Trellix Endpoint Security and Elastic Security compete in the endpoint protection category. Trellix leads in support and pricing satisfaction, while Elastic Security is favored for its comprehensive features, making it a noteworthy investment for its price.
Features: Trellix offers strong malware detection, behavior analysis, and easy integration. Elastic provides robust threat intelligence, scalability, and customizable dashboards with advanced analytics.
Room for Improvement: Trellix users wish for better performance speed, enhanced reporting, and speed enhancements. Elastic users seek improvements in the setup process, more intuitive navigation, and simplifying initial configurations.
Ease of Deployment and Customer Service: Trellix is noted for its seamless deployment and responsive support, making it user-friendly for various environments. Elastic, while powerful, has a steeper learning curve but benefits from highly regarded documentation. Trellix deployment is straightforward, supported well by customer service. Elastic requires more expertise, but users commend its detailed guides.
Pricing and ROI: Trellix is considered cost-effective, offering good ROI with competitive setup costs. Elastic's pricing is higher, reflecting its extensive capabilities, but users report a worthwhile ROI due to enhanced security outcomes. Trellix provides affordability with satisfactory returns, while Elastic justifies its higher initial investment with long-term performance benefits.
It does not require hefty security budgets and can be deployed for enterprise security effectively.
There are two parts: one is the encryption which is standard and no AI is needed, but the data protection part could benefit from AI to detect new types of data and protect it.
Clients appreciate the solution’s customization capabilities and ongoing product improvements.
We have observed tremendous return on investment after implementing Trellix Endpoint Security as it is a more cost-effective solution compared to other products.
Providing necessary assistance efficiently.
Most of the time when my team encounters issues, they receive responses within 24 hours.
When we implemented Trellix Endpoint Security in their network, multiple malwares were detected.
The response time is a notable issue.
I would rate their customer service nine out of ten.
It allows us to think about specific use cases, such as gathering malicious IPs in a single view and analyzing threats based on geolocation.
Trellix Endpoint Security is scalable.
I would rate the scalability of the solution as a six out of ten, indicating some challenges due to downtime requirements.
In terms of stability, I would rate Elastic a solid eight out of ten.
I would rate its stability as nine out of ten.
I would rate the stability of Trellix Endpoint Security as near perfect, close to ten out of ten.
I think it's stable enough; earlier it had glitches, but now it's stable enough.
My security testing team continuously reports vulnerabilities, and we have to fix and update the versions frequently.
CrowdStrike and Defender have more established threat intelligence integration due to having a larger client base.
Elastic Security consumes a lot of resources, requiring a substantial deployment setup.
It doesn't support Microsoft Windows Hello authentication.
What needs improvement in Trellix Endpoint Security is the reduction of resource consumption by the scanning feature.
The product does not seem to be cloud-native.
This is beneficial for SMEs as they do not need extensive budgets for security solutions.
The pricing is reasonable, especially for Small Medium Enterprises (SMEs), making it a viable option for businesses building their security infrastructure.
Elastic Security is considered cost-effective, especially at lower EPS levels.
The license costs are very reasonable, around 1,000 to 1,200 rupees per year.
Trellix Endpoint Security is cost-effective and provides excellent value for money.
Elastic Security offers advanced features such as machine learning and integration with ChatGPT.
We require rapid processing speed for alerts and event data, and Elastic Security is very efficient at handling this level of data.
Elastic Security is as flexible and configurable as Microsoft Sentinel.
Including options like Application Control (formerly Solidcore), integrated monitoring, change control, DLP, and advanced threat protection, the solution offers comprehensive security.
Trellix Endpoint Security is a proven, robust, and cost-effective solution that protects the organization from different types of ransomware and attacks.
The detection capability of Trellix Endpoint Security is higher than traditional antivirus solutions.
Elastic Security combines the features of a security information and event management (SIEM) system with endpoint protection, allowing organizations to detect, investigate, and respond to threats in real time. This unified approach helps reduce complexity and improve the efficiency of security operations.
Additional offerings and benefits:
Finally, Elastic Security benefits from a global community of users who contribute to its threat intelligence, helping to enhance its detection capabilities. This collaborative approach ensures that the solution remains on the cutting edge of cybersecurity, with up-to-date information on the latest threats and vulnerabilities.
Trellix Endpoint Security provides aggressive robust protection for every endpoint in an enterprise organization. Trellix uses dynamic threat intelligence and mounts a superb defense across the complete threat lifecycle. This solution will keep your organization more secure and resistant to any possible threat of risks. Trellix offers an amalgamated suite of next-generation endpoint security tools. These tools give users the benefit of machine learning, intuitive intelligence, and greater assistance to ensure their networks are being protected non-stop against threats - potential or realized - and can stop attacks before they happen. Trellix uses MDR (managed detection and response) and XDR (extended detection and response) to give users a comprehensive endpoint security solution.
Trellix Endpoint Security Benefits
Trellix Endpoint Security Top Features
Reviews from Real Users
“It has a great console. We can manage everything from the central console and it is very easy. Every year we are getting the benefits of legacy also. It's easy to set up.” - S Fazlul H., IT Lead Engineer, Information Technology at Banglalink
“There is a new feature where you can set thresholds for all the CPU consumption allowing for no consumption on the servers when the scans happen. It is a separate plugin or addon, and if we have it on all the virtual machines it automatically checks the resources, and based on that, it will schedule the scans. That is something that I have not seen in other antivirus solutions, such as Symantec.” - Sabari K. Senior Engineer at a comms service provider
We monitor all Extended Detection and Response (XDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.