Giving You Control of cybersecurity
April 25, 2022

Giving You Control of cybersecurity

Anonymous | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Overall Satisfaction with FireEye Helix

We've used FireEye Helix to beef up our cybersecurity by helping us put priority on the 'real' threats and critical alerts. We employ FireEye Helix services in compliance reporting and User and Entity Behavior Analytics. Our websites offer a centralized digital assets trading platform for our customers and therefore attacks targeted on our sites attempt to mimic our staff for backdoor access and compromise the assets. With FireEye Helix, we have total control of our SaaS security operations.
  • It's easy to analyze the Helix detect datasheet
  • It's possible to automate both alert volumes and false positives.
  • It may be overburdened by multi-vector attacks and must be used alongside deception software.
  • Has limited API integrations.
  • Use and Entity Behavior Analytics have been crucial in detecting unauthorized users trying to gain backdoor access.
  • We use it to consolidate all PCI compliance reports.

Do you think Trellix Helix delivers good value for the price?

Yes

Are you happy with Trellix Helix's feature set?

Yes

Did Trellix Helix live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of Trellix Helix go as expected?

Yes

Would you buy Trellix Helix again?

Yes

Integration was swift, specifically with Netskope. It's easy to ingest data from Netskope into FireEye to identify and block threats. Importing data from Netskope has enabled us to share malicious IPs and URLs to analyze all IOCs.
The UI displays wells the deviations and anomalies using advanced threat intelligence so you have full control of your security ecosystem. We've used it for two years to secure our servers and we easily customize threat detections to reduce the stressful false positives. We fill the XDR AI with data and it correlates with incident data to deliver unmatched frontline security intelligence.

Trellix Helix Feature Ratings

Centralized event and log data collection
7
Correlation
6
Event and log normalization/management
8
Deployment flexibility
7
Integration with Identity and Access Management Tools
8
Custom dashboards and workspaces
7
Host and network-based intrusion detection
8