SolarWinds Threat Monitor vs. Trellix Endpoint Security ENS

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
SolarWinds Threat Monitor
Score 8.4 out of 10
N/A
SolarWinds Threat Monitor empowers MSSPs of all sizes by reducing the complexity and cost of threat detection, response, and reporting. You get an all-in-one security operations center (SOC) that is unified, scalable, and affordable.N/A
Trellix Endpoint Security ENS
Score 8.5 out of 10
N/A
Trellix Endpoint Security (ENS) solutions apply proactive threat intelligence and defenses across the entire attack lifecycle to keep organizations safer and more resilient.N/A
Pricing
SolarWinds Threat MonitorTrellix Endpoint Security ENS
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
SolarWinds Threat MonitorTrellix Endpoint Security ENS
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
SolarWinds Threat MonitorTrellix Endpoint Security ENS
Top Pros

No answers on this topic

Top Cons

No answers on this topic

Features
SolarWinds Threat MonitorTrellix Endpoint Security ENS
Endpoint Security
Comparison of Endpoint Security features of Product A and Product B
SolarWinds Threat Monitor
-
Ratings
Trellix Endpoint Security ENS
8.5
14 Ratings
0% above category average
Anti-Exploit Technology00 Ratings8.812 Ratings
Endpoint Detection and Response (EDR)00 Ratings8.013 Ratings
Centralized Management00 Ratings9.014 Ratings
Hybrid Deployment Support00 Ratings8.18 Ratings
Infection Remediation00 Ratings8.113 Ratings
Vulnerability Management00 Ratings8.211 Ratings
Malware Detection00 Ratings9.014 Ratings
Best Alternatives
SolarWinds Threat MonitorTrellix Endpoint Security ENS
Small Businesses
AlienVault USM
AlienVault USM
Score 8.0 out of 10
SentinelOne Singularity
SentinelOne Singularity
Score 9.1 out of 10
Medium-sized Companies
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
Enterprises
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
BeyondTrust Endpoint Privilege Management
BeyondTrust Endpoint Privilege Management
Score 8.7 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
SolarWinds Threat MonitorTrellix Endpoint Security ENS
Likelihood to Recommend
9.1
(6 ratings)
8.8
(25 ratings)
Support Rating
8.0
(1 ratings)
5.0
(6 ratings)
Ease of integration
-
(0 ratings)
10.0
(1 ratings)
User Testimonials
SolarWinds Threat MonitorTrellix Endpoint Security ENS
Likelihood to Recommend
SolarWinds
Due to the high price that SolarWinds has, I do not recommend it for small companies. And if I recommend SolarWinds in large companies with complex infrastructures where constant monitoring and review of the network is required, this system is very complete and helps everyone in the technology team, both network administrators, database administrators, Security Administrators, and Server Administrators are all very happy with this system.
Read full review
Trellix (FireEye + McAfee)
It provides great web security and will protect your devices against viruses and malware when paired with other security software and hardware. For instance, we have multiple layers of security set up so if McAfee misses something then one of our other barriers will catch the infection or intrusion before it reaches the network. I would not suggest using this product as a standalone agent because I do not think it will be as effective when working by itself. The dashboard also makes it convenient to manage devices, policies, and settings from wherever you are so it's an ideal solution for any IT department to use. I would just suggest using something else as a backup so your network isn't left vulnerable.
Read full review
Pros
SolarWinds
  • monitoring
  • notification systems
  • virus attack monitoring
  • ability to shut down systems when it senses an imminent threat
Read full review
Trellix (FireEye + McAfee)
  • Provides high fidelity alerting.
  • Allows CSOC analysts to perform forensic triage and alert investigations through containment from a single pane of glass.
  • Provides alert telemetry across on-disk and in-memory attacks.
  • Supports many additional 'bolt-on' modules to provide additional alert context or capabilities.
Read full review
Cons
SolarWinds
  • Steep learning curve.
  • Usually takes a bit to get the scans to run easily in a new environment.
  • Could have more reporting options.
Read full review
Trellix (FireEye + McAfee)
  • The amount of false detections especially the negative ones needed to be reduced.
  • It requires more optimization. It tends to make the PCs slower.
  • It almost doesn't have the ability to heal. This is very important as we need our sensitive data to be recoverable.
  • It doesn't have any free scanning functionality. Our users using personal machines cannot scan in case of an incident. This could be added like Malwarebytes.
Read full review
Support Rating
SolarWinds
SolarWinds offers live chat support for all its products built-in. So if you are working on something you can just reach out to someone at that time, and usually get an answer pretty quick. If you are trying to get something done it's a lot better than submitting a ticket and waiting for the email response.
Read full review
Trellix (FireEye + McAfee)
The support of product was very good when we initially implemented the solution. We were getting fats replies and could see the customer approach. After a while the level of support was not following the SLA's and the replies were getting very confusing and late.
Read full review
Alternatives Considered
SolarWinds
Threat Monitor is very new on the scene. Its obviously not at the same level as some of the established vendors yet. We also deploy Alienvault for example and its nowhere near the same level as this, however the cost model between these two products reflects that. Alienvault however does have a physical footprint on the environment, whereas Threat Monitor doesnt. If you have the paitence to wait, Threat Monitor will surely only improve over time.
Read full review
Trellix (FireEye + McAfee)
Unlike Trellix Endpoint Security Symantec Endpoint provides less information about events on the user side. Trellix give an opportunity to see information about virus detection on a user machine as quick as it possible, so we were able to catch the signs of virus propagation early and prevent the spread of damage
Read full review
Return on Investment
SolarWinds
  • The positive impact that this system has on our company is that it has saved us a lot of expenses when it comes to investigating what the bank's network and systems are.
  • This saving translates into administrators' time when it comes to finding the problem quickly, expeditiously, and effectively.
  • It has helped us a lot and we have even required fewer hours from external providers when it comes to solving a problem.
Read full review
Trellix (FireEye + McAfee)
  • From an auditing standpoint, we can show that our workstations/servers are protected.
  • Even though it cant identify more advanced/targeted malware, it is still good to identify the more obvious malware which occurs daily in my enterprise.
  • Since it can be easily deployed, the products can easily get deployed on all systems in the environment for optimal anti-malware protection.
Read full review
ScreenShots

SolarWinds Threat Monitor Screenshots

Screenshot of Threat IntelligenceScreenshot of Event Log CorrelationScreenshot of Event LogScreenshot of AlarmsScreenshot of Log SearchScreenshot of Security Threats

Trellix Endpoint Security ENS Screenshots

Screenshot of The Monitoring workspace presents actionable endpoint threat detection without the noise.Screenshot of Automatically identify the key findings without requiring manual evaluation of each individual artifact.Screenshot of Visualization displays relationships and speeds analyst understanding.Screenshot of AI-guided investigations automatically provide answers to typical questions asked during a security incident and highlight the most relevant evidence.