Try our new research platform with insights from 80,000+ expert users

Microsoft Exchange Online Protection (EOP) vs Trellix Collaboration Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 3, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cloudflare One
Sponsored
Ranking in Email Security
20th
Average Rating
8.8
Reviews Sentiment
6.7
Number of Reviews
22
Ranking in other categories
Secure Web Gateways (SWG) (15th), Data Loss Prevention (DLP) (21st), Cloud Access Security Brokers (CASB) (11th), Distributed Denial-of-Service (DDoS) Protection (7th), Software Defined WAN (SD-WAN) Solutions (13th), Access Management (12th), Bot Management (3rd), ZTNA as a Service (8th), ZTNA (3rd), Secure Access Service Edge (SASE) (10th), Remote Browser Isolation (RBI) (3rd)
Microsoft Exchange Online P...
Ranking in Email Security
7th
Average Rating
8.2
Reviews Sentiment
6.6
Number of Reviews
42
Ranking in other categories
Anti-Malware Tools (11th)
Trellix Collaboration Security
Ranking in Email Security
11th
Average Rating
8.8
Reviews Sentiment
6.9
Number of Reviews
19
Ranking in other categories
Instant Communications Security and Compliance (2nd), Secure Email Gateway (SEG) (6th), AI Security (9th)
 

Mindshare comparison

As of March 2026, in the Email Security category, the mindshare of Cloudflare One is 1.5%, down from 1.8% compared to the previous year. The mindshare of Microsoft Exchange Online Protection (EOP) is 4.1%, down from 7.1% compared to the previous year. The mindshare of Trellix Collaboration Security is 2.3%, up from 2.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Email Security Mindshare Distribution
ProductMindshare (%)
Microsoft Exchange Online Protection (EOP)4.1%
Trellix Collaboration Security2.3%
Cloudflare One1.5%
Other92.1%
Email Security
 

Featured Reviews

CV
Network Architect at IP Dimension
Cloud security has improved remote access and has reduced costs for smaller client sites
I have used Cloudflare One's Identity-Aware Proxy, and it is quite straightforward from what I have seen so far. The app registration on the Azure side integrates fully into Cloudflare, and I am very satisfied with that part because it is easy to set up. The integration of Cloudflare One's Secure Web Gateway and Zero Trust Network Access works without any issues. That part is pretty automatic, and if you complete the rest of the setup, it comes together by itself with no issues from my side. What makes it nice is that we can actually start replacing on-site firewalls at this stage for the smaller clients because it does not matter if they go to a coffee shop or work from home; they are still secured by the same connection. The hops get shorter and you get better latency. We have done testing to see if it is better. One thing that we did notice with our proof of concept with our current client is that they have people connecting from the UK. When they used their previous VPN solution, uploading CAD drawings and other files to the server took a long time. They mentioned that it is much quicker on Cloudflare One's solution. I definitely believe that is part of the improved performance, and I am satisfied with that as well. What is nice about Cloudflare One is that it makes the setup easier and also easier to train technicians to maintain it. Compared to legacy systems, we do not need to get fancy firewalls in place that are costly. That is definitely also a cost-saver with Cloudflare One.
NancyHartman - PeerSpot reviewer
Business Process Manager/ Educational Technologist at a educational organization with 1,001-5,000 employees
Layered email security has protected sensitive research and still flags phishing in real time
The valuable features of Microsoft Exchange Online Protection (EOP) include providing an additional layer of protection, as it builds on the basic Exchange level of security that allows us to get our work done. Another feature I appreciate is the ability to question things, as our Exchange server allows us to identify in real-time if an email is a phishing email or spam email. It really helps us identify risks, especially through our external exchanges via email or through our cloud-based platforms. Our Exchange system blocks any embedded AI from all our applications and products, so we cannot use embedded AI in our daily work from our official laptops because we have secure information. The system is quite locked down.
Felipe Antoniazzi - PeerSpot reviewer
Cybersecurity Engineer Lead at Johnson & Johnson
Real-time threat response has boosted detection accuracy and reduces manual investigation work
I have had challenges in the past with Trellix Collaboration Security for implementation because of issues related to compatibility. Since we worked in a global company with different operating systems, it was necessary to create different plans and different actions to implement the product.One thing I really do not prefer in Trellix Collaboration Security is not related to the console. I am a McAfee fan since the McAfee tool, and I find the console of Trellix Collaboration Security to be very user-friendly and easy to use. However, I do not know if it is related to the architecture of the product. Of course, we have modern threats based on behaviors and zero days. We have today CrowdStrike and SentinelOne, where we have better results based on threats and behavior, where it is possible to create a simulation environment based on the file detected and based on it, confirm if it really is malicious or not. In general, I believe Trellix Collaboration Security improved the console based on the last console of McAfee, but I think it is possible to improve more. It really is a good product, but in my view, it needs to improve detection based on behaviors. Regarding automations, I have implemented Trellix Collaboration Security here at Johnson & Johnson, and I implemented it in the same situation at Santander Bank and BNP Paribas Bank, where I created automations to export data for different metrics, including malicious detections, compliance, baselines, scans, last scans based on the seven days, and checking of patterns. I export everything to CSV files. Based on that, I create Power BI dashboards, and in these Power BI dashboards, I have a more executive view for different metrics to provide to myself, my manager, or director to create an executive view based on it. Another important point we use here at Johnson & Johnson and other companies is a data hub or a SIEM solution, such as Elastic or ArcSight, where we select some logs to be sent and use it to build reports and metrics.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Cloudflare Zero Trust Platform removes the risk of exposing the applications to the public."
"Enables me to work from two locations."
"It is a stable solution."
"The blocking feature is very good."
"Clover is the best product globally."
"For Cloudflare Access, I am using the free plan...The most valuable feature is their protection."
"The solution has different options that can be used to differentiate DDoS attacks."
"Using Cloudflare One makes my work quite easy because for DDoS protection, all I need to do is understand the OSI model and click; it makes it easier than trying to write a command line or use a Linux command."
"The solution's stability is very, very good. I didn't face any problems in the last year."
"It offers great security against malware and other threats."
"The product's most valuable feature is third-party integrations."
"The email policy configuration options in Microsoft EOP are satisfactory."
"We like the holding facility that is available for potentially suspicious URL's. This allows a real-time review to be performed before the email reaches a users inbox."
"We use the solution to receive emails. We do not use the calendar function as our clients are slow adaptors to the latest features."
"It's definitely scalable."
"It is an easy solution."
"The solution's most valuable feature is its simplicity. It's very user-friendly."
"The auto-remediation feature is valuable."
"FireEye Email Security helps us prevent spam and phishing emails and all other business-compromised email attacks."
"The initial setup is simple."
"We have had very good results from the use of FireEye Email Security. We are very comfortable with this technology, but I don't know if it's necessary to move into the cloud, we will check other technologies and study them. Additionally, the solution has good integration."
"Trellix Collaboration Security has positively impacted my organization by improving security, making teamwork more effective, and ensuring collaboration has become smoother."
"One of the most valuable features is the protection against vulnerabilities, particularly through virtual patching."
"FireEye Email Security is easy to use."
 

Cons

"The free plan has limitations. For example, I can only set up three rules, and the application firewall is unavailable."
"They don't have a person to provide support for customers using the solution under their free plan."
"From a logging perspective, it is still a bit difficult to see exactly what users are being blocked with the current views."
"The initial onboarding was causing us some confusion."
"Operating and tuning the product is difficult."
"There are premium tier live service and lower tier live service, so we opted for the lower tier. But there is no medium tier where we pay a little extra and get a bit more service. So if that can be improved."
"For the topic of improvement, providing some training material is one of my suggestions."
"When there are any dynamic changes in complex applications, the tool takes a lot of time, making its analytics-related area a major matter of concern where improvements are needed."
"The tool is not 100% stable."
"Performance and speed should continue to be improved."
"The security compliance features need to be improved. Sometimes, a client's mailbox becomes full because of retained information and not because of mail. I would like to see improvement in block rules as well."
"The product's end-of-life cycle could be extended."
"If a company wants to put in line back-to-back anti-spam solutions, they need to work on that part because Microsoft recommends either you use EOP as a front line or you don't use it."
"Our company faces difficulty with Microsoft Exchange Online Protection (EOP) because it's too big, clunky, and difficult for a small client to implement quickly and easily."
"Some of the searchability when looking for specifics in Exchange logs is tedious."
"The security features could be better."
"The solution must provide features to scan QR codes for threats."
"Trellix Collaboration Security can be improved by making the reporting and analysis tools more detailed."
"I would like to see this solution become more flexible."
"The reporting aspect of the solution needs improvement."
"The spam detection feature could be better."
"The custom tailoring is limited."
"FireEye needs single sign-on. They say it's on their roadmap. They should also implement support for Microsoft Authenticator app for 2FA."
"I would rate them as a 1.5. The new hub created in India is not good."
 

Pricing and Cost Advice

"The pricing of the solution is cheap. The licensing cost is also very low. I rate the cost and pricing a three out of ten."
"The price tag is no longer $200,000, but rather $300,000 to $400,000. It's twice."
"The prices are slightly expensive."
"The solution is not that expensive."
"My company has to make yearly payments towards the licensing costs attached to the solution. There are no hidden charges apart from the licensing costs of the solution."
"The solution's pricing lacks transparency."
"Cloudflare Zero Trust Platform's pricing is good."
"The pricing is somewhere in the middle. I would rate the pricing a seven out of ten."
"Online Protection is fairly expensive."
"The product's pricing is competitive for the US market."
"The solution should reduce the cost."
"The solution falls on the higher or more expensive side of the spectrum."
"The pricing for the solution depends on what you are trying to achieve with the use of the product, but I know that it is not a cheaply priced product. Yearly payments have to be made towards the licensing fees of the solution."
"The tool's pricing is excellent."
"The price could be lower."
"The solution's pricing is subscription-based rather than a yearly licensing cost. Pricing is based on the size of the environment and company and can be expensive."
"I rate the product price as nine out of ten, where ten is the most expensive, and one is the cheapest. There is no need to pay any extra charges apart from the licensing costs."
"The licensing is on a yearly basis."
"The solution requires a license to be purchased for every user."
"The cost is very high."
report
Use our free recommendation engine to learn which Email Security solutions are best for your needs.
884,873 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Comms Service Provider
10%
Computer Software Company
9%
Financial Services Firm
8%
Manufacturing Company
8%
Computer Software Company
10%
Financial Services Firm
10%
Manufacturing Company
9%
Government
7%
Manufacturing Company
15%
Healthcare Company
12%
Comms Service Provider
11%
Computer Software Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business10
Midsize Enterprise2
Large Enterprise10
By reviewers
Company SizeCount
Small Business24
Midsize Enterprise7
Large Enterprise11
By reviewers
Company SizeCount
Small Business8
Midsize Enterprise4
Large Enterprise11
 

Questions from the Community

What needs improvement with Cloudflare Access?
Cloudflare Access has strong integration with Microsoft, among other platforms. However, when it comes to Kaspersky, ...
What is your primary use case for Cloudflare Access?
Cloudflare Access provides secure access to internal applications for employees, external members of the organization...
What advice do you have for others considering Cloudflare Access?
Cloudflare Access is one of the best integrations available. While about two hundred vendors offer similar services, ...
What do you like most about Microsoft Exchange Online Protection?
The initial setup was easy. The configuration process is very straightforward.
What needs improvement with Microsoft Exchange Online Protection?
From an end-user point of view, I am quite happy with Microsoft Exchange Online Protection (EOP) because my favorite ...
What is your primary use case for Microsoft Exchange Online Protection?
Microsoft Exchange Online Protection (EOP) serves as the main use case for my company because, as a research company,...
What do you like most about FireEye Email Security?
One of the valuable features of the product stems from the fact that it is easy to implement the tool in our environm...
What needs improvement with FireEye Email Security?
I have had challenges in the past with Trellix Collaboration Security for implementation because of issues related to...
What is your primary use case for FireEye Email Security?
In my field, I have been in the information security area for 17 years, and I am currently working in my position for...
 

Also Known As

Cloudflare Area 1 Email Security, Cloudflare Bot Management, Cloudflare Gateway, Cloudflare Zero Trust Platform, Cloudflare DDoS, Cloudflare SASE & SSE Platform
Microsoft EOP, MS Exchange Online Protection
FireEye Email Security
 

Overview

 

Sample Customers

23andMe
Information Not Available
Northshore Utility District, Luz Technologies, Air Academy Federal Credit Union, Bank Gutmann, Bank of Thailand, Penn State Health Milton S. Hershey Medical Center, State of Missouri, City and County of San Francisco, Denver Public Schools, Vodafone, Go Auto, Stater Bros. Market
Find out what your peers are saying about Microsoft Exchange Online Protection (EOP) vs. Trellix Collaboration Security and other solutions. Updated: March 2026.
884,873 professionals have used our research since 2012.