Trellix Network Detection and Response Primary Use Case

AS
Information Security Senior Advisor at Eskom Ltd

We use the solution in our servers and workstations for Endpoint Detection and Response. 

View full review »
Hamada Elewa - PeerSpot reviewer
System Engineer - Security Presales at Raya Integration

We use FireEye Network Security to secure the internet link. The solution works as an inline sandbox. Additionally, it can scan and monitor all uploads and downloads, and internet browsed links.

View full review »
YaserAljohani - PeerSpot reviewer
OT/ICS Information Security Specialist at SANS

In my company, the solution is used for our endpoints.

View full review »
Buyer's Guide
Trellix Network Detection and Response
March 2024
Learn what your peers think about Trellix Network Detection and Response. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
767,995 professionals have used our research since 2012.
KV
Senior Manager at a financial services firm with 10,001+ employees

It is mostly an NTAP tool. It is just blocking the CNC domains. That is the primary use case.

View full review »
MF
Sales engineer at Mavisco Resources Sdn Bhd

We use the product because our customers want to fix a web gateway and NDR so that they can watch the incoming traffic.

View full review »
CS
Sr Technical Consultant at a tech services company with 51-200 employees

We implement this solution for our clients for the complete protection of their network.

View full review »
it_user886083 - PeerSpot reviewer
Head of IT Division at PT Bank Mandiri (Persero) Tbk.

Our primary use of the solution is monitoring network security and intrusion detection.

View full review »
SB
Sr Manager - Information Security & Researcher at a tech services company with 1,001-5,000 employees

The solution can be used for detecting malicious traffic based upon known IOCs and it's integrated with the artificial intelligent speed, so we're able to recognize which IOCs are matching and their threat attribution.

View full review »
KR
Deputy Assistant Secretary with 201-500 employees

Our primary use case if for zero-day identifying anomalies and zero-day vulnerabilities without requiring signature recognition.

View full review »
JG
CEO at a tech services company with 1-10 employees

We are using the file security scanner. The solution is used to monitor network traffic for network-based malware.

View full review »
YA
OT/ICS Information Security Specialist at SANS

We use FireEye to protect our web and email traffic.

View full review »
HK
Information Security Consultant at a financial services firm with 1,001-5,000 employees

Our primary use case is for endpoint protection. We need the solution to integrate with the firewall so that we could get some threat intel based on the kinds of malicious factors that we are getting on the internet at work. We are working to optimize it with the firewall and the other tools we are using for network protection.

View full review »
AE
System Engineer at IRIS

Our primary use case is for application filtering and security. 

View full review »
SZ
Professional Services Division Manager at 2Bsecure

We are using this solution for sandboxing on all channels.

View full review »
SK
Lead Program Manager at a computer software company with 10,001+ employees

We are using it from the perspective of data protection. We have two types of data that is coming. One is the actual data or the customer data that comes into our premises, and the second is the internet traffic that comes into our organization. FireEye devices scan all the traffic that comes through the tools on which we have configured FireEye, and they also analyze a lot of traffic.

View full review »
AK
PreSales Director at a marketing services firm with 51-200 employees

My primary use case for this solution is world gateway or an email gateway for forensic tools.

View full review »
JR
Security Analyst at a financial services firm with 201-500 employees

We use FireEye NX to monitor our networking traffic and FireEye EX to monitor our email traffic. So, it's mostly for blocking malicious traffic.

View full review »
HL
System Engineer at a tech services company with 1,001-5,000 employees

We implemented this solution for our customers. The primary use case is for Advanced Persistent Threat detection at a network level.

View full review »
it_user792615 - PeerSpot reviewer
Security Consultant at a tech services company with 51-200 employees

Implementing at customer sites. Conducting pre-sales and PoC demos for customers and providing technical support to customers on behalf of FireEye.

View full review »
SA
Technical lead at a tech services company with 51-200 employees

We use FireEye to prevent cyber attacks. 

View full review »
MS
CPM at a comms service provider with 1,001-5,000 employees

This solution is our firewall protection.

View full review »
Buyer's Guide
Trellix Network Detection and Response
March 2024
Learn what your peers think about Trellix Network Detection and Response. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
767,995 professionals have used our research since 2012.