AdaptiveMobile vs Trellix Collaboration Security comparison

Cancel
You must select at least 2 products to compare!
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pricing and Cost Advice
Information Not Available
  • "The solution requires a license to be purchased for every user."
  • "The licensing is on a yearly basis."
  • "The cost is very high."
  • More Trellix Collaboration Security Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Mobile Threat Defense solutions are best for your needs.
    765,234 professionals have used our research since 2012.
    Questions from the Community
    Ask a question

    Earn 20 points

    Top Answer:FireEye Email Security helps us prevent spam and phishing emails and all other business-compromised email attacks.
    Top Answer:In the next release, I'd like to see them provide more integration features.
    Top Answer:Our primary use case for this solution is as a layer of advanced security for emails. FireEye Email Security helps us prevent spam and phishing emails and all other business-compromised email attacks.
    Ranking
    8th
    Views
    35
    Comparisons
    17
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    17th
    out of 107 in Email Security
    Views
    2,389
    Comparisons
    1,979
    Reviews
    3
    Average Words per Review
    350
    Rating
    8.7
    Comparisons
    Also Known As
    AdaptiveMobile Messaging Security
    FireEye Email Security
    Learn More
    Trellix
    Video Not Available
    Overview

    AdaptiveMobile Security provides advanced protection against cybercrime that is exploiting the mobile messaging channel and can help operators, aggregators and inter-exchange carriers take the right steps to tackle a broad range of challenges to their messaging services. Using distributed real-time autonomous AI policy decision engines to implement-advanced network control and leveraging Machine Learning techniques to build advanced threat detection algorithms and trust reputation scoring, the Messaging Protection platform can identify and block attacks, render useless advanced persistent attackers’ infrastructure and prevent the use of private information by automated messaging attack campaigns. Ensuring the security of an operator’s current and future messaging services and enforcing personal preferences and privacy.

    Trellix Collaboration Security is a comprehensive solution designed to protect sensitive data and ensure secure collaboration within organizations. With the increasing reliance on digital platforms for communication and collaboration, it is crucial to have robust security measures in place. Trellix Collaboration Security offers a range of features to safeguard data and prevent unauthorized access.

    One of the key features of Trellix Collaboration Security is its advanced encryption capabilities. All data transmitted and stored within the platform is encrypted using industry-standard encryption algorithms, ensuring that it remains secure and protected from potential threats. This encryption extends to all communication channels, including emails, file transfers, and instant messaging, providing end-to-end security.

    To further enhance security, Trellix Collaboration Security incorporates multi-factor authentication. This means that users are required to provide multiple forms of identification, such as passwords, biometrics, or security tokens, to access the platform. This significantly reduces the risk of unauthorized access, as even if one factor is compromised, the others provide an additional layer of protection.

    In addition to encryption and multi-factor authentication, Trellix Collaboration Security offers robust access controls. Administrators can define and enforce granular access permissions, ensuring that only authorized individuals can view, edit, or share specific documents or folders. This helps prevent data leakage and ensures that sensitive information is only accessible to those who need it.

    Trellix Collaboration Security also includes comprehensive auditing and monitoring capabilities. Administrators can track user activities, monitor file transfers, and generate detailed reports to identify any suspicious or unauthorized behavior. This proactive approach allows organizations to quickly detect and respond to potential security breaches, minimizing the impact on data integrity and confidentiality.

    Sample Customers
    AT&T, Claro, Omantel, Telcel
    Northshore Utility District, Luz Technologies, Air Academy Federal Credit Union, Bank Gutmann, Bank of Thailand, Penn State Health Milton S. Hershey Medical Center, State of Missouri, City and County of San Francisco, Denver Public Schools, Vodafone, Go Auto, Stater Bros. Market
    Top Industries
    No Data Available
    VISITORS READING REVIEWS
    Financial Services Firm15%
    Computer Software Company13%
    Government8%
    Manufacturing Company8%
    Company Size
    No Data Available
    REVIEWERS
    Small Business42%
    Midsize Enterprise25%
    Large Enterprise33%
    VISITORS READING REVIEWS
    Small Business14%
    Midsize Enterprise13%
    Large Enterprise73%

    AdaptiveMobile is ranked 8th in Mobile Threat Defense while Trellix Collaboration Security is ranked 17th in Email Security with 12 reviews. AdaptiveMobile is rated 0.0, while Trellix Collaboration Security is rated 8.6. On the other hand, the top reviewer of Trellix Collaboration Security writes "Protects from advanced malware and phishing attacks; useful dashboard". AdaptiveMobile is most compared with , whereas Trellix Collaboration Security is most compared with Cisco Secure Email, Proofpoint Email Protection, Microsoft Defender for Office 365, Microsoft Exchange Online Protection (EOP) and Trend Micro Email Security.

    We monitor all Mobile Threat Defense reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.