ThetaRay vs Trellix Helix comparison

Cancel
You must select at least 2 products to compare!
ThetaRay Logo
15 views|10 comparisons
Trellix Logo
1,449 views|998 comparisons
100% willing to recommend
Featured Review
Use ThetaRay?
Abanoub Alfy
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pricing and Cost Advice
Information Not Available
  • "The price could be better. But I think it's rightly placed when we buy everything in one shot, and we get some discount for that. That's how we basically plan our deployment, and it's holistic. We pay for the license yearly."
  • "It could be cheaper, but that applies to every product."
  • "FireEye Helix is a little expensive."
  • "I rate Trellix Helix a five out of ten for pricing."
  • More Trellix Helix Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Anti-Money Laundering (AML) solutions are best for your needs.
    768,578 professionals have used our research since 2012.
    Questions from the Community
    Ask a question

    Earn 20 points

    Top Answer:Trellix Helix helps prevent email attacks, like phishing and email spoofing attacks.
    Top Answer:Trellix Helix's configuration and learning could be improved to identify normal traffic from abnormal and to identify trusted domains. Backup capturing should be included in the solution's next… more »
    Ranking
    Views
    15
    Comparisons
    10
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Views
    1,449
    Comparisons
    998
    Reviews
    2
    Average Words per Review
    353
    Rating
    8.5
    Comparisons
    Also Known As
    FireEye Helix, FireEye Threat Analytics
    Learn More
    ThetaRay
    Video Not Available
    Trellix
    Video Not Available
    Overview

    ThetaRay’s Industrial ThetaRay Asset Protection Cyber Solution (Industrial TAP-CyberTM) protects against unknown zero-day malware, targeted APT attacks, and sophisticated Stuxnet-like state sponsored cyber-attacks that target industrial critical infrastructure networks. Monitoring critical infrastructure networks and devices, such as various SCADA networks, aircrafts engines, medical equipment and more, the TAP-Cyber solution enables the real-time detection and actionable mitigation of unknown threats before any impact to production, safety or revenues can occur. ThetaRay’s non-intrusive industrial solution is deployed on-premises in a centralized location where it can access multi-site data collected by the customer (such as Historian data in the plant operating center), or locally protecting a specific site or entity (electrical utility

    substation, offshore Oil&Gas site, water pumping site, commercial airplane etc.)

    Trellix Helix is a cutting-edge product that revolutionizes the way businesses manage their data and streamline their operations. With its advanced features and user-friendly interface, Trellix Helix offers a comprehensive solution for businesses of all sizes. One of the key features of Trellix Helix is its powerful data management capabilities. 

    The product allows businesses to store, organize, and analyze large volumes of data in a secure and efficient manner. With its intuitive interface, users can easily navigate through the system and access the information they need, saving valuable time and effort. Trellix Helix also offers seamless integration with other business applications, making it a versatile tool for businesses. It can be easily integrated with existing systems, such as CRM and ERP software, allowing for a smooth flow of data across different platforms. This integration ensures that businesses have a holistic view of their operations and can make informed decisions based on accurate and up-to-date information. 

    Another standout feature of Trellix Helix is its robust reporting and analytics capabilities. It provides businesses with real-time insights and actionable intelligence, enabling them to identify trends, spot opportunities, and make data-driven decisions. The customizable dashboards and reports allow users to visualize data in a meaningful way, making it easier to understand complex information and communicate it effectively to stakeholders. 

    Trellix Helix offers advanced security features to protect sensitive business data. It employs industry-standard encryption protocols and access controls to ensure that data is secure and only accessible to authorized personnel. This level of security gives businesses peace of mind, knowing that their valuable information is protected from unauthorized access or breaches.

    Helix is a comprehensive and user-friendly solution for businesses looking to optimize their data management and streamline their operations. With its advanced features, seamless integration, robust reporting, and analytics capabilities, as well as top-notch security, Trellix Helix empowers businesses to make informed decisions, improve efficiency, and drive growth.

    Sample Customers
    ATM machines
    Police Bank, Verisk Analytics, Teck Resources
    Top Industries
    No Data Available
    VISITORS READING REVIEWS
    Computer Software Company15%
    Manufacturing Company11%
    Financial Services Firm8%
    Government8%
    Company Size
    No Data Available
    REVIEWERS
    Small Business25%
    Large Enterprise75%
    VISITORS READING REVIEWS
    Small Business27%
    Midsize Enterprise12%
    Large Enterprise61%

    ThetaRay is ranked 15th in Anti-Money Laundering (AML) while Trellix Helix is ranked 32nd in Security Information and Event Management (SIEM) with 7 reviews. ThetaRay is rated 0.0, while Trellix Helix is rated 8.6. On the other hand, the top reviewer of Trellix Helix writes "Helps prevent email attacks, like phishing and email spoofing attacks". ThetaRay is most compared with IBM Security QRadar, whereas Trellix Helix is most compared with LogRhythm SIEM, Microsoft Sentinel, Splunk Enterprise Security, Trellix ESM and IBM Security QRadar.

    We monitor all Anti-Money Laundering (AML) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.