We performed a comparison between Sophos UTM and Trellix Network Detection and Response based on real PeerSpot user reviews.
Find out what your peers are saying about Sophos, Cisco, WatchGuard and others in Unified Threat Management (UTM)."The initial setup is easy."
"What I like about Sophos UTM is that it improves my company's security. The solution is easy to set up, which I like, and it's very stable."
"It works well without any maintenance. So far, it has worked pretty well regardless of the traffic."
"Stability-wise, I rate this solution a ten out of ten...Scalability-wise, I rate this solution a ten out of ten."
"It's a stable solution."
"The most valuable features of this solution are the firewall application and application control."
"Sophos UTM has a good user interface and granular security controls."
"The stability, overall, is excellent. I haven't had a problem in the last two years."
"The sandbox feature of FireEye Network Security is very good. The operating system itself has many features and it supports our design."
"The most valuable feature is MVX, which tests all of the files that have been received in an email."
"The product has helped improve our organization by being easy to use and integrate. This saves time, trouble and money."
"It is stable and quite protective. It has a lot of features to scan a lot of malicious things and vulnerabilities."
"The most valuable feature is the view into the application."
"It protects from signature-based attacks and signature-less attacks. The sandboxing technology, invented by FireEye, is very valuable. Our customers go for FireEye because of the sandboxing feature. When there is a threat or any malicious activity with a signature, it can be blocked by IPS. However, attacks that do not have any signatures and are very new can only be blocked by using the sandboxing feature, which is available only in FireEye. So, FireEye has both engines. It has an IPS engine and a sandbox engine, which is the best part. You can get complete network protection by using FireEye."
"Initially, we didn't have much visibility around what is occurring at our applications lower level. For instance, if we are exposed to any malicious attacks or SQL injections. But now we've integrated FireEye with Splunk, so now we get lots of triggers based on policy content associated with FireEye. The solution has allowed for growth and improvement in our information security and security operations teams."
"I also like its logging method. Its logging is very powerful and useful for forensic purposes. You can see the traffic or a specific activity or how something entered your network and where it went."
"The solution is not scalable."
"The scalability of the product is an area with certain shortcomings where improvements are required."
"Sophos UTM could improve the way the configuration has to be done. I have to do the configuration through the command line interface but if it could be done through the graphical user interface it would be much better."
"Sophos UTM sometimes falls short in high-availability environments. They used to launch firmware that didn't work very well in a high-availability environment."
"There is absolutely no support when using AWS. If you buy the on-premise Sophos solution, you get support."
"I would like this solution to support ICAP. Also, they no longer support on-premises management, and are forcing clients to use centralized management via the cloud, which I don't agree with."
"During initial configuration, I encountered a few issues."
"The solution needs to do better at covering mobile devices, although they may have an integrated solution for that purpose."
"Its documentation can be improved. The main problem that I see with FireEye is the documentation. We are an official distributor and partner of FireEye, and we have access to complete documentation about how to configure or implement this technology, but for customers, very limited documentation is available openly. This is the area in which FireEye should evolve. All documents should be easily available for everyone."
"It doesn't connect with the cloud, advanced machine learning is not there. A known threat can be coming into the network and we would want the cloud to look up the problem. I would also like to see them develop more file replication and machine learning."
"Stability issues manifested in terms of throughput maximization."
"Management of the appliance could be greatly improved."
"FireEye Network Security should have better integration with other vendors' firewalls or proxies, such as Palo Alto and Fortinet. Files that are being submitted should happen through the API or automatically."
"They can maybe consider supporting some compliance standards. When we are configuring rules and policies, it can guide whether they are compliant with a particular compliance authority. In addition, if I have configured some rules that have not been used, it should give a report saying that these rules have not been used in the last three months or six months so that I disable or delete those rules."
"The product's integration capabilities are an area of concern where improvements are required."
"We'd like the potential for better scaling."
More Trellix Network Detection and Response Pricing and Cost Advice →
Sophos UTM is ranked 1st in Unified Threat Management (UTM) with 110 reviews while Trellix Network Detection and Response is ranked 9th in Advanced Threat Protection (ATP) with 35 reviews. Sophos UTM is rated 8.4, while Trellix Network Detection and Response is rated 8.6. The top reviewer of Sophos UTM writes "It's a highly stable platform with very few hardware issues". On the other hand, the top reviewer of Trellix Network Detection and Response writes "Blocks traffic and DDoS attacks ". Sophos UTM is most compared with Netgate pfSense, Fortinet FortiGate, Sophos XG, OPNsense and Palo Alto Networks NG Firewalls, whereas Trellix Network Detection and Response is most compared with Fortinet FortiSandbox, Palo Alto Networks WildFire, Zscaler Internet Access, Fortinet FortiGate and Vectra AI.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.