Trellix Endpoint Security (ENS) solutions apply proactive threat intelligence and defenses across the entire attack lifecycle to keep organizations safer and more resilient.
N/A
Trellix Helix
Score 7.1 out of 10
Enterprise companies (1,001+ employees)
Trellix Helix (formerly FireEye Helix) is a SIEM solution providing a non-malware threat detection solution.
$0
Events per second
Pricing
Trellix Endpoint Security ENS
Trellix Helix
Editions & Modules
No answers on this topic
Helix Console
$0
Events per second
Helix Enterprise
$0
Events per second
Offerings
Pricing Offerings
Trellix Endpoint Security ENS
Trellix Helix
Free Trial
No
No
Free/Freemium Version
No
No
Premium Consulting/Integration Services
No
Yes
Entry-level Setup Fee
No setup fee
Optional
Additional Details
—
—
More Pricing Information
Features
Trellix Endpoint Security ENS
Trellix Helix
Endpoint Security
Comparison of Endpoint Security features of Product A and Product B
Trellix Endpoint Security ENS
8.3
15 Ratings
3% below category average
Trellix Helix
-
Ratings
Anti-Exploit Technology
8.013 Ratings
00 Ratings
Endpoint Detection and Response (EDR)
8.014 Ratings
00 Ratings
Centralized Management
9.015 Ratings
00 Ratings
Hybrid Deployment Support
7.98 Ratings
00 Ratings
Infection Remediation
8.014 Ratings
00 Ratings
Vulnerability Management
8.012 Ratings
00 Ratings
Malware Detection
9.015 Ratings
00 Ratings
Security Information and Event Management (SIEM)
Comparison of Security Information and Event Management (SIEM) features of Product A and Product B
Trellix Endpoint Security ENS
-
Ratings
Trellix Helix
9.6
3 Ratings
20% above category average
Centralized event and log data collection
00 Ratings
9.93 Ratings
Correlation
00 Ratings
9.93 Ratings
Event and log normalization/management
00 Ratings
9.03 Ratings
Deployment flexibility
00 Ratings
9.73 Ratings
Integration with Identity and Access Management Tools
It provides great web security and will protect your devices against viruses and malware when paired with other security software and hardware. For instance, we have multiple layers of security set up so if McAfee misses something then one of our other barriers will catch the infection or intrusion before it reaches the network. I would not suggest using this product as a standalone agent because I do not think it will be as effective when working by itself. The dashboard also makes it convenient to manage devices, policies, and settings from wherever you are so it's an ideal solution for any IT department to use. I would just suggest using something else as a backup so your network isn't left vulnerable.
Great for organizations that are considering improving their operational security by utilizing their threats intelligence capabilities. It offers a great collection and analysis of security events and provides solutions to solve them. When considering a solution that is secure and can provide very extensive visualization of your environment for threats.
The amount of false detections especially the negative ones needed to be reduced.
It requires more optimization. It tends to make the PCs slower.
It almost doesn't have the ability to heal. This is very important as we need our sensitive data to be recoverable.
It doesn't have any free scanning functionality. Our users using personal machines cannot scan in case of an incident. This could be added like Malwarebytes.
The support of product was very good when we initially implemented the solution. We were getting fats replies and could see the customer approach. After a while the level of support was not following the SLA's and the replies were getting very confusing and late.
Unlike Trellix Endpoint Security Symantec Endpoint provides less information about events on the user side. Trellix give an opportunity to see information about virus detection on a user machine as quick as it possible, so we were able to catch the signs of virus propagation early and prevent the spread of damage
It offers extensive visibility thus easy detection of threats and easy mitigation practices. Utilization of its threats intelligence capabilities thus early detection of incidents and maximization of security investments. Offers great integration of cloud resources with existing security tools thus ensuring seamless performance and all-time security for the organizational resources.
From an auditing standpoint, we can show that our workstations/servers are protected.
Even though it cant identify more advanced/targeted malware, it is still good to identify the more obvious malware which occurs daily in my enterprise.
Since it can be easily deployed, the products can easily get deployed on all systems in the environment for optimal anti-malware protection.