Skip to main content
TrustRadius
Trellix Enterprise Security Manager

Trellix Enterprise Security Manager
Formerly McAfee Enterprise Security Manager

Overview

What is Trellix Enterprise Security Manager?

Trellix Enterprise Security Manager (formerly McAfee Enterprise Security Manager) is security information and event management (SIEM) software.

Read more
Recent Reviews

TrustRadius Insights

McAfee Enterprise Security Manager has proven to be a valuable tool in improving information security processes and minimizing threats to …
Continue reading

Best SIEM

10 out of 10
May 23, 2019
Incentivized
McAfee Enterprise Security Manager is easy to use and to maintain, with great results. We use this SIEM because it offers threat …
Continue reading
Read all reviews

Popular Features

View all 13 features
  • Centralized event and log data collection (9)
    8.6
    86%
  • Deployment flexibility (9)
    8.3
    83%
  • Event and log normalization/management (9)
    8.0
    80%
  • Correlation (9)
    7.0
    70%
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Trellix Enterprise Security Manager?

Trellix Enterprise Security Manager (formerly McAfee Enterprise Security Manager) is security information and event management (SIEM) software.

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

27 people also want pricing

Alternatives Pricing

What is Trellix Helix?

Trellix Helix (formerly FireEye Helix) is a SIEM solution providing a non-malware threat detection solution.

What is Sumo Logic?

Sumo Logic is a log management offering from the San Francisco based company of the same name.

Return to navigation

Features

Security Information and Event Management (SIEM)

Security Information and Event Management is a category of security software that allows security analysts to look at a more comprehensive view of security logs and events than would be possible by looking at the log files of individual, point security tools

8.4
Avg 7.8
Return to navigation

Product Details

What is Trellix Enterprise Security Manager?

Trellix Enterprise Security Manager Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo

Frequently Asked Questions

Trellix Enterprise Security Manager (formerly McAfee Enterprise Security Manager) is security information and event management (SIEM) software.

Reviewers rate Integration with Identity and Access Management Tools and Custom dashboards and workspaces highest, with a score of 9.3.

The most common users of Trellix Enterprise Security Manager are from Mid-sized Companies (51-1,000 employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(39)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

McAfee Enterprise Security Manager has proven to be a valuable tool in improving information security processes and minimizing threats to cloud services and systems. Users have reported that the product effectively monitors, investigates, and mitigates problems and threats encountered in their environments. With its ability to monitor the performance of various components such as systems, applications, databases, and critical network processes, McAfee Enterprise Security Manager enables users to analyze data for threat detection purposes. This capability has been highly praised by customers who appreciate the product's contribution to their overall security strategy.

Another key use case of the product is its role in deploying full disk encryption, managing HIPS, and ensuring endpoint security across large enterprises. McAfee Enterprise Security Manager is widely utilized by organizations of all sizes, be it small companies or large enterprises in both the private and public sectors. The product's robust features are leveraged by entire office staffs to prevent and identify security threats, resulting in a safer work environment. Furthermore, the SIEM solution serves as an enterprise SIEM across multiple sites and domains, collecting system logs and events for correlation and alerting purposes.

Users have commended McAfee Enterprise Security Manager for its ease of use in day-to-day operations and maintenance. The product is highly regarded for providing excellent results while being relatively straightforward to set up and configure. It offers a range of functionalities such as threat intelligence correlation, analytics, profiling, security alerts, data presentation, and compliance capabilities. The integration with other McAfee tools and log sources has been well-received by users as it simplifies the monitoring of security events while facilitating the identification of incidents and cyber attacks. Overall, McAfee Enterprise Security Manager has established itself as a reliable SIEM solution capable of addressing various security challenges faced by organizations today.

Valuable Threat Intelligence: Users have found Advanced Threat intelligence to be a valuable feature, allowing them to prioritize alerts quickly and efficiently. Several reviewers have stated that it helps in identifying potential threats before they happen.

Highly Praised SIEM Log Collection: The SIEM log collection feature is highly praised by users for its ability to integrate other Intel products into a centralized point, enhancing overall security capabilities. Many users appreciate the convenience and effectiveness of this integration.

Key Advantage of VDI Availability: The availability of ESM as a VDI is considered a key advantage by many organizations. It provides flexibility and easy access for users who have moved away from physical appliances. This feature has been highlighted as beneficial for efficient system accessibility.

Cumbersome Integration Process: Several users have found the integration process into other vendor products to be cumbersome and more difficult compared to other vendor products. They feel that it is not as intuitive and requires additional effort.

Lack of Training for Key Features: Some users have noted a lack of training provided for technology teams to fully understand and utilize the key features of the tools. This can lead to challenges in effectively leveraging the software's capabilities.

Difficulties with Reports Customization: Users have expressed frustration with analyzing and customizing reports. They find it challenging to tailor reports according to their specific needs, indicating a need for improvement in this area.

Attribute Ratings

Reviews

(1-1 of 1)
Companies can't remove reviews or game the system. Here's why
Score 8 out of 10
Vetted Review
Verified User
Incentivized
McAfee Enterprise Security Manager is used not only for its log collection capabilities but also for its advanced threat intelligence. We are using the product as part of moving into Intel's complete suite of products, where appliance integration will bring a commonality to our incident capabilities and help with faster response times and visibility.
  • Advanced Threat intelligence gives us the ability to prioritise alerts quickly and efficiently.
  • SIEM log collection allows us to integrate our other Intel products to a centralised point.
  • Physical appliances is one of the areas we have moved away from, so the ability for ESM to be available as a VDI was key.
  • If there is a requirement to integrate into other vendor products i.e. (log sharing) then this was very cumbersome.
  • Integration of vulnerability scanning that is available in other vendor products would be a good addition.
  • When integrating all of Intel's products a third party consultancy is usually required, where other vendor products can be configured without this additional cost.

McAfee Enterprise Security Manager is well placed when the environment has other Intel products. We operate McAfee Move and the two products work extremely well together. The anti-virus product can be very cumbersome if used with another SIEM solution when log collecting.

We have other areas where intel solutions are not in use and in these circumstances we used another well-known SIEM solution that had an easier implementation phase than Intel's and where remote access was challenging.

Security Information and Event Management (SIEM) (6)
71.66666666666667%
7.2
Centralized event and log data collection
80%
8.0
Correlation
80%
8.0
Event and log normalization/management
80%
8.0
Deployment flexibility
60%
6.0
Integration with Identity and Access Management Tools
70%
7.0
Custom dashboards and workspaces
60%
6.0
  • Centralisation of events form NIDS/IPS/IDS, Firewall(s), Web Proxy and Endpoint
  • Ability to have third party management
  • Actively upgraded product with good vendor support

We looked at a few products, these were AlienVault, ESM, LogRhythm and Alert Logic.

ESM at the time had more functionality and a friendlier and cleaner user interface than LogRhythm

ESM had an ability to integrate easily into Intel's endpoint solution versus AlienVault where a parser would have to be written, though AlienVault's inclusion of vulnerability management and IDS made it stand out from some of the others.

ESM had a better correlation engine and log drill through than Alert Logic, and in our scenario we were not looking for a hosted solution at the time.

ESM has a good network of partners and in the event a managed service is required the transition to this is made very easily.

No
  • Product Features
  • Product Usability
  • Existing Relationship with the Vendor
The feature set was important along with usability, but the integration with our other Intel products was a key purchasing decision
If we had to evaluate again, we would look more closely at what are we trying to achieve and does it make sense to keep some of the other products we already have. A key element is to have a completely integrated suite of products all working in unison, and though this can be achieved by having a multi-vendor environment it is never as clean as a single vendor solution. Also we would look at the outsourcing of certain IT security functions, in the case of SIEM solutions it can make more sense to have this activity outsourced where the third party has a larger scope and more realtime experience of event s that are happening to other clients and can then apply the incident response to all of their customers.
Return to navigation