We performed a comparison between Elastic Security and Trend Micro Apex One based on real PeerSpot user reviews.
Find out in this report how the two Endpoint Detection and Response (EDR) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It is a scalable solution...The initial setup of Fortinet FortiEDR was straightforward."
"We have FortiEDR installed on all our systems. This protects them from any threats."
"I like FortiClient EMS. FortiEDR has a lot of great features like lockdown mode, remote wipes, and encryption. I can set malware outbreak policies and controls for detecting abnormalities. You can also simulate phishing attacks."
"The stability is very good."
"Exceptions are easy to create and the interface is easy to follow with a nice appearance."
"The product detects and blocks threats and is more proactive than firewalls."
"Fortinet is very user-friendly for customers."
"It is very easy to set up. I would rate my experience with the initial setup a ten out of ten, with ten being very easy to set up."
"The scalability is good. It can be scaled easily in the production environment."
"The most valuable feature is the scalability. We are in Indonesia, more engineers understand Elastic Security here. So it is easier to scale and also develop. In features, the discovery to query all the logs is very important to us. It is very easy, especially with the query function and the feature to generate alerts and create tools. Sometimes we use the alert security dashboard to monitor our clients."
"It's a good platform and the very best in the current market. We looked at the Forester report from December 2022 where it was said to be a leader."
"ELK Logstash is easy and fast, at least for the initial setup with the out of box uses."
"It's very customizable, which is quite helpful."
"The solution is quite stable. The performance has been good."
"Elastic is straightforward, easy to integrate, and highly customizable."
"Elastic provides the capability to index quickly due to the reverse indexes it offers. This data is crucial as it contains critical information. The reverse index allows fast data indexing because of Elastic's efficient search engine."
"It is very precise and allows more permission for different use cases."
"The most valuable feature is the antivirus."
"It's easy to use and used to be a very good solution."
"It provides comprehensive visibility into all client logs and seamlessly integrates with other products, such as CM."
"Stability-wise, it is a good product, and I rate it a ten out of ten."
"The number of accessories included is the most valuable feature."
"We have found the reports to be most valuable."
"The features I found most valuable in this solution are the micro apps. I also value the dashboard that offers better visibility and helps protect machines from attacks."
"Everything with Fortinet having to do with their cloud services. They need to invest more in their internal infrastructure that they are running in the cloud. One of the things I find with their cloud environment compared to others' is that they go cheap on the equipment. So it causes some performance degradation."
"To improve Fortinet, we need to see more features and technology areas at the endpoint level introduced."
"ZTNA can improve latency."
"It takes about two business days for initial support, which is too slow in urgent situations."
"The solution is not stable."
"The solution's installation from a central installation server could be improved because the engineers had a little bit of trouble getting it installed from a central location."
"Once, we had an event that was locked and blocked, but information about it came to us two or three days later."
"FortiEDR can be improved by providing more detailed reporting."
"The process of designing dashboards is a little cumbersome in Kibana. Unless you are an expert, you will not be able to use it. The process should be pretty straightforward. The authentication feature is what we are looking for. We would love to have a central authentication system in the open-source edition without the need for a license or an enterprise license. If they can give at least a simple authentication system within a company. In a large organization, authentication is very essential for security because logs can contain a lot of confidential data. Therefore, an authentication feature for who accesses it should be there."
"With Elastic Security, the challenge arises from the fact that there is a learning curve in relation to queries and understanding the query language provided to extract usable data."
"It could use maybe a little more on the Linux side."
"Authentication is not a default in Kibana. We need to have another tool to have authentication and authorization. These two should be part of Kibana."
"Better integration with third-party APMs would be really good."
"This type of monitoring is not very mature just yet. We need more real-time information in a way that's easier to manage."
"The problem with ELK is it's difficult to administer. When you have a problem, it can be very, very difficult to rebuild indexes."
"Its documentation should be a bit better. I have to spend at least a couple of hours to find the solution for a simple thing. When we buy Elastic, training is not included for free with Elastic. We have to pay extra for the training. They should include training in the price."
"If certain alerts could be translated into day-to-day English with some action plans, a few points, what to do, and how to do it, that would help me personally as IT Manager. They have some recommendations regarding the vulnerability of the endpoint. They take you to some very technical information and if you are not a security engineer or security-trained you might not understand what they're talking about. We are a small company and it would benefit if things were explained better, we cannot afford a dedicated Trend Micro Apex One engineer."
"It could be more customizable."
"We are completely satisfied with the functionality of the product, but the reporting should be more granular."
"The integration is lacking in Trend Micro Apex One. It does not integrate well with Microsoft p solutions. For example, with Office 365, we have to buy another solution for mail protection. That's why we are assessing Microsoft Defender 365 because we have an email from Microsoft, an endpoint from Microsoft, and we use Windows systems."
"We're not sure if we're going to continue with those products or their products or we're going to switch to something else. That's why we stopped the immigration process. If we were going to replace another product, it's not really efficient to waste time on it moving patients and other clients."
"Recently, we had a malware attack and considered looking at other cloud solutions because of this breach."
"They need to integrate the DLP with the EDR."
"We have had some false positives with One Endpoint Security's ransomware detection. We received an alert, but it wasn't a ransomware attack. When we did an investigation, we found it was only malware."
Elastic Security is ranked 16th in Endpoint Detection and Response (EDR) with 59 reviews while Trend Micro Apex One is ranked 6th in Endpoint Detection and Response (EDR) with 125 reviews. Elastic Security is rated 7.6, while Trend Micro Apex One is rated 8.2. The top reviewer of Elastic Security writes "A stable and scalable tool that provides visibility along with the consolidation of logs to its users". On the other hand, the top reviewer of Trend Micro Apex One writes "We can get consolidated logs of suspicious objects and malware attacks in a single console". Elastic Security is most compared with Wazuh, Splunk Enterprise Security, Microsoft Sentinel, IBM Security QRadar and Microsoft Defender for Endpoint, whereas Trend Micro Apex One is most compared with Trend Micro Deep Security, Microsoft Defender for Endpoint, Cortex XDR by Palo Alto Networks, CrowdStrike Falcon and Trend Micro Smart Protection. See our Elastic Security vs. Trend Micro Apex One report.
See our list of best Endpoint Detection and Response (EDR) vendors.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.