Symantec Endpoint Security and Trellix Endpoint Security both compete in the endpoint protection category. Symantec appears to have the upper hand in integration capabilities and cross-platform support, while Trellix shines in dashboard flexibility and reporting.
Features: Symantec Endpoint Security provides a robust suite with antivirus, anti-spyware, and a firewall, alongside its extensive threat intelligence and capability for intrusion prevention. Trellix Endpoint Security focuses on threat protection and user access control, with notable features include its flexibility in dashboard customization and comprehensive access protection mechanisms.
Room for Improvement: Symantec Emone Endpoint Security could benefit from more cloud integration, streamlined user interfaces, and improved real-time threat visibility. Trellix Endpoint Security needs enhancements in reducing resource consumption, improving technical support responsiveness, and simplifying policy management.
Ease of Deployment and Customer Service: Symantec Endpoint Security offers layered on-premise protection but is often hampered by complex configuration requirements and slower post-acquisition technical support. Trellix offers flexible deployment options including hybrid cloud, but maintenance demands dedicated resources despite its generally responsive support team.
Pricing and ROI: Symantec Endpoint Security is perceived as moderately priced but higher than free alternatives such as Microsoft Defender, delivering good ROI especially in reducing threat-related downtime. Trellix Endpoint Security, considered pricey, offers scalable subscription models providing long-term cost-effectiveness and value through its encompassing security suite.
Symantec Endpoint Security filled gaps in our toolset, particularly with the ability to control network firewall on hosts remotely, which was greatly appreciated.
We have observed tremendous return on investment after implementing Trellix Endpoint Security as it is a more cost-effective solution compared to other products.
Clients appreciate the solution’s customization capabilities and ongoing product improvements.
There are two parts: one is the encryption which is standard and no AI is needed, but the data protection part could benefit from AI to detect new types of data and protect it.
In some cases, it rates as high as ten out of ten, while in others, it can be as low as eight.
There is no support in the German language, which is a problem for many public tenders.
The response time is a notable issue.
I would rate their customer service nine out of ten.
When we implemented Trellix Endpoint Security in their network, multiple malwares were detected.
Symantec Endpoint Security is quite scalable, and it is very important for large clients.
The scalability of the servers is good, as it requires computational powers.
I would rate the scalability of the solution as a six out of ten, indicating some challenges due to downtime requirements.
Trellix Endpoint Security is scalable.
I have encountered issues where I had to uninstall and reinstall the product on end users' computers to view the logs again.
Previously, we used to have multiple servers such as GUP servers and numerous servers for pushing updates, but we reduced it and transitioned almost 30,000 devices to CrowdStrike, which was easy to manage.
I would rate its stability as nine out of ten.
I would rate the stability of Trellix Endpoint Security as near perfect, close to ten out of ten.
I think it's stable enough; earlier it had glitches, but now it's stable enough.
Device management is not very good and I am not enabling it in my organization due to security reasons.
I would like to see improvements in the scanning part of the solution, specifically to enhance the CPU and hard disk usage during scanning and updates to prevent disruption during work hours.
It is cumbersome to use, particularly in handling firewall management.
What needs improvement in Trellix Endpoint Security is the reduction of resource consumption by the scanning feature.
Improvements are needed in forensic analytics to detect specific vulnerabilities.
The product does not seem to be cloud-native.
It seems to be half the cost or more affordable than other solutions.
The pricing is very low compared to other companies like SentinelOne and others.
I rate the pricing, setup cost, and licensing around nine out of ten.
The license costs are very reasonable, around 1,000 to 1,200 rupees per year.
Trellix Endpoint Security is cost-effective and provides excellent value for money.
Symantec Endpoint Security offers many valuable features, such as file explosion, application learning, DLP, injection detection, and EDR solutions for traffic control.
The incident response capabilities allow me to resolve authentication and support issues promptly, ensuring the system operates without downtime.
One important feature is the EDR function, necessary for many public customers due to upcoming laws in Germany, which is available through Symantec Endpoint Security Complete.
Trellix Endpoint Security is a proven, robust, and cost-effective solution that protects the organization from different types of ransomware and attacks.
Including options like Application Control (formerly Solidcore), integrated monitoring, change control, DLP, and advanced threat protection, the solution offers comprehensive security.
The detection capability of Trellix Endpoint Security is higher than traditional antivirus solutions.
Product | Market Share (%) |
---|---|
Trellix Endpoint Security Platform | 3.9% |
Symantec Endpoint Security | 3.6% |
Other | 92.5% |
Company Size | Count |
---|---|
Small Business | 69 |
Midsize Enterprise | 32 |
Large Enterprise | 62 |
Company Size | Count |
---|---|
Small Business | 67 |
Midsize Enterprise | 36 |
Large Enterprise | 59 |
Symantec Endpoint Security is a robust and reliable product that provides complete protection against viruses, malware, Trojans, and malicious files. It offers application and device control, ease of use in deploying and updating, a central control console, stability, scalability, auto-discovery capabilities, patch management, endpoint detection and response capabilities, intrusion detection module.
The Symantec Global Intelligence Network (GIN) provides threat intelligence and detection across endpoints, email, and web traffic. It has helped organizations reduce downtime, increase productivity, and improve security posture. Symantec Endpoint Security is easy to use, has a flexible administration, and offers more value than expected.
Trellix Endpoint Security Platform offers essential features like centralized management, threat prevention, and encryption, facilitating seamless scaling and integration with other systems while prioritizing user security.
This comprehensive platform focuses on endpoint protection, antivirus capabilities, and malware defense. It enhances cybersecurity with data loss prevention, advanced threat detection, and AI-driven features for reliable protection without impacting performance. Central management and advanced reporting streamline integration and ease of use. Flexible policy deployment through the management console and its robust security measures, such as DLP and device control, further increase protection. Challenges include high CPU and memory usage affecting performance, a complex interface, and lengthy deployment. Third-party integration and Windows Hello support need improvement. Additional concerns involve improved threat detection and faster technical support responses.
What are the key features of Trellix Endpoint Security Platform?Trellix Endpoint Security Platform is widely implemented in industries such as banking and government for securing mobile and desktop devices. Its capabilities cover network security, device control, and remote access protection, catering to diverse environments by offering robust cybersecurity management against advanced threats.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.