Microsoft Defender for Cloud vs. Trellix ePolicy Orchestrator

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Microsoft Defender for Cloud
Score 8.5 out of 10
N/A
Microsoft Defender for Cloud is a Cloud Security Posture Management (CSPM) and Cloud Workload Protection Platform (CWPP) for Azure, on-premises, and multicloud (Amazon AWS and Google GCP) resources.N/A
Trellix ePolicy Orchestrator
Score 7.2 out of 10
N/A
Trellix ePolicy Orchestrator (formerly McAfee ePolicy Orchestrator) software centralizes and streamlines management of endpoint, network, data security, and compliance solutions.N/A
Pricing
Microsoft Defender for CloudTrellix ePolicy Orchestrator
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Microsoft Defender for CloudTrellix ePolicy Orchestrator
Free Trial
YesNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details——
More Pricing Information
Features
Microsoft Defender for CloudTrellix ePolicy Orchestrator
Threat Intelligence
Comparison of Threat Intelligence features of Product A and Product B
Microsoft Defender for Cloud
-
Ratings
Trellix ePolicy Orchestrator
6.6
1 Ratings
19% below category average
Network Analytics00 Ratings5.01 Ratings
Threat Recognition00 Ratings6.01 Ratings
Vulnerability Classification00 Ratings7.01 Ratings
Automated Alerts and Reporting00 Ratings7.01 Ratings
Threat Analysis00 Ratings8.01 Ratings
Threat Intelligence Reporting00 Ratings7.01 Ratings
Automated Threat Identification00 Ratings6.01 Ratings
Vulnerability Management Tools
Comparison of Vulnerability Management Tools features of Product A and Product B
Microsoft Defender for Cloud
-
Ratings
Trellix ePolicy Orchestrator
6.0
1 Ratings
31% below category average
IT Asset Realization00 Ratings7.01 Ratings
Authentication00 Ratings5.01 Ratings
Configuration Monitoring00 Ratings6.01 Ratings
Web Scanning00 Ratings6.01 Ratings
Vulnerability Intelligence00 Ratings6.01 Ratings
Best Alternatives
Microsoft Defender for CloudTrellix ePolicy Orchestrator
Small Businesses

No answers on this topic

ThreatDown, powered by Malwarebytes
ThreatDown, powered by Malwarebytes
Score 8.7 out of 10
Medium-sized Companies
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
Enterprises
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Microsoft Defender for CloudTrellix ePolicy Orchestrator
Likelihood to Recommend
8.4
(31 ratings)
7.0
(14 ratings)
Support Rating
-
(0 ratings)
8.2
(4 ratings)
User Testimonials
Microsoft Defender for CloudTrellix ePolicy Orchestrator
Likelihood to Recommend
Microsoft
Microsoft Defender is very good while we are enhancing our organization's security, and it is very useful in getting threat alerts and vulnerabilities that can harm our system and users. It is recommended to use this to improve overall security and threat protection of our users and organization. With the help of Microsoft Defender, we get fully covered and secured.
Read full review
Trellix (FireEye + McAfee)
[McAfee ePolicy Orchestrator] seems to be better suited to large enterprise applications... I don't feel it really suits the or self-managed SMB market. The general joe is not going to understand how to wield this product to it's full potential. For those of us managing large networks, this is a very ideal product for managing multiple sites and users.
Read full review
Pros
Microsoft
  • detect and respond to security threats in the cloud environment, reducing the risk of data breaches and unauthorized access.
  • The product assists our organization dealing with sensitive data in achieving and maintaining compliance with data protection rules.
  • The product provides real-time visibility into the cloud environment, offering insights into ongoing security activities.
  • It guarantees that security teams can actively handle possible threats by delivering real-time monitoring and notifications, reducing the impact on business operations.
Read full review
Trellix (FireEye + McAfee)
  • Static malware scans for known bad processes and files works well and can be schedules on endpoints easily
  • Preventing users from accessing USB drives and other peripherals is easily configured. We can also allow users to access to USB drives with user codes for the times they need it for business reasons.
  • ePO provides access into our MSME software so that we're not managing many different products from different locations.
  • In recent years the console has gotten much easier to navigate even though there is a ton of information to be accessed.
Read full review
Cons
Microsoft
  • 'Regulatory Compliance' is definitely an area of improvement for MDC. The complex and high number of controls within a specific framework should allow a more helpful and detailed guidelines in order to tackle them.
  • The limitation of options in the incident management menu of MDC has proven to be a hassle while managing security alerts. For example, an analyst cannot even provide a comment about the actions taken on an incident.
  • There is a missing functionality of connecting other EDR or XDR solutions to MDC which I think should be there for a CSPM tool.
Read full review
Trellix (FireEye + McAfee)
  • It has a slow mechanism when adding custom threat feeds. For example, if McAfee didn't have a signature or detection about a new virus and we try to add it to our console it is like a really big process in adding that to our available signatures.
  • Whenever a scan is performed, the system CPU utilization goes up 100 percent.
  • Installation fails due to difference in timestamp when we try to shuffle between packages.
Read full review
Support Rating
Microsoft
No answers on this topic
Trellix (FireEye + McAfee)
McAfee support is definitely GREAT! It is one of the best technical support on a business level. GOLD support is recommended to business. Their website is easy and quick to create a ticket. Their technical team usually responds right away with an email or call. Via call and web they provide a full and complete support until the issue is resolved. The best, most of the time they explain in detail what is the issue, the reason and how to resolve it.
Read full review
Alternatives Considered
Microsoft
Defender for Cloud (previously known as Azure Security Center) is a more comprehensive and extensive security solution. Currently, threat analytics make up only a small portion of the whole picture. It encourages a comprehensive picture of the cloud environment across all of its endpoints. For example, firewalls, virtual machine coverage, etc. When compared to the former Threat Analytics, the attack surface of Defender for Cloud is vastly expanded.
Read full review
Trellix (FireEye + McAfee)
I have used Symantec Endpoint Encryption before. Symantec and EPO are both good in their own ways. EPO allows integration of other McAfee products. I have been using ePolicy Orchestrator for years. I have a lot of experience with the product. That is why I like it.
Read full review
Return on Investment
Microsoft
  • It creates a great insight in all assets that are available
  • The CSPM makes sure that certain risk that might have been missed are addressed
  • Being able to query across the data gives great insights in threats and possible vulernabilties for CVEs
Read full review
Trellix (FireEye + McAfee)
  • Peace of mind that your environment is safe and secure.
  • Keep your network environment up and running.
  • Additional resources (consulting or training) may be required if not familiar with the product.
  • Very complex to setup and configure ( training may be required).
  • Once configured, it will take care of almost 80% of your tasks.
Read full review
ScreenShots

Microsoft Defender for Cloud Screenshots

Screenshot of Remediation of critical issues in codeScreenshot of Cloud security benchmark mapped to industry FramworksScreenshot of Prioritization of critical risks with contextual threat analysisScreenshot of Workload protectionScreenshot of Unified DevOps VisibilityScreenshot of Visualizations to improve security posture proactively