

Trellix Network Detection and Response and Microsoft Defender for Cloud Apps compete in the network security and application monitoring space. Trellix seems to have an upper hand in detecting advanced threats, while Microsoft Defender benefits from strong integrations within the Microsoft ecosystem.
Features: Trellix Network Detection and Response stands out with its sandboxing technology, MVX engine, and a focus on advanced persistent threats and zero-day vulnerabilities. Its deep malware analysis capabilities exceed traditional SIEM solutions. Microsoft Defender for Cloud Apps offers strong integration with Microsoft's ecosystem, excels in application monitoring, and provides holistic security management with in-depth evaluations and alerting systems.
Room for Improvement: Trellix Network Detection and Response could improve its VM sandbox customization and integration with cloud solutions and better threat analysis management systems. Microsoft Defender for Cloud Apps may enhance its response times, integration with macOS, and provide more pre-configured reporting tools, along with better third-party solution integration and alert precision.
Ease of Deployment and Customer Service: Trellix Network Detection and Response primarily offers on-premises deployment, suitable for businesses with on-site needs but less flexible than Microsoft Defender for Cloud Apps, which supports public, private, and hybrid cloud deployments. Both products receive good support ratings, though Defender users note slightly better customer service.
Pricing and ROI: Trellix Network Detection and Response is often seen as pricey but delivers considerable ROI by reducing breach incidents. Microsoft Defender for Cloud Apps offers cost-effective pricing, especially when bundled with Microsoft 365, making it affordable upfront and improving ROI through reduced response times and increased productivity.
The biggest return on investment so far has been visibility, knowing what we have in our environment.
As a small team, Microsoft Defender for Cloud Apps allowed us to manage systems with just one or two people.
We have at least saved the costs we had from the Netskope solution this year.
Their customer service is pretty good, but it's frustrating to go through three or four channels before reaching the right person.
The support is excellent, and the speed of response is commendable.
There were instances where the engineers were knowledgeable and helpful, but at other times it felt like a ping pong game, with unnecessary transfers until the right person was found.
Technical support needs improvement as sometimes engineers are not available promptly, especially during high-severity incidents.
The customer support for Trellix Network Detection and Response is great.
For what I know about the log collector and how much data it can take in, it is super scalable and capable of handling high workloads.
Microsoft Defender for Cloud Apps is very scalable, provided you have the right subscription.
In my experience, Microsoft Defender for Cloud Apps is good enough for small to medium businesses.
I would rate it a ten because I have not experienced any stability issues so far with Defender for Cloud Apps.
I would assess the stability and reliability of Microsoft Defender for Cloud Apps as stable
My impression on the stability and reliability of Microsoft Defender for Cloud Apps is that it is very stable.
For data loss prevention, it would be useful to be able to drill down into the kind of data being transferred over CloudApp.
Defender typically connects to Entra ID, but we have local users on the cloud for database access, SSH, or RDS, and there is nothing produced by Defender regarding those local IAM users.
Microsoft Defender for Cloud Apps would benefit if Microsoft allows users to fine-tune false positives, enabling us to dismiss alerts or make adjustments so that such things don't trigger multiple times in the future.
There should be improvements in AI intelligence, faster decision-making, and a more responsive technical support team.
I would like to see in Trellix Network Detection and Response more explanation about some details of the threat.
The pricing for Microsoft Defender for Cloud Apps is acceptable.
My organization is currently revisiting pricing, but previously, the cost was a bit expensive, yet comparable to other solutions with similar functionalities and features.
It's not the cheapest, but also not the most expensive, placing it in the mid-level range.
It provides excellent suggestions and options for configuration; for example, it can track suspicious files getting uploaded to cloud resources on Azure based on their signatures, generating alerts for those files.
The product recommends things that need to be blocked and allows for dynamic configuration, which cuts down on potential issues that might arise from going through lists and understanding what needs to be blocked.
The ability to sanction unsanctioned apps using Secure Score benchmarking, included in Cloud, is also beneficial.
Trellix NDR provides an essential defense by automatically responding to network incidents that firewalls may not catch.
What makes Trellix Network Detection and Response stand out for me compared to other tools is the way you can detect threats. It is very easy and comfortable to use, and the detection shows clearly on the screen, which is very easy to understand.
| Product | Mindshare (%) |
|---|---|
| Microsoft Defender for Cloud Apps | 2.0% |
| Trellix Network Detection and Response | 4.1% |
| Other | 93.9% |

| Company Size | Count |
|---|---|
| Small Business | 15 |
| Midsize Enterprise | 12 |
| Large Enterprise | 19 |
| Company Size | Count |
|---|---|
| Small Business | 20 |
| Midsize Enterprise | 8 |
| Large Enterprise | 19 |
Microsoft Defender for Cloud Apps is a robust tool for shadow IT detection, cloud integration, and threat detection, enhancing security management with capabilities in auditing and data protection.
Microsoft Defender for Cloud Apps strengthens cloud security by providing comprehensive insights into user activities, seamlessly integrating with Microsoft security products and platforms like SharePoint, Teams, and OneDrive. Its investigative capabilities enhance threat detection, while real-time alerts and policy applications improve security posture. Organizations benefit from its monitoring, auditing, and privileged identity management features that contribute to enhanced security management and data protection.
What are the key features of Microsoft Defender for Cloud Apps?Microsoft Defender for Cloud Apps implementation varies across industries, crucial for sectors needing stringent data protection and compliance, like finance and healthcare. Firms use it to monitor user activity, enforce data loss prevention policies, and ensure security across multi-cloud environments while integrating with Azure services for comprehensive threat management. These implementations are particularly beneficial in improving compliance efforts and protecting sensitive data.
Trellix Network Detection and Response provides robust threat protection with advanced detection of zero-day attacks and APTs. Its user-friendly dashboard and real-time response capabilities enhance security and visibility across networks.
Trellix Network Detection and Response stands out with its MVX engine, leveraging virtual machines for comprehensive behavioral analysis. The solution supports detection of advanced cyber threats through features like sandboxing and application filtering, offering real-time response and packet capture for detailed contextual insights. Companies benefit from seamless integration with other platforms, enhancing usability and overall protection. User-friendly interfaces improve network visibility, while stability and ease of configuration safeguard against both signature-based and signature-less threats.
What key features does Trellix offer?Companies in sectors like finance, healthcare, and enterprise security utilize Trellix Network Detection and Response for tasks such as network intrusion detection, endpoint protection, and securing data transmission paths. It aids in threat investigations, pre-sales demos, and network forensics, reducing risks by protecting against cyber threats like phishing.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.