We performed a comparison between Elastic Security and Trend Vision One Endpoint Security based on real PeerSpot user reviews.
Find out in this report how the two Endpoint Detection and Response (EDR) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable feature is the analysis, because of the beta structure."
"The main thing is that I feel safe. Because the processes that have been used to get a handle on the attackers are much better than other competitors"
"The stability is very good."
"I get alerts when scripts are detected in the environment."
"The setup is pretty simple."
"It is a scalable solution...The initial setup of Fortinet FortiEDR was straightforward."
"Having all monitoring, response, tracking, and mitigation tools in one dashboard provides our analysts and SOC team with a comprehensive view at a glance."
"NGAV and EDR features are outstanding."
"The most valuable feature is the ability to collect authentication information from service providers."
"It is very quick to react. I can set it to check anomalies or suspicious behavior every 30 seconds. It is very fast."
"The stability of the solution is good."
"ELK Logstash is easy and fast, at least for the initial setup with the out of box uses."
"The feature that we have found the most valuable is scalability."
"The most valuable features of the solution are the prevention methods and the incident alerts."
"The most valuable feature is the machine learning capability."
"We've found the initial setup to be quite straightforward."
"There's excellent data loss prevention to help prevent purposeful or accidental loss of data."
"I use Trend Vision One Endpoint Security for work control, application control, firewall, whitelist and blocklist filtration, analysis, monitoring, deep security for the servers, major monitoring, and IPS modules."
"I like One Endpoint Security. We can manage all the Trend Micro products from one console."
"Its ability to detect ransomware and malware is the most valuable. Its protection is also good."
"The most valuable features of Trend Micro Apex One are it has its own machine learning and it is quite fast, compared with the other solutions. When you're comparing the other solutions, each has pros and cons, you cannot claim one is 100 percent suitable for you. None of the solutions dominate in all areas."
"The features that I have found most valuable are the endpoint security with the zero-day vulnerability. They have an on-premise sandboxing solution which prevents any of those zero-day vulnerability issues."
"I believe that optimization is a really good feature on the front side."
"The most valuable feature is the behavior monitoring."
"The support needs improvement."
"The EDR console should have more extensive reporting. You shouldn't need to purchase FortiAnalyzer. It should be included in the EDR part. The security adviser cloud platform could be improved with more options for exclusive or intensive rules for devices."
"Detections could be improved."
"The SIEM could be improved."
"The solution is not stable."
"The solution's installation from a central installation server could be improved because the engineers had a little bit of trouble getting it installed from a central location."
"Intelligence aspects need improvement"
"Integration with Azure and SaaS provisioning tools could improve Fortinet FortiEDR."
"Technical support could respond faster."
"Email notification should be done the same way as Logentries does it."
"The training that is offered for Elastic is in need of improvement because there is no depth to it."
"We'd like to see some more artificial intelligence capabilities."
"There should be a simulation environment to check whether my Elastic implementation is functioning perfectly fine. Other solutions have their own Android and iOS applications that I can install on my mobile so that I am continuously connected to the SIEM."
"The tool needs to integrate with legacy servers. Big companies can have legacy servers that may not always be updated."
"We're using the open-source edition, for now, I think maybe they can allow their OLED plugin to be open source, as at the moment it is commercialised."
"Their visuals and graphs need to be better."
"I want more options and flexibility when creating rules. I want to set rules that are contingent, like "If this happens, then this, this, and this will happen.""
"Trend Micro Apex One could include more in-depth endpoint protection."
"The alert, or warning function, needs to be improved."
"It needs a consolidated manager as there are too many parts to currently manage it."
"It has good signature-based capabilities, but features like “shape detection” can be improved upon."
"The reports are not eye-catching from the customer's point of view, which is something that should be improved."
"Apex One's threat and vulnerability management has room for improvement."
"The EDR feature is difficult to use and could be made more user-friendly."
More Trend Vision One Endpoint Security Pricing and Cost Advice →
Elastic Security is ranked 16th in Endpoint Detection and Response (EDR) with 59 reviews while Trend Vision One Endpoint Security is ranked 6th in Endpoint Detection and Response (EDR) with 125 reviews. Elastic Security is rated 7.6, while Trend Vision One Endpoint Security is rated 8.2. The top reviewer of Elastic Security writes "A stable and scalable tool that provides visibility along with the consolidation of logs to its users". On the other hand, the top reviewer of Trend Vision One Endpoint Security writes "We can get consolidated logs of suspicious objects and malware attacks in a single console". Elastic Security is most compared with Wazuh, Splunk Enterprise Security, Microsoft Sentinel, IBM Security QRadar and Microsoft Defender for Endpoint, whereas Trend Vision One Endpoint Security is most compared with Trend Micro Deep Security, Microsoft Defender for Endpoint, Trend Vision One and Cortex XDR by Palo Alto Networks. See our Elastic Security vs. Trend Vision One Endpoint Security report.
See our list of best Endpoint Detection and Response (EDR) vendors.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.