SafeBreach vs Trellix Advanced Threat Defense comparison

Cancel
You must select at least 2 products to compare!
SafeBreach Logo
2,065 views|1,171 comparisons
100% willing to recommend
Trellix Logo
795 views|554 comparisons
83% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between SafeBreach and Trellix Advanced Threat Defense based on real PeerSpot user reviews.

Find out what your peers are saying about Pentera, Cymulate, Picus Security and others in Breach and Attack Simulation (BAS).
To learn more, read our detailed Breach and Attack Simulation (BAS) Report (Updated: April 2024).
769,630 professionals have used our research since 2012.
Featured Review
HossamSelim
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The most valuable feature is the reporting database and attack protection.""The most valuable feature is the huge library of hack attacks and breach methods."

More SafeBreach Pros →

"It is stable and reliable.""It stops in excess of twenty-five malware events per month, all of which could be critical to the business.""The most valuable features are the administration console and its detection and response module.""Its greatest strength is the DXL client which can rapidly disseminate attack information to all clients via the McAfee Agent instead of going through the ePO server.""I recommend this solution because of its ease of use.""It is very scalable.""Provides good exfiltration, and is an all-in-one product."

More Trellix Advanced Threat Defense Pros →

Cons
"There is room for improvement in the interface. It is not always easy to find the options that you need and not everything is customizable.""I would like to see some integration on the customization and customer support."

More SafeBreach Cons →

"There could be a tool that automatically updates all-new Microsoft IPs, which are available for free to connect to the client.""Make the ATD system a part of the whole product and take the whole thing onto the cloud. While it is there already, it is not to the same level as the on-premise version.""The initial setup was industry standard complex. It takes awhile and has a lot of planning involved. It could be simplified with product redesign.""This solution needs to be made "cloud ready".""Lacks remote capabilities not dependent on the internet.""I would like to see future versions of the solution incorporate artificial intelligence technology.""We'd like them to be better at dealing with script threats."

More Trellix Advanced Threat Defense Cons →

Pricing and Cost Advice
  • "The price starts from about $140,000 so this solution is expensive in my opinion. Maintenance and support is included in the license cost."
  • "The pricing is more expensive than other options on the market today."
  • More SafeBreach Pricing and Cost Advice →

  • "The product is expensive, but it is better than the rest of them in the industry."
  • "Our licensing fees for this solution are approximately one million dollars per year."
  • More Trellix Advanced Threat Defense Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Breach and Attack Simulation (BAS) solutions are best for your needs.
    769,630 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The most valuable feature is the reporting database and attack protection.
    Top Answer:The pricing is more expensive than other options on the market today.
    Top Answer:I would like to see some integration on the customization and customer support.
    Top Answer:I recommend this solution because of its ease of use.
    Top Answer:The product offers good pricing. It was not very expensive.
    Top Answer:There could be a tool that automatically updates all-new Microsoft IPs, which are available for free to connect to the client.
    Ranking
    Views
    2,065
    Comparisons
    1,171
    Reviews
    1
    Average Words per Review
    178
    Rating
    8.0
    Views
    795
    Comparisons
    554
    Reviews
    2
    Average Words per Review
    421
    Rating
    8.5
    Comparisons
    Also Known As
    McAfee Advanced Threat Defense
    Learn More
    Overview

    SafeBreach is the world's most widely used continuous security validation platform in enterprise companies. The company's patented platform empowers CISOs and their teams to validate security controls, maximize their effectiveness, and drive down risk. 

    SafeBreach provides a "hacker's view" of an enterprise's security posture by continuously validating security controls and presenting findings in customized dashboards to enable stakeholders to cleanly focus on the biggest risk to the organization. SafeBreach automatically and safely executes thousands of attack methods to validate network, endpoint, cloud, container, and email security controls against the Hacker's Playbook, the world's largest collection of attack data broken down by methods, tactics, and threat actors. Data from SafeBreach validations can improve SOC team responses and empower management to make smarter decisions to better manage risk and invest resources.

    Powerful advanced threat detection

    Uncover Hidden Threats

    Combine in-depth static code analysis, dynamic analysis (malware sandboxing), and machine learning to increase zero-day threat and ransomware detection.

    Threat Intelligence Sharing

    Immediately share threat intelligence across your entire infrastructure—including multi-vendor ecosystems—to reduce time from threat encounter to containment.

    Enable Investigation

    Validate threats and access critical indicators of compromise (IoCs) needed for investigation and threat hunting.

    Sample Customers
    PayPal, ICON, Netflix, Johnson & Johnson, CVS Health, Pepsi, Kellogg's, Cisco, Deloitte
    The Radicati Group, Florida International University, MGM Resorts International, County Durham andDarlington NHS Foundation Trust
    Top Industries
    VISITORS READING REVIEWS
    Financial Services Firm20%
    Computer Software Company12%
    Manufacturing Company9%
    Insurance Company6%
    REVIEWERS
    Manufacturing Company29%
    Computer Software Company29%
    Security Firm14%
    Financial Services Firm14%
    VISITORS READING REVIEWS
    Financial Services Firm14%
    Computer Software Company13%
    Manufacturing Company12%
    Government12%
    Company Size
    VISITORS READING REVIEWS
    Small Business18%
    Midsize Enterprise17%
    Large Enterprise65%
    REVIEWERS
    Small Business27%
    Midsize Enterprise36%
    Large Enterprise36%
    VISITORS READING REVIEWS
    Small Business23%
    Midsize Enterprise8%
    Large Enterprise69%
    Buyer's Guide
    Breach and Attack Simulation (BAS)
    April 2024
    Find out what your peers are saying about Pentera, Cymulate, Picus Security and others in Breach and Attack Simulation (BAS). Updated: April 2024.
    769,630 professionals have used our research since 2012.

    SafeBreach is ranked 5th in Breach and Attack Simulation (BAS) with 2 reviews while Trellix Advanced Threat Defense is ranked 21st in Advanced Threat Protection (ATP) with 8 reviews. SafeBreach is rated 8.0, while Trellix Advanced Threat Defense is rated 7.8. The top reviewer of SafeBreach writes "Breach and attach simulation solution used to test security tools with a valuable library of hacking data". On the other hand, the top reviewer of Trellix Advanced Threat Defense writes "Easy to set up and use with a nice interface". SafeBreach is most compared with Picus Security, Cymulate, Pentera, AttackIQ and XM Cyber, whereas Trellix Advanced Threat Defense is most compared with Microsoft Defender for Office 365, Fortinet FortiSandbox, Palo Alto Networks WildFire, Microsoft Defender for Identity and Trellix Network Detection and Response.

    We monitor all Breach and Attack Simulation (BAS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.