Trellix Endpoint Security
8.1 /10

What is Trellix Endpoint Security?

Protect and empower your workforce with an integrated security framework that protects every endpoint. Trellix (formerly McAfee Mvision) endpoint security solutions apply proactive threat intelligence and defenses across the entire attack lifecycle to keep your organization safer and more resilient.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Trellix Endpoint Security Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on Trellix Endpoint Security.

84 Likeliness to Recommend

92 Plan to Renew

83 Satisfaction of Cost Relative to Value


{y}
{name}

Emotional Footprint Overview

+83 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love Trellix Endpoint Security?

5% Negative
9% Neutral
86% Positive

Pros

  • Security Protects
  • Respectful
  • Reliable
  • Saves Time

Feature Ratings

Average 80

Vendor Capability Ratings

Average 78

Trellix Endpoint Security Reviews

Adui J.

  • Role: Information Technology
  • Industry: Food and Beverage
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Feb 2024

Trellix Endpoint Security is Accurate and Reliable

Likeliness to Recommend

10 /10

What differentiates Trellix Endpoint Security from other similar products?

Trellix Endpoint Security has unique features that makes it accurate when detecting and responding to malware.

What is your favorite aspect of this product?

I enjoy the ease of use of Trellix Endpoint Security. Trellix Endpoint Security portrays simplicity.

What do you dislike most about this product?

There is nothing to dislike about Trellix Endpoint Security. Trellix Endpoint Security is the best.

What recommendations would you give to someone considering this product?

I highly recommend Trellix Endpoint Security. Trellix Endpoint Security is highly effective.

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing

Teo D.

  • Role: Consultant
  • Industry: Consulting
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Jan 2024

Prevent of attacks

Likeliness to Recommend

10 /10

What differentiates Trellix Endpoint Security from other similar products?

Has no difference with just that has good user's interface

What is your favorite aspect of this product?

It offers protection to computer from virus and blocks threats.

What recommendations would you give to someone considering this product?

I recommend it because offers perfect software security.

Pros

  • Reliable
  • Effective Service
  • Saves Time
  • Respectful

MUDIT K.

  • Role: Consultant
  • Industry: Technology
  • Involvement: IT Leader or Manager
Validated Review
Verified Reviewer

Submitted Jan 2024

Fantastic Endpoint Security Software

Likeliness to Recommend

9 /10

What differentiates Trellix Endpoint Security from other similar products?

Customized reporting is a feature I like most

What is your favorite aspect of this product?

Customized reporting and task

What do you dislike most about this product?

Policy configuration I find bit difficult

What recommendations would you give to someone considering this product?

This is a great Endpoint Security software

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing

Most Popular Trellix Endpoint Security Comparisons

  • Symantec Endpoint Security Logo

    Symantec Endpoint Security

    Compare
  • Avast Business Security Logo

    Avast Business Security

    Compare
  • Acronis Cyber Protect Logo

    Acronis Cyber Protect

    Compare
  • WithSecure Elements Endpoint Protection Logo

    WithSecure Elements Endpoint Protection

    Compare
  • Webroot Business Endpoint Protection Logo

    Webroot Business Endpoint Protection

    Compare
  • Check Point Endpoint Security Logo

    Check Point Endpoint Security

    Compare