TrustRadius: an HG Insights company

Trellix Endpoint Security ENS

Score8.2 out of 10

121 Reviews and Ratings

What is Trellix Endpoint Security ENS?

Trellix Endpoint Security (ENS) solutions apply proactive threat intelligence and defenses across the entire attack lifecycle to keep organizations safer and more resilient.

Media

The Monitoring workspace presents actionable endpoint threat detection without the noise.
Automatically identify the key findings without requiring manual evaluation of each individual artifact.
Visualization displays relationships and speeds analyst understanding.
AI-guided investigations automatically provide answers to typical questions asked during a security incident and highlight the most relevant evidence.

1 / 4

Top Performing Features

  • Centralized Management

    Centralized management supporting multi-factor authentication, customized views, and role-based access control.

    Category average: 8.7

  • Malware Detection

    Detection and blocking of zero-day file and fileless malware.

    Category average: 9.1

  • Anti-Exploit Technology

    In-memory and application layer attack blocking (e.g. ransomeware)

    Category average: 8.8

Areas for Improvement

  • Infection Remediation

    Capability to quarantine infected endpoint and terminate malicious processes.

    Category average: 8.6

  • Vulnerability Management

    Vulnerability prioritization for fixes.

    Category average: 8.6

  • Hybrid Deployment Support

    Administrators should be able to choose endpoint security on-premise, cloud, or hybrid.

    Category average: 8.1

Endpoint Security with great Centralized Management

Use Cases and Deployment Scope

We use Trellix Endpoint Security ENS in all our company protected device. Trellix enabled us enforce security policies, stay compliant, and reduce response time to threats.

Pros

  • Centralized policy management
  • Real-time threat prevention
  • Integration with other security tools
  • Low system performance impact

Cons

  • Interoperability on older hardware
  • Slow response from support at times
  • Time consuming policy deployment and updates
  • Requires frequent tuning

Return on Investment

  • Improved security compliance
  • Centralized Management
  • Less security Incidents
  • Initial Deployment Cost

Usability

Alternatives Considered

Symantec Endpoint Security, SentinelOne Purple AI and McAfee DLP Endpoint

Other Software Used

Microsoft Defender for Endpoint, Cisco Umbrella

Trellix ENS offers great protection

Use Cases and Deployment Scope

Trellix ENS is used to protect all Servers, Desktops and Latops in our Organization. We use the Threat Protection, Adaptvie Threat Protection and Web Control modules

Pros

  • protects against viruses and malicious software.
  • monitors websites visited

Cons

  • Sometimes on Access Scan can use a lot of processing power

Return on Investment

  • We have never been affected by Ransomware
  • Have an extremely low rate of other virus infections (Almost 0)
  • Blocks malicious and blacklisted Websites

Other Software Used

Trellix ePolicy Orchestrator, Microsoft 365

My Trellix Endpoint Security Review

Use Cases and Deployment Scope

We use this as a Security platform for our endpoint devices, The platform addresses our problems in our end point security providing a secured agent and devices. Very helpful platform because it has advanced capabilities, reliability and policy packages that protects and udpates computers and devices for an optimum performance

Pros

  • Adaptive Threat Protection
  • Web Control
  • Firewall

Cons

  • Configuration
  • User Interface
  • Updates

Return on Investment

  • Features
  • Security Update
  • Compatibility

Alternatives Considered

Symantec Endpoint Security, Symantec Web Security Service and Trend Micro Cloud One - Application Security

Other Software Used

Microsoft 365, Microsoft Teams, Rakuten Viber

Trellix endpoint Security review

Use Cases and Deployment Scope

Trellix was replaced by McAfee endpoint security and it's been really helpful to manager the security of the device under one umbrella.

The application provides logs and automatically blocks and suspicious attempt on the device,

We have installed Trillax on all the devices to manage the security and firewall aspects.

Pros

  • Logs of the devices are automatically available to download
  • Any expectations can be added without any issues by the admin
  • Easier to install and manage

Cons

  • None as of now

Return on Investment

  • Managed all the devices centrally
  • Block suspecioius URL

Other Software Used

BeyondTrust Remote Support, Microsoft 365

Trellix Endpoint Security

Use Cases and Deployment Scope

The Trellix endpoint protection is a standard protection for enterprise networks, small scale networks. It addresses all server hardware and software protection. It protect against intrusion, data theft and malware intrusion. we are able to run email traces and better protect our organization from threats. It easy to manage from single console.

Pros

  • It sends regular update and therefore each endpoint stay safe individually.
  • Provides high severity alerts.
  • ATP protection

Cons

  • Hard to configure.
  • Too many false positive.
  • Takes more CPU utilization.

Return on Investment

  • very stable with the clients.
  • Does not use an exorbitant amount of resource to run.
  • Need more tool to analyze.

Other Software Used

Palo Alto Networks Advanced URL Filtering, Forcepoint NGFW, Netskope Public Cloud Security