FireEye Endpoint Security Pros and Cons

FireEye Endpoint Security Pros

Hubert Luberek
Information Technology Security Architect at a financial services firm with 5,001-10,000 employees
The most valuable feature of this solution is its simplicity.
View full review »
reviewer1406157
Deputy Technical Manager (SOC Operations) at a tech services company with 1,001-5,000 employees
The exploit guard and malware protection features are very useful. The logon tracker feature is also very useful. They have also given new modules such as logout backup, process backup. We ordered these modules from the FireEye market place, and we have installed these modules. We are currently exploring these features.
View full review »
Technicalconsult568
Technical Consultant at MCS
The most valuable network security feature is the network sandbox solution. This sandbox feature works on traffic flow.
The investigation and forensic analysis have been most helpful.
View full review »
Find out what your peers are saying about FireEye, CrowdStrike, Carbon Black and others in Endpoint Detection and Response (EDR). Updated: October 2020.
441,672 professionals have used our research since 2012.
Executiv435c
Executive Officer at a tech services company with 10,001+ employees
It is very valuable in finding out unknown malware.
View full review »
Muhanad Khader
IT Security Engineer at Miltec
The most valuable feature is the integration between environments.
View full review »

FireEye Endpoint Security Cons

Hubert Luberek
Information Technology Security Architect at a financial services firm with 5,001-10,000 employees
The integration and display of the dashboards have to be done better.
View full review »
reviewer1406157
Deputy Technical Manager (SOC Operations) at a tech services company with 1,001-5,000 employees
The Linux support is very poor. I use base detection. Currently, they are providing malware protection and logon track features in Windows and Mac. These features aren't available in Linux. It will be helpful to extend these capabilities to Linux. We would also like assets grouping and device lock protection features, which are included in their roadmap.
View full review »
Technicalconsult568
Technical Consultant at MCS
They could also increase or improve the scalability because to my knowledge the biggest bandwidth can only support up to 10 gigs of input.
If you have another endpoint product running on the same machine, you have to fine tune functions from FireEye to avoid performance and user experience issues.
View full review »
Find out what your peers are saying about FireEye, CrowdStrike, Carbon Black and others in Endpoint Detection and Response (EDR). Updated: October 2020.
441,672 professionals have used our research since 2012.
Executiv435c
Executive Officer at a tech services company with 10,001+ employees
I hope the solution can be used in cloud systems going forward.
View full review »
Muhanad Khader
IT Security Engineer at Miltec
I would like to see simple processing and reporting online.
View full review »
Find out what your peers are saying about FireEye, CrowdStrike, Carbon Black and others in Endpoint Detection and Response (EDR). Updated: October 2020.
441,672 professionals have used our research since 2012.