Skip to main content
TrustRadius
Trellix Helix

Trellix Helix
Formerly FireEye Helix

Overview

What is Trellix Helix?

Trellix Helix (formerly FireEye Helix) is a SIEM solution providing a non-malware threat detection solution.

Read more
Recent Reviews

TrustRadius Insights

FireEye Helix has been praised by users for its ease of use and user-friendly interface. It simplifies the management of security …
Continue reading
Read all reviews
Return to navigation

Pricing

View all pricing

Helix Console

$0

Cloud
Events per second

Helix Enterprise

$0

Cloud
Events per second

Entry-level set up fee?

  • Setup fee optional

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services
Return to navigation

Product Details

What is Trellix Helix?

Trellix Helix (formerly FireEye Helix) is a cloud-hosted security operations platform that allows organizations to take control of any incident from alert to fix. Trellix Helix integrates disparate security tools and augments them with advanced SIEM, Orchestration, and threat intelligence capabilities to capture the untapped potential of security investments.

Trellix Helix Features

Security Information and Event Management (SIEM) Features

  • Supported: Centralized event and log data collection
  • Supported: Correlation
  • Supported: Event and log normalization/management
  • Supported: Deployment flexibility
  • Supported: Integration with Identity and Access Management Tools
  • Supported: Custom dashboards and workspaces
  • Supported: Host and network-based intrusion detection

Additional Features

  • Supported: Security Information and Event Management (SIEM) Improve threat and vulnerability detection with managed and curated detection rules
  • Supported: User and Entity Behavior Analytics (UEBA) Detect insider threats and advanced attacks with machine learning driven analytics
  • Supported: Security Analytics Surface answers from your data with next generation security analytics
  • Supported: Security Orchestration, Automation, and Response (SOAR) Automate response with pre-built playbooks created by frontline practitioners

Trellix Helix Screenshots

Screenshot of Helix Cloud IntegrationsScreenshot of Helix Asset Alert Correlation

Trellix Helix Videos

To protect against advanced threats, organizations need to integrate their security and apply the right expertise and processes. FireEye Helix is a cloud-hosted security operations platform that allows organizations to take control of any incident from alert to fix.
Axway Software, an API-software developer utilizes FireEye to reinvigorate its security operations.

Trellix Helix Integrations

Trellix Helix Competitors

Trellix Helix Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationNo
Supported CountriesWorldwide
Supported LanguagesEnglish

Trellix Helix Downloadables

Frequently Asked Questions

Trellix Helix (formerly FireEye Helix) is a SIEM solution providing a non-malware threat detection solution.

IBM Security QRadar SIEM, IBM Security QRadar SOAR, and IBM i2 Analyze are common alternatives for Trellix Helix.

Reviewers rate Host and network-based intrusion detection highest, with a score of 9.

The most common users of Trellix Helix are from Enterprises (1,001+ employees).

Trellix Helix Customer Size Distribution

Consumers0%
Small Businesses (1-50 employees)0%
Mid-Size Companies (51-500 employees)10%
Enterprises (more than 500 employees)90%
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(6)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

FireEye Helix has been praised by users for its ease of use and user-friendly interface. It simplifies the management of security operations by consolidating security events and alerts into a single view, allowing users to easily monitor and manage security events. With its customizable dashboard, FireEye Helix helps in prioritizing real threats and critical alerts, thereby improving cybersecurity.

One of the key use cases of FireEye Helix is its ability to automate routine security tasks and workflows, enabling faster response times and more efficient use of security resources. This is valuable for organizations with limited resources as it eliminates the need for manual intervention and streamlines the security operations process. Additionally, FireEye Helix serves as a log aggregator, providing a centralized dashboard to consolidate security logs and correlate them for global businesses.

Users have also found value in FireEye Helix as a SIEM - Security Information and Event Management solution. It assists in the management of security events and conducts behavioral analysis to detect potential threats. The product enhances collaboration among work teams, allowing tasks to be completed faster and more accurately. Furthermore, FireEye Helix integrates existing security tools with its next-generation SIEM, bolstering organizational threat intelligence capabilities.

Another notable use case for FireEye Helix is compliance reporting. The product offers features that support compliance efforts by providing comprehensive reports on security events, helping organizations meet regulatory requirements. Furthermore, FireEye Helix leverages User and Entity Behavior Analytics - UEBA to identify anomalous behavior and potential insider threats.

Lastly, FireEye Helix empowers organizations to maintain total control over their SaaS - Software-as-a-Service security operations. It particularly excels in managing attacks targeting digital assets trading platforms, ensuring the security of these critical assets.

Overall, FireEye Helix provides valuable solutions across various areas of cybersecurity management, from automating routine tasks to enhancing threat intelligence capabilities and facilitating compliance reporting. Its user-friendly interface and excellent technical support have been appreciated by users, making it a reliable choice for managing security operations.

Easy Deployment: Many users have mentioned that the deployment of FireEye Helix is easy and can be easily adopted in their environment. They found the integration to be uncomplicated and straightforward, making it a hassle-free process.

Detailed Information on Attacks: Reviewers appreciate that FireEye Helix provides detailed information on attacks. This allows analysts to see all the necessary information about threats, enabling them to take appropriate actions.

Excellent Technical Support: Customers are highly satisfied with the technical support provided by FireEye. They consider it to be the best in terms of expertise and assistance. The prompt and helpful support from the team enhances their overall experience with the product.

Slow Triage: Several users have expressed frustration with the slow triage process in FireEye Helix, stating that it hinders their ability to respond promptly and effectively to security incidents. This issue has been mentioned by multiple reviewers, highlighting a need for improved efficiency.

Expensive Cost: The cost of implementing FireEye Helix is relatively high compared to other security solutions available in the market, making it less accessible for smaller organizations with limited budgets. Some users have voiced concerns about the affordability of FireEye Helix, emphasizing the need for more cost-effective options.

False Positives: Users have reported instances of false positives being generated during the initial stage in FireEye Helix. These inaccurate alerts can lead to wasted time and resources as users investigate non-existent threats. Multiple reviewers have highlighted this issue, indicating the importance of enhancing detection accuracy.

Attribute Ratings

Reviews

(1-4 of 4)
Companies can't remove reviews or game the system. Here's why
Shirleen Muraya | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Helped in collaboration with work teams to complete tasks faster, accurately, and easily. We are able to utilize this to enhance our organizational threat intelligence capabilities through the integration of our existing security tools with the next-generation SIEM. Helps in the management of our security events and in conducting behavioral analysis.
  • Detection of advanced threats.
  • Easy integration with cloud resources and our existing security tools thus enhancing performance.
  • Easy deployment with great threats intelligence capabilities.
  • Integration of SOAR with multiple vendors can be quite challenging.
  • You have to login differently to it's multiple tools hence can be confusing.
  • The cost can be quite high.
Great for organizations that are considering improving their operational security by utilizing their threats intelligence capabilities. It offers a great collection and analysis of security events and provides solutions to solve them. When considering a solution that is secure and can provide very extensive visualization of your environment for threats.
Security Information and Event Management (SIEM) (7)
97.14285714285714%
9.7
Centralized event and log data collection
100%
10.0
Correlation
100%
10.0
Event and log normalization/management
90%
9.0
Deployment flexibility
100%
10.0
Integration with Identity and Access Management Tools
100%
10.0
Custom dashboards and workspaces
90%
9.0
Host and network-based intrusion detection
100%
10.0
  • Optimization of your security investments.
  • Operations are seamless and better with easy integrations that enhance performance.
  • Efficiency in running of incidences with enhanced case management for all its alerts.
It offers extensive visibility thus easy detection of threats and easy mitigation practices. Utilization of its threats intelligence capabilities thus early detection of incidents and maximization of security investments. Offers great integration of cloud resources with existing security tools thus ensuring seamless performance and all-time security for the organizational resources.
Integration with our already existing security tools was quite easy as we were able to customize its dashboards to fit our organizational needs and also the fact that it uses standard industry protocols makes it easy to set up. And the cloud configuration also didn't take much time and thus within no time things were up and flowing.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We've used FireEye Helix to beef up our cybersecurity by helping us put priority on the 'real' threats and critical alerts. We employ FireEye Helix services in compliance reporting and User and Entity Behavior Analytics. Our websites offer a centralized digital assets trading platform for our customers and therefore attacks targeted on our sites attempt to mimic our staff for backdoor access and compromise the assets. With FireEye Helix, we have total control of our SaaS security operations.
  • It's easy to analyze the Helix detect datasheet
  • It's possible to automate both alert volumes and false positives.
  • It may be overburdened by multi-vector attacks and must be used alongside deception software.
  • Has limited API integrations.
The UI displays wells the deviations and anomalies using advanced threat intelligence so you have full control of your security ecosystem. We've used it for two years to secure our servers and we easily customize threat detections to reduce the stressful false positives. We fill the XDR AI with data and it correlates with incident data to deliver unmatched frontline security intelligence.
Security Information and Event Management (SIEM) (7)
72.85714285714286%
7.3
Centralized event and log data collection
70%
7.0
Correlation
60%
6.0
Event and log normalization/management
80%
8.0
Deployment flexibility
70%
7.0
Integration with Identity and Access Management Tools
80%
8.0
Custom dashboards and workspaces
70%
7.0
Host and network-based intrusion detection
80%
8.0
  • Use and Entity Behavior Analytics have been crucial in detecting unauthorized users trying to gain backdoor access.
  • We use it to consolidate all PCI compliance reports.
Integration was swift, specifically with Netskope. It's easy to ingest data from Netskope into FireEye to identify and block threats. Importing data from Netskope has enabled us to share malicious IPs and URLs to analyze all IOCs.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
FireEye Helix is our organization's system for managing all security events and conducting behavioral analysis. We have deployed FireEye agents to all desktops, laptops, and servers that report into FireEye Helix. We also have a series of taps and other systems reporting into FireEye Helix and the associated SOC service. This gives us one place to review all security information and take the needed actions.
  • Single location for all security event management
  • Detect advanced threats
  • Provide audit artifacts to ensure compliance
  • Overly complex platform
  • Multiple logins needed for various tools--leads to confusion
  • Costs can add up
Overall, we've had a great experience with FireEye Helix and would recommend it to organizations looking to improve their operational security. We've found Helix to be a great way to collect and analyze revenant security events and take action. Having a single pane of glass makes this process much more efficient. Prior to moving to FireEye Helix, we had different teams sending data to different applications, which resulted in confusion and critical data being missed.
Security Information and Event Management (SIEM) (7)
85.71428571428571%
8.6
Centralized event and log data collection
90%
9.0
Correlation
90%
9.0
Event and log normalization/management
90%
9.0
Deployment flexibility
70%
7.0
Integration with Identity and Access Management Tools
70%
7.0
Custom dashboards and workspaces
90%
9.0
Host and network-based intrusion detection
100%
10.0
  • Reduce manual intervention for most events
  • Single tool containing all security information--much more efficient than checking multiple tools
  • Overall a boost to our security operation--positive ROI
We found FireEye Helix to outperform all other tools we reviewed. SecureWorks had a great marketing plan but once we drilled into the technical details, the platform wasn't able to keep up.
FireEye Helix was fairly easy to integrate with our existing systems. It uses standard industry protocols (syslog for logging, https for management access), which allowed us to quickly set up the various integrations and get information flowing.
We did purchase premium support; given the critical role this plays in our environment, we felt it was required.
No
FireEye provided exceptional support when we had a runaway process from the FireEye Agents eating up CPU on our servers. They were able to identify the source and provide a quick fix within a day.
We've been fairly happy with FireEye Helix support overall. Most issues are resolved the same day the case is opened.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Helix is used as a log aggregator to support global business. It is the SIEM within the environment.
  • Single pane of glass for all alerts.
  • Great at consolidating threat intelligence, alerts, and metadata all in a single platform.
  • The ability to pivot directly from Helix to endpoint (HX) EDR, Email, etc. is a big blessing.
  • Additional integration points (API cloud integrations).
Very impressed with the solution. I would recommend it to any organization. Even if they have a SIEM in place, the Helix solution could be another area of telemetry.
Security Information and Event Management (SIEM) (7)
98.57142857142858%
9.9
Centralized event and log data collection
100%
10.0
Correlation
100%
10.0
Event and log normalization/management
100%
10.0
Deployment flexibility
100%
10.0
Integration with Identity and Access Management Tools
90%
9.0
Custom dashboards and workspaces
100%
10.0
Host and network-based intrusion detection
100%
10.0
  • Helix has had a significant impact on CSOC visibility efforts across the organization.
  • Helix fills the logging and alerting gaps that are missing across the infrastructure side.
  • Having a single pane of glass allows teams to more efficiently run incidents. Additionally, Helix is integrated with ServiceNow providing enhanced and efficient case management for all Helix alerts.
I find Helix to be super-efficient and able to cut through the noise. Previous installations of LogRhythm and Splunk resulting in an overwhelming amount of noise (out of the gate), and we had to constantly tune out false positives. Helix is different. Out of the gate, Helix provided higher fidelity hits, and our teams don't spend half their day turning out the noise.
Helix integration isn't too difficult. The Cloud version of Helix can be stood up in an afternoon. Cloud integrations can be configured over the course of a week or two as well.
Return to navigation