FireEye Endpoint Security Reviews

Filter by:Reset all filters
industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
rating
Loading...
Filter Unavailable
Hubert Luberek
Real User
Information Technology Security Architect at a financial services firm with 5,001-10,000 employees
Aug 08 2019

What is most valuable?

The most valuable feature of this solution is its simplicity. The triage process is quite effective, and it is compatible with many different systems.

How has it helped my organization?

This solution has helped to protect our organization against security threats.

What needs improvement?

We had a very large problem that has, unfortunately, not been solved. Simply put, when we start the computer the program will not start. We have encouraged FireEye to solve this problem because we have to manually start this product each… more»

If you previously used a different solution, which one did you use and why did you switch?

We did use another solution prior to this, but because we have the entire FireEye suite, we decided to create a more monolithic approach to security using different products. These include FireEye EX and FireEye AX, which are used for… more»

What other advice do I have?

I like FireEye products, and they have a huge portfolio for this solution. However, this is not a magic bullet where you can install it and your problems will disappear. The problem is with the people, rather than the tool. From my… more»
Technicalconsult568
Reseller
Technical Consultant at MCS
Sep 25 2019

What is most valuable?

The most valuable network security feature is the network sandbox solution. This sandbox feature works on traffic flow. Detects multi stages attacks based on MVX analytics engine which detects… more»

What needs improvement?

They could use a Host Intrusion Prevention System (HIPS) and application control module. If you have another endpoint product running on the same machine, you have to fine tune functions from FireEye… more»

What's my experience with pricing, setup cost, and licensing?

The current pricing is much better than before because they now offer product-related promotions along with some changes in product licensing. The new pricing model is better than before. It is a… more»

If you previously used a different solution, which one did you use and why did you switch?

Before FireEye, we used McAfee Endpoint Protection and Trend Micro.

What other advice do I have?

It offers protection from the latest threats.

Which other solutions did I evaluate?

We also looked at Palo Alto Networks Traps and Trend Micro.
Find out what your peers are saying about FireEye, CrowdStrike, Carbon Black and others in Endpoint Detection and Response. Updated: September 2019.
370,827 professionals have used our research since 2012.
Real User
Executive Officer at a tech services company with 10,001+ employees
Mar 20 2019

What is most valuable?

It is very valuable in finding out unknown malware.

How has it helped my organization?

The solution made it possible for us to have visibility into the amount of malware and threats which were coming into our company. The solution has helped to increase staff productivity.

What needs improvement?

I hope the solution can be used in cloud systems going forward.

If you previously used a different solution, which one did you use and why did you switch?

We did not use a solution prior to this one.

What other advice do I have?

First, implement it. Then, see what is going on in your company. You will see that there are many risks which you have never seen. The product is not bad, but there may be somethings that need to be… more»

Which other solutions did I evaluate?

We did look at other vendors, like Cylance. We chose FireEye because they have a long history, which results in stability.
Jitu Mani Das
Real User
Information Security Manager at a tech services company
Jan 06 2019

What is most valuable?

All the features of HX give the administrator control over the managed devices: * Managing is easy * The different threat actor based signature * Behavioural analysis * Malware protection * Zero-day protection IOC based detections are really the best ones. However, the enterprise search option is a hunting option given to the admin.

How has it helped my organization?

This gives us a more secure and completely scalable zero-day model security product to the endpoint. We manage not only the software but also the next-gen AV.

What needs improvement?

* AV management based on manual scan * Manual scan feature is not easily done * A long way of setting hostname set, and * Scheduling over policy which is time taking and I don't feel comfortable.
Muhanad Khader
Reseller
IT Security Engineer at Miltec
Sep 25 2019

What do you think of FireEye Endpoint Security?

What is most valuable?

The most valuable feature is the integration between environments.

What needs improvement?

Something that needs to improve is the interface. I would also like to see simple processing and reporting online. 

For how long have I used the solution?

I've been using this solution for six months now.

What do I think about the stability of the solution?

The stability of the solution was not very good.

What do I think about the scalability of the solution?

We had some issues with the scalability but it was taken care of. It can be improved, however. 

What other advice do I have?

I will rate this solution an eight out of ten. In the next version I would like to see an improvement in the scalability and stability. 

Articles

User Assessments By Topic About FireEye Endpoint Security

Find out what your peers are saying about FireEye, CrowdStrike, Carbon Black and others in Endpoint Detection and Response. Updated: September 2019.
370,827 professionals have used our research since 2012.

FireEye Endpoint Security Questions

What is FireEye Endpoint Security?

FireEye Endpoint Security is an integrated endpoint solution that detects, prevents and responds effectively to known malware and threats traditional anti-virus endpoint security products miss. It expands endpoint visibility and provides contextual frontline intelligence to help analysts automate protection, quickly determine the exact scope and level of any attack activity and adapt defenses as needed.

Sign Up with Email