

Trellix Network Detection and Response and Check Point Security Management compete in network security and management. Trellix holds an advantage in advanced threat detection, focusing on zero-day threats and advanced persistent threats (APTs), offering superior malware analysis tools. Check Point provides comprehensive security management with a centralized console and robust integration with security features.
Features: Trellix is equipped with advanced features like the MVX Engine for real-time threat detection, Yara rules editing for customization, and detailed malware analysis tools, enabling prompt identification of complex threats. Check Point offers strong application filtering, identity awareness, and a unified SmartConsole for easy management, streamlining security operations across gateways and integrating various security functions efficiently.
Room for Improvement: Trellix can improve in integrating with other systems and enhance real-time analytics and cloud functionalities. Users also desire better customization for VMs and sandboxing solutions. Check Point users desire improved policy management and system stability, along with better integration with third-party solutions. Simplifying the upgrade and licensing processes and enhancing support responsiveness are additional areas for development for Check Point.
Ease of Deployment and Customer Service: Trellix provides flexible deployment options in on-premises and hybrid cloud environments and is supported by robust international customer service, highly rated by users. Check Point offers robust multi-cloud deployment options favoring hybrid models but suffers from regional inconsistencies within its customer support services.
Pricing and ROI: Both Trellix and Check Point are considered premium solutions. Trellix's pricing is high but justified by its advanced threat detection capabilities, offering substantial ROI through reduced response times and improved security postures. Check Point delivers ROI with advanced security management features and flexible licensing options, offsetting its initial high costs with value provided by feature versatility.
I have seen a strong ROI from using Check Point Security Management through unified policy management, reduced misconfigurations, and faster incident response.
The time to resolve issues is very much better now with Check Point Security Management.
I have seen a hundred percent return on investment with Check Point Security Management.
When we face technical issues, they are ready to help us.
Customer support for Check Point Security Management is excellent
We have partner support that helps us mitigate vulnerabilities reported by our infrastructure team.
Technical support needs improvement as sometimes engineers are not available promptly, especially during high-severity incidents.
The customer support for Trellix Network Detection and Response is great.
It can be a multi-domain Security Management server and can manage large or segmented environments with multiple domains or customers.
When you upgrade multiple times, you leave many files that are useless. They are dated, so it's always better to create a new machine every few versions, for example, three or four major versions.
The scalability of Check Point Security Management is excellent.
Check Point Security Management is really stable, and I have not experienced any downtime or issues with reliability except for when we do upgrades.
The SmartConsole used to administrate the security management is somewhat unstable.
Check Point Security Management is very stable in my experience, ensuring that our operations run smoothly without interruptions.
When the logs are too heavy for the security management server, the CPU spike will be high, causing our management day-to-day activity to lag or become difficult.
Refining reports and automation capabilities to make it more intuitive and scalable for diverse enterprise environments could improve Check Point Security Management.
Engaging role-based access control is essential; granular permissions for more flexible RBAC will allow the organization to delegate tasks.
There should be improvements in AI intelligence, faster decision-making, and a more responsive technical support team.
I would like to see in Trellix Network Detection and Response more explanation about some details of the threat.
Since we are using it extensively, we get significant discounts during procurement.
Licensing is quite expensive.
We pay on a three-year base.
Check Point Security Management has positively impacted my organization by providing centralized control, allowing us to manage all security policies and gateways from a single console, reducing complexity and saving time.
After deploying Check Point Security Management, we improved our productivity by integrating all devices into a single console instead of managing separate log-ins for each branch's gateways, making our admin team's tasks easier.
The monitoring is exceptional as it provides consolidated logs, signals, and any alerts that come from the security gateway in real time.
Trellix NDR provides an essential defense by automatically responding to network incidents that firewalls may not catch.
What makes Trellix Network Detection and Response stand out for me compared to other tools is the way you can detect threats. It is very easy and comfortable to use, and the detection shows clearly on the screen, which is very easy to understand.
| Product | Mindshare (%) |
|---|---|
| Check Point Security Management | 1.1% |
| Trellix Network Detection and Response | 4.1% |
| Other | 94.8% |

| Company Size | Count |
|---|---|
| Small Business | 55 |
| Midsize Enterprise | 31 |
| Large Enterprise | 43 |
| Company Size | Count |
|---|---|
| Small Business | 20 |
| Midsize Enterprise | 8 |
| Large Enterprise | 19 |
Check Point Security Management offers centralized policy control, a unified console, and role-based access. It simplifies security operations through automation, real-time monitoring, and integration capabilities, ensuring efficient management across multiple environments.
Users leverage Check Point Security Management for streamlined configuration and consistent security enforcement. The platform's scalability and flexibility suit diverse environments, including cloud and on-premise settings, enabling efficient firewall and security gateway management. Real-time monitoring and logging capabilities facilitate swift incident response and comprehensive oversight.
What are the key features of Check Point Security Management?Check Point Security Management is widely implemented across industries such as finance, healthcare, and telecommunications. These sectors require stringent security protocols and benefit from real-time monitoring and comprehensive threat prevention capabilities it provides. Organizations use it to manage and enforce security measures, ensuring secure data transmission and infrastructure protection.
Trellix Network Detection and Response provides robust threat protection with advanced detection of zero-day attacks and APTs. Its user-friendly dashboard and real-time response capabilities enhance security and visibility across networks.
Trellix Network Detection and Response stands out with its MVX engine, leveraging virtual machines for comprehensive behavioral analysis. The solution supports detection of advanced cyber threats through features like sandboxing and application filtering, offering real-time response and packet capture for detailed contextual insights. Companies benefit from seamless integration with other platforms, enhancing usability and overall protection. User-friendly interfaces improve network visibility, while stability and ease of configuration safeguard against both signature-based and signature-less threats.
What key features does Trellix offer?Companies in sectors like finance, healthcare, and enterprise security utilize Trellix Network Detection and Response for tasks such as network intrusion detection, endpoint protection, and securing data transmission paths. It aids in threat investigations, pre-sales demos, and network forensics, reducing risks by protecting against cyber threats like phishing.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.