Skip to main content
TrustRadius
Trellix ePolicy Orchestrator

Trellix ePolicy Orchestrator
Formerly McAfee ePolicy Orchestrator

Overview

What is Trellix ePolicy Orchestrator?

Trellix ePolicy Orchestrator (formerly McAfee ePolicy Orchestrator) software centralizes and streamlines management of endpoint, network, data security, and compliance solutions.

Read more
Recent Reviews

TrustRadius Insights

McAfee ePolicy Orchestrator is widely used as the go-to antivirus product for organizations, serving as a comprehensive solution for …
Continue reading
Read all reviews

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Trellix ePolicy Orchestrator?

Trellix ePolicy Orchestrator (formerly McAfee ePolicy Orchestrator) software centralizes and streamlines management of endpoint, network, data security, and compliance solutions.

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

60 people also want pricing

Alternatives Pricing

What is ThreatDown, powered by Malwarebytes?

ThreatDown replaces the former Malwarebytes for Business product suite, combining Malwarebytes' endpoint security capabilities in four bundles. The basic Core tier includes incident response, Next-gen AV, device control, vulnerability assessments, and the ability to block unwanted application.…

What is Snyk?

Snyk’s Developer Security Platform automatically integrates with a developer’s workflow and helps security teams to collaborate with their development teams. It boasts a developer-first approach that ensures organizations can secure all of the critical components of their applications from code to…

Return to navigation

Product Details

What is Trellix ePolicy Orchestrator?

Trellix ePolicy Orchestrator Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo

Frequently Asked Questions

Trellix ePolicy Orchestrator (formerly McAfee ePolicy Orchestrator) software centralizes and streamlines management of endpoint, network, data security, and compliance solutions.

Reviewers rate Support Rating highest, with a score of 10.

The most common users of Trellix ePolicy Orchestrator are from Mid-sized Companies (51-1,000 employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(58)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

McAfee ePolicy Orchestrator is widely used as the go-to antivirus product for organizations, serving as a comprehensive solution for securing systems, servers, and PCs. Users appreciate the ease of management and robust control over endpoints that this software offers. Its cloud-based nature eliminates the need for on-premises overhead, simplifying management and providing a seamless user experience.

One notable use case comes from a Defense Contractor that relies on McAfee ePolicy Orchestrator for real-time virus scanning and USB peripheral detection on both classified and unclassified systems. The software has greatly simplified and streamlined endpoint security management, allowing for easier tracking and management of threats across the network. By automating security processes, it has freed up valuable time for the IT team to focus on other critical tasks.

Moreover, the reporting and analytics capabilities of McAfee ePolicy Orchestrator are robust, helping organizations stay on top of potential threats. It ensures that computers are properly managed and up to date before being added back into the domain, preventing issues with outdated antivirus software and potential malware spread.

Users value the easy-to-use and informative dashboard approach of McAfee ePolicy Orchestrator, which enables them to build a single pane of glass view for efficient security management. It offers flexibility through features such as whitelisting processes, tagging endpoints for additional tasks, and quarantining systems with restricted policies. The software provides secure applications and data protection through its customization options.

For many organizations facing global crypto locker attacks, deploying McAfee ePolicy Orchestrator has been crucial in providing real-time protection to users in different locations. The software proves its worth by catching numerous instances of malicious files, successfully preventing users from unintentionally opening phishing scam emails.

McAfee ePolicy Orchestrator also acts as a centralized management console for various McAfee products including Antivirus, DLP endpoint sensors, Exchange MSME software policies, Host Protection, Site Advisor, and Disk Encryption. It effectively manages malware protection across the organization, covering workstations, laptops, and servers.

In summary, McAfee ePolicy Orchestrator serves as an effective tool for security threat prevention and detection. Its user-friendly interface, robust control over endpoints, automation capabilities, reporting and analytics features, and centralized management console make it a valuable asset for organizations aiming to maintain a secure environment for their systems and data.

Intuitive User Interface: Users have consistently praised the software's intuitive and easy-to-navigate user interface, with several reviewers stating that it has made accessing different features and performing tasks quick and convenient.

Cloud-based Access: Many users appreciate the cloud-based access provided by the software as it allows them to access it from anywhere without the need for installation on individual devices. This flexibility has been noted as a significant advantage by multiple reviewers.

Seamless Integration with Single Sign-On SSO: The integration of the software with Single Sign-On SSO has been highly regarded by users who find it seamless to authenticate and access the software. This feature enhances their overall user experience with the product.

Difficult User Interface: Some users have found the user interface to have a steep learning curve and not easy to master every component of the software. They feel that it takes time and effort to become familiar with the interface, which can be frustrating for new users.

Challenging Deployment and Setup: The process of deploying the software has been reported as not easy by some users. They mention that the setup is more time-consuming than expected, causing delays in getting the software up and running smoothly.

Busy-Looking Console: Users have mentioned that the console can be overwhelming for new users due to its busy appearance. This can make it difficult for them to navigate through different features and functionalities effectively.

Users have made several recommendations based on their experience with the software.

Firstly, they suggest that it is important to try using the software before making a decision. Users emphasize the importance of giving it a test run to evaluate its performance and features.

Secondly, before using the software, users recommend considering if a comprehensive solution is necessary for managing multiple security tools. This will help determine if McAfee e Policy Orchestrator is the right fit for the organization's needs.

Thirdly, many users prefer using McAfee e Policy Orchestrator for their security management needs, particularly when there are multiple security tools to manage. They find it efficient and effective in handling and coordinating various security components.

In addition to these recommendations, users also provide some key advice:

  • Ensure that all required ports are open through the firewall before setting up McAfee ePO.
  • Use the recommended server configuration based on the number of nodes for optimal performance.
  • Utilize the tagging feature for a phased rollout of McAfee components.
  • Subscribe to McAfee SNS alerts for updates and hotfix details.
  • Report to McAfee Support if the antivirus does not detect a virus immediately.

By following these recommendations, users can make the most of their experience with McAfee e Policy Orchestrator.

Attribute Ratings

Reviews

(1-1 of 1)
Companies can't remove reviews or game the system. Here's why
Felipe Antoniazzi | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
ResellerIncentivized
Endpoint Security Suite
We use Trellix ePolicy Orchestrator and the features to support the environment for antivirus, DLP, DE and FW for host.
The tool helps to deliver security with efficiency. The accurate of the detection is really very good.
Our scope involves Wkt, Srv for Santander and affiliates. No issues impacting the business.
  • Integration
  • Accurate of the detection
  • System tree structure
  • Dlp policies
  • Firewall for host
Citrix environment
Vulnerability Management Tools (5)
100%
10.0
IT Asset Realization
100%
10.0
Authentication
100%
10.0
Configuration Monitoring
100%
10.0
Web Scanning
100%
10.0
Vulnerability Intelligence
100%
10.0
Threat Intelligence (7)
71.42857142857143%
7.1
Network Analytics
100%
10.0
Vulnerability Classification
100%
10.0
Automated Alerts and Reporting
100%
10.0
Threat Analysis
100%
10.0
Threat Intelligence Reporting
100%
10.0
Automated Threat Identification
N/A
N/A
Threat Recognition
N/A
N/A
  • Licensing
  • Availability
Trend, Symantec Advanced Threat Protection, Trellix ePolicy Orchestrator
15
Different levels of support
5
Admin, support, reporter, user
  • Quality of detection
  • Protection against threats
  • Behavior of the threats
  • Threats behaviour
  • Zero day
Because the company is evaluating other products.
Yes
Trend
  • Cloud Solutions
  • Scalability
  • Integration with Other Systems
  • Ease of Use
Quality of the detection, management
The results about threat detection and the CPU consumption.
Satisfied
  • Implemented in-house
  • Third-party professional services
NetsafeCorp
Yes
Change management was a big part of the implementation and was well-handled
Organization of the waves and test all versions with differents OS
  • Assign policies
  • Removal of the last product
  • Online Training
  • In-Person Training
  • No Training
Excellent
Excellent
No, because of the traps about inheritance.
Complex
Attention with the inheritance policies and tasks.
Some - we have done small customizations to the interface
Some - we have added small pieces of custom code
The groups
The support worked very well in the appropriate time to answer
I don't know what is the level of support.
Yes
Yes... fee years ago, vse product
When we had an issue about dat deployed.
User friendly, what is the only point to be improved is about the inheritance of policies and tasks.
  • Reports
  • System tree
  • Schedule of tasks
  • Inheritance
Trellix ePolicy Orchestrator is a great tool, and provide complete security with Endpoint Suite.
Outage only during upgrade... but not impact the environment.
No issues
  • Web Gateway
  • Atd
  • Threat intel
  • File import/export
No issues
Satisfied
Historical
The time of renewal
Yes
Fix bugs
  • Fix bugs
  • Improve security
  • Integration with more vendors
Yes
Is a good app
Yes
To continue updated
Return to navigation