We performed a comparison between Cynet and Trellix Endpoint Security based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Cynet offers strong ransomware protection and an intuitive interface. Trellix Endpoint Security users like the ePolicy Orchestrator, the solution’s robust central management console. Cynet needs to expand device support and add customization options. Users suggest improving network monitoring and strengthening integration with other tools. Trellix could improve by reducing resource usage, enhancing stability, and making the solution more user-friendly.
Service and Support: Cynet's customer service is consistently lauded for its excellence. They have a dedicated support team that is available round the clock, and they also have a contingency plan for urgent incidents. Some users say Trellix support is helpful and responsive, while others believe there is room for improvement in communication and resolution times.
Ease of Deployment: Cynet’s setup is highly efficient, with the ability to configure thousands of devices quickly. Setting up Trellix Endpoint Security is simple if the user has some expertise.
Pricing: Customers generally view Cynet's pricing and licensing experience as affordable and a good value for its features.Trellix Endpoint Security’s pricing is considered flexible, competitive, and about average compared to other solutions.
ROI: Cynet yields an excellent ROI by preventing cyberattacks and safeguarding sensitive data. Users reported saving time by implementing Trellix Endpoint Security.
"Another noteworthy feature that I find appealing in Microsoft Defender is the credit-backed simulation. This feature enables organizations to train their users on effectively responding to phishing emails through a simulated training environment."
"The summarization of emails is a valuable feature."
"All of the security components are valuable including, antiphishing, antispam, and stage three antivirus."
"The portal is quite user-friendly. There is integration with Office, Intune, and other products from the same portal. From there, we can see which policies are installed on a particular machine. We also can manage devices, groups, and tagging."
"Microsoft Defender XDR provides strong identity protection with comprehensive insights into risky user behavior and potential indicators of compromise."
"Microsoft Defender's most critical component is its CASB solution. It has many built-in policies that can improve your organization's cloud security posture. It's effective regardless of where your users are, which is critical because most users are working from home. It's cloud-based, so nothing is on-premise."
"Microsoft 365 Defender is simple to upgrade."
"It has great stability."
"We are protecting all our workstations."
"Advanced detection and protection against ransomware paired with SOC monitoring are the most valuable features. They have 24/7 SOC monitoring and file activity. It is a very robust tool."
"If some unusual activity happens on the network, such as I open administrator sessions in a short duration of an hour on many computers in the lab, it sends me an alert about my network saying that one user opened three, four, or five sessions in one hour. Similarly, if I try to play with the disk size on a computer, it will send me an alert, and it will also stop the operation."
"The initial setup is very fast and very easy."
"The interface is exceptionally clear and easy to understand."
"In terms of incident response, Cynet can contain attacks, offer a trial period to customers, and uninstall if not continued. The most valuable aspect is its integration capabilities, covering endpoints and network data for a comprehensive view of threats."
"The initial setup is simple and user-friendly."
"Its ability to revert back from a previous state is quite notable. This feature is particularly valuable because, for maintaining integrity, it can inspect the socket for any firewall modifications. In practice, it allows us to return to a previous configuration when everything was functioning correctly."
"The solution scales well."
"The product’s stability and security features enhance user protection and organizational security."
"The DLP and user interface are the most valuable feature."
"Initially, the DLP was very valuable for disabling access to USB drives."
"Threat prevention is valuable because most clients use other solutions like antivirus as part of web protection. I don't find that kind of solution useful."
"The endpoint protection and disk encryption features are the most valuable."
"McAfee Complete Endpoint Protection is stable. We don't have any bugs being reported."
"The endpoint security, antivirus and firewall are the most valuable features of Trellix Endpoint Security."
"There is definitely scope for improvement in the automation area. Because the solution is a SaaS platform, we don't have the overall ability to automate stuff.... There is no direct way to go ahead because it's a SaaS platform."
"There are other SIEM solutions that are easier to use, mainly based on the creation of rules, use cases, and groups."
"The price should be adjustable by region."
"Intrusion detection and prevention would be great to have with 365 Defender."
"Offboarding latency should be reduced. Even after a device has been successfully offboarded using a particular offboarding script, it still shows up as onboarded."
"The support team is not competent or responsive."
"The advanced threat-hunting capabilities are phenomenal, and the security copilot enhances that, but some data elements could be better or have more context inside of the advanced tables themselves. The schemas feel a little limited to what they're building into the product. It's probably just a maturity thing. I imagine we'll see the features I want in the next year."
"The abundance of sub-dashboards and sub-areas within the main dashboard can be confusing, even if it all technically makes sense."
"The solution lacks URL filtering."
"Increased application for SOAR abilities across interconnected devices would be a welcome improvement."
"We'd like something that makes it easier to manage specific points."
"The reporting is a little weak and could be improved. The other downside is that Cynet does not use the local time zone. It's based off of Greenwich Mean Time."
"There is room for improvement in terms of support. The support should be faster to respond."
"Cynet fails to deploy the same technology in mobile devices."
"The reporting functionality in Cynet may not be as comprehensive or flexible as desired."
"Sometimes, it is necessary for me to make important changes to a hard drive of a computer, and because Cynet does not allow me to do that, I have to go to the console and remove the computer from the security group just for Cynet. After that, I have to wait for 10 or 15 minutes for that to take effect. I would like to be able to disable Cynet locally. I shouldn’t have to go to the console to find the PC and then take it out of the group and then add it again to the group. I should locally be able to disable Cynet on a computer with a password or something like that, but it is currently not possible."
"The management console is a little bit difficult to understand for admins. You need a lot of time in order to become familiar with that. It is a little bit complicated and not too easy to understand. Its price can also be improved. Its price is higher than its competitors. McAfee also needs to have better cloud integration and more data centers in the EU. The cloud center should be in Europe or in Germany. In Germany, it is really important to have access to your data within the same country. Customer data needs to be placed and processed in the same country."
"I would like this solution to do what Palo Alto traps does because I would only need to run this one product."
"The VirusScan needs to improve in order to detect ransomware and other advanced threats."
"The initial setup isn't so easy. You need to know what you are doing."
"The local technical support could be better."
"Trying to move away from the signature model for antivirus and malware blocking is something that would be nice. Instead of having to update every day, which is signature-based, moving to more of a kernel or architecture-based model would probably be beneficial."
"On the next release, they should build an easier way to see a repair option within the McAfee icon on your system tray. If there was an issue, you should be able to contact the user or just right-click on "repair". That would be a very good feature to add. That could be a place of improvement, just adding that button, or customizing it."
"I would like to have the ability to have more control over the deployment in the next release. If you have this console in the cloud, you cannot make pilot groups for deploying the agents. We only have the current group. So, as soon as you inject the software, it will go directly into production, which doesn't work for us. We need to build up pilot groups slowly. We already requested to have this feature on the cloud, and we are still waiting."
Cynet is ranked 16th in Endpoint Protection Platform (EPP) with 35 reviews while Trellix Endpoint Security is ranked 11th in Endpoint Protection Platform (EPP) with 96 reviews. Cynet is rated 8.8, while Trellix Endpoint Security is rated 8.0. The top reviewer of Cynet writes "Provides memory protection, device control, and vulnerability management". On the other hand, the top reviewer of Trellix Endpoint Security writes "Good user behavioral analysis and helpful patching but needs better support services". Cynet is most compared with CrowdStrike Falcon, SentinelOne Singularity Complete, ESET Endpoint Protection Platform, Microsoft Defender for Endpoint and Cortex XDR by Palo Alto Networks, whereas Trellix Endpoint Security is most compared with Microsoft Defender for Endpoint, Trellix Endpoint Security (ENS), CrowdStrike Falcon, Cortex XDR by Palo Alto Networks and Trend Micro Deep Security. See our Cynet vs. Trellix Endpoint Security report.
See our list of best Endpoint Protection Platform (EPP) vendors, best Extended Detection and Response (XDR) vendors, and best Endpoint Detection and Response (EDR) vendors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.