No more typing reviews! Try our Samantha, our new voice AI agent.

Abnormal Security vs Trellix Collaboration Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cloudflare One
Sponsored
Ranking in Email Security
20th
Average Rating
8.6
Reviews Sentiment
6.5
Number of Reviews
23
Ranking in other categories
Secure Web Gateways (SWG) (13th), Data Loss Prevention (DLP) (20th), Cloud Access Security Brokers (CASB) (12th), Distributed Denial-of-Service (DDoS) Protection (7th), Software Defined WAN (SD-WAN) Solutions (12th), Access Management (11th), Bot Management (3rd), ZTNA as a Service (9th), ZTNA (4th), Secure Access Service Edge (SASE) (10th), Remote Browser Isolation (RBI) (3rd)
Abnormal Security
Ranking in Email Security
6th
Average Rating
9.4
Reviews Sentiment
7.5
Number of Reviews
11
Ranking in other categories
Secure Email Gateway (SEG) (4th)
Trellix Collaboration Security
Ranking in Email Security
11th
Average Rating
8.8
Reviews Sentiment
6.9
Number of Reviews
19
Ranking in other categories
Instant Communications Security and Compliance (2nd), Secure Email Gateway (SEG) (6th), AI Security (11th)
 

Mindshare comparison

As of May 2026, in the Email Security category, the mindshare of Cloudflare One is 1.7%, up from 1.6% compared to the previous year. The mindshare of Abnormal Security is 4.5%, down from 7.5% compared to the previous year. The mindshare of Trellix Collaboration Security is 2.2%, up from 2.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security Mindshare Distribution
ProductMindshare (%)
Abnormal Security4.5%
Trellix Collaboration Security2.2%
Cloudflare One1.7%
Other91.6%
Email Security
 

Featured Reviews

CV
Network Architect at IP Dimension
Cloud security has improved remote access and has reduced costs for smaller client sites
I have used Cloudflare One's Identity-Aware Proxy, and it is quite straightforward from what I have seen so far. The app registration on the Azure side integrates fully into Cloudflare, and I am very satisfied with that part because it is easy to set up. The integration of Cloudflare One's Secure Web Gateway and Zero Trust Network Access works without any issues. That part is pretty automatic, and if you complete the rest of the setup, it comes together by itself with no issues from my side. What makes it nice is that we can actually start replacing on-site firewalls at this stage for the smaller clients because it does not matter if they go to a coffee shop or work from home; they are still secured by the same connection. The hops get shorter and you get better latency. We have done testing to see if it is better. One thing that we did notice with our proof of concept with our current client is that they have people connecting from the UK. When they used their previous VPN solution, uploading CAD drawings and other files to the server took a long time. They mentioned that it is much quicker on Cloudflare One's solution. I definitely believe that is part of the improved performance, and I am satisfied with that as well. What is nice about Cloudflare One is that it makes the setup easier and also easier to train technicians to maintain it. Compared to legacy systems, we do not need to get fancy firewalls in place that are costly. That is definitely also a cost-saver with Cloudflare One.
reviewer2251509 - PeerSpot reviewer
Senior Director, Information Technology at a insurance company with 51-200 employees
AI has helped classify threat types more accurately but product ownership can improve
Ease of use is important, and Abnormal Security's responsiveness and ability to deliver solutions when issues arise are crucial. However, there is always room for improvement, as achieving a perfect 10 means there is no more room for enhancement. For Abnormal Security, it's about leveraging AI even more, which they are already working on in their roadmap.
Felipe Antoniazzi - PeerSpot reviewer
Cybersecurity Engineer Lead at Johnson & Johnson
Real-time threat response has boosted detection accuracy and reduces manual investigation work
I have had challenges in the past with Trellix Collaboration Security for implementation because of issues related to compatibility. Since we worked in a global company with different operating systems, it was necessary to create different plans and different actions to implement the product.One thing I really do not prefer in Trellix Collaboration Security is not related to the console. I am a McAfee fan since the McAfee tool, and I find the console of Trellix Collaboration Security to be very user-friendly and easy to use. However, I do not know if it is related to the architecture of the product. Of course, we have modern threats based on behaviors and zero days. We have today CrowdStrike and SentinelOne, where we have better results based on threats and behavior, where it is possible to create a simulation environment based on the file detected and based on it, confirm if it really is malicious or not. In general, I believe Trellix Collaboration Security improved the console based on the last console of McAfee, but I think it is possible to improve more. It really is a good product, but in my view, it needs to improve detection based on behaviors. Regarding automations, I have implemented Trellix Collaboration Security here at Johnson & Johnson, and I implemented it in the same situation at Santander Bank and BNP Paribas Bank, where I created automations to export data for different metrics, including malicious detections, compliance, baselines, scans, last scans based on the seven days, and checking of patterns. I export everything to CSV files. Based on that, I create Power BI dashboards, and in these Power BI dashboards, I have a more executive view for different metrics to provide to myself, my manager, or director to create an executive view based on it. Another important point we use here at Johnson & Johnson and other companies is a data hub or a SIEM solution, such as Elastic or ArcSight, where we select some logs to be sent and use it to build reports and metrics.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It will take the blow rather than our applications should an attack occur."
"It's a perfect solution from my perspective; it's easy to understand and easy to configure."
"Cloudflare Access is part of the Zero Trust philosophy."
"This solution is easy to understand and easy to configure."
"Enables me to work from two locations."
"Cloudflare is by far the most effective solution that I have come across."
"The tool also offers good scalability, and the dashboard, along with real-time analytics, is very good."
"Cloudflare, in my opinion, was easy to implement."
"It does some really cool stuff that other tools aren't doing. We found it to be really effective, and the AI/ML functionality is really what differentiates them."
"I would recommend Abnormal Security."
"What I like about Abnormal Security is that it notifies me if any of my partners or suppliers are experiencing a security breach by analyzing their database and identifying potential cyber threats."
"Abnormal Security's AI capabilities are what we like most, as they can categorize and classify the emails, and based on the context of the email, understand if it's a graymail, a bulk mail, or a phish."
"Initial auto-remediation allows us to auto-remediate before the email lands in the end user's inbox for a split second."
"Ease of use is undoubtedly one of the most valuable features of Abnormal Security."
"One of the things that I love about them is that the setup and installation are super easy. All you do is give them access to your Microsoft 365 tenant, and through APIs, they are able to do their work. They are doing all this through APIs, so you do not have to install the software and take a month to get it all set up to even see the value of the solution. You could be up and running in less than an hour."
"Their ability to take things out of the mailbox and catch things much faster than users is excellent."
"Trellix Collaboration Security has positively impacted my organization by improving security, making teamwork more effective, and ensuring collaboration has become smoother."
"The accessibility is one of the features that I love; we can control it from the cloud and we can access it from anywhere."
"Trellix Collaboration Security is valued for being a stable and comprehensive solution that fulfills customer needs."
"The initial setup is simple."
"The auto-remediation feature is valuable."
"In my experience, the best features related to Trellix Collaboration Security concern the protection against threats."
"I'd recommend the product due to the fact that it can stop most of the phishing and malicious items from getting through our email."
"We have had very good results from the use of FireEye Email Security and we are very comfortable with this technology, and additionally, the solution has good integration."
 

Cons

"The tool should provide on-premise versions. Currently, all versions are cloud-based."
"Our customers no longer use Cloudflare because its service is subpar."
"Our customers no longer use Cloudflare because its service is subpar."
"The pricing is an area that can be improved. Pricing, as far as I recall, was the source of our problems."
"They don't have a person to provide support for customers using the solution under their free plan."
"Cloudflare DDoS has poor technical support."
"When there are any dynamic changes in complex applications, the tool takes a lot of time, making its analytics-related area a major matter of concern where improvements are needed."
"Cloudflare One is not very powerful, but for what we require, it is basic and sufficient."
"Abnormal should add more automatic reports. I have an open request to our account team for more notification and report types that can be sent automatically. For example, they have an awesome report that gets sent weekly, and I also want them monthly, so I don't need to do so much adding up when my director wants numbers over time."
"When we're working on something as engineers, and we find an idea or a method of doing something that would be greatly improved by doing it another way, there should be an ability for me to click the ideas button, type in an idea that I have, and submit it to a product review team or developers to have them think through the process a little bit more."
"There could be room for improvement in enhancing integration with other cybersecurity tools."
"I, as such, do not have anything that I do not like or would like to add, but you could argue that because they are doing it API-based, there is a chance that something could slip through temporarily before they are able to pull it out. In theory, it could happen just because of the nature of the system. They are not in line with the delivery of the mail. They are kind of asynchronous, which is a pro as well as a con. If it is synchronous, then I know it would always stop them, but because it is asynchronous, things could get through temporarily or because of some system issues on the Microsoft side or their side. It is the nature of the beast, but it is a little bit of a con."
"One feature I'd love to see is outbound scanning."
"The biggest pain point for us is the lack of support for on-premise email systems."
"I would like to have the ability to customize the auto-remediation feature."
"There could be more selectable options and more granular selections available."
"I would rate them as a 1.5. The new hub created in India is not good."
"The solution is not easy to set up. However, we have employees that have the knowledge that can do the difficult implementation. It would be better if the process was easier."
"I would like the solution to be able to automatically quarantine the malicious emails before getting to the user's mailbox and continue with regular email operations. This could result in the user clicking the email before the purge operation is completed."
"The solution needs better support."
"The custom tailoring is limited."
"The reporting aspect of the solution needs improvement."
"The cloud product is not open to the customers. If the system itself could be more open to the customer, I'd be able to configure it more specifically."
"I would like to see this solution become more flexible."
 

Pricing and Cost Advice

"The solution's pricing lacks transparency."
"The price tag is no longer $200,000, but rather $300,000 to $400,000. It's twice."
"The pricing of the solution is cheap. The licensing cost is also very low. I rate the cost and pricing a three out of ten."
"The pricing is somewhere in the middle. I would rate the pricing a seven out of ten."
"Cloudflare Zero Trust Platform's pricing is good."
"The solution is not that expensive."
"My company has to make yearly payments towards the licensing costs attached to the solution. There are no hidden charges apart from the licensing costs of the solution."
"The prices are slightly expensive."
"Abnormal Security, on the other hand, provides the same level of functionality for just over $60,000 – that's half the price!"
"Overall, we'd certainly prefer lower pricing, but Abnormal Security doesn't seem unreasonable compared to similar offerings in the market."
"The pricing appears fair, and they demonstrate a genuine willingness to work with us on it."
"The license is based on the user count, so the number of users that have an email address in the organization."
"The licensing is on a yearly basis."
"I rate the product price as nine out of ten, where ten is the most expensive, and one is the cheapest. There is no need to pay any extra charges apart from the licensing costs."
"The solution requires a license to be purchased for every user."
"The cost is very high."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
893,221 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Construction Company
20%
Comms Service Provider
10%
Financial Services Firm
8%
Manufacturing Company
6%
Computer Software Company
10%
Financial Services Firm
9%
Manufacturing Company
8%
University
6%
Manufacturing Company
14%
Construction Company
12%
Comms Service Provider
11%
Healthcare Company
11%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business10
Midsize Enterprise2
Large Enterprise11
By reviewers
Company SizeCount
Small Business1
Midsize Enterprise2
Large Enterprise8
By reviewers
Company SizeCount
Small Business8
Midsize Enterprise4
Large Enterprise11
 

Questions from the Community

What needs improvement with Cloudflare Access?
Cloudflare Access has strong integration with Microsoft, among other platforms. However, when it comes to Kaspersky, ...
What is your primary use case for Cloudflare Access?
Cloudflare Access provides secure access to internal applications for employees, external members of the organization...
What advice do you have for others considering Cloudflare Access?
Cloudflare Access is one of the best integrations available. While about two hundred vendors offer similar services, ...
What is your experience regarding pricing and costs for Abnormal Security?
I find the pricing to be favorable, but I did not disclose the exact cost.
What needs improvement with Abnormal Security?
Ease of use is important, and Abnormal Security's responsiveness and ability to deliver solutions when issues arise a...
What is your primary use case for Abnormal Security?
The main use case for Abnormal Security is as a spam filter and for mail hygiene. This use case is for the finance in...
What do you like most about FireEye Email Security?
One of the valuable features of the product stems from the fact that it is easy to implement the tool in our environm...
What needs improvement with FireEye Email Security?
I have had challenges in the past with Trellix Collaboration Security for implementation because of issues related to...
What is your primary use case for FireEye Email Security?
In my field, I have been in the information security area for 17 years, and I am currently working in my position for...
 

Also Known As

Cloudflare Area 1 Email Security, Cloudflare Bot Management, Cloudflare Gateway, Cloudflare Zero Trust Platform, Cloudflare DDoS, Cloudflare SASE & SSE Platform
No data available
FireEye Email Security
 

Overview

 

Sample Customers

23andMe
Foot Lcoker, Xerox, Liberty Mutual, Mattel, Boston Scientific
Northshore Utility District, Luz Technologies, Air Academy Federal Credit Union, Bank Gutmann, Bank of Thailand, Penn State Health Milton S. Hershey Medical Center, State of Missouri, City and County of San Francisco, Denver Public Schools, Vodafone, Go Auto, Stater Bros. Market
Find out what your peers are saying about Abnormal Security vs. Trellix Collaboration Security and other solutions. Updated: April 2026.
893,221 professionals have used our research since 2012.