We performed a comparison between Cybereason Endpoint Detection & Response and Trellix ESM based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, SentinelOne, CrowdStrike and others in Endpoint Detection and Response (EDR)."NGAV and EDR features are outstanding."
"The solution was relatively easy to deploy."
"The features that I have found most valuable are the ability to customize it and to reduce its size. It lets you run in a very small window in terms of memory and resources on legacy cash registers."
"Fortinet FortiEDR made our clients feel secure and more at ease, knowing that they had an EDR solution that would close the gap in their security posture."
"It notifies us if there's any suspicious file on any PC. If any execution or similar kind of thing is happening, it just alerts us. It doesn't only alert. It also blocks the execution until we allow it. We check whether the execution is legitimate or not, and then approve it or keep it blocked. This gives us a little bit of control over this mechanism. Fortinet FortiEDR is also very straightforward and easy to maintain."
"he solution is an anti-malware product that integrates well with other vendor products such as firewalls, SIEM, etc. It captures threat intelligence and gives you better visibility. The product also has sandboxing features."
"Exceptions are easy to create and the interface is easy to follow with a nice appearance."
"The product detects and blocks threats and is more proactive than firewalls."
"It gives all the information in a clear response."
"Their EDR solution, the ability to mitigate issues through their command line, is probably the best feature that we've had. We use that all the time. It's very useful for doing investigations."
"The interface is user-friendly."
"For me, the technical support is good."
"The initial setup was easy and straightforward."
"The solution is efficient."
"I haven't had any issues with the solution. Stability-wise, I rate the solution a ten out of ten."
"The most valuable feature is the capability of the command used by the machine so that we see the kind of performance that is running."
"The most valuable features of McAfee ESM are intrusion detection, malware protection, and the device controller."
"The solution's technical support is great."
"I rate the tool's deployment an eight out of ten. The deployment is completed in two days."
"The most valuable feature for us is that it comes with many correlations, reports, and dashboards already available. It's also very easy to use."
"It is user-friendly. The notification part of McAfee ESM is very easy."
"I like the ease of deployment."
"It is a good central viewpoint for issues. These can then be investigated in more detail on the subnet server(s)/endpoints."
"It is easy to use and deploy. It comes with user-friendly manuals."
"I haven't seen the use of AI in the solution."
"FortiEDR can be improved by providing more detailed reporting."
"They can include the automation for the realtime updates. We have a network infrastructure with remote sites. Whenever they send updates, they are not automated. We have to go into the console and push those updates. I wish it was more automated. The update file is currently around 31 MB. It could be smaller."
"The only minor concern is occasional interference with desired programs."
"ZTNA can improve latency."
"The support needs improvement."
"It takes about two business days for initial support, which is too slow in urgent situations."
"Integration with Azure and SaaS provisioning tools could improve Fortinet FortiEDR."
"The deployment on individual endpoints is more geared toward larger organizations. It might prove to be a bit too complicated for a smaller organization. You need to know what you're doing when you're deploying the sensor."
"I feel that the product lacks reporting features and needs improvement."
"The product's reporting isn't great."
"The reporting feature needs improvement."
"There can be problems with the EDI."
"They need to improve their technical support services."
"It should be more stable, and the sensor needs improvement in terms of connectivity."
"It initially took some time to deploy."
"We acquired the IBM product because McAfee is slightly confusing to use, and it's broader."
"There should be support for multitenancy in the product."
"The initial setup is difficult and could improve."
"The solution needs to improve case management. The UI is confusing."
"The only issue I have with McAfee is the amount of computer resources that it takes... it's definitely impacting some of the other applications that are running on a computer at the same time."
"I have to purchase a new box now. Its existing box is not scalable and I can't use it anymore."
"We would welcome integrations with some of the new McAfee acquisitions, e.g., behavioural analytics."
"The support from McAfee ESM could improve. They could improve the speed."
More Cybereason Endpoint Detection & Response Pricing and Cost Advice →
Cybereason Endpoint Detection & Response is ranked 37th in Endpoint Detection and Response (EDR) with 19 reviews while Trellix ESM is ranked 18th in Security Information and Event Management (SIEM) with 34 reviews. Cybereason Endpoint Detection & Response is rated 8.0, while Trellix ESM is rated 7.4. The top reviewer of Cybereason Endpoint Detection & Response writes "It has helped us become more knowledgeable about our environment and aware of threats". On the other hand, the top reviewer of Trellix ESM writes "Provides visibility of all the traffic within the company infrastructure". Cybereason Endpoint Detection & Response is most compared with CrowdStrike Falcon, Microsoft Defender for Endpoint, Cortex XDR by Palo Alto Networks, Darktrace and SentinelOne Singularity Complete, whereas Trellix ESM is most compared with ArcSight Enterprise Security Manager (ESM), IBM Security QRadar, Splunk Enterprise Security, LogRhythm SIEM and SQRRL.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.