We performed a comparison between Elastic Security and Trend Micro Apex One based on real PeerSpot user reviews.
Find out in this report how the two Endpoint Detection and Response (EDR) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The product detects and blocks threats and is more proactive than firewalls."
"Additionally, when it comes to EDR, there are more tools available to assist with client work."
"This is stable and scalable."
"he solution is an anti-malware product that integrates well with other vendor products such as firewalls, SIEM, etc. It captures threat intelligence and gives you better visibility. The product also has sandboxing features."
"We have FortiEDR installed on all our systems. This protects them from any threats."
"Forensics is a valuable feature of Fortinet FortiEDR."
"Fortinet has helped free up around 20 percent of our staff's time to help us out."
"The console is easy to read. I also like the scanning part and the ability to move assets from one to the other."
"The most valuable feature is the scalability. We are in Indonesia, more engineers understand Elastic Security here. So it is easier to scale and also develop. In features, the discovery to query all the logs is very important to us. It is very easy, especially with the query function and the feature to generate alerts and create tools. Sometimes we use the alert security dashboard to monitor our clients."
"The cost is reasonable. It's not overly pricey."
"The performance is good and it is faster than IBM QRadar."
"The feature that we have found the most valuable is scalability."
"Just the ability to do a lot more than just up-down is nice, which a lot of people take for granted."
"The stability of the solution is good."
"The solution is quite stable. The performance has been good."
"The most valuable feature is the ability to collect authentication information from service providers."
"The product has proven to be very flexible over the years that we have had it."
"I like Apex One's playbooks because they make it easier to set rules and policies. You can customize the playbooks and use them in more than one company. If you manage multiple businesses, it's a great way to set separate policies for each group. You can check for vulnerabilities, attacks, bugs, or anything strange. It also allows you to conduct performance analysis."
"Technical support is quite knowledgeable and helpful."
"I have found Trend Micro Apex One to be secure."
"One of the better features, in my opinion, is that it also makes use of a web reputation. For example, if someone accidentally clicks on a link in an email that leads to a malicious website, they will block it."
"The solution offers quick and timely updates."
"It has the ability to share, which is not available in other products."
"Trend Micro Apex One is good at detecting zero-day threats. When the solution was in operation I did not notice any system performance problems. Upgrades of the solution were simple to do and there are plenty of features."
"I think cloud security and SASE are areas of concern in the product where improvements are required. The tool's cloud version has to be improved in terms of the security it offers."
"The only minor concern is occasional interference with desired programs."
"They can include the automation for the realtime updates. We have a network infrastructure with remote sites. Whenever they send updates, they are not automated. We have to go into the console and push those updates. I wish it was more automated. The update file is currently around 31 MB. It could be smaller."
"We find the solution to be a bit expensive."
"We've encountered challenges during API deployment, occasionally resulting in unstable environments."
"Everything with Fortinet having to do with their cloud services. They need to invest more in their internal infrastructure that they are running in the cloud. One of the things I find with their cloud environment compared to others' is that they go cheap on the equipment. So it causes some performance degradation."
"Cannot be used on mobile devices with a secure connection."
"The solution's installation from a central installation server could be improved because the engineers had a little bit of trouble getting it installed from a central location."
"We're using the open-source edition, for now, I think maybe they can allow their OLED plugin to be open source, as at the moment it is commercialised."
"The solution needs to be more reactive to investigations. We need to be able to detect and prevent any attacks before it can damage our infrastructure. Currently, this solution doesn't offer that."
"I would like more ways to manage permissions and restrict access to certain users."
"Elastic Security has a steep learning curve, so it takes some time to tune it and set it up for your environment. There are some costs associated with logging things that don't have value. So you need to be cautious to only log things that make sense and keep them around for as long as you need. You shouldn't hold onto things just because you think you might need them."
"I would like the process of retrieving archived data and viewing it in Kibana to be simplified."
"Elastic Security could improve the documentation. It would help if they were more simple and clean."
"The solution's query building is not that intuitive compared to other solutions."
"We set up a cron job to delete old logs so that we wouldn't hit a disk space issue. Such a feature should be available in the UI, where old logs can be deleted automatically. (Don’t know if this feature is already there)."
"We cover many things, but there is something called ATP, advanced threat prevention. I think they need to invest in this technology."
"More integration with different platforms would be great, as everyone seems to want the solution to integrate with each team."
"The cost could be improved."
"I am expecting an Apple featured IDLP solution with OfficeScan, where we have only IDLP. Also, the ADR functionality in our Office Scan solution would be a nice addition. Genrally, the ADR solutions are the only failed ends of the solutions we have found with Trend Micro."
"The menus can be more user-friendly or easier. For example, if we want to enable access to the USB ports, it should be more user-friendly. It is not easy. We need to navigate through several menus to be able to give access."
"We do not have much control as we have to work with regional policies and regional support."
"The integration is lacking in Trend Micro Apex One. It does not integrate well with Microsoft p solutions. For example, with Office 365, we have to buy another solution for mail protection. That's why we are assessing Microsoft Defender 365 because we have an email from Microsoft, an endpoint from Microsoft, and we use Windows systems."
"The solution could use extra dashboards and offer more analytics."
Elastic Security is ranked 16th in Endpoint Detection and Response (EDR) with 58 reviews while Trend Micro Apex One is ranked 6th in Endpoint Detection and Response (EDR) with 124 reviews. Elastic Security is rated 7.6, while Trend Micro Apex One is rated 8.2. The top reviewer of Elastic Security writes "A stable and scalable tool that provides visibility along with the consolidation of logs to its users". On the other hand, the top reviewer of Trend Micro Apex One writes "Good monitoring and server protection with helpful machine learning". Elastic Security is most compared with Wazuh, Splunk Enterprise Security, Microsoft Sentinel, IBM Security QRadar and Microsoft Defender for Endpoint, whereas Trend Micro Apex One is most compared with Trend Micro Deep Security, Microsoft Defender for Endpoint, Cortex XDR by Palo Alto Networks, CrowdStrike Falcon and Trend Micro Smart Protection. See our Elastic Security vs. Trend Micro Apex One report.
See our list of best Endpoint Detection and Response (EDR) vendors.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.