Trellix ESM Primary Use Case
The primary use case of the solution is central log management for the company. It allows us to see all the traffic coming in and going out to and from the internet. It provides various views from the firewall and web application firewall and event logs from the endpoint. The command view will tell us the current status of the threats from various threat sources. While the normalized view will give us correlated events from sources to destinations and related applications.
View full review »We use McAfee for security features.
View full review »We use the product to protect endpoint nodes.
View full review »Buyer's Guide
Trellix ESM
March 2024
Learn what your peers think about Trellix ESM. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
768,578 professionals have used our research since 2012.
McAfee ESM is utilized to gather logs from Microsoft Windows servers and Palo Alto firewalls.
View full review »ES
Ersa Spahiu
Security Engineer at PC Store
In my company, we don't use Trellix ESM in our environment because we are a small company, but we have implemented it for our customers.
My company's customers use Trellix ESM to monitor and report on servers in their environment. My company's customers also have some of the virtual machines in their environment, along with firewalls integrated into Trellix ESM.
McAfee ESM is used for my customers in the financial sector.
View full review »MV
reviewer927423
Senior Security Specialist at a manufacturing company with 10,001+ employees
We use it for malware detection and authentication or login failures.
View full review »We use McAfee ESM for log storage and audit purposes. Security is the base reason, and we do build content for them.
View full review »SW
Steve Wiles
Technical Support Engineer at a comms service provider with 10,001+ employees
We are using this solution primarily for SIEM logs.
View full review »SA
Selina Aldefolla
Information Security Officer at a healthcare company with 1,001-5,000 employees
We implement it in our hospital applications.
View full review »LL
reviewer1514295
VP Cyber Security & IT at a computer software company with 1,001-5,000 employees
I work with an integration company and implement tools such as McAfee ESM.
We are an MSSP for a lot of clients. We gather their logs, correlate them, create rules, and assume the role of their SOC. We have skilled operators 24/7 who take care of these clients.
View full review »As a bank, we have different cases use cases that are typical for the industry.
View full review »WA
Cybersecon67
Cyber Security Consultant at a computer software company with 51-200 employees
We use this solution to provide managed security services. We use loggers at the client site to generate logs for monitoring their devices. We handle the monitoring, administration, and troubleshooting of their endpoints.
For some customers, we manage everything, while for other customers we only monitor their critical devices.
We are using an on-premises deployment model.
View full review »We are a service provider and we implement it for our customers, as well as use it internally.
This is a SIEM product that makes up part of our overall security solution.
View full review »VA
Victor Alexandrescu
IT Consultant and Project Manager at a government with 1-10 employees
We use this solution to monitor everything in our hybrid-cloud environment. This includes IoT devices and a couple of data centers.
SH
reviewer1152327
Assistant Vice President at a financial services firm with 1,001-5,000 employees
We are using the solution for log analyzing endpoints and investigating all types of applications, files or network devices login collection.
View full review »LR
itmanager1231232
IT Manager at a tech services company with 10,001+ employees
It has performed well and delivered the results that I have been looking for.
View full review »RN
Business8c2a
Business System Analyst at a consultancy with 5,001-10,000 employees
My primary use case for this solution is to secure the data on my laptop.
View full review »SK
reviewer1614318
Vice President Cyber Security Practice Head at a tech services company with 1,001-5,000 employees
We use this solution for correlation, alerting, and log management.
We are integrators.
View full review »MA
reviewer1427199
Information Security Officer at a tech services company with 51-200 employees
We use McAfee ESM for IT operations and a few security-related things.
View full review »MN
ITsece56457
IT Security Analyst at Ingenium Group
- To gain transparency into potential vulnerabilities within the network.
- To monitor problems, e.g., failure to update packages within the back-end security environment.
Buyer's Guide
Trellix ESM
March 2024
Learn what your peers think about Trellix ESM. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
768,578 professionals have used our research since 2012.