

Trend Vision One Endpoint Security and Trellix Endpoint Detection and Response (EDR) are prominent endpoint security solutions. Trellix EDR has the upper hand due to its advanced features and user satisfaction.
Features: Trend Vision One Endpoint Security is recognized for its user-friendly setup, efficient threat detection, and affordability. Trellix EDR offers advanced threat analytics, comprehensive security, and automated response capabilities.
Room for Improvement: Trend Vision One users mention occasional false positives, the need for more advanced threat intelligence, and feature enhancements. Trellix EDR faces performance issues during heavy scans, a steep learning curve, and needs optimization improvements.
Ease of Deployment and Customer Service: Trend Vision One Endpoint Security offers a straightforward deployment process and effective customer service. Trellix EDR's deployment can be complex, but its robust support team helps mitigate issues.
Pricing and ROI: Trend Vision One Endpoint Security is noted for its cost-effectiveness and solid ROI. Trellix EDR has higher upfront costs but provides better long-term value with its comprehensive security features.
We have certainly seen the return on investment with Trend Vision One Endpoint Security given that endpoints are largely focused in terms of cyber attacks.
I have contracted support and also have an operating control so I can get various types of support.
Their technical support deserves a rating of nine out of ten.
we reached out to our local vendor in the country for questions, and they resolved these issues with Trend Micro.
We have a really good sales team to manage that and they have been really helpful in giving the proposal as well as the setup and fine-tuning cost every year over year, so that is taken care.
Trend Vision One Endpoint Security is scalable and stable because we have been using it for more than five years.
I am seeing, for workflows, some sort of ethical hacking to test our environment.
Trellix Endpoint Detection and Response (EDR) is interesting and is a very good entry point that has been evolving through the last years.
We need more training resources for my team and I, such as developing labs and sessions to implement it more easily.
If they could provide a client for FreeBSD, it would be better.
It supports Mac and is fully functional with that.
The pricing is very high, despite the solution’s capabilities.
Regarding the price, there was a tender, and Trend Micro won; the price was good.
All the tree of data that we have, which may be a lot of information to argue whether it is going to be a threat or not, can be analyzed.
I have spent efforts on training our managers and others - what can software do if the knowledge base is low?
The vulnerability protection module helps to identify which threat group is active and is using which specific vulnerability and also it helps to detect if those vulnerabilities exist within our environment and shows which machine is affected.
They are very aggressive for our program, so whenever we have any issue, we just lodge a call, and within 15 minutes, we get the engineer on a call or Webex call to resolve the issue for the solution.
The integration of ML and AI provides complete visibility, suggests responses, detects threats, and includes integration into XDR, which covers email security, endpoint security, cloud security, among other aspects.
| Product | Market Share (%) |
|---|---|
| Trend Vision One Endpoint Security | 1.6% |
| Trellix Endpoint Detection and Response (EDR) | 1.1% |
| Other | 97.3% |


| Company Size | Count |
|---|---|
| Small Business | 13 |
| Midsize Enterprise | 3 |
| Large Enterprise | 10 |
| Company Size | Count |
|---|---|
| Small Business | 45 |
| Midsize Enterprise | 36 |
| Large Enterprise | 60 |
Reduce the time to detect and respond to threats. Trellix EDR helps security analysts quickly prioritize threats and minimize potential disruption.
Guided investigation automatically asks and answers questions while gathering, summarizing, and visualizing evidence from multiple sources—reducing the need for more SOC resources.
Cloud-based deployment and analytics enables your skilled security analysts to focus on strategic defense, instead of tool maintenance. Benefit from implementing the right solution for you.
Trend Vision One Endpoint Security offers comprehensive, user-friendly endpoint protection, characterized by centralized management and integration with Trend Micro products. Its advanced AI capabilities and zero-day threat protection provide strong security, enhancing the effectiveness of threat detection.
Trend Vision One Endpoint Security is designed to protect client devices and network infrastructures against threats like ransomware and email-based attacks. It can be deployed on-premises or utilized as a SaaS solution, effectively covering thousands of endpoints. The centralized console delivers detailed visibility across environments for quick threat response. Although robust, it needs improvements in areas such as firewall performance, Linux compatibility, and data-loss prevention module efficiency. High resource usage, causing system slowdowns, user interface enhancements, and better third-party integration are also necessary. Current customers appreciate its scalability and the seamless integration with existing systems, although additional training resources and support might be desired.
What are Trend Vision One Endpoint Security's key features?Industries implement Trend Vision One Endpoint Security to safeguard client devices and networks in dynamic IT environments. It covers servers, desktops, and laptops, offering solutions for organizations requiring flexible, scalable security measures to protect critical infrastructure. Trend Vision One is especially valued where large-scale endpoint protection is crucial, ensuring a secure environment with its advanced and adaptable features.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.