Trellix Endpoint Security Primary Use Case

AhmedEl-Tayeb - PeerSpot reviewer
Product Manager at MCS

The endpoint of Trellix itself should be placed within an enterprise with more than 200 or 300 endpoints. And then, an administration council should be used to administrate these endpoints and get the updates, including any virtual batching needed, and so on. This is the most usual case for this product. However, of course, there are other supportive add-ons, or sensors, to be added to this endpoint - including the EDR, the endpoint detection response, sensor. 

View full review »
RS
Assistant Vice President at a financial services firm with 10,001+ employees

Our company just started evaluating the solution for endpoint protection. We have tested it in a POC environment but have not deployed it to the production environment. 

View full review »
IA
Chief Technology Officer at S.C. Vault Apps S.R.L

The solution is used for drive encryption and as a policy orchestrator.

View full review »
Buyer's Guide
Trellix Endpoint Security
March 2024
Learn what your peers think about Trellix Endpoint Security. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
767,995 professionals have used our research since 2012.
Zubair Ahmad - PeerSpot reviewer
Senior Chief Manager at Arcil

We are using ePO Center Server to communicate with all the endpoints that are in the network. While I cannot be certain, I believe the relevant version is McAfee 8 or 9.

We make use of McAfee Agent version number 5.6.4.151. We utilize McAfee Data Exchange Layer.

The McAfee Endpoint Security version to which we refer is 10.7.

We use the solution for antivirus purposes. 

View full review »
AV
Information Technology Consultant at Aeries Technology Group

We build our own use cases and those provided by the vendor for specific upcoming attack scenarios. Configuring the rule set using Trellix Endpoint Security is very much flexible based on the IOCs.

View full review »
GANESAN K - PeerSpot reviewer
Senior Technical Engineer at Safezone Secure Solutions Private Limited

Previously, before the transition to Trellix, we used McAfee. Following a merger, FireEye now collaborates with McAfee, utilizing its console and threat intelligence.

In terms of endpoint security, I would recommend Trellix Endpoint Security, especially for users prioritizing threat intelligence and seeking an internal solution. Trellix has proven effective in areas such as blocking capabilities, device control, and application control.

View full review »
DM
Client Engineer at KSB

We use Trellix Endpoint Security for pattern-based scanning. We use it on all our handsets. We also use it for behavior-based adaptive threat prevention; it's a solution that will recognize malicious behavior.

View full review »
Harsh Bhardwaj - PeerSpot reviewer
Presales Engineer at Rah Infotech Pvt Ltd

Customers use Trellix Endpoint Security as an anti-malware or antivirus solution that provides AI and machine learning features. The solution provides DAC (Dynamic Access Control) and HIPS (host intrusion prevention system) functionality in its firewall module. It also has a web control functionality, wherein we can allow, deny, or choose the category part and work it out.

View full review »
S M Fazlul Haque - PeerSpot reviewer
IT Lead Engineer, Information Technology at Banglalink

We primarily use the solution for security. Sometimes we try to shift to other security sites, however, whenever we compare this solution with the others, we found that McAfee developing in more dynamic ways.

View full review »
AM
IT Security Specialist at Commercial Bank of Ethiopia

We basically use the solution for threat detection. It's for security purposes.

View full review »
LS
IT Infrastructure Manager at a financial services firm with 51-200 employees

We currently have around 50 servers. We aren't really a big company but we have 50 servers which we manage. We use McAfee for the web filtering portion of it. For example, if a user is doing a search on Google, there's a risk-rating web content filter built into McAfee. This alerts us if there are any threats present. 

We have licensed McAfee ENS on a per-server basis. As of now, from memory, I think we have 56 endpoints running McAfee — 56 servers in total.

View full review »
DM
IT Head at a comms service provider with 51-200 employees

It is exclusively for Endpoint security. Besides that, we have subscribed to additional features such as MDX for mobile security and recently added ESL. Previously, we had Trend Micro, and at times we utilized it for malware. Comparing the three tools, I would recommend sticking with Trend Micro or Malwarebytes.

View full review »
Faisal Mian - PeerSpot reviewer
CTO at ABM Info. tech

The solution is specifically used at the endpoints. We do a lot of integrations with various clients. 

View full review »
Felix Nyasudi - PeerSpot reviewer
Business Development Manager at A Cyber 1 Company

It serves as a comprehensive endpoint security solution that goes beyond traditional antivirus by incorporating features such as document scanning for sensitive information, approval workflows for document sharing, patch management, and advanced threat detection using AI and machine learning. It actively monitors various endpoints, including web interactions and email communications, to detect and prevent a wide range of attacks, even those that are not signature-based.

View full review »
SK
Senior Engineer at a comms service provider with 10,001+ employees

We are using McAfee Endpoint Security for network security.

View full review »
GZ
IS Manager, Software Engineer at a manufacturing company with 10,001+ employees

We use McAfee Endpoint Security as a solution for workstations and laptops.

View full review »
Shreyansh Sharma - PeerSpot reviewer
Instrument and Control Engineer at Reliance Industries Ltd

We use it for protecting our system nodes. It's run on Windows 7 and Windows 10.

View full review »
WM
ITOfficer at U.S. Army Medical Research Unit - Kenya

Our use case is pretty straightforward. We have the central ePO that's running, and clients connect to it. All the clients connect to the ePO for updates and the ePO is able to go out and get updates, so it's pretty much like a star topology where you have the ePO sitting at the middle and handling all the requests from the clients and the servers.

View full review »
DN
Presales and product manager at Mi Mi Informatics Joint Stock Company

We use the product for EDR purposes.

View full review »
Nadeem Syed - PeerSpot reviewer
CEO at Haniya Technologies

McAfee is a security-based company. All of their products are related to the security of networking. We have approximately 15 to 20 customers working with McAfee Endpoint Security.

View full review »
Valerio Favitta - PeerSpot reviewer
IT Security Specialist at asystel italia

In Trellix Endpoint Security, I use all modules, including firewall and web control, except for encryption.

View full review »
Ebenezer D - PeerSpot reviewer
Network Security & Data Management Admin at Digitaltrack

In my company, we use Trellix Endpoint Security for its endpoint security capabilities. Wherever there is a need for someone to comply with ISMS, we deploy Trellix Endpoint Security over there and support them in maintaining it.

View full review »
BK
General Manager at a tech services company with 11-50 employees

We use Trellix to secure our customers' endpoint devices and the cloud. It was a McAfee solution before the Trellix acquisition. Trellix has a full portfolio for local and cloud protection. McAfee MVISION products are managed on the cloud, but some customers need an on-premise local management console.

View full review »
MA
Systems Engineer at First Datacorp

Some of the solution's primary use cases include successfully adding devices through ESM GUI and setting up data storage via ELM.

View full review »
SS
CyberSecurity Engineer at a government with 501-1,000 employees

It covers the AV and malware security piece.

View full review »
MO
Support Security Engineer at a computer software company with 501-1,000 employees

I work for a company that is a McAfee partner. We sell the solution, and we have engineers that implement the solutions. Basically, I am part of the technical staff that implements the solution on-premise.

We use endpoint security for our clients. We configure policies to scan the computer every single day in some cases and every week or even every moment. Basically, it protects the endpoint, and we have policies to do advanced threat protection.

View full review »
VK
VP - Cyber Security at a manufacturing company with 11-50 employees

The solution has three primary uses for us. 

Our environment is Windows-based. We don't have Mac and very little space for Linux systems. We use the solution on all of our Windows devices as a basic antivirus protection. That's our first use case.

The second use case for the solution is to be able to have USB restrictions on my endpoints. 

And the third would be the protection of machines when, especially now in this COVID-19 climate, users connect from home. There are a lot of network-based attacks. When users are connecting from other networks, they're protected from dangers with this solution

View full review »
GG
Works at a government

I use this solution for system security protection.

View full review »
Muhammad Ejaz ul Hassan - PeerSpot reviewer
CEO at RISE Technologies

Overall, we handle the implementation of the solution, taking into account the policy required to secure the network.

We primarily use McAfee Endpoint Security for data loss and endpoint protection.

View full review »
KP
Senior System Administrator at a computer software company with 501-1,000 employees

We primarily use the solution for endpoint security.

View full review »
SM
Team Leader Network and Mail Team at a energy/utilities company with 10,001+ employees

Our primary use case is for endpoint protection, to block malware and viruses.

View full review »
MV
Software Engineer at a computer software company with 10,001+ employees

The product is installed in the center and we install a product in it and give it to our customers.

View full review »
DB
System Engineer at a comms service provider with 10,001+ employees

We use this product for our endpoint security.

View full review »
Sandhya Machkuri - PeerSpot reviewer
Associate Technical Solutions Professional at Alliance Pro IT Pvt Ltd

We use the product mainly for security purposes.

View full review »
KA
Director Of Information Technology at a financial services firm with 1,001-5,000 employees

We primarily use the solution for endpoint security.

View full review »
S M Fazlul Haque - PeerSpot reviewer
IT Lead Engineer, Information Technology at Banglalink

We use the solution as a server and workstation.

View full review »
it_user1383900 - PeerSpot reviewer
Senior Project Manager at a computer software company with 1,001-5,000 employees

This product is mainly used for detecting viruses and malware on the laptops and also to scan older, existing files.  

View full review »
OY
Solution Architect Security at a tech services company with 201-500 employees
OA
Security Consultant at CS Africa

We are using the latest version at the moment because I'm managed by the MVISION tenants.

In the past, many people had issues with the utilization of detections and resources. ENS is actually very good for detection. When properly configured, especially when the prevention feature is activated, it integrates very well with the ATP, in respect of the endpoint. ATP offers very good protection and is a rich solution which helps to remove ransomware. I've been using the product for a while now and been able to secure a lot of environmental ransomware attacks, as well as some others, by integrating the ATP with the ENS. 

View full review »
JD
Managing Director at eyeT GmbH

We provide services. We mainly use this solution for endpoint security and protection. We have cloud, hybrid, and on-premises deployments.

View full review »
MG
General Manager (Corporate Services) with 1,001-5,000 employees

I am using McAfee Complete Endpoint Protection to control bandwidth. Any network administrator can do that easily. Control is the best part of Mcafee.

View full review »
MV
Managing Director at a computer software company with 51-200 employees

We use this product for endpoint server protection and content security.

View full review »
WR
Assistant Manager at a financial services firm with 501-1,000 employees

I am not liberty to describe our use cases, as this information is confidential. 

View full review »
AA
Relationship Manager at a financial services firm with 5,001-10,000 employees

We are using  McAfee Endpoint Security to protect the business.

View full review »
VB
Manager - Computing at a tech services company with 10,001+ employees

We use it for all Windows and MAC clients. We use it for endpoint protection, DLP, and disk encryption. We are using the latest version.

View full review »
SS
Senior Consultant at SCPD

This is part of our network security solution. We have it running on different servers and workstations that are on different platforms.

View full review »
SA
Delivery Manager at Jlogic Innovations

We receive good protection with this solution. We use this for internet protection on the end-point.

View full review »
MA
Works

McAfee Complete Endpoint Protection is mature, tested, and usual: this is our policy. We don't go for the latest releases. We go for the release which is before the last.

View full review »
SB
Network Administrator at a tech services company with 51-200 employees

We use the solution to protect our endpoint systems.

View full review »
MS
Systems Engineer at South Asian Technologies

Our primary use case is to provide our customers with an endpoint security solution.

View full review »
AJ
operador central de monitoreo at a financial services firm with 501-1,000 employees

Our primary use case of this solution is for it to attack malware. 

View full review »
SA
I-Security Engineer at Nhq Distribution Ltd

I use certain features of the solution, although I am not using the latest version, even though my colleagues do so a lot. They also use MVISION, although I do not.

We make use of Endpoint host level data loss prevention.

View full review »
TT
ICT Manager at a printing company with 201-500 employees

Our primary use case is for endpoint protection.

View full review »
it_user951735 - PeerSpot reviewer
VP Tecnología at a tech services company with 10,001+ employees

We primarily use this solution for antivirus and malware protection. 

View full review »
RP
Admin at a tech services company with 11-50 employees

We use the solution for security.

View full review »
MC
Administrator at a financial services firm with 1,001-5,000 employees

We are using it on our network as protection.

View full review »
AC
General manager at a tech services company with 201-500 employees

We use this solution for endpoint protection, CASB, and it is integrated with Office 365.

View full review »
VK
CISO at a manufacturing company with 10,001+ employees

McAfee Endpoint Security can be used for threat protection, for malware protection, and for data loss prevention by encrypting the end user devices using full depth encryption.

We are using the latest version minus two because we generally update the antivirus to the current version after testing it. So generally it is two versions behind.

We have three versions in our network, one is the latest version, then we have a minus one on critical machines and minus two on the endpoints.

View full review »
it_user710460 - PeerSpot reviewer
Director with 11-50 employees

My primary use case of this solution is for the endpoint protection.

View full review »
DG
Technical Lead Specialist at a computer software company with 1,001-5,000 employees

The primary use case of this solution is for intrusion prevention.

We are service providers.

View full review »
Buyer's Guide
Trellix Endpoint Security
March 2024
Learn what your peers think about Trellix Endpoint Security. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
767,995 professionals have used our research since 2012.