Overview
Product Information on Trellix Endpoint Security Suite
What is Trellix Endpoint Security Suite?
Trellix Endpoint Security Suite Pricing
Overall experience with Trellix Endpoint Security Suite
“Behavior-Based Detection Excels While Operational Overhead Remains a Notable Concern”
“Complex Deployment but High Endpoint Visibility: A Fair Trade-off?”
About Company
Company Description
Trellix operates as an international entity devoted to reshaping the cybersecurity landscape. The key business issue the company addresses revolves around the escalation of sophisticated threats challenging organizations today. To combat this, Trellix offers an open and native detection and response platform, building a secure and resilient operational structure. The company embraces machine learning and automation, drawing upon the proficiency of its security professionals and an expansive partner ecosystem to deliver technological advancements. The application of their expertise serves to benefit an extensive user base comprising numerous business and government organizations.
Company Details
Do You Manage Peer Insights at Trellix?
Access Vendor Portal to update and manage your profile.
Key Insights
A Snapshot of What Matters - Based on Validated User Reviews
User Sentiment About Trellix Endpoint Security Suite
Reviewer Insights for: Trellix Endpoint Security Suite
Deciding Factors: Trellix Endpoint Security Suite Vs. Market Average
Performance of Trellix Endpoint Security Suite Across Market Features
Trellix Endpoint Security Suite Likes & Dislikes
1. Solid endpoint telemetry for a managed SOC. With the sensor feeding our managed SOC, Trellix provided consistent file, process, and behavioral data that popped alerts and provided the information needed for investigations. 2. Behavior-based detection. Rather than just signature-based antivirus scanning, Trellix did an excellent job of surfacing suspicious behavior, which aligned well with how the SOC hunted threats. 3. Multiple Signals. Rather than just being used on workstations, we were able to collect logs from servers, serverless jobs, and network appliances using Trellix.
1. Solid endpoint telemetry for a managed SOC. With the sensor feeding our managed SOC, Trellix provided consistent file, process, and behavioral data that popped alerts and provided the information needed for investigations. 2. Behavior-based detection. Rather than just signature-based antivirus scanning, Trellix did an excellent job of surfacing suspicious behavior, which aligned well with how the SOC hunted threats. 3. Multiple Signals. Rather than just being used on workstations, we were able to collect logs from servers, serverless jobs, and network appliances using Trellix.
1. Solid endpoint telemetry for a managed SOC. With the sensor feeding our managed SOC, Trellix provided consistent file, process, and behavioral data that popped alerts and provided the information needed for investigations. 2. Behavior-based detection. Rather than just signature-based antivirus scanning, Trellix did an excellent job of surfacing suspicious behavior, which aligned well with how the SOC hunted threats. 3. Multiple Signals. Rather than just being used on workstations, we were able to collect logs from servers, serverless jobs, and network appliances using Trellix.
Deployment is very complex and even the administrator doesn't know about the settings we have, its bit complex and also integration with Google's second SIEM solution was bit difficult due to log parsing issues
Deployment is very complex and even the administrator doesn't know about the settings we have, its bit complex and also integration with Google's second SIEM solution was bit difficult due to log parsing issues
Deployment is very complex and even the administrator doesn't know about the settings we have, its bit complex and also integration with Google's second SIEM solution was bit difficult due to log parsing issues
Top Trellix Endpoint Security Suite Alternatives
Peer Discussions
Trellix Endpoint Security Suite Reviews and Ratings
- CLOUD APPLICATION SECURITY ENGINEERGov't/PS/EdEducationReview Source
Behavior-Based Detection Excels While Operational Overhead Remains a Notable Concern
We deployed Trellix Endpoint Security Suite primarily as an endpoint detection and telemetry agent supporting our managed defense SOC. In this role, Trellix functioned as a reliable source of endpoint data rather than a standalone analyst console. The solution performed best in stability and threat signal quality across our stack. The main challenges that arrived were the resource intensive nature of the Trellix agent.



