We performed a comparison between SafeBreach and Trellix Network Detection and Response based on real PeerSpot user reviews.
Find out what your peers are saying about Pentera, Cymulate, Picus Security and others in Breach and Attack Simulation (BAS)."The most valuable feature is the huge library of hack attacks and breach methods."
"The most valuable feature is the reporting database and attack protection."
"The most valuable feature is MVX, which tests all of the files that have been received in an email."
"The features that I find most valuable are the MIR (Mandiant Incident Response) for checks on our inbound security."
"If we are receiving spam emails, or other types of malicious email coming from a particular email ID, then we are able to block them using this solution."
"The installation phase was easy."
"The product has helped improve our organization by being easy to use and integrate. This saves time, trouble and money."
"The product is very easy to configure."
"Initially, we didn't have much visibility around what is occurring at our applications lower level. For instance, if we are exposed to any malicious attacks or SQL injections. But now we've integrated FireEye with Splunk, so now we get lots of triggers based on policy content associated with FireEye. The solution has allowed for growth and improvement in our information security and security operations teams."
"The most valuable feature is the network security module."
"There is room for improvement in the interface. It is not always easy to find the options that you need and not everything is customizable."
"I would like to see some integration on the customization and customer support."
"The product's integration capabilities are an area of concern where improvements are required."
"It doesn't connect with the cloud, advanced machine learning is not there. A known threat can be coming into the network and we would want the cloud to look up the problem. I would also like to see them develop more file replication and machine learning."
"They can maybe consider supporting some compliance standards. When we are configuring rules and policies, it can guide whether they are compliant with a particular compliance authority. In addition, if I have configured some rules that have not been used, it should give a report saying that these rules have not been used in the last three months or six months so that I disable or delete those rules."
"It is very expensive, the price could be better."
"Based on what we deployed, they should emphasize the application filtering and the web center. We need to look deeper into the SSM inspection. If we get the full solution with that module, we don't need to get the SSM database from another supplier."
"Management of the appliance could be greatly improved."
"The world is currently shifting to AI, but FIreEye is not following suit."
"It would be great if we could create granular reports based on the protocols, types of attacks, regions of attack, etc. Also we would like to easily be able to add exceptions to rules in cases of false positives."
More Trellix Network Detection and Response Pricing and Cost Advice →
SafeBreach is ranked 5th in Breach and Attack Simulation (BAS) with 2 reviews while Trellix Network Detection and Response is ranked 14th in ATP (Advanced Threat Protection) with 35 reviews. SafeBreach is rated 8.0, while Trellix Network Detection and Response is rated 8.6. The top reviewer of SafeBreach writes "Breach and attach simulation solution used to test security tools with a valuable library of hacking data". On the other hand, the top reviewer of Trellix Network Detection and Response writes "Blocks traffic and DDoS attacks ". SafeBreach is most compared with Picus Security, Cymulate, Pentera, AttackIQ and XM Cyber, whereas Trellix Network Detection and Response is most compared with Fortinet FortiSandbox, Palo Alto Networks WildFire, Fortinet FortiGate, Zscaler Internet Access and Cisco Secure Firewall.
We monitor all Breach and Attack Simulation (BAS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.