We performed a comparison between Intercept X Endpoint and Trend Vision One based on real PeerSpot user reviews.
Find out in this report how the two Endpoint Detection and Response (EDR) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The 'Incidents and Alerts' tab is a valuable feature where we can find triggered alerts."
"I like how Microsoft XDR and the other Microsoft products are integrated into a single unified security stack covering identity access management, endpoint protection, email, cloud applications, etc."
"The most valuable features of Microsoft 365 Defender are the combination of all the capabilities and centralized management."
"Many people don't realize that Microsoft Azure, Exchange Online, and the security and compliance portal all sync together. For instance, within the Azure portal you can set security restrictions and policies to help secure your tenants... The good part of it is that these products have already been integrated. When you sign on as an admin you have global admin rights and that gives you access to all these features."
"Microsoft Defender XDR provides strong identity protection with comprehensive insights into risky user behavior and potential indicators of compromise."
"Microsoft Defender's most critical component is its CASB solution. It has many built-in policies that can improve your organization's cloud security posture. It's effective regardless of where your users are, which is critical because most users are working from home. It's cloud-based, so nothing is on-premise."
"The product integrates security into one tool instead of having third-party security tools."
"Scanning, vulnerability reporting, and the dashboard are the most valuable features."
"The most valuable feature of Sophos Intercept X is cloud management."
"The package we use also comes with spam filtering features, which are quite useful."
"Very stable solution."
"We have found the pricing to be reasonable."
"Offers artificial intelligence, security metrics and a lot of information gathered to make decisions."
"The most valuable feature of Intercept X its ability to stay ahead of the infection. By the time the ransomware spreads to the next machine in line, the data has already been encrypted on that workstation. It didn't matter what the ransomware did because could go in and get it back."
"The most valuable feature is the supervisory side of it where we can watch the throughputs, and even the loading of the device, to see how much traffic is happening."
"The most valuable features are ease of use and the GUI."
"Its detection rate is valuable. It is really an easy product to install and manage. It is quite effective at what it does, and if needed, it can also be co-managed, which means 24 hours and seven days a week monitoring through a SOC."
"The zero-day vulnerability is valuable."
"We are very impressed with the single pane of glass visibility that Trend Micro XDR provides."
"It helps us with investigations."
"The most valuable feature is the network protection shield on every server, which isolates attacks and prevents our clients from being affected."
"VisionOne offers a clear window into the security posture of our endpoints."
"The centralized visibility is good."
"Trend Micro XDR is stable, scalable, and reasonably priced."
"I personally have not seen much evidence of how Defender can enhance the story of zero trust for enterprises."
"The management features could be improved, particularly in terms of better integration with Intune, Microsoft's cloud-based management solution."
"The management and automation of the cloud apps have room for improvement."
"Microsoft Defender XDR is not a full-fledged EDR or XDR."
"The design of the user interface could use some work. Sometimes it's hard to find the exact information you need."
"The interface could be improved. For example, if you want to do a phishing simulation for your employees, it can take a while to figure out what to do. The interface is a bit messy and could be updated. It isn't too bad, but doing some things can be a long process."
"The dashboard should be easier to use. There is also improvement needed in the reporting when it comes to exporting or scheduling reports."
"The mobile app support for Android and iOS is difficult and needs improvement."
"It would be better if it can automatically generate a report for each and every user so that the users get to know the things that shouldn't be accessed from their PCs. It can have information about malicious and non-malicious sites so users are aware of them, and they don't access malicious websites. Such reports can be generated at the end of the day. We should also be able to get through to their support team quickly. Currently, it takes more than half an hour to get through to a technical person."
"I have not done it, but integrating it with authenticating the users on the Windows system looks a bit complicated to me. It could be because I don't understand it."
"They might want to offer an MSP model for licensing, to offer the solution as a software as a service."
"I would like to see better support for virtual and desktop infrastructures."
"This solution is not in the high ratings on many of the top review sites. This solution has to be near the top for me to continue using it."
"The solution's pricing could be better."
"I would like the solution to have more functions and to be more user-friendly."
"We would like more application control in order to be able to schedule times and access."
"I think that continued optimization of the environment towards automation and orchestration, a kind of layer that sits underneath all of the technologies, would be extremely important."
"There isn't a lot I'd do to change it. The web interface could be improved to sort of make it a little easier to manage multiple clients out of one location. It could also be made a bit easier to sort of manage the licensing side of it."
"Also, XDR should improve its coverage of the latest IOCs. Their suspicious object management works, but the coverage should be improved. It will take one or two months to get those things covered. XDR will detect on a behavioral basis, but these databases will not get updated daily like some other solutions. If you're dealing with new ransomware or malware, it may take around a month before it's covered by Trend Micro."
"I would like to have the capability to export the information we receive from the XDR into Microsoft Excel."
"They should increase their potential for third-party integrations."
"The price could be lower."
"The product needs to have a lot more maturity, and they need to improve the overall technical support framework for getting the value out of XDR."
"It is very expensive."
Intercept X Endpoint is ranked 4th in Endpoint Detection and Response (EDR) with 101 reviews while Trend Vision One is ranked 5th in Endpoint Detection and Response (EDR) with 43 reviews. Intercept X Endpoint is rated 8.4, while Trend Vision One is rated 8.6. The top reviewer of Intercept X Endpoint writes "A standard offering with good threat analysis but reduces machine performance". On the other hand, the top reviewer of Trend Vision One writes "The integration of toolsets is key, enabling automation, and vendor has been tremendous partner for us". Intercept X Endpoint is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Kaspersky Endpoint Security for Business, SentinelOne Singularity Complete and Fortinet FortiClient, whereas Trend Vision One is most compared with CrowdStrike Falcon, Trend Vision One Endpoint Security, SentinelOne Singularity Complete, Microsoft Defender for Endpoint and Symantec Endpoint Detection and Response. See our Intercept X Endpoint vs. Trend Vision One report.
See our list of best Endpoint Detection and Response (EDR) vendors, best Extended Detection and Response (XDR) vendors, and best Endpoint Detection and Response (EDR) vendors.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.