The tool is primarily used for endpoint detection. When an event occurs on an endpoint, alarms are generated. Colleagues from my company then investigate these alarms based on a playbook. Depending on the playbook and the specific customer contract, actions may be taken, such as informing the customer or implementing endpoint containment measures.
Product and Service Architect at a legal firm with 11-50 employees
Offers endpoint protection and generates alarms for events
Pros and Cons
- "The tool has contributed to improving our security posture. While it's just one part of our overall solution, it plays a crucial role. As we continue to evolve, we anticipate it becoming even more important alongside other aspects like network behavior and additional metrics."
- "The product is consolidating its portfolio into one product. It is difficult at the moment."
What is our primary use case?
What is most valuable?
The tool has contributed to improving our security posture. While it's just one part of our overall solution, it plays a crucial role. As we continue to evolve, we anticipate it becoming even more important alongside other aspects like network behavior and additional metrics.
The tool's most valuable feature is containment. Last year, a German company faced an external attack. We installed the product on every machine, totaling hundreds of endpoints. The Trellix agent collected information, allowing us to check the entire IT infrastructure.
What needs improvement?
The product is consolidating its portfolio into one product. It is difficult at the moment.
For how long have I used the solution?
I have been using the product for three years.
Buyer's Guide
Trellix Endpoint Security Platform
January 2026
Learn what your peers think about Trellix Endpoint Security Platform. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,114 professionals have used our research since 2012.
What do I think about the scalability of the solution?
The solution's scalability is easy. If you have Trellix Endpoint Security on-premises, you need to define how many agents you will support and consider future scaling. Different appliances are available for various scenarios. If you plan to have hundreds or thousands of agents in the future, hardware considerations become important. However, if it is deployed in the cloud, scaling up or down is easily manageable.
How are customer service and support?
My experience with the product's tech support is good.
How would you rate customer service and support?
Positive
How was the initial setup?
Trellix Endpoint Security (ENS)'s deployment is not difficult. There are different options available, such as using an on-prem hardware box or a virtual machine in the cloud. Setting up the virtual machine in the cloud is easy, requiring only a connection to the customer's system.
If you plan to install the solution on-premises, you bring the box to the customer and connect it to their system. This involves some configuration, such as opening a port on the firewalls. Deploying agents on the endpoints is straightforward and can be done from a central management point. The entire process takes around a day to configure, and then you are up and running.
What's my experience with pricing, setup cost, and licensing?
Microsoft Defender is not cheap and from a cost perspective, Trellix Endpoint Security (ENS) is a better option.
What other advice do I have?
We integrate the product into our system using API. The information, in the form of messages or alarms, is received in our system. We further process this information and incorporate it into our complete solution.
I rate the product an eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. partner
Partner Account Manager at a consumer goods company with 11-50 employees
It integrates well with other solutions, but the vendor needs more of a local presence and faster response
Pros and Cons
- "Trellix integrates well with most SIEM and data classification solutions."
- "You do not have access to all the features when you use the Trellix web interface. For example, you cannot do device or drive encryption from the web interface. Also, when we're working with customers, it's sometimes challenging to get sales support. Delays mean we might lose an opportunity. Lastly, Trellix lacks some documentation about custom features."
What is our primary use case?
We primarily use Trellix for drive encryption and malware prevention, but we also use some advanced features, such as centralized control and policy management.
How has it helped my organization?
Trellix enables us to customize and centrally manage policies. We can set on-prem policies and synchronize them with the cloud.
What is most valuable?
Trellix integrates well with most SIEM and data classification solutions.
What needs improvement?
You do not have access to all the features when you use the Trellix web interface. For example, you cannot do device or drive encryption from the web interface. Also, when we're working with customers, it's sometimes challenging to get sales support. Delays mean we might lose an opportunity. Lastly, Trellix lacks some documentation about custom features.
I would like to see Trellix add database activity monitoring. They don't have a plan for this, and there isn't a significant roadmap around it. They have an enterprise service manager, which is sort of like a SIEM, but there is no roadmap. I want to see a clearer roadmap for integrating specific critical solutions like PAM and other things, too.
For how long have I used the solution?
I have used Trellix ENS for two to three years.
What do I think about the stability of the solution?
Trellix ENS is stable.
What do I think about the scalability of the solution?
Trellix is scalable with some limitations. I recommend it for small or medium-sized businesses. The integration needs to be simplified for it to work in an enterprise with a large, complex environment.
How are customer service and support?
I rate Trellix support six out of 10. They need more local presence in South Africa and a faster response. Other distributors work through a partner system. There are also some challenges due to the merger of McAfee and FireEye to form Trellix and some legacy issues around a lack of innovation.
Standard support is included with the subscription, and there are layers of escalation when you open a ticket. You can pay extra to get premium support, which is priced separately.
How would you rate customer service and support?
Neutral
How was the initial setup?
Trellix is easy to deploy if you have enough skills. Some customers think they can do it alone without professional services, but the deployment doesn't go smoothly. They have misconfigurations, which become a problem. They have issues when they are renewing the license because they didn't scale sufficiently in the beginning. The deployment time can range from five days to three months, depending on the size and complexity of your environment.
What's my experience with pricing, setup cost, and licensing?
Trellix is reasonably priced, but the cost goes up by about 7 to 10 percent annually, so some of our customers complain at renewal time. The license is based on the number of devices. There are discounts as you add more devices, so you may pay $15 per device or up to $50 per device.
Standard support is included with the subscription for the first year, but you'll pay for the deployment costs. In the next year, you'll pay only for the license and support.
Which other solutions did I evaluate?
Trellix is one of the best legacy endpoint protection solutions, but we're also looking at Crowdstrike. Other solutions have advantages over Trellix in brand awareness and local presence.
The company needs to do more to build its presence in this country. I've never seen an account manager or sales rep show up to an in-person event in South Africa. Other companies like Trend Micro have offices here.
What other advice do I have?
I rate Trellix Endpoint Security six out of 10. I would give it a seven or an eight if not for the vendor's shortcomings in terms of support and local presence. The scale and speed of response make a difference. It's an excellent product that may not be perceived as such because of how it's supported and the awareness of potential customers.
Before implementing Trellix, you should take time to understand the core use cases you want to achieve and match them to specific features. You should also do a limited proof of concept with the vendor or a distributor.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Buyer's Guide
Trellix Endpoint Security Platform
January 2026
Learn what your peers think about Trellix Endpoint Security Platform. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,114 professionals have used our research since 2012.
Large account Manager at a media company with 501-1,000 employees
Offers good malware protection features but needs to improve its scalability
Pros and Cons
- "The product's initial setup phase was straightforward."
- "Sometimes, one might face issues with the scalability of the product. The aforementioned area can be considered for improvement."
What is our primary use case?
The solution is used, especially by those who want an antivirus product. It is also useful for those looking for tools that offer endpoint detection and response features. The product offers multiple features, one of which is endpoint security.
What needs improvement?
Sometimes, one might face issues with the scalability of the product. The aforementioned area can be considered for improvement.
For how long have I used the solution?
I have been using Trellix Endpoint Security (ENS) for five years. I operate as a system integrator of the product in my company.
What do I think about the stability of the solution?
Stability-wise, I rate the solution an eight out of ten.
What do I think about the scalability of the solution?
Scalability-wise, I rate the solution a seven out of ten.
My company caters to the needs of small, medium, and large-sized businesses.
How are customer service and support?
I rate the technical support a ten out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
The product's initial setup phase was straightforward.
The solution is deployed on the cloud and on an on-premises model.
The time required for the deployment of the product can vary, and it also depends on whether the company has been actively using the product.
What's my experience with pricing, setup cost, and licensing?
The price of the product is similar to the ones in the market that offer the same features.
What other advice do I have?
The product has improved its malware protection features since it provides a couple of features that no other solution does. The tool is helpful for multiple companies.
The tool streamlines the incident response process.
The most effective part of the product for threat prevention is related to the tool's rollback feature.
Trellix Endpoint Security (ENS) is like an antivirus tool, but it doesn't alone provide the rollback feature since it is something that is possible with Trellix Endpoint Detection and Response (EDR).
The tool does provide adaptive threat protection features.
I recommend the product to those who plan to use it.
I rate the tool a seven to eight out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Integrator
Chief Technology Officer at a computer software company with 11-50 employees
The solution is used for drive encryption but it is pretty hard to configure and maintain
Pros and Cons
- "The endpoint security, antivirus and firewall are the most valuable features of Trellix Endpoint Security."
- "The solution should provide a more easy way to uninstall it on specific stations."
What is our primary use case?
The solution is used for drive encryption and as a policy orchestrator.
What is most valuable?
The endpoint security, antivirus and firewall are the most valuable features of Trellix Endpoint Security.
What needs improvement?
Trellix Endpoint Security is pretty hard to configure and maintain. You need to have a dedicated person for the solution. It is very complex when you want to change the data loss prevention and data leak prevention policies. It's quite hard to give some exceptions on specific computers. It's not very fast onboarding with the orchestrator.
The solution should provide a more easy way to uninstall it on specific stations.
For how long have I used the solution?
I have been working with Trellix Endpoint Security for two years.
What do I think about the stability of the solution?
The solution’s stability is quite okay.
I rate Trellix Endpoint Security an eight or nine out of ten for stability.
What do I think about the scalability of the solution?
Trellix Endpoint Security is a scalable solution. Around 200 users are using the solution in our organization.
How was the initial setup?
Currently, the solution's initial setup on a new computer is quite simple. Although some time is needed to configure all the policies, especially for our needs, it is not too difficult.
The deployment takes one week internally and two days of professional help from a local vendor partner.
It is enough to have one administrator for the solution’s maintenance, but we do not have one full-time administrator. A dedicated person is needed for the maintenance and monitoring of the solution to take it to its full potential. The resources or computers needed to use the solution make it quite expensive. Especially if you put the drive encryption and don't have new computers, you will have to delete multiple files, which is quite a pain.
What about the implementation team?
The solution was implemented by a local vendor partner.
What was our ROI?
We have seen a return on investment with Trellix Endpoint Security in terms of time.
What's my experience with pricing, setup cost, and licensing?
Compared to Bitdefender, Trellix Endpoint Security is more expensive, but considering it comes with DLP, the solution's price is fine. The licensing cost for the solution is 20k a year for 400 users and 10k for 200 users. You don't have to pay additionally for the solution's maintenance.
What other advice do I have?
The solution's effectiveness depends a lot on the stations that you want to install it on. I will not recommend Trellix Endpoint Security for people with a lot of small text files on the computer. The DLP solution is quite okay. It is not so easy to configure in terms of the computers and permission to allow USB devices on specific computers.
Overall, I rate Trellix Endpoint Security a seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Business Development Manager at a tech services company with 11-50 employees
Efficient safeguarding of endpoints that provides robust protection, user-friendly features and significant cost savings
Pros and Cons
- "It provides a robust defense against cybersecurity threats while offering user-friendly features like notifications and approval prompts."
- "I've encountered minor challenges related to encryption."
What is our primary use case?
It serves as a comprehensive endpoint security solution that goes beyond traditional antivirus by incorporating features such as document scanning for sensitive information, approval workflows for document sharing, patch management, and advanced threat detection using AI and machine learning. It actively monitors various endpoints, including web interactions and email communications, to detect and prevent a wide range of attacks, even those that are not signature-based.
What is most valuable?
One of the standout features of this solution is its encryption capabilities and DLP functionality. It provides a robust defense against cybersecurity threats while offering user-friendly features like notifications and approval prompts. The encryption feature provides peace of mind in the event of a lost or stolen device, safeguarding sensitive conversations and data from unauthorized access. This level of protection significantly reduces the risk of extortion attempts or data breaches, making it a valuable asset for any organization. So far, I haven't experienced any security breaches or attacks.
What needs improvement?
I've encountered minor challenges related to encryption.
For how long have I used the solution?
I have been using it for a year.
What do I think about the scalability of the solution?
We have a user base of over one hundred individuals who use the software.
Which solution did I use previously and why did I switch?
The decision to implement endpoint security software like Trellix is made at a company-wide level, involving discussions and agreements between various entities, including our parent company and potentially other subsidiaries like the one in Sweden. This decision isn't made independently by individual branches like Kenya; rather, it's coordinated and negotiated at a higher level.
How was the initial setup?
I operate within a managed environment where the IT team handles the installation and setup of endpoint security software. Once installed, they provide me with the necessary details, such as login credentials and instructions for changing passwords. My role primarily involves using the machines provided to me, without needing to delve into the setup process.
What was our ROI?
Compared to the solutions, it helped us to save at least ten to twenty percent, if not more.
What's my experience with pricing, setup cost, and licensing?
I would emphasize its affordability rather than merely focusing on cheapness. It provides good value by striking a balance between cost-effectiveness and feature richness.
What other advice do I have?
I would recommend conducting a proof of concept to explore the features firsthand. It's essential to understand what you currently have in place, as that will help determine whether the solution is the right fit for your needs. After that, ensure that the POC is conducted efficiently so that you can make an informed decision about whether to proceed with the solution or consider other options. Overall, , I would rate it an eight out of ten. It's a good solution that meets my needs satisfactorily.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Customer/Partner
Endpoint Security solution that protects the productivity with a common service layer and our new anti-malware core engine that helps reduce the amount of resources and power required by a user's sys
Pros and Cons
- "Trellix Security Endpoint can promptly isolate any host machines directly from the console. If alerts are received and isolation is necessary, it can be accomplished through the console. The console itself holds significant value, accessible through a browser and allowing remote actions via cloud login."
- "If there's a possibility for remote assistance or investigation support in the future, it would be beneficial. Currently, we use another remote software for such purposes. If this feature could be included in the next version, that would be an improvement. The feature is called Remote Administration. I'm somewhat satisfied, but there's an issue I recently encountered. When attempting to scan a suspected host machine, Symantec Endpoint Security did not provide any alerts. However, when we installed Malwarebytes and ran a scan, it detected a threat that wasn't identified by Symantec. We raised this concern with the team for resolution, and the investigation is still ongoing."
What is our primary use case?
It is exclusively for Endpoint security. Besides that, we have subscribed to additional features such as MDX for mobile security and recently added ESL. Previously, we had Trend Micro, and at times we utilized it for malware. Comparing the three tools, I would recommend sticking with Trend Micro or Malwarebytes.
What is most valuable?
Trellix Security Endpoint can promptly isolate any host machines directly from the console. If alerts are received and isolation is necessary, it can be accomplished through the console. The console itself holds significant value, accessible through a browser and allowing remote actions via cloud login.
What needs improvement?
If there's a possibility for remote assistance or investigation support in the future, it would be beneficial. Currently, we use another remote software for such purposes. If this feature could be included in the next version, that would be an improvement. The feature is called Remote Administration.
I'm somewhat satisfied, but there's an issue I recently encountered. When attempting to scan a suspected host machine, Symantec Endpoint Security did not provide any alerts. However, when we installed Malwarebytes and ran a scan, it detected a threat that wasn't identified by Symantec. We raised this concern with the team for resolution, and the investigation is still ongoing.
For how long have I used the solution?
I have used Trellix Endpoint Security for the last two years.
What do I think about the stability of the solution?
It is stable and I would rate it 8 out of 10.
What do I think about the scalability of the solution?
Scalability is 8 out of 10.
How are customer service and support?
The issue with technical support lies in the response time. When submitting a complaint, there is a delay, sometimes taking one or two days for a response. This extended timeframe is considered quite lengthy.
How would you rate customer service and support?
Neutral
How was the initial setup?
The initial deployment of Trellix Endpoint Security involves some time to install agents on host machines. However, once in use, adding new versions and deploying agents to GPO becomes straightforward. It's possible to manually install agents on various devices, and the current process of deploying agents through GPO policies typically takes around ten to fifteen minutes per agent. The duration may vary based on internet connectivity, and it's generally faster when the machine is on the network.
I would rate it 8 out of 10 and it is very straightforward.
What's my experience with pricing, setup cost, and licensing?
It is reasonably priced.
What other advice do I have?
I would recommend it. I rate the solution an eight out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Technical Engineer at a security firm with 11-50 employees
Protects the productivity of users with a common service layer and our new anti-malware core engine that helps reduce the amount of resources and power required by a user
Pros and Cons
- "Trellix Endpoint Security offers robust access protection, addressing major concerns in prevention. It provides both application control and user access control within its access protection features."
- "Recently, Trellix has introduced a CDR, which involves more manual response than automatic. I believe they should enhance the system by adding features like automated response and the ability to create custom playbooks. This is crucial for an EDR solution, and currently, Trellix lacks this feature while other products offer it."
What is our primary use case?
Previously, before the transition to Trellix, we used McAfee. Following a merger, FireEye now collaborates with McAfee, utilizing its console and threat intelligence.
In terms of endpoint security, I would recommend Trellix Endpoint Security, especially for users prioritizing threat intelligence and seeking an internal solution. Trellix has proven effective in areas such as blocking capabilities, device control, and application control.
What is most valuable?
Trellix Endpoint Security offers robust access protection, addressing major concerns in prevention. It provides both application control and user access control within its access protection features.
What needs improvement?
Recently, Trellix has introduced a CDR, which involves more manual response than automatic. I believe they should enhance the system by adding features like automated response and the ability to create custom playbooks. This is crucial for an EDR solution, and currently, Trellix lacks this feature while other products offer it.
For how long have I used the solution?
I have been using this solution for the past five years.
What do I think about the stability of the solution?
Previously, I would have rated it around ten, but now it's more like seven. They need to enhance the EDR part and put in more effort.
What do I think about the scalability of the solution?
For on-premise implementation, I would rate it a six as there is a need for more scalable options during the initial setup. On the other hand, for cloud implementation, I would give it a nine because it offers enabled scalability options.
How are customer service and support?
I acknowledge their technical expertise in the product, but the support has not been as satisfactory as it was with McAfee. I believe there is a need for improvement, whether it's the team's capacity or response time. Previously, the response time was excellent, but now it has increased, causing frustration among customers and creating potential issues. Reducing this delay would be beneficial.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
If someone asks for a bundled solution with strong threat detection, I would recommend Trellix because it stands out as the only bundle solution with a decent amount of threat detection. While there are other bundled solutions in the market, Trellix excels in both access and detection capabilities.
How was the initial setup?
Regarding the initial setup of Trellix Endpoint Security, I am accustomed to executing it accurately. I would rate it around 8.5 or 9.I have successfully implemented Trellix Endpoint Security for up to five thousand endpoints, and the process took approximately four days. For smaller enterprises, it can be completed in about one day.
What's my experience with pricing, setup cost, and licensing?
I would rate the cost as four to five, considering it's normal compared to other products. I find it nominal and worth the money.
What other advice do I have?
The support phase needs improvement, specifically in reducing the time taken to respond to calls. Additionally, the EDR functionality in Intelix requires enhancement. While McAfee fulfilled product functionality even without strong support, the introduction of EDR seems to be partial and lacks automated response capabilities. The overall rating for Trellix Endpoint Security would be an eight.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Technical consultant at a construction company with 51-200 employees
Protects server files deployed in the web tier but have poor support
Pros and Cons
- "HIPS protects server files from being modified or deleted by unauthorized users. It's primarily deployed in the web tier."
- "It is a bit technical. The user interface has some significant limitations, mainly when using HIPS on the server side, to protect files from being changed or deleted by hackers, users, or administrators."
What is our primary use case?
I'm working on a project for the Hong Kong library system under the Hong Kong government. They provide workstations in the library for citizens to access the Internet. The ENS needs to be installed on all the PCs in the library. Another part involves the CSWA for the server farm. They are upgrading the entire library system, including the rental system, book search, eBooks, multimedia, and other services. The CSWA modules are primarily for the backend servers, including Linux and Windows.
How has it helped my organization?
Detection and response functionality meet our requirements, but the support is poor.
What is most valuable?
HIPS protects server files from being modified or deleted by unauthorized users. It's primarily deployed in the web tier.
What needs improvement?
It is a bit technical. The user interface has some significant limitations, mainly when using HIPS on the server side, to protect files from being changed or deleted by hackers, users, or administrators. The UI only allows for the inclusion of files using wildcards.
For example, it can protect an entire directory or a subdirectory, but it doesn't let you select specific files within a directory.
For how long have I used the solution?
I have been using Trellix Endpoint Security (ENS) as an implementor for two years.
What do I think about the stability of the solution?
We haven't had any system crashes or problems in most cases. SolidCore is not compatible with some kernels, which is causing problems. Endpoint, HIPS, and anti-theft are working fine so far.
I rate the solution’s stability as seven out of ten.
What do I think about the scalability of the solution?
We use one ePO server to manage around four thousand endpoints, including servers. This single server effectively handles this load.
It is suitable for medium and large enterprises.
I rate the solution’s scalability as seven out of ten.
How are customer service and support?
Support is poor. A module called Solidcore needs to match with the OS kernel in one area. The support for this module has been slow because it doesn't match the latest OS. As a result, we haven't been able to upgrade our OS because McAfee does not support the latest version. We've also encountered issues where the product can't be upgraded or installed successfully. We're managing over 300 servers and 3,000 workstations. Upgrading has been a nightmare with this setup.
It provides a slow response. Sometimes, getting feedback takes a few days, and that is also not to the point.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup is easy and straightforward. Determining specific modules and functions often involves a lot of trial and error. Deployment takes only a couple of days.
What other advice do I have?
Overall, I rate the solution a seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Implementer
Buyer's Guide
Download our free Trellix Endpoint Security Platform Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2026
Product Categories
Endpoint Protection Platform (EPP) Endpoint Detection and Response (EDR) Extended Detection and Response (XDR)Popular Comparisons
CrowdStrike Falcon
Microsoft Defender for Endpoint
Fortinet FortiEDR
SentinelOne Singularity Complete
IBM Security QRadar
HP Wolf Security
Cortex XDR by Palo Alto Networks
Microsoft Defender XDR
Elastic Security
Huntress Managed EDR
WatchGuard Firebox
Fortinet FortiClient
Buyer's Guide
Download our free Trellix Endpoint Security Platform Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Symantec Endpoint vs. McAfee Complete Endpoint Protection: Technical Comparison Between Data Loss Protection Solutions
- How does McAfee Endpoint Security compare with MVISION?
- How does Crowdstrike Falcon compare with FireEye Endpoint Security?
- Where can I get a fully paid for training course for McAfee MVISION Endpoint?
- What is the biggest difference between EPP and EDR products?
- Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- What's the best way to trial endpoint protection solutions?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- Which Endpoint Protection Solution offers Zero Trust (ZTN) as a feature?


















