We performed a comparison between Meraki MX and Trellix Network Detection and Response based on real PeerSpot user reviews.
Find out what your peers are saying about Check Point Software Technologies, Cisco, Sophos and others in Unified Threat Management (UTM)."The technical support people from Meraki are brilliant."
"The solution's most valuable feature is the Meraki dashboard, which is a single pane of glass."
"The most valuable feature of Meraki MX is I can manage the solution from anywhere remotely, I can throttle bandwidth, and create all rules. Additionally, it is secure for our customers."
"Its ease of configuration and management is very useful for us and for other companies that don't have an onsite IT person. It is easy to configure and easy to manage. It is easy to configure the VPN with the Auto VPN feature."
"It prevents us from being hacked and delivers information about who and where the attack came from."
"Since it has an integrated dashboard for all the products, customers can get complete network analytics regarding what the user is doing, monitoring, and observing."
"The internet traffic shaping has been very valuable."
"Easy to deploy with a simple configuration."
"The most valuable feature is the view into the application."
"The most valuable feature of the solution stems from how it allows users to do the investigation part. Another important part of the product that is valuable is associated with how it gives information to users in the form of a storyline."
"The solution can scale."
"Improved our systems and our customers' by providing better malware protection, defense against zero-day threats, and improved network security."
"The installation phase was easy."
"It allows us to be more hands off in checking on emails and networking traffic. We can set up a bunch of different alerts and have it alert us."
"I also like its logging method. Its logging is very powerful and useful for forensic purposes. You can see the traffic or a specific activity or how something entered your network and where it went."
"The product is very easy to configure."
"The solution's pricing should be reduced."
"You can only have one tunnel in the whole infrastructure — one tunnel with one device."
"I need more UTM protection security features."
"The only stability issue is in Content Filtering. Sometimes we need to report these types of issues to Cisco support."
"Expensive licensing and firewall stops immediately working if the license is not renewed at expiration date."
"In general, the SD-WAN feature needs to be improved. The load sharing and load balancing of the traffic should be improved. I have had some problems with these features in the past."
"Right now, you can postpone the update but eventually, if you don't do the update, it will install the updates automatically for you and that's something that is not working for me."
"We had minor issues with Meraki MX. We had a couple of RMAs, so that could be an area for improvement, but in terms of how the RMAs went, the turnaround time and getting those back into redeployment were quick. Another area for improvement in Meraki MX is that when you're scaling for multiple locations, you need to use the same model, but the model you'd need is only available for a short time. The specific model you require could be out of stock, or Meraki isn't making that model anymore, so Meraki should improve that."
"The product's integration capabilities are an area of concern where improvements are required."
"We'd like the potential for better scaling."
"FireEye Network Security should have better integration with other vendors' firewalls or proxies, such as Palo Alto and Fortinet. Files that are being submitted should happen through the API or automatically."
"It would be a good idea if we could get an option to block based upon the content of an email, or the content of a file attachment."
"Based on what we deployed, they should emphasize the application filtering and the web center. We need to look deeper into the SSM inspection. If we get the full solution with that module, we don't need to get the SSM database from another supplier."
"It would be very helpful if there were better integration with other solutions from other vendors, such as Fortinet and Palo Alto."
"The problem with FireEye is that they don't allow VM or sandbox customization. The user doesn't have control of the VMs that are inside the box. It comes from the vendor as-is. Some users like to have control of it. Like what type of Windows and what type of applications and they have zero control over this."
"It doesn't connect with the cloud, advanced machine learning is not there. A known threat can be coming into the network and we would want the cloud to look up the problem. I would also like to see them develop more file replication and machine learning."
More Trellix Network Detection and Response Pricing and Cost Advice →
Meraki MX is ranked 2nd in Unified Threat Management (UTM) with 59 reviews while Trellix Network Detection and Response is ranked 9th in Advanced Threat Protection (ATP) with 37 reviews. Meraki MX is rated 8.2, while Trellix Network Detection and Response is rated 8.4. The top reviewer of Meraki MX writes "Cost-effective, simplified, easy to manage, and reliable with advanced security features and granular visibility". On the other hand, the top reviewer of Trellix Network Detection and Response writes "Offers in-depth investigation capabilities, integrates well and smoothly transitioned from a lower-capacity appliance to a higher one". Meraki MX is most compared with Fortinet FortiGate, Palo Alto Networks NG Firewalls, Cisco Secure Firewall, Sophos XG and SonicWall TZ, whereas Trellix Network Detection and Response is most compared with Fortinet FortiSandbox, Palo Alto Networks WildFire, Fortinet FortiGate, Zscaler Internet Access and Vectra AI.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.