FireEye Endpoint Security Pros and Cons

FireEye Endpoint Security Pros

SB
Sr Manager - Information Security & Researcher at a tech services company with 1,001-5,000 employees
It is easy to use, flexible, and stable. Because it is a cloud-based solution and it integrates all endpoints of the cloud, we can do an IOC-based search. It can search the entire enterprise and tell us the endpoints that are possibly compromised.
It has a feature called Isolation. If a device is compromised, we can connect it to our SOC, and no one would be able to access it. This way we can limit the damage to the network while we are investigating.
View full review »
Information Technology Security Architect at a financial services firm with 5,001-10,000 employees
The most valuable feature of this solution is its simplicity.
View full review »
RT
Manager at a tech company with 1,001-5,000 employees
FireEye Endpoint Security's scalability is awesome. I think it is one of the best on that front.
View full review »
Learn what your peers think about FireEye Endpoint Security. Get advice and tips from experienced pros sharing their opinions. Updated: July 2021.
522,946 professionals have used our research since 2012.
MK
Deputy Technical Manager (SOC Operations) at a tech services company with 1,001-5,000 employees
The exploit guard and malware protection features are very useful. The logon tracker feature is also very useful. They have also given new modules such as logout backup, process backup. We ordered these modules from the FireEye market place, and we have installed these modules. We are currently exploring these features.
View full review »
MO
product manager at MCS
The most valuable network security feature is the network sandbox solution. This sandbox feature works on traffic flow.
The investigation and forensic analysis have been most helpful.
View full review »
MK
IT Security Engineer at Miltec
The most valuable feature is the integration between environments.
View full review »

FireEye Endpoint Security Cons

SB
Sr Manager - Information Security & Researcher at a tech services company with 1,001-5,000 employees
Malware detection can be better. It doesn't have support and detection for the recent malware, but it has a compensatory control where it can do the behavior-based assessment and alert you when there is something malicious or unexpected. For example, when a certain user is executing the privilege command, which is not normal. These dynamic detections are good, and they compensate for malware detection.
It has very good integrations. However, its integration with Palo Alto was not good, and they seem to be working on it at the backend. It is not very resource-hungry, but it can be even better in terms of resource utilization. It could be improved in terms of efficiency, memory sizing, and disk consumption by agents.
They have something called Managed Detection and Response. They get intel from their customers, and that intel is shared with the rest of FireEye's customers. I want to subscribe to their intel, but that is not available to us.
View full review »
Information Technology Security Architect at a financial services firm with 5,001-10,000 employees
The integration and display of the dashboards have to be done better.
View full review »
RT
Manager at a tech company with 1,001-5,000 employees
The reports need more development. They need more details on the reports and more details taking the executive view into consideration.
View full review »
Learn what your peers think about FireEye Endpoint Security. Get advice and tips from experienced pros sharing their opinions. Updated: July 2021.
522,946 professionals have used our research since 2012.
MK
Deputy Technical Manager (SOC Operations) at a tech services company with 1,001-5,000 employees
The Linux support is very poor. I use base detection. Currently, they are providing malware protection and logon track features in Windows and Mac. These features aren't available in Linux. It will be helpful to extend these capabilities to Linux. We would also like assets grouping and device lock protection features, which are included in their roadmap.
View full review »
MO
product manager at MCS
They could also increase or improve the scalability because to my knowledge the biggest bandwidth can only support up to 10 gigs of input.
If you have another endpoint product running on the same machine, you have to fine tune functions from FireEye to avoid performance and user experience issues.
View full review »
MK
IT Security Engineer at Miltec
I would like to see simple processing and reporting online.
View full review »
Learn what your peers think about FireEye Endpoint Security. Get advice and tips from experienced pros sharing their opinions. Updated: July 2021.
522,946 professionals have used our research since 2012.