We just raised a $30M Series A: Read our story

Compare Fidelis Elevate vs. FireEye Endpoint Security

Cancel
You must select at least 2 products to compare!
Featured Review
Find out what your peers are saying about Fidelis Elevate vs. FireEye Endpoint Security and other solutions. Updated: July 2020.
552,305 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
"What I like the most about this solution is the complexity. It covers a lot of areas, unlike other solutions.""Compared to similar solutions, it's quite scalable. You just need to add more storage to scale-up."

More Fidelis Elevate Pros »

"It's a stable solution with good performance.""FireEye Endpoint Security is easy to use and lightweight compared to others.""The exploit guard and malware protection features are very useful. The logon tracker feature is also very useful. They have also given new modules such as logout backup, process backup. We ordered these modules from the FireEye market place, and we have installed these modules. We are currently exploring these features.""FireEye Endpoint Security's scalability is awesome. I think it is one of the best on that front.""It has a feature called Isolation. If a device is compromised, we can connect it to our SOC, and no one would be able to access it. This way we can limit the damage to the network while we are investigating.""It is easy to use, flexible, and stable. Because it is a cloud-based solution and it integrates all endpoints of the cloud, we can do an IOC-based search. It can search the entire enterprise and tell us the endpoints that are possibly compromised."

More FireEye Endpoint Security Pros »

Cons
"The reports in the endpoint area of Elevate can be improved.""Configuration, in terms of building the collector and communicating with endpoints, is complex."

More Fidelis Elevate Cons »

"The Linux support is very poor. I use base detection. Currently, they are providing malware protection and logon track features in Windows and Mac. These features aren't available in Linux. It will be helpful to extend these capabilities to Linux. We would also like assets grouping and device lock protection features, which are included in their roadmap.""It has very good integrations. However, its integration with Palo Alto was not good, and they seem to be working on it at the backend. It is not very resource-hungry, but it can be even better in terms of resource utilization. It could be improved in terms of efficiency, memory sizing, and disk consumption by agents.""We would like to solution to offer better security.""The reports need more development. They need more details on the reports and more details taking the executive view into consideration.""They have something called Managed Detection and Response. They get intel from their customers, and that intel is shared with the rest of FireEye's customers. I want to subscribe to their intel, but that is not available to us.""Most of these types of solutions including others, such as Carbon Black and FortiEDR, all have the same features. However, Carbon Black is the leader when it comes to being robust and user-friendly and this solution should improve in those areas to stay more competitive.""Malware detection can be better. It doesn't have support and detection for the recent malware, but it has a compensatory control where it can do the behavior-based assessment and alert you when there is something malicious or unexpected. For example, when a certain user is executing the privilege command, which is not normal. These dynamic detections are good, and they compensate for malware detection."

More FireEye Endpoint Security Cons »

Pricing and Cost Advice
"It's quite expensive but we can customize it to reduce the price."

More Fidelis Elevate Pricing and Cost Advice »

Information Not Available
report
Use our free recommendation engine to learn which Extended Detection and Response (XDR) solutions are best for your needs.
552,305 professionals have used our research since 2012.
Questions from the Community
Top Answer: Compared to similar solutions, it's quite scalable. You just need to add more storage to scale-up.
Top Answer: The detection is determined by the analyst. The analyst has to do the detection. It's not similar to FireEye Mandiant, which has pre-set detection. Still, Fidelis Elevate is improving. As of now, they… more »
Top Answer: Overall, as someone who has three years of experience with this solution, on a scale from one to ten, I would give Fidelis Elevate a rating of seven. I would not recommend this solution to others… more »
Top Answer:  The Crowdstrike Falcon program has a simple to use user interface, making it both an easy to use as well as an effective program. Its graphical design is such that it makes an extremely useful… more »
Top Answer: It is easy to use, flexible, and stable. Because it is a cloud-based solution and it integrates all endpoints of the cloud, we can do an IOC-based search. It can search the entire enterprise and tell… more »
Top Answer: If you compare your solution without the antivirus solution, and the price of the agent, it is a little bit expensive. But when you learn more about the value of forensic analysis, you will pay those… more »
Ranking
Views
2,106
Comparisons
1,368
Reviews
2
Average Words per Review
306
Rating
8.0
Views
8,420
Comparisons
7,015
Reviews
4
Average Words per Review
553
Rating
8.3
Comparisons
Also Known As
Fidelis Elevate Platform, Fidelis Enterprise, Fidelis Cloud
Learn More
Overview

Fidelis Elevate integrates network visibility, data loss prevention, deception, and endpoint detection and response into one unified solution. Now your security team can focus on the most urgent threats and protect sensitive data rather than spending time validating and triaging thousands of alerts.

FireEye Endpoint Security is an integrated endpoint solution that detects, prevents and responds effectively to known malware and threats traditional anti-virus endpoint security products miss. It expands endpoint visibility and provides contextual frontline intelligence to help analysts automate protection, quickly determine the exact scope and level of any attack activity and adapt defenses as needed.

Offer
Learn more about Fidelis Elevate
Learn more about FireEye Endpoint Security
Sample Customers
First Midwest Bank
Tech Resources Limited, Globe Telecom, Rizal Commercial Banking Corporation
Top Industries
VISITORS READING REVIEWS
Computer Software Company33%
Comms Service Provider13%
Government9%
Insurance Company5%
VISITORS READING REVIEWS
Computer Software Company24%
Comms Service Provider19%
Government11%
Financial Services Firm7%
Company Size
No Data Available
REVIEWERS
Small Business40%
Large Enterprise60%
Find out what your peers are saying about Fidelis Elevate vs. FireEye Endpoint Security and other solutions. Updated: July 2020.
552,305 professionals have used our research since 2012.

Fidelis Elevate is ranked 6th in Extended Detection and Response (XDR) with 2 reviews while FireEye Endpoint Security is ranked 13th in Endpoint Detection and Response (EDR) with 5 reviews. Fidelis Elevate is rated 8.0, while FireEye Endpoint Security is rated 8.2. The top reviewer of Fidelis Elevate writes "A scalable yet complex solution with some detection issues". On the other hand, the top reviewer of FireEye Endpoint Security writes "Enables us to do IOC-based search across the enterprise and isolate compromised devices". Fidelis Elevate is most compared with Cortex XDR by Palo Alto Networks, Attivo Networks, ExtraHop Reveal(x), Vectra AI and SentinelOne, whereas FireEye Endpoint Security is most compared with CrowdStrike Falcon, Darktrace, Microsoft Defender for Endpoint, Tanium and Cortex XDR by Palo Alto Networks. See our Fidelis Elevate vs. FireEye Endpoint Security report.

We monitor all Extended Detection and Response (XDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.