

Trellix Endpoint Security Platform and Tanium compete in the category of endpoint protection. Trellix has the upper hand in data loss prevention and central management features, whereas Tanium excels in real-time data aggregation and risk identification, offering detailed performance analytics.
Features: Trellix Endpoint Security provides comprehensive data loss prevention, advanced encryption, and centralized management through its ePO console. Tanium offers real-time data aggregation, effective risk identification, and detailed analytics across endpoint performances.
Room for Improvement: Trellix users seek better module integration, reduced scanning resource consumption, and enhanced reporting features. Tanium could improve scalability, decrease false positives, and simplify its user interface with more detailed documentation for troubleshooting.
Ease of Deployment and Customer Service: Trellix supports both on-premises and cloud environments, preferred in hybrid settings, though users mention integration complexity post-merger. Tanium primarily targets on-premises and private cloud deployments, acclaimed for quick and efficient customer service and technical support.
Pricing and ROI: Trellix is reasonably priced with device discounts, offering good ROI by reducing recovery expenses and managing users efficiently. Tanium, being more expensive, justifies its cost through strong IT operations capabilities, delivering substantial ROI through security risk mitigation and resource optimization.
| Product | Market Share (%) |
|---|---|
| Trellix Endpoint Security Platform | 3.7% |
| Tanium | 2.2% |
| Other | 94.1% |

| Company Size | Count |
|---|---|
| Small Business | 6 |
| Midsize Enterprise | 3 |
| Large Enterprise | 11 |
| Company Size | Count |
|---|---|
| Small Business | 67 |
| Midsize Enterprise | 36 |
| Large Enterprise | 61 |
Tanium offers robust endpoint protection, patching, and inventory management, consolidating the functions of tools like BigFix with capabilities in incident response, network security, and cloud or on-premise deployments.
Known for real-time capabilities, Tanium provides detailed analytics, security features, and device management. Users benefit from quick implementation, real-time updates, and patching campaigns. Despite its strengths, integration and custom plugin expansion remain areas to improve, along with data visualization and network optimization. Reporting enhancements and user training could advance its usability, and some UI elements may require updates for clarity and security.
What are the essential features of Tanium?Tanium's deployment spans industries focusing on endpoint protection and compliance, ensuring reliable device and server management in settings where safety and quick adaptation are critical. Organizations use it for application deployment, compliance checks, and integrating it as an EDR solution, enhancing overall security and operational efficiencies.
Trellix Endpoint Security Platform offers essential features like centralized management, threat prevention, and encryption, facilitating seamless scaling and integration with other systems while prioritizing user security.
This comprehensive platform focuses on endpoint protection, antivirus capabilities, and malware defense. It enhances cybersecurity with data loss prevention, advanced threat detection, and AI-driven features for reliable protection without impacting performance. Central management and advanced reporting streamline integration and ease of use. Flexible policy deployment through the management console and its robust security measures, such as DLP and device control, further increase protection. Challenges include high CPU and memory usage affecting performance, a complex interface, and lengthy deployment. Third-party integration and Windows Hello support need improvement. Additional concerns involve improved threat detection and faster technical support responses.
What are the key features of Trellix Endpoint Security Platform?Trellix Endpoint Security Platform is widely implemented in industries such as banking and government for securing mobile and desktop devices. Its capabilities cover network security, device control, and remote access protection, catering to diverse environments by offering robust cybersecurity management against advanced threats.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.