


Trellix Endpoint Detection and Response (EDR) and Microsoft Defender for Endpoint compete in the EDR category. Microsoft Defender is seen to offer superior features and easier deployment, whereas Trellix stands out for customer service and pricing.
Features: Trellix EDR is recognized for its comprehensive threat detection capabilities, customizable alerts, and competitive pricing. Microsoft Defender for Endpoint integrates well with other Microsoft products, uses advanced machine learning insights, and provides a more robust feature set.
Room for Improvement: Trellix EDR could improve its user experience, reporting functionalities, and usability. Microsoft Defender for Endpoint users suggest better customer support, a more intuitive setup process, and enhancements in documentation.
Ease of Deployment and Customer Service: Trellix EDR offers a straightforward deployment process and exceptional customer service. Microsoft Defender for Endpoint benefits from efficient deployment due to existing Microsoft infrastructure, though it faces criticisms regarding customer service response times.
Pricing and ROI: Trellix EDR is perceived as a cost-efficient option with a good return on investment. Microsoft Defender for Endpoint is seen as more expensive but offers compelling value through its extensive features and integration benefits.
They appreciate the rich telemetry data from the solution, as it provides in-depth threat identification.
Cortex XDR by Palo Alto Networks helps to reduce my total cost of ownership significantly.
In Cortex XDR by Palo Alto Networks, most of the remediation is automated and the accuracy is quite good.
Without detection and protection measures, organizations would face substantial payments and reputational damage, including the necessity to inform customers about data breaches, potentially leading to loss of business.
We have seen a return on investment when using Microsoft Defender for Endpoint, as it saves labor by reducing the need for staff to focus on it.
The biggest return on investment for me when using Microsoft Defender for Endpoint is the time saving.
The advanced detection and mitigation capabilities ensure the highest level of protection and proper detection for command and control and bot attacks.
I have seen a return on investment with Trellix Endpoint Detection and Response (EDR); a lot of time is saved as it minimizes the efforts of manual work.
The technical support from Palo Alto deserves a mark of ten because they reach out within an hour whenever assistance is needed.
There is no back and forth, and they know what we are asking for and come up with the best resolution for a solution.
If any of these services are missed, it becomes a problem in terms of support tickets, follow-up, or special configuration that needs to be done in the system.
The Microsoft agent, who did not actually work for Microsoft, is one of the vendors that Microsoft uses for support, said, 'Just to set expectations, my lunch break is in an hour and I am going to go away then.'
The level-one support seems disconnected from subject matter experts.
I rate Microsoft support 10 out of 10.
I have contracted support and also have an operating control so I can get various types of support.
On our servers, we do not want it to touch our resources, so we deployed Sophos XDR on the server.
The customer support for Trellix Endpoint Detection and Response (EDR) is excellent.
You can onboard 10,000 endpoints in just hours, which demonstrates the excellent scalability of this product.
Activating the newly purchased licenses is instantaneous, allowing installations without adjustments since it's cloud-based.
Cortex XDR by Palo Alto Networks can be expanded anytime by purchasing another license without any issues related to scalability.
We managed to scale it out in a short amount of time, with two months of planning and three months of implementation on 10,000 computers.
Microsoft Defender for Endpoint is scalable enough to handle various devices across environments, whether they are laptops, Android devices, or operating in hybrid environments.
Compatibility is its main feature.
Trellix Endpoint Detection and Response (EDR) is really scalable, allowing easy deployment with its agent across all devices and servers within the organization.
Cortex remains fast and responsive, even with increasing data and alerts.
The thresholds we've seen on our firewall boxes at some instances reached 80% to 85%, but even at that level of utilization, we don't observe any latency or any issues reported with respect to accessing the application.
Cortex XDR is stable, offering high quality and reliable performance.
I haven't seen any outages with Microsoft.
I rate Defender 10 out of 10 for stability.
Defender for Endpoint is extremely stable.
So I have to use Sophos XDR on servers because Sophos XDR does not consume resources.
Improving reporting and dashboard customization, along with the addition of real-time and exportable reports, would help SOC teams greatly.
The inclusion of this feature would allow the application of DLP policies alongside antivirus policies via a single agent and console, making it more competitive as other OEMs often offer DLP solutions as part of their antivirus products.
If the per GB data could be provided at a certain level free of cost or at the same cost which the customer is taking for the entire bundle, that would be better.
Repeated interactions are necessary due to Level One's lack of tools and knowledge, hindering efficient problem-solving and negatively impacting our experience with Microsoft support.
In contrast, competing products offer reduced pricing for long-term commitments, which makes it difficult for us in that environment.
We use Microsoft partners to help govern the platform, and as part of an alliance, we want to gather data from each tenant and combine them for a complete view.
I am seeing, for workflows, some sort of ethical hacking to test our environment.
Trellix Endpoint Detection and Response (EDR) is interesting and is a very good entry point that has been evolving through the last years.
One area where Trellix Endpoint Detection and Response (EDR) can be improved is the lack of device or user mapping.
The pricing on SentinelOne is far more reasonable and cheaper than Cortex XDR by Palo Alto Networks.
I would say it is definitely not a cheap product, considering how mature it is and how scalable all Palo Alto products are together.
Cortex XDR is perceived as expensive by some customers, yet offers dynamic pricing.
That has been the trend we have seen with Microsoft lately—it is just getting more and more expensive.
Given our extensive Microsoft licensing, transitioning to Defender for Endpoint did not affect licensing costs.
It costs $15 per VM for the P2 plan, which is seen as affordable for customers.
For the license requirement, we worked with the vendor to secure the minimum price for Trellix endpoint solutions, with no additional costs charged by the vendor.
My experience with pricing, setup cost, and licensing is very cost-effective.
It incorporates AI for normal behavior detection, distinguishing unusual operations.
The product provides automation responses in case of a threat attack, severity assessments, centralized manageability, and comprehensive compliance features, resulting in reduced costs.
It includes machine learning to easily analyze data and detect complex threats across endpoints, networks, or clouds.
Defender for Endpoint's coverage across different platforms in our environment is pretty good. We have devices running Linux, Mac OS, Windows, iOS, and Android. It covers all of them.
Microsoft Defender for Endpoint provides a unified management interface allowing customers to manage their on-premises and hybrid infrastructures from a single pane.
One of the best features of Microsoft Defender for Endpoint is its database for identifying zero-day attacks or malware attacks.
Trellix Endpoint Detection and Response (EDR) has very good threat hunting capability.
Advanced detection capabilities ensure that targeted attacks will be detected and blocked before they arrive at our network.
I have spent efforts on training our managers and others - what can software do if the knowledge base is low?
| Product | Mindshare (%) |
|---|---|
| Microsoft Defender for Endpoint | 6.0% |
| Cortex XDR by Palo Alto Networks | 3.4% |
| Trellix Endpoint Detection and Response (EDR) | 1.0% |
| Other | 89.6% |



| Company Size | Count |
|---|---|
| Small Business | 46 |
| Midsize Enterprise | 20 |
| Large Enterprise | 49 |
| Company Size | Count |
|---|---|
| Small Business | 82 |
| Midsize Enterprise | 43 |
| Large Enterprise | 95 |
| Company Size | Count |
|---|---|
| Small Business | 14 |
| Midsize Enterprise | 3 |
| Large Enterprise | 14 |
Cortex XDR by Palo Alto Networks provides advanced threat detection with AI-driven endpoint protection and seamless integration, ensuring multi-layered security and automatic threat response.
Cortex XDR is designed to safeguard endpoints against malware and suspicious activities. It offers advanced threat detection and response capabilities using behavioral analysis, AI, and machine learning. It seamlessly integrates with security infrastructures, providing endpoint security, firewall integration, and enhanced visibility in both cloud-based and on-premises environments.
What are the key features of Cortex XDR?Organizations in diverse sectors deploy Cortex XDR to protect against malware, leveraging its advanced threat detection capabilities. Its integration with existing security infrastructures appeals to those seeking comprehensive protection in both cloud and on-premises environments, providing enhanced visibility and threat intelligence.
Microsoft Defender for Endpoint provides comprehensive threat protection that integrates well with current systems, offering proactive threat detection and automatic updates while reducing manual efforts.
The platform is designed for seamless integration with Microsoft products, facilitating efficient management and use. It offers proactive ransomware protection and valuable threat intelligence, crucial for timely response and increased visibility across devices. Users highlight its ability to secure endpoints from viruses and malware, integrating with Windows and Office 365 to enhance real-time detection capabilities in diverse environments, including hybrid and on-premises setups. However, enhancements are needed in Linux integration, detection accuracy, and policy implementations.
What are the key features of Microsoft Defender for Endpoint?Microsoft Defender for Endpoint is implemented across industries for securing endpoints, relying on its deep integration with Windows and Office 365 to protect against malware and viruses. Organizations benefit from its real-time detection and comprehensive management capabilities, particularly in hybrid environments where diverse digital infrastructures need safeguarding.
Trellix Endpoint Detection and Response (EDR) offers advanced threat detection using AI-driven analytics, real-time monitoring, and integration with the MITRE Framework, enhancing security through comprehensive detection and response features.
Trellix EDR provides users with tools for threat hunting, powerful forensic capabilities, and intuitive dashboards. It integrates with diverse systems and supports cloud-based multi-site configurations, which facilitates a more robust security posture. With features like effective quarantine measures, behavior monitoring, and automation, it enhances operational efficiency. Despite its strengths, areas for refinement include better AI-driven threat analysis, improved resource efficiency, and faster processing times. Enhancing detection capabilities for unknown threats and improving integration with other tools can significantly upgrade performance and usability.
What features define Trellix EDR?Trellix EDR is widely implemented in industries for endpoint protection and incident response. It helps protect workstations and improve threat intelligence by supporting integrations with cloud security and SIEM. Users benefit from its ability to identify malicious files and ransomware while adhering to zero-trust principles through improved telemetry visibility.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.