Proofpoint Email Protection vs. Trellix Endpoint Security ENS

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Proofpoint Email Protection
Score 8.8 out of 10
N/A
Proofpoint Email Protection is available as an on-premise or cloud based solution and blocks unwanted, malicious and impostor emails with granular search capabilities and visibility into all messages. Outbound controls include encryption and data loss prevention, while continuity capabilities ensure business communications can continue as normal in the event of an email outage. With Proofpoint's Email Protection, you can protect your people, data, and brand from today’s threats…N/A
Trellix Endpoint Security ENS
Score 8.1 out of 10
N/A
Trellix Endpoint Security (ENS) solutions apply proactive threat intelligence and defenses across the entire attack lifecycle to keep organizations safer and more resilient.N/A
Pricing
Proofpoint Email ProtectionTrellix Endpoint Security ENS
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Proofpoint Email ProtectionTrellix Endpoint Security ENS
Free Trial
YesNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
Proofpoint Email ProtectionTrellix Endpoint Security ENS
Considered Both Products
Proofpoint Email Protection
Chose Proofpoint Email Protection
In poc, fireye missed things that proofpoint did not, especially in the Phishing department. End of story for us.
Trellix Endpoint Security ENS

No answer on this topic

Top Pros

No answers on this topic

Top Cons

No answers on this topic

Features
Proofpoint Email ProtectionTrellix Endpoint Security ENS
Secure Email Gateway
Comparison of Secure Email Gateway features of Product A and Product B
Proofpoint Email Protection
9.2
78 Ratings
9% above category average
Trellix Endpoint Security ENS
-
Ratings
Anti-malware10.076 Ratings00 Ratings
Customizability10.075 Ratings00 Ratings
Data Loss Protection8.748 Ratings00 Ratings
Threat Detection9.075 Ratings00 Ratings
Sandboxing9.257 Ratings00 Ratings
End-to-End Encryption9.358 Ratings00 Ratings
Management Tools8.074 Ratings00 Ratings
Endpoint Security
Comparison of Endpoint Security features of Product A and Product B
Proofpoint Email Protection
-
Ratings
Trellix Endpoint Security ENS
8.5
14 Ratings
0% below category average
Anti-Exploit Technology00 Ratings8.812 Ratings
Endpoint Detection and Response (EDR)00 Ratings8.013 Ratings
Centralized Management00 Ratings9.014 Ratings
Hybrid Deployment Support00 Ratings8.28 Ratings
Infection Remediation00 Ratings8.013 Ratings
Vulnerability Management00 Ratings8.311 Ratings
Malware Detection00 Ratings9.014 Ratings
Best Alternatives
Proofpoint Email ProtectionTrellix Endpoint Security ENS
Small Businesses
Barracuda Essentials
Barracuda Essentials
Score 9.2 out of 10
SentinelOne Singularity
SentinelOne Singularity
Score 9.1 out of 10
Medium-sized Companies
Barracuda Essentials
Barracuda Essentials
Score 9.2 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
Enterprises
Cisco Cloud Email Security
Cisco Cloud Email Security
Score 7.8 out of 10
BeyondTrust Endpoint Privilege Management
BeyondTrust Endpoint Privilege Management
Score 8.7 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Proofpoint Email ProtectionTrellix Endpoint Security ENS
Likelihood to Recommend
8.9
(95 ratings)
8.8
(25 ratings)
Usability
8.3
(2 ratings)
-
(0 ratings)
Availability
9.1
(1 ratings)
-
(0 ratings)
Performance
8.2
(1 ratings)
-
(0 ratings)
Support Rating
8.3
(5 ratings)
5.0
(6 ratings)
Ease of integration
-
(0 ratings)
10.0
(1 ratings)
Product Scalability
8.2
(1 ratings)
-
(0 ratings)
User Testimonials
Proofpoint Email ProtectionTrellix Endpoint Security ENS
Likelihood to Recommend
Proofpoint
Well suited: Proofpoint does a pretty good job at protecting us from spam emails. I was able to block a lot of emails coming from SendGrid by blocking SendGrid emails with a custom spam filter. However, SendGrid has a lot of legit emails too so I was able to create another rule to allow those emails from certain people, then block the rest. That way business need was met but spam emails are blocked. Less Appropriate If you are trying to monitor internal to internal emails Proofpoint is probably a little over featured for that.
Read full review
Trellix (FireEye + McAfee)
It provides great web security and will protect your devices against viruses and malware when paired with other security software and hardware. For instance, we have multiple layers of security set up so if McAfee misses something then one of our other barriers will catch the infection or intrusion before it reaches the network. I would not suggest using this product as a standalone agent because I do not think it will be as effective when working by itself. The dashboard also makes it convenient to manage devices, policies, and settings from wherever you are so it's an ideal solution for any IT department to use. I would just suggest using something else as a backup so your network isn't left vulnerable.
Read full review
Pros
Proofpoint
  • Spam - catches these emails before hitting the inbox.
  • Daily digest - provides users with a list of the emails that were blocked and allows them to choose to release them if they are legitimate emails.
  • Ensures that emails coming into our organization is safe for our users and verifies the email is coming from stated senders email server.
Read full review
Trellix (FireEye + McAfee)
  • Provides high fidelity alerting.
  • Allows CSOC analysts to perform forensic triage and alert investigations through containment from a single pane of glass.
  • Provides alert telemetry across on-disk and in-memory attacks.
  • Supports many additional 'bolt-on' modules to provide additional alert context or capabilities.
Read full review
Cons
Proofpoint
  • Proofpoint could offer more frequent training opportunities to customers at all levels of expertise.
  • Proofpoint can always continue to strive to keep its product a leader in the industry.
  • Proofpoint's support site could be overhauled to provide a more logical flow.
Read full review
Trellix (FireEye + McAfee)
  • The amount of false detections especially the negative ones needed to be reduced.
  • It requires more optimization. It tends to make the PCs slower.
  • It almost doesn't have the ability to heal. This is very important as we need our sensitive data to be recoverable.
  • It doesn't have any free scanning functionality. Our users using personal machines cannot scan in case of an incident. This could be added like Malwarebytes.
Read full review
Usability
Proofpoint
Very robust and solid product in protecting our emails. The engineers who assisted with our implementation was very knowledgable and great to work with. Easy to use by end-users. Administration and management are also easy for IT. Great dashboard and reporting tools for business reviews.
Read full review
Trellix (FireEye + McAfee)
No answers on this topic
Reliability and Availability
Proofpoint
There were no appliance errors or unplanned outages during five years of operation.
Read full review
Trellix (FireEye + McAfee)
No answers on this topic
Performance
Proofpoint
Most important thing is the performance of processing mails. Even in a complex environment the system keeps performing on a very high Level.
Read full review
Trellix (FireEye + McAfee)
No answers on this topic
Support Rating
Proofpoint
We use ProofPoint support quite often to fix issues and assist with setting up features and rules. Each time we have created a ticket, they have been very helpful and respectful. Each ticket has been treated with the appropriate SLA time and attention. We also enjoy the regular check-ins from the engineers when tickets are open but we get busy with other tasks.
Read full review
Trellix (FireEye + McAfee)
The support of product was very good when we initially implemented the solution. We were getting fats replies and could see the customer approach. After a while the level of support was not following the SLA's and the replies were getting very confusing and late.
Read full review
Alternatives Considered
Proofpoint
We previously used halon anti-spam, which lasted us well until our organization really started to grow and it was not able to keep up with the amount of mail we were receiving. The support is also nothing compared to Proofpoint's professional services offering. Halon was also not able to have the complex rules that Proofpoint can offer.
Read full review
Trellix (FireEye + McAfee)
Unlike Trellix Endpoint Security Symantec Endpoint provides less information about events on the user side. Trellix give an opportunity to see information about virus detection on a user machine as quick as it possible, so we were able to catch the signs of virus propagation early and prevent the spread of damage
Read full review
Scalability
Proofpoint
You can add a lot of agents to your environment if you need them. And you can operate hardware appliances and virtual appliances in the same cluster.
Read full review
Trellix (FireEye + McAfee)
No answers on this topic
Return on Investment
Proofpoint
  • Having easy-to-reach backups of all employee emails has made Proofpoint worth it by itself. That plus the countless times that spam/malicious emails did not make it through to the intended person that could have potentially cost the organization a lot of money.
Read full review
Trellix (FireEye + McAfee)
  • From an auditing standpoint, we can show that our workstations/servers are protected.
  • Even though it cant identify more advanced/targeted malware, it is still good to identify the more obvious malware which occurs daily in my enterprise.
  • Since it can be easily deployed, the products can easily get deployed on all systems in the environment for optimal anti-malware protection.
Read full review
ScreenShots

Trellix Endpoint Security ENS Screenshots

Screenshot of The Monitoring workspace presents actionable endpoint threat detection without the noise.Screenshot of Automatically identify the key findings without requiring manual evaluation of each individual artifact.Screenshot of Visualization displays relationships and speeds analyst understanding.Screenshot of AI-guided investigations automatically provide answers to typical questions asked during a security incident and highlight the most relevant evidence.