Skip to main content
TrustRadius
Trellix Endpoint Security ENS

Trellix Endpoint Security ENS
Formerly FireEye +McAfee Endpoint Security

Overview

What is Trellix Endpoint Security ENS?

Trellix Endpoint Security (ENS) solutions apply proactive threat intelligence and defenses across the entire attack lifecycle to keep organizations safer and more resilient.

Read more
Recent Reviews

TrustRadius Insights

McAfee Endpoint Protection Suite has a long history of providing robust server protection against viruses, malware, and intrusions. IT …
Continue reading
Read all reviews

Popular Features

View all 7 features
  • Centralized Management (14)
    9.0
    90%
  • Malware Detection (14)
    9.0
    90%
  • Infection Remediation (13)
    8.0
    80%
  • Endpoint Detection and Response (EDR) (13)
    8.0
    80%

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Trellix Endpoint Security ENS?

Trellix Endpoint Security (ENS) solutions apply proactive threat intelligence and defenses across the entire attack lifecycle to keep organizations safer and more resilient.

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

130 people also want pricing

Alternatives Pricing

What is Microsoft Defender for Endpoint?

Microsoft Defender for Endpoint (formerly Microsoft Defender ATP) is a holistic, cloud delivered endpoint security solution that includes risk-based vulnerability management and assessment, attack surface reduction, behavioral based and cloud-powered next generation protection, endpoint detection…

Return to navigation

Features

Endpoint Security

Endpoint security software protects enterprise connected devices from malware and cyber attacks.

8.5
Avg 8.5
Return to navigation

Product Details

What is Trellix Endpoint Security ENS?

Trellix Endpoint Security (ENS) solutions apply proactive threat intelligence and defenses across the entire attack lifecycle to keep organizations safer and more resilient.

Endpoint Security
Provides intelligent endpoint security that aligns to the organization's prioritized security needs—from preventing and hunting threats to tailoring security controls.

Endpoint Detection and Response
An advanced EDR solution helps users to reduce alert noise and empower analysts to reduce mean time to detect and respond to threats through automation.

Endpoint Forensics
Remotely detect and investigate endpoint cyberattacks including hidden malware. Automate triage with other sources to determine root case and resolve the incident.

Trellix Connect
Fast track SIEM workflows and outcomes with expert-built ready to deploy content packs for connecting, monitoring, and automating security operations.

Trellix Endpoint Security ENS Features

Endpoint Security Features

  • Supported: Anti-Exploit Technology
  • Supported: Endpoint Detection and Response (EDR)
  • Supported: Centralized Management
  • Supported: Infection Remediation
  • Supported: Vulnerability Management
  • Supported: Malware Detection

Trellix Endpoint Security ENS Screenshots

Screenshot of The Monitoring workspace presents actionable endpoint threat detection without the noise.Screenshot of Automatically identify the key findings without requiring manual evaluation of each individual artifact.Screenshot of Visualization displays relationships and speeds analyst understanding.Screenshot of AI-guided investigations automatically provide answers to typical questions asked during a security incident and highlight the most relevant evidence.

Trellix Endpoint Security ENS Video

Protect and empower your workforce with an integrated security framework that protects every endpoint. Trellix Endpoint Security (ENS) solutions apply proactive threat intelligence and defenses across the entire attack lifecycle to keep your organization safer and more resilient.

Trellix Endpoint Security ENS Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationNo

Trellix Endpoint Security ENS Downloadables

Frequently Asked Questions

Trellix Endpoint Security (ENS) solutions apply proactive threat intelligence and defenses across the entire attack lifecycle to keep organizations safer and more resilient.

Symantec Endpoint Security, CrowdStrike Falcon, and Watchguard Endpoint Security are common alternatives for Trellix Endpoint Security ENS.

Reviewers rate Centralized Management and Malware Detection highest, with a score of 9.

The most common users of Trellix Endpoint Security ENS are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(119)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

McAfee Endpoint Protection Suite has a long history of providing robust server protection against viruses, malware, and intrusions. IT departments have relied on this suite for over 10 years to safeguard their servers. Trellix Endpoint Protection is an effective solution for enterprise networks and small-scale networks, offering comprehensive security features such as server hardware and software protection, intrusion prevention, data theft prevention, and defense against malware intrusions. Distributors in sectors like banking and government trust FireEye Endpoint Security for its advanced Endpoint Detection and Response capabilities. McAfee Endpoint Security allows for centralized management of clients, including checks on Bitdefender and Virus as well as seamless software upgrades through an EPO server. It is a reliable choice for enterprise networks, small-scale networks, and single or multiple user systems, offering regular security updates, system scanning capabilities, and agent status monitoring. For organizations seeking visibility and security across their infrastructure, McAfee Endpoint MVISION provides comprehensive threat protection with easy management options. FireEye is known for its advanced email security features, including attachment scanning, spam and malware filtering, and email tracing. McAfee Endpoint Security offers encryption and antivirus protection while blocking unnecessary links and advertisements to ensure safety and privacy. It is globally trusted on Windows PCs to protect against malware. Users have reported positive experiences with these products, encountering no major issues.

Effective Protection: Several users have stated that McAfee's software suite is highly effective in protecting their servers from malware and viruses. They emphasize that they have never experienced any system intrusions or downtime due to McAfee's strong security measures.

Frequent Updates: Many reviewers appreciate the frequent updates provided by McAfee. These updates ensure that the software stays up-to-date with new viruses and threats in the computer world. Users value this continuous updating as it ensures that their systems are always shielded from both new and old threats.

Excellent Customer Service: McAfee's customer service has received high praise from users. They appreciate receiving notices about renewing their software well in advance of the contract end date, as well as reminders until they have actually renewed their agreement. The proactive approach from McAfee is highly valued, especially when users may get busy and forget to renew on time. Prompt notifications via software installed on their system and email help prevent any lapse in protection.

Cons:

  1. Ineffectiveness as standalone protection: Many users have reported that McAfee is not effective in protecting computers from viruses and malware when used as the sole security software. Some users felt that it lacked advanced threat detection capabilities, making their systems vulnerable to attacks.
  2. Resource-intensive and system slowdown: Several reviewers have experienced significant slowdowns in their computers after installing McAfee, particularly during automated virus scans. This has resulted in frustration and decreased productivity for some users.
  3. Complexity and difficulty of use: Users have found the interface of McAfee to be complex and time-consuming to understand its features. Configuring the software has also posed difficulties, requiring extra time for first-time users to navigate through its settings.

Attribute Ratings

Reviews

(1-25 of 25)
Companies can't remove reviews or game the system. Here's why
Score 9 out of 10
Vetted Review
Verified User
Incentivized
The product is very easy to be deployed to the endpoints.
It works based on an agent that is installed initially and then it pulls all other modules that you need to be deployed.
It send almost righ-away alerts about threats.
The management dashboard is easy to understand and use.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
It is well suited for office and home users who have a lot of online and offline activities. This antivirus platform is equipped with the advanced capabilities and policies of threat detection and controlled usage. The full scan of the device is the most useful when it comes to users and support.
Score 6 out of 10
Vetted Review
Verified User
Incentivized
During the pandemic all our users worked remotely that was challenging from security perspective, so we had to deploy the endpoint protection system with cloud based monitoring server. By doing that we were able to keep safety for users workspaces even though some of them did not connect to VPN for a long time.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Data security has become very serious issue in modern workplace. Trellix endpoint security spared me from genuine assault a few times. This product offers me peace of mind on every possible level. It provides excellent visibility across the enterprises when it comes to threats, both internal and external. Trellix is vetted will all major applications.
August 25, 2022

Stable and easy to use

Junior Pierre-Toussaint | TrustRadius Reviewer
Score 6 out of 10
Vetted Review
Verified User
Incentivized
It is a great solution. The way it exchanges the information between the entire ecosystem, all the endpoints, as well as the network ATP, can trigger the blocking even if it is seen by some other device. If the network has seen something, we can use that to put a block to all the endpoints.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
I think the FireEye Endpoint solution is super solid. I would, and have, recommended this solution to colleagues. It is well suited to identify, contain, triage, remediate, and eradicate threats across the entire attack lifecycle.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
It has been well adopted by our business partners. We have many different and complicated environments and this solution was suited for those scenarios. It has given us trust in our security journey and has made our path easier to adopt. It has impacted the business in a very positive way.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
McAfee Endpoint Security is well suited for all kinds of organizations at different scales. Since it is per endpoint, there is no single point of failure or stress. However, considering the price/performance ratio, it is better for mid-scale, mid-budget organizations. Also, due to its cases of false negatives, it is recommended to be used where data is backed up on regular basis or data loss is highly tolerable. Not to mention, the endpoints must be equipped with enough physical memory, a recent processor and a Solid State Drive. It is little tough on outdated PCs with hard drives as the disk usage goes up and becomes the limiting factor each time a significant amount of data is processed or transferred.
Also, not much technical understanding is needed to use the tool. It is quite friendly. Good for organizations with non-technical employees as well.
Furthermore, if employees use a lot of personal machines outside the university assets, then it becomes a problem as McAfee doesn't provide any free scanning in case of an incident, like Malwarebytes. In this case McAfee doesn't suit well.
Score 7 out of 10
Vetted Review
Verified User
Incentivized
I believe that Mcafee Endpoint Security is well suited for environments that have formal endpoint security or cyber-security department because more attention to go into the tuning of it. Environments that do NOT have those types of departments will be able to deploy the solution in their company but won't be able to devote the time to tune the product into something beneficial.
Score 7 out of 10
Vetted Review
Verified User
Incentivized
I think that small companies that have just started can in the beginning not go with such a complicated antivirus like McAfee Endpoint Security as it can prove expensive for them. Also, if the company is not that popular, no one will try to attack them. But yes, with company growth and the increase of sensitive information of the clients they hold, you'll have to switch to an antivirus like McAfee.
December 27, 2019

Highly recommended!

Score 9 out of 10
Vetted Review
Verified User
Incentivized
I really like the features on McAfee where I can see the detail of an asset including data loss prevention, encryption, the version of the agent installed in the particular system and the version of Windows a particular user/computer has. Besides, the console will also have the capability to see who is the user of that system and when was the last time the device communicates to the network. The issue that we run into is whenever we need to perform an on-demand scan for a particular end-user when we received an alarm, the on-demand scan will timeout.
Ralf Richter | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
If you deliver managed clients globally to your customer, the EPO-Server is a good tool for managing them.
The reports are very transparent and easy to present to clients. Harddisk encryption can be managed by the software, too. This is a step forward in security, too. The special thing is when using Cisco tools, e.g. AMP or Umbrella. In this scenario, McAfee additionally makes no sense.
March 28, 2019

Lifesaver

Score 10 out of 10
Vetted Review
Verified User
I am recommending this software for many reasons. This software is the best option to protect our PC or phone from hackers, viruses, and many other things. The main reason I recommend it is because it can automatically block junk, advertisements, and safety-threatening things when we are surfing the internet.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
If your company is looking to change or simply implement an anti-virus solution, look no further. McAfee is the best solution on the market! It easily beats Symantec and all other competitors. It has tons of great features, price is very good compared to others. Deploying agents is extremely simple, and checking logs is very easy.
Score 9 out of 10
Vetted Review
Verified User
It is well suited in lots of scenarios but I would also say I don't care for the UI of this product. Security undertakings and alternatives are not as effectively client open or controlled likewise with other well-known security programming. This influences me to feel in less control as the end client. While running out of sight is my most loved feature, I might want to see more prominent alternatives for controlling these foundation errands and that so with more noteworthy specificity than what is as of now given by the GUI.
February 12, 2018

True Protection !

Score 9 out of 10
Vetted Review
Verified User
Incentivized
It fits for most of the Zero Day exploits and known issues. We are using it to make our system more secured. If you have a small company or organization it can be a luxury purchase for you. Therefore, it focuses to fill the gaps in your system, also the sustainability of the system makes it expensive.
December 19, 2017

Suite that's Sour!

Christopher "Scott" Pandolfo | TrustRadius Reviewer
Score 5 out of 10
Vetted Review
Verified User
Incentivized
As I stated before the software is intuitive, easy to use and only draws minimal resources. However, the protection is moderate, lots of false positives/negatives, and the agressive software is very invasive, and hard to remove. There are also too many software conflicts.
July 20, 2017

FireEye Review

Score 9 out of 10
Vetted Review
Verified User
Incentivized
FireEye is the obvious solution if a company is having trouble with threats getting in via mail attachments. We use Office 365 and initially subscribed to their attachment scanning product. Users immediately started complaining it would take a minimum of 3 minutes and sometimes as long as 12 hours to receive their attachments. This rate of time was unacceptable. So we did a POC with FireEye and immediately saw that attachments were processed on average in 30 seconds but at the most, around 1.5 minutes. We were convinced after that.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
FireEye would make sense for a variety of situations. The ability to quickly identify large scale phishing and things like malware C2 callouts makes the difference between a quiet day at work or being the next headline on KrebsOnSecurity.com. I think businesses of all sizes could benefit from the various offerings of the FireEye portfolio.
Roberta Jones | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
It provides great web security and will protect your devices against viruses and malware when paired with other security software and hardware. For instance, we have multiple layers of security set up so if McAfee misses something then one of our other barriers will catch the infection or intrusion before it reaches the network. I would not suggest using this product as a standalone agent because I do not think it will be as effective when working by itself. The dashboard also makes it convenient to manage devices, policies, and settings from wherever you are so it's an ideal solution for any IT department to use. I would just suggest using something else as a backup so your network isn't left vulnerable.
Return to navigation