Trellix Endpoint Security Logo
Trellix Endpoint Security Logo
Trellix

Trellix Endpoint Security

Composite Score
7.8 /10
CX Score
8.0 /10
Category
Trellix Endpoint Security
7.8 /10

What is Trellix Endpoint Security?

Protect and empower your workforce with an integrated security framework that protects every endpoint. Trellix (formerly McAfee Mvision) endpoint security solutions apply proactive threat intelligence and defenses across the entire attack lifecycle to keep your organization safer and more resilient.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Trellix Endpoint Security Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on Trellix Endpoint Security.

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

84 Likeliness to Recommend

92 Plan to Renew

84 Satisfaction of Cost Relative to Value

1
Since last award


{y}
{name}

Emotional Footprint Overview

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

+84 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love Trellix Endpoint Security?

4% Negative
9% Neutral
87% Positive

Pros

  • Respectful
  • Security Protects
  • Helps Innovate
  • Reliable

Feature Ratings

Average 79

Vendor Capability Ratings

Average 78

Trellix Endpoint Security Reviews

Briggs J.

  • Role: Sales Marketing
  • Industry: Technology
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Dec 2022

"Impenetrable System Protection with Trellix"

Likeliness to Recommend

10 /10

What differentiates Trellix Endpoint Security from other similar products?

This Computer Security Software offers not only system protection, but also an extensive range of endpoint management tools and services. It includes user authentication, patch management, vulnerability scanning, compliance and audit reports, application control, data encryption and more. By utilizing these tools, companies can ensure their systems are secure from the latest threats while still meeting all relevant regulations.

What is your favorite aspect of this product?

I appreciate the user authentication feature. This allows companies to control who is allowed access to their systems and when that access is granted. It also ensures that no unauthorized individuals can gain access, providing an additional layer of security for sensitive data and applications. Furthermore, the software supports regular updates to ensure that it is always up-to-date with the latest security features, allowing companies to remain secure against emerging threats.

What do you dislike most about this product?

I believe that excess is dangerous because having a comprehensive solution that enables you to configure your desired outcome in such detail drives it to function in a particular manner. , and quite frankly, in my opinion, this is reflected in the overall performance of the computer: it slows down, which is not to everyone's taste. Using a McAfee solution could make my computer more secure, but I don't want it to run slower.

What recommendations would you give to someone considering this product?

I would also suggest that users familiarize themselves with the various features offered by Trellix Endpoint Security and determine how they will benefit from them. Taking advantage of the user authentication, patch management, and other tools can help organizations ensure their systems are as secure as possible.

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing

Alyssa K.

  • Role: Public Sector
  • Industry: Consulting
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Dec 2022

"Secure Your System with Endpoint Security"

Likeliness to Recommend

10 /10

What differentiates Trellix Endpoint Security from other similar products?

Unlike other security programs, Trellix Endpoint Security is designed to specifically protect different organizations' endpoints from threats. It also offers an attractive dashboard with up-to-date insights into pending attacks. Companies can adjust settings and policies to better address their specific needs, allowing them to customize the program's capabilities as they see fit.

What is your favorite aspect of this product?

My favourite aspect of this product is the dynamic dashboard feature. It provides up-to-date details about active and pending attacks, allowing for quick and effective responses to emerging threats. This allows companies to quickly identify any security risks or breaches so that they can take appropriate action. Additionally, the dashboard offers a comprehensive overview of system activity, giving administrators insight into system performance and allowing them to fine-tune settings as needed.

What do you dislike most about this product?

I would have wanted it to be written in a simpler and more creative language because I had never used antivirus software before and I struggled to use it because I didn't understand several user terminologies.

What recommendations would you give to someone considering this product?

I would recommend that people considering Trellix Endpoint Security assess their system's current security needs and determine if the product is a good fit for them. The software offers great protection against malicious threats, but its comprehensive features may be unnecessary for some users. People should also take note of the license agreement and make sure they understand what can and cannot be done with the product.

Pros

  • Helps Innovate
  • Reliable
  • Enables Productivity
  • Trustworthy

James A.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Nov 2022

Trellix security is an amazing security tool.

Likeliness to Recommend

8 /10

What differentiates Trellix Endpoint Security from other similar products?

Trellix spared me from real assaults sometimes. GUI is marvelous and easy to use. The feature I prefer best would have to be full encryption to prevent information theft from stolen laptops or mobile devices. Mac and Linux system operating systems are also supported.

What is your favorite aspect of this product?

The detection level is healthier than Windows defender. The e-policy orchestration management console that comes with it permits us to manage the devices remotely, run scans on the endpoints, and update their virus definitions forcibly. It sends regular updates and thus every endpoint stays safe individually. Furthermore, it’s a simple-to-grasp interface.

What do you dislike most about this product?

My biggest flak with trellix is that it is quite resource-intensive. It does tend to create the system a bit slow.

What recommendations would you give to someone considering this product?

I’m recommending this package for several reasons. This software is the most suitable choice to guard our PC or phone against hackers, viruses, and plenty of other things. The main reason I recommend it is because it can mechanically block junk, advertisements, and safety-threatening things once we are surfing the internet.

Pros

  • Unique Features
  • Effective Service
  • Altruistic
  • Acts with Integrity

Most Popular Trellix Endpoint Security Comparisons

  • Symantec Endpoint Security Logo

    Symantec Endpoint Security

    Compare
  • Avast Business Security Logo

    Avast Business Security

    Compare
  • Acronis Cyber Protect Cloud Logo

    Acronis Cyber Protect Cloud

    Compare
  • WithSecure Elements Endpoint Protection Logo

    WithSecure Elements Endpoint Protection

    Compare
  • Webroot Business Endpoint Protection Logo

    Webroot Business Endpoint Protection

    Compare
  • ThreatLocker Logo

    ThreatLocker

    Compare