We performed a comparison between Sophos Intercept X and Trend Micro Apex One based on our users’ reviews in four categories. After reading all of the collected data, you can find our conclusion below.
Comparison Results: Trend Micro Apex One comes out on top in this comparison. According to its reviewers, it is the more lightweight solution and easy to set up. In addition, many of its reviewers feel that it is reasonably priced.
"Exceptions are easy to create and the interface is easy to follow with a nice appearance."
"Having all monitoring, response, tracking, and mitigation tools in one dashboard provides our analysts and SOC team with a comprehensive view at a glance."
"It is stable and scalable."
"The product's initial setup phase is very easy."
"The features that I have found most valuable are the ability to customize it and to reduce its size. It lets you run in a very small window in terms of memory and resources on legacy cash registers."
"Fortinet FortiEDR made our clients feel secure and more at ease, knowing that they had an EDR solution that would close the gap in their security posture."
"NGAV and EDR features are outstanding."
"The product detects and blocks threats and is more proactive than firewalls."
"The most valuable features of Sophos Intercept X are the minimal configuration needed for the end user and the central view of all the endpoints. There are plenty of tools to control and manage the endpoints. Additionally, there is the capability of connecting the endpoint to the CLI."
"The security on offer is pretty good. We are happy with it."
"After that, the client switched to Sophos to get the protection they lacked. It either works or it doesn’t and Sophos works."
"The Managed Detection and Response service provided by Intercept X Endpoint is highly valuable. With a team of 600-700 individuals monitoring systems, they swiftly respond to attacks, either informing us to isolate or directly removing threats. This full MDR service is especially recommended for sectors like finance, where data security is critical. The deep learning technology within Intercept X Endpoint enhances our security posture by analyzing behaviors and algorithms to differentiate between legitimate users and threats, effectively preventing attacks on our network infrastructure."
"What I have found the most valuable about Sophos Intercept X is the ease of use with management administration and the solution's ability to stop exploits and ransomware."
"Since it's cloud-managed, the solution is easy to administer, especially if the person using it is in a different geophysical location."
"We most value the price and interface quality with Sophos Intercept X. We focus on solution quality."
"The most valuable feature is the anti-ransomware capability. It's been helpful because we have been seeing a lot of information around what the ransomware hit."
"Its ability to detect ransomware and malware is the most valuable. Its protection is also good."
"It is available on our OS platform and will automatically scan our machines daily or weekly."
"Trend Micro Apex One has good features and is lightweight."
"The initial setup is not that tough. It's easy."
"Web reputation and behavior monitoring are valuable features, as they allow us to control which websites users can visit and download from, and to protect against ransomware."
"The scalability is perfect."
"It has the ability to share, which is not available in other products."
"I'm using the cloud solution, which I really like. I like being able to update policies on the cloud so that when users who are working from home connect to the internet, their laptops will be updated automatically. I also like that this solution is easy to use and is stable and scalable"
"Making the portal mobile friendly would be helpful when I am out of office."
"The solution's installation from a central installation server could be improved because the engineers had a little bit of trouble getting it installed from a central location."
"The only minor concern is occasional interference with desired programs."
"The solution is not stable."
"Cannot be used on mobile devices with a secure connection."
"The solution should address emerging threats like SQL injection."
"I haven't seen the use of AI in the solution."
"We've encountered challenges during API deployment, occasionally resulting in unstable environments."
"In terms of the site-to-site VPN elements, they tend to concentrate. It's quite simple when there are Meraki devices at both ends of the VPN but if there is another user at one end, on another device, it can be a bit tricky. So they could really simplify that process a bit."
"We had some initial problems with our deployment, and they were more around uninstalling Sophos Basic and installing Sophos Intercept X. We had some challenges with some of the uninstallation scripts. They can improve the deployment of Sophos Intercept X when there is already an existing Sophos version. They can also provide more information in the form of best practices and lessons learned from previous findings. A knowledge base with this type of information would be helpful."
"To be a perfect product, the price would have to be a bit better."
"The security is good but the feature set is limited."
"If Sophos Intercept allows users to restrict website access based on specific needs, such as streaming new videos for business purposes, we would prefer to use that."
"Intercept X needs more reporting and device management features, so I can get messages from PCs that let me know if I need to do something with them."
"Needs more flexible reporting, particularly for medium to large size companies."
"It's a bit heavy on the computers. So once you install it, the computer slows down. It is a resource-intensive solution."
"The support could be more customer-friendly, although my experience with them has been okay."
"There is room for improvement in next-gen attacks protection."
"We have found that this product is a bit heavy on the endpoints."
"Trend Micro Apex One can improve its vulnerability assessment and monitoring tools."
"The integration could improve in this solution."
"Trend Micro's encryption is not up to the mark. We tried their encryption product, but we did not like it. Encryption was difficult to manage."
"The reporting can be improved. We'd like to have had broader insights as to what was happening on a machine."
"If certain alerts could be translated into day-to-day English with some action plans, a few points, what to do, and how to do it, that would help me personally as IT Manager. They have some recommendations regarding the vulnerability of the endpoint. They take you to some very technical information and if you are not a security engineer or security-trained you might not understand what they're talking about. We are a small company and it would benefit if things were explained better, we cannot afford a dedicated Trend Micro Apex One engineer."
Intercept X Endpoint is ranked 7th in EPP (Endpoint Protection for Business) with 96 reviews while Trend Micro Apex One is ranked 6th in EPP (Endpoint Protection for Business) with 123 reviews. Intercept X Endpoint is rated 8.4, while Trend Micro Apex One is rated 8.2. The top reviewer of Intercept X Endpoint writes "A standard offering with good threat analysis but reduces machine performance". On the other hand, the top reviewer of Trend Micro Apex One writes "Good monitoring and server protection with helpful machine learning". Intercept X Endpoint is most compared with Microsoft Defender for Endpoint, CrowdStrike Falcon, Kaspersky Endpoint Security for Business, SentinelOne Singularity Complete and Seqrite Endpoint Security, whereas Trend Micro Apex One is most compared with Trend Micro Deep Security, Microsoft Defender for Endpoint, Cortex XDR by Palo Alto Networks, Trend Micro Smart Protection and SentinelOne Singularity Complete. See our Intercept X Endpoint vs. Trend Micro Apex One report.
See our list of best EPP (Endpoint Protection for Business) vendors and best EDR (Endpoint Detection and Response) vendors.
We monitor all EPP (Endpoint Protection for Business) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.