

Trellix Network Detection and Response and Microsoft Defender for Endpoint compete in the network security market. Trellix has the upper hand in advanced threat detection, while Microsoft Defender offers better integration with Microsoft services.
Features: Trellix Network Detection and Response offers powerful analytical tools, zero-day attack detection, and customization options like Yara rules and sandbox capabilities. It provides detailed threat analysis and application filtering. Microsoft Defender for Endpoint is known for its integration with Microsoft services, user-friendly design, and comprehensive threat protection, including antivirus, firewall, and real-time alerts.
Room for Improvement: Trellix could enhance its user interface for easier navigation and reduce false positives. Other areas for improvement include application filtering, firewall integrations, and cloud connectivity. Microsoft Defender for Endpoint needs better integration across services, improved threat detection capabilities, more user-friendly dashboards, and reduced false positives. Greater third-party integrations and support for non-Windows systems would be beneficial.
Ease of Deployment and Customer Service: Both Trellix and Microsoft Defender offer on-premises deployments, with Trellix focusing more on on-premises infrastructure and Microsoft Defender supporting a broader range of environments. Trellix is noted for efficient customer service and technical support, while Microsoft Defender's customer service has mixed feedback.
Pricing and ROI: Trellix is recognized for high costs but significant ROI through advanced threat detection. Microsoft Defender for Endpoint is often bundled with Microsoft products, reducing costs, making it cost-effective for businesses using Microsoft's ecosystem. Both solutions offer a solid ROI by preventing breaches and reducing response times, though Trellix tends to be more expensive.
Without detection and protection measures, organizations would face substantial payments and reputational damage, including the necessity to inform customers about data breaches, potentially leading to loss of business.
We have seen a return on investment when using Microsoft Defender for Endpoint, as it saves labor by reducing the need for staff to focus on it.
The biggest return on investment for me when using Microsoft Defender for Endpoint is the time saving.
The Microsoft agent, who did not actually work for Microsoft, is one of the vendors that Microsoft uses for support, said, 'Just to set expectations, my lunch break is in an hour and I am going to go away then.'
The level-one support seems disconnected from subject matter experts.
I rate Microsoft support 10 out of 10.
Technical support needs improvement as sometimes engineers are not available promptly, especially during high-severity incidents.
The customer support for Trellix Network Detection and Response is great.
We managed to scale it out in a short amount of time, with two months of planning and three months of implementation on 10,000 computers.
Microsoft Defender for Endpoint is scalable enough to handle various devices across environments, whether they are laptops, Android devices, or operating in hybrid environments.
Compatibility is its main feature.
I haven't seen any outages with Microsoft.
I rate Defender 10 out of 10 for stability.
Defender for Endpoint is extremely stable.
Repeated interactions are necessary due to Level One's lack of tools and knowledge, hindering efficient problem-solving and negatively impacting our experience with Microsoft support.
In contrast, competing products offer reduced pricing for long-term commitments, which makes it difficult for us in that environment.
We use Microsoft partners to help govern the platform, and as part of an alliance, we want to gather data from each tenant and combine them for a complete view.
There should be improvements in AI intelligence, faster decision-making, and a more responsive technical support team.
I would like to see in Trellix Network Detection and Response more explanation about some details of the threat.
That has been the trend we have seen with Microsoft lately—it is just getting more and more expensive.
Given our extensive Microsoft licensing, transitioning to Defender for Endpoint did not affect licensing costs.
It costs $15 per VM for the P2 plan, which is seen as affordable for customers.
Defender for Endpoint's coverage across different platforms in our environment is pretty good. We have devices running Linux, Mac OS, Windows, iOS, and Android. It covers all of them.
Microsoft Defender for Endpoint provides a unified management interface allowing customers to manage their on-premises and hybrid infrastructures from a single pane.
One of the best features of Microsoft Defender for Endpoint is its database for identifying zero-day attacks or malware attacks.
Trellix NDR provides an essential defense by automatically responding to network incidents that firewalls may not catch.
What makes Trellix Network Detection and Response stand out for me compared to other tools is the way you can detect threats. It is very easy and comfortable to use, and the detection shows clearly on the screen, which is very easy to understand.
| Product | Mindshare (%) |
|---|---|
| Microsoft Defender for Endpoint | 5.7% |
| Trellix Network Detection and Response | 4.1% |
| Other | 90.2% |


| Company Size | Count |
|---|---|
| Small Business | 82 |
| Midsize Enterprise | 43 |
| Large Enterprise | 95 |
| Company Size | Count |
|---|---|
| Small Business | 20 |
| Midsize Enterprise | 8 |
| Large Enterprise | 19 |
Microsoft Defender for Endpoint provides comprehensive threat protection that integrates well with current systems, offering proactive threat detection and automatic updates while reducing manual efforts.
The platform is designed for seamless integration with Microsoft products, facilitating efficient management and use. It offers proactive ransomware protection and valuable threat intelligence, crucial for timely response and increased visibility across devices. Users highlight its ability to secure endpoints from viruses and malware, integrating with Windows and Office 365 to enhance real-time detection capabilities in diverse environments, including hybrid and on-premises setups. However, enhancements are needed in Linux integration, detection accuracy, and policy implementations.
What are the key features of Microsoft Defender for Endpoint?Microsoft Defender for Endpoint is implemented across industries for securing endpoints, relying on its deep integration with Windows and Office 365 to protect against malware and viruses. Organizations benefit from its real-time detection and comprehensive management capabilities, particularly in hybrid environments where diverse digital infrastructures need safeguarding.
Trellix Network Detection and Response provides robust threat protection with advanced detection of zero-day attacks and APTs. Its user-friendly dashboard and real-time response capabilities enhance security and visibility across networks.
Trellix Network Detection and Response stands out with its MVX engine, leveraging virtual machines for comprehensive behavioral analysis. The solution supports detection of advanced cyber threats through features like sandboxing and application filtering, offering real-time response and packet capture for detailed contextual insights. Companies benefit from seamless integration with other platforms, enhancing usability and overall protection. User-friendly interfaces improve network visibility, while stability and ease of configuration safeguard against both signature-based and signature-less threats.
What key features does Trellix offer?Companies in sectors like finance, healthcare, and enterprise security utilize Trellix Network Detection and Response for tasks such as network intrusion detection, endpoint protection, and securing data transmission paths. It aids in threat investigations, pre-sales demos, and network forensics, reducing risks by protecting against cyber threats like phishing.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.