Businesses
ThreatDown, powered by Malwarebytes
ThreatDown, powered by Malwarebytes
Score 8.7 out of 10
ThreatDown, powered by Malwarebytes
ThreatDown, powered by Malwarebytes
Score 8.7 out of 10
Medium-sized Companies
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
Enterprises
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
IntruderTrellix ePolicy Orchestrator
Likelihood to Recommend
9.0
(1 ratings)
7.0
(14 ratings)
Support Rating
-
(0 ratings)
8.2
(4 ratings)
User Testimonials
IntruderTrellix ePolicy Orchestrator
Likelihood to Recommend
Intruder Systems
When the infrastructure landscape and risk profile is not well known and is legacy, Intruder can scan and automate reporting on open security risks, as well as coordinate responses.
Read full review
Trellix (FireEye + McAfee)
[McAfee ePolicy Orchestrator] seems to be better suited to large enterprise applications... I don't feel it really suits the or self-managed SMB market. The general joe is not going to understand how to wield this product to it's full potential. For those of us managing large networks, this is a very ideal product for managing multiple sites and users.
Read full review
Pros
Intruder Systems
  • Auto scanning.
  • New vulnerability detection.
  • Alert levels.
Read full review
Trellix (FireEye + McAfee)
  • Static malware scans for known bad processes and files works well and can be schedules on endpoints easily
  • Preventing users from accessing USB drives and other peripherals is easily configured. We can also allow users to access to USB drives with user codes for the times they need it for business reasons.
  • ePO provides access into our MSME software so that we're not managing many different products from different locations.
  • In recent years the console has gotten much easier to navigate even though there is a ton of information to be accessed.
Read full review
Cons
Intruder Systems
  • Reports could contain more detail.
Read full review
Trellix (FireEye + McAfee)
  • It has a slow mechanism when adding custom threat feeds. For example, if McAfee didn't have a signature or detection about a new virus and we try to add it to our console it is like a really big process in adding that to our available signatures.
  • Whenever a scan is performed, the system CPU utilization goes up 100 percent.
  • Installation fails due to difference in timestamp when we try to shuffle between packages.
Read full review
Support Rating
Intruder Systems
No answers on this topic
Trellix (FireEye + McAfee)
McAfee support is definitely GREAT! It is one of the best technical support on a business level. GOLD support is recommended to business. Their website is easy and quick to create a ticket. Their technical team usually responds right away with an email or call. Via call and web they provide a full and complete support until the issue is resolved. The best, most of the time they explain in detail what is the issue, the reason and how to resolve it.
Read full review
Alternatives Considered
Intruder Systems
Intruder focuses on scanning network blocks for your servers even if you don't know which services or hostnames are running on them, unlike Detectify which requires a domain or hostname to scan. The network port scanning of Intruder is also broader than many competitors.
Read full review
Trellix (FireEye + McAfee)
I have used Symantec Endpoint Encryption before. Symantec and EPO are both good in their own ways. EPO allows integration of other McAfee products. I have been using ePolicy Orchestrator for years. I have a lot of experience with the product. That is why I like it.
Read full review
Return on Investment
Intruder Systems
  • Improved security profile.
  • Better reporting to stakeholders and clients of the current security risks.
Read full review
Trellix (FireEye + McAfee)
  • Peace of mind that your environment is safe and secure.
  • Keep your network environment up and running.
  • Additional resources (consulting or training) may be required if not familiar with the product.
  • Very complex to setup and configure ( training may be required).
  • Once configured, it will take care of almost 80% of your tasks.
Read full review
ScreenShots

Intruder Screenshots

Screenshot of The Intruder dashboardScreenshot of Cloud connectorsScreenshot of Network viewScreenshot of Issues pageScreenshot of Targets page