Trellix Endpoint Security (ENS) Valuable Features

Joseck Wekesa - PeerSpot reviewer
Partner Account Manager at Trinexia

Trellix integrates well with most SIEM and data classification solutions.

View full review »
Meleria Mangaring - PeerSpot reviewer
Solutions Engineer at Trends and Technologies, Inc

One of the strengths of McAfee in general, not only in the Endpoint, is the ePolicy orchestrator. It's a single management platform for all the solutions and also a single agent. From my experience, with all other products, it becomes easy to use with multiple deployments. 

With McAfee, what you do is you just upload and download some packages for specific features. For example, with endpoint security, you get only the four features, the firewall, web control, the ATP, and then threat prevention. Should the client would want an additional feature, for example, device control, full-blown DLP, or application control, then we can add the packages for that and then easily deploy it with the client. 

View full review »
Venugopal Potumudi - PeerSpot reviewer
Senior Consultant at Tata Consultancy

It is very stable.  

The independent modules are very good. 

For the most part, the setup and deployment are simple.

View full review »
Buyer's Guide
Trellix Endpoint Security (ENS)
March 2024
Learn what your peers think about Trellix Endpoint Security (ENS). Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,386 professionals have used our research since 2012.
TL
Owner

So far, the experience has been positive. 

The pricing is good. It is very reliable. 

It offers good centralized management.  

The solution is scalable.

It is stable. 

I found the initial setup to be easy. 

View full review »
Itamar Kalay - PeerSpot reviewer
Information Security Professional Manager at Hermeticon

The most valuable feature of the solution is its advanced ability to search for threats.

View full review »
Peter Antoni - PeerSpot reviewer
Product and Service Architect at Radar Cyber Security

The tool has contributed to improving our security posture. While it's just one part of our overall solution, it plays a crucial role. As we continue to evolve, we anticipate it becoming even more important alongside other aspects like network behavior and additional metrics.

The tool's most valuable feature is containment. Last year, a German company faced an external attack. We installed the product on every machine, totaling hundreds of endpoints. The Trellix agent collected information, allowing us to check the entire IT infrastructure. 

View full review »
AndyPittas - PeerSpot reviewer
Head of Network and Security & Department at National Bank of Greece (Cyprus)

The most valuable features of McAfee MVISION Endpoint are advanced threat protection, web filtering, and removable storage devices in the DLP.

View full review »
Suresh Pathipatti - PeerSpot reviewer
Senior Information Technology Administrator at Aighospital

McAfee is working perfectly. The productivity itself is great.

There are really a lot of features in McAfee.

The endpoint administration is very easy.

We found the initial setup to be simple. 

The stability has been great.

You can scale the product.

View full review »
MB
Regional Cyber Security Manager

It offers more plugins for endpoints in order to extend endpoint protection. There are a variety of plugin options.

The extendability is great. 

It is pretty stable.

The product is very scalable.

We find the pricing to be in line with the current market.

View full review »
Simone Scatolini - PeerSpot reviewer
System&Security engineer at Var Group SpA

It is a really strong solution for endpoint security.

View full review »
AG
Executive Director of Infrastructure and Technology Asia Pacific at a manufacturing company with 10,001+ employees

Provides endpoint security protection against malware and the like.

View full review »
RS
Group Manager at HCL Technologies

It is a great solution. The way it exchanges the information between the entire ecosystem, all the endpoints, as well as the network ATP, can trigger the blocking even if it is seen by some other device. If the network has seen something, we can use that to put a block to all the endpoints.

It works in an ecosystem. Centrally, from just one console, you can block malicious attacks across your environment. It provides you with the ability to respond to threats better.

View full review »
FS
Manager Pre-Sales (ICT) at CNS Engineering

The solution provides good mobile device protection and it's great that it's on the cloud. The product is compatible and works for all platforms.

View full review »
CM
Managing Director at Computer Wise

The solution has reduced false positives for our clients and ourselves.

It's got quite good ransomware detection.

The product can be deployed across mobile devices.

It has a managed service push deployment where we can push cloud tasks into policies. 

It's a really good product. It's stable and scalable. It offers good flexibility, has a small footprint, offers a minimal effect on performance, and is from a trusted brand.

We have found the deployment to be very fast.

Technical support is excellent.

View full review »
LawrenceKwaghga - PeerSpot reviewer
Deputy Director, Research at NACA

The platform’s most valuable features are ease of use, integration, and deployment.

View full review »
HD
Manager- Process Excellence at Datamatics Business Solutions

The solution is valuable for security aspects.

View full review »
RS
Delivery Manager at a tech services company with 10,001+ employees

I like the console and the GUI is user-friendly. One of the most important and critical features is containment. Suppose something gets infected and there's the possibility of it spreading laterally and causing a problem or compromising a network. FireEye has a feature that enables it to disconnect from a system network so that the infection doesn't spread. 

Even if an incident occurs at night when support teams are not available, the feature can contain the infection so that when the support teams get to work, they can carry out the remediation part and bring the system back to production.

View full review »
RUBEN CARDENAS - PeerSpot reviewer
National Technical Support Manager at BancoSol S.A.

MVISION offers decent protection.

View full review »
JB
Teamleader 2:nd line Security at Cygate AB

The most valuable feature of the solution stems from the fact that it works fine with stability.

View full review »
MF
Sales engineer at Mavisco Resources Sdn Bhd

Trellix Endpoint Security has a full suite of DLP. 

View full review »
Abu Imran - PeerSpot reviewer
Information Security Engineer at Nhq Distribution Ltd

The most valuable feature of the solution is its dashboard.

View full review »
SR
Talent Acquisition Specialist at Nine A Business Connect

It's good that it periodically scans all my drives. I can stay up to date with the status of my drivers and update them if needed.

View full review »
SB
Sr Manager - Information Security & Researcher at a tech services company with 1,001-5,000 employees

It is easy to use, flexible, and stable. Because it is a cloud-based solution and it integrates all endpoints of the cloud, we can do an IOC-based search. It can search the entire enterprise and tell us the endpoints that are possibly compromised.

It has a feature called Isolation. If a device is compromised, we can connect it to our SOC, and no one would be able to access it. This way we can limit the damage to the network while we are investigating.

View full review »
PP
Principal Architect at LTIMINDTREE

We have a cloud-based instance, so we can deploy all our configurations through the cloud. That's the beauty of FireEye.

View full review »
AT
Owner / Consultant at a marketing services firm with 1-10 employees

The seamless deployment is very valuable.

View full review »
PV
Senior Technical Manager at Incedo Inc.

McAfee is fine as an endpoint. We are offering the product to clients for data protection. It is not about this being a reactive solution like a firewall. There should be a shield of gateways, wherever possible, whenever this security solution can be implemented.  

View full review »
RS
Cyber Security Consultant at a energy/utilities company with 10,001+ employees

The features we have found most valuable have been containment as well as the ability to triage agent activities.

View full review »
RC
Technical Presales Consultant - Solutions Architect at Nexus Technologies,Inc.

Some of the most valuable features of this solution are the ePO, centralized management, single control, and ease of management. 

The agents are easy to deploy.

For McAfee, as long as you have ePO it is easy to manage.

It integrates well with other solutions and I like their CASB and the Web Gateway, their cloud security.  Most of our clients are migrating to the cloud and they are evaluating cloud security solutions and data protection.

View full review »
CF
Mgr. ICT-Services at a comms service provider with 501-1,000 employees

What I like most about McAfee MVISION Endpoint is that it's very user-friendly. You do need some knowledge on how to navigate the portal, but as soon as you've gained that knowledge, navigation will no longer be an issue.

I have no complaints about McAfee MVISION Endpoint. For me, the product is perfect the way it is. It's great right now, and it's doing good as it is.

View full review »
SF
ICT Manager at SecurEyes

FireEye Endpoint Security is easy to use and lightweight compared to others.

View full review »
MA
Technical Presales Consultant/ Engineer at a tech vendor with 10,001+ employees

It's simple and very easy to use. Before MVISION Endpoint, McAfee had their own Endpoint Security software called ENS, which included their anti-malware engine. Even though ENS was a comprehensive product and a very good product as well, it was confusing for some professionals. 

In the times that we live in now, an IT personnel, even a specialized one, is a generalist. So you have an IT person who is managing the firewall and endpoint security, and also managing the ERP and backups, and the switches as well. Everything in the environment will be handed over to a single person.

A product like McAfee ENS is pretty extensive and allows for advanced configurations, especially for security professionals. However, IT personnel often fail to configure it properly. MVISION Endpoint is so much easier and so much simpler for the lay security personnel to handle. This is what I really like about it.

McAfee has an on-premises ePO server, which you can install on your environment. You can add your infrastructure and push the agents all from the console; so you literally don't have to do anything on your own. From the dashboard, you'll push the agents, install them, configure them, and manage them all from the console.

View full review »
JD
Information Security Manager at SPXFLOW

All the features of HX give the administrator control over the managed devices:

  • Managing is easy
  • The different threat actor based signature
  • Behavioural analysis
  • Malware protection
  • Zero-day protection

IOC based detections are really the best ones. However, the enterprise search option is a hunting option given to the admin.

View full review »
RE
Solution Architect at PentechSolution Sdn Bhd

Trellix Endpoint Security (ENS) is an easy-to-manage platform.

View full review »
RT
Manager at a tech company with 1,001-5,000 employees

The most valuable feature that my customers have found with solution is the capacity to collect all the information for forensic analysis purposes.

View full review »
HL
Information Technology Security Architect at a financial services firm with 5,001-10,000 employees

The most valuable feature of this solution is its simplicity. The triage process is quite effective, and it is compatible with many different systems.

View full review »
MC
Region Head - S1@Dimension Data India at a computer software company with 51-200 employees

In my opinion, it's a pretty good product.

I have not received any complaints about the performance.

View full review »
Murali Krishnan L - PeerSpot reviewer
Technical Manager (SOC Operations) at Novac Technology Solutions

The exploit guard and malware protection features are very useful. The logon tracker feature is also very useful. 

They have also given new modules such as logout backup, process backup. We ordered these modules from the FireEye market place, and we have installed these modules. We are currently exploring these features. 

View full review »
MO
product manager at MCS

The most valuable network security feature is the network sandbox solution. This sandbox feature works on traffic flow. Detects multi stages attacks based on MVX analytics engine which detects zero-day, multi-flow and other evasive attacks with dynamic, signature-less analysis in a safe, virtual environment. It stops infection and compromise phases of the cyber-attack kill chain by identifying never-before-seen exploits and malware.

It has capabilities like machine learning and endpoint protection as an antivirus.

The investigation and forensic analysis have been most helpful.

View full review »
it_user1395708 - PeerSpot reviewer
Technical Executive at Digitaltrack

The most valuable feature is user-based policy provision. It allows for greater granularity.

Our clients use the VPN to create secure connections to their servers.

View full review »
PJ
CIO & Information manager at a leisure / travel company with 501-1,000 employees

I am satisfied with this solution.

The performance is good. 

View full review »
MK
IT Security Engineer at MILLENNIUM TECHNOLOGIES

The most valuable feature is the integration between environments.

View full review »
GS
Cyber Defense Advisor | Founder Executive at a tech services company with 1-10 employees

The response part of EDR was most valuable. We used that to separate the endpoint from the network. We utilized the solution during the instant response. We were also utilizing advanced malware detection capabilities, but we benefited the most from its help with the response.

View full review »
LL
IT Manager at a tech services company with 51-200 employees

The product is easy to use.

It's a stable solution with good performance. 

The scalability is good.

The installation process is very straightforward.

View full review »
KS
Executive Officer at a tech services company with 10,001+ employees

It is very valuable in finding out unknown malware.

View full review »
Buyer's Guide
Trellix Endpoint Security (ENS)
March 2024
Learn what your peers think about Trellix Endpoint Security (ENS). Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,386 professionals have used our research since 2012.