Trellix Network Detection and Response Primary Use Case

AS
Information Security Senior Advisor at Eskom Ltd

We use the solution in our servers and workstations for Endpoint Detection and Response. 

View full review »
Hamada Elewa - PeerSpot reviewer
System Engineer - Security Presales at Raya Integration

We use FireEye Network Security to secure the internet link. The solution works as an inline sandbox. Additionally, it can scan and monitor all uploads and downloads, and internet browsed links.

View full review »
YaserAljohani - PeerSpot reviewer
OT/ICS Information Security Specialist at SANS

In my company, the solution is used for our endpoints.

View full review »
Buyer's Guide
Trellix Network Detection and Response
April 2024
Learn what your peers think about Trellix Network Detection and Response. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
769,479 professionals have used our research since 2012.
KV
Senior Manager at a financial services firm with 10,001+ employees

It is mostly an NTAP tool. It is just blocking the CNC domains. That is the primary use case.

View full review »
BiswabhanuPanda - PeerSpot reviewer
Senior technical consultant at Hitachi Systems Micro Clinic

The solution has been in place for quite some time – three or four years. We've renewed it several times, and we upgraded from Gen 3 to Gen 4 hardware at one point as well.

Currently, it's integrated with our firewall and McAfee IPS. We also have network-based sandboxing deployed. It uses static and dynamic analysis engines, so we get alerts if malicious traffic is detected or harmful objects are downloaded.

We've been using their PX solution for packet capture, which is the core of their NDR functionality. But we haven't fully adopted the combined product – NX and PX  – yet because they are still separate. 

The storage requirements for raw packet capture, especially with our traffic levels, make it quite expensive.  And that's true for many security products. I feel like NDR is pretty expensive. 

However, this is especially true about raw packet capture for network telemetry – the storage requirements with RAID 0 become quite expensive, regardless of the solution.

View full review »
MF
Sales engineer at Mavisco Resources Sdn Bhd

We use the product because our customers want to fix a web gateway and NDR so that they can watch the incoming traffic.

View full review »
CS
Sr Technical Consultant at a tech services company with 51-200 employees

We implement this solution for our clients for the complete protection of their network.

View full review »
it_user886083 - PeerSpot reviewer
Head of IT Division at PT Bank Mandiri (Persero) Tbk.

Our primary use of the solution is monitoring network security and intrusion detection.

View full review »
SB
Sr Manager - Information Security & Researcher at a tech services company with 1,001-5,000 employees

The solution can be used for detecting malicious traffic based upon known IOCs and it's integrated with the artificial intelligent speed, so we're able to recognize which IOCs are matching and their threat attribution.

View full review »
KR
Deputy Assistant Secretary with 201-500 employees

Our primary use case if for zero-day identifying anomalies and zero-day vulnerabilities without requiring signature recognition.

View full review »
JG
CEO at a tech services company with 1-10 employees

We are using the file security scanner. The solution is used to monitor network traffic for network-based malware.

View full review »
YA
OT/ICS Information Security Specialist at SANS

We use FireEye to protect our web and email traffic.

View full review »
HK
Information Security Consultant at a financial services firm with 1,001-5,000 employees

Our primary use case is for endpoint protection. We need the solution to integrate with the firewall so that we could get some threat intel based on the kinds of malicious factors that we are getting on the internet at work. We are working to optimize it with the firewall and the other tools we are using for network protection.

View full review »
AE
System Engineer at IRIS

Our primary use case is for application filtering and security. 

View full review »
SZ
Professional Services Division Manager at 2Bsecure

We are using this solution for sandboxing on all channels.

View full review »
SK
Lead Program Manager at a computer software company with 10,001+ employees

We are using it from the perspective of data protection. We have two types of data that is coming. One is the actual data or the customer data that comes into our premises, and the second is the internet traffic that comes into our organization. FireEye devices scan all the traffic that comes through the tools on which we have configured FireEye, and they also analyze a lot of traffic.

View full review »
AK
PreSales Director at a marketing services firm with 51-200 employees

My primary use case for this solution is world gateway or an email gateway for forensic tools.

View full review »
JR
Security Analyst at a financial services firm with 201-500 employees

We use FireEye NX to monitor our networking traffic and FireEye EX to monitor our email traffic. So, it's mostly for blocking malicious traffic.

View full review »
HL
System Engineer at a tech services company with 1,001-5,000 employees

We implemented this solution for our customers. The primary use case is for Advanced Persistent Threat detection at a network level.

View full review »
it_user792615 - PeerSpot reviewer
Security Consultant at a tech services company with 51-200 employees

Implementing at customer sites. Conducting pre-sales and PoC demos for customers and providing technical support to customers on behalf of FireEye.

View full review »
SA
Technical lead at a tech services company with 51-200 employees

We use FireEye to prevent cyber attacks. 

View full review »
MS
CPM at a comms service provider with 1,001-5,000 employees

This solution is our firewall protection.

View full review »
Buyer's Guide
Trellix Network Detection and Response
April 2024
Learn what your peers think about Trellix Network Detection and Response. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
769,479 professionals have used our research since 2012.