We performed a comparison between Elastic Security and Trend Micro Apex One based on real PeerSpot user reviews.
Find out in this report how the two Endpoint Detection and Response (EDR) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."I like FortiClient EMS. FortiEDR has a lot of great features like lockdown mode, remote wipes, and encryption. I can set malware outbreak policies and controls for detecting abnormalities. You can also simulate phishing attacks."
"The ease of deployment and configuration is valuable. It's very easy compared to other vendors like Sophos. Sophos' configuration is complex. Fortinet is a lot easier to understand. You don't need a lot of admin knowledge to do the configuration."
"The console is easy to read. I also like the scanning part and the ability to move assets from one to the other."
"It is a scalable solution...The initial setup of Fortinet FortiEDR was straightforward."
"This is stable and scalable."
"The setup is pretty simple."
"Fortinet FortiEDR's scalability is quite good, and you can add licenses to the solution."
"Exceptions are easy to create and the interface is easy to follow with a nice appearance."
"Enables monitoring of application performance and the ability to predict behaviors."
"I use the stack every morning to check the errors and it's just so clear. I don't see any disadvantage to using Logstash."
"It is an extremely stable solution. Stability-wise, I rate the solution a ten out of ten."
"It is very quick to react. I can set it to check anomalies or suspicious behavior every 30 seconds. It is very fast."
"The most valuable feature is the scalability. We are in Indonesia, more engineers understand Elastic Security here. So it is easier to scale and also develop. In features, the discovery to query all the logs is very important to us. It is very easy, especially with the query function and the feature to generate alerts and create tools. Sometimes we use the alert security dashboard to monitor our clients."
"ELK is open-source, and it will give you the framework you need to build everything from scratch."
"What customers found most valuable in Elastic Security feature-wise is the search capability, in particular, the way of writing the search query and the speed of searching for results."
"It's a good platform and the very best in the current market. We looked at the Forester report from December 2022 where it was said to be a leader."
"The product offers almost all of the features the client expects from such a solution."
"The end user perspective is very good because the solution isn't complex to learn and support is readily available."
"The most valuable feature is the vulnerability attack and detection since it enables swift action."
"The nano protection and device control are great."
"No down time in terms of the backend having to be updated because it's on cloud."
"The policies, protection, and ease of use are the most valuable features of Trend Micro Apex One."
"DLP is a solid feature in the product. I like it very much. It is very useful in our environment. It is also a very stable solution. Their support is also very good."
"I believe that optimization is a really good feature on the front side."
"FortiEDR could add a separate scanning dashboard. In incident management, we prefer to remove the endpoint system from the environment and scan the system. We typically use Symantec for that, but if we want to use FortiEDR for that, then we need a scanning tab to clarify things."
"ZTNA can improve latency."
"Making the portal mobile friendly would be helpful when I am out of office."
"The solution should address emerging threats like SQL injection."
"The SIEM could be improved."
"To improve Fortinet, we need to see more features and technology areas at the endpoint level introduced."
"The EDR console should have more extensive reporting. You shouldn't need to purchase FortiAnalyzer. It should be included in the EDR part. The security adviser cloud platform could be improved with more options for exclusive or intensive rules for devices."
"The amount of usage, the number of details we get, or the number of options that can be tweaked is limited in comparison to that with other EDR solutions"
"The setup process is complex. You need a solid working knowledge of networking, operating systems, and a little programming."
"Authentication is not a default in Kibana. We need to have another tool to have authentication and authorization. These two should be part of Kibana."
"Elastic Security's maintenance is hard and its scalability is a challenge. There are complications in scaling and upgrading. The solution needs to also provide periodic upgrade checks."
"I would like more ways to manage permissions and restrict access to certain users."
"We set up a cron job to delete old logs so that we wouldn't hit a disk space issue. Such a feature should be available in the UI, where old logs can be deleted automatically. (Don’t know if this feature is already there)."
"The solution's query building is not that intuitive compared to other solutions."
"If you compare this with CrowdStrike or Carbon Black, they can improve."
"The interface could be more user friendly because it is sometimes hard to deal with."
"The role-based access control needs improvement."
"The integration is lacking in Trend Micro Apex One. It does not integrate well with Microsoft p solutions. For example, with Office 365, we have to buy another solution for mail protection. That's why we are assessing Microsoft Defender 365 because we have an email from Microsoft, an endpoint from Microsoft, and we use Windows systems."
"We had issues with our system integrator who didn't have enough experience with Trend Micro. There aren't many enterprise customers in our country who use Trend Micro on the level that we are using it, so it might be a little too complex for them. Trend Micro is typically used in small companies that do not need all the advanced features that we are looking for. The integrators don't have experience deploying these features. The scope is broad, but Microsoft Defender is simpler."
"We want to manage the policies in the group. Currently, if I am at one location and other users are at other locations, the main problem is that we cannot manage policies location-wise. The policy management should be improved. I should be able to group them based on the location. If one location has four policies and another location has the same policy, currently, I have to scroll the screen to find out the policy as per my location."
"Some of our customers need to add cache file signatures in Trend Micro Apex One, but it is currently not a supported feature."
"I can't think of any specific areas that need improvement."
"The EDR feature is difficult to use and could be made more user-friendly."
"The support is slow and has room for improvement."
Elastic Security is ranked 16th in Endpoint Detection and Response (EDR) with 59 reviews while Trend Micro Apex One is ranked 6th in Endpoint Detection and Response (EDR) with 125 reviews. Elastic Security is rated 7.6, while Trend Micro Apex One is rated 8.2. The top reviewer of Elastic Security writes "A stable and scalable tool that provides visibility along with the consolidation of logs to its users". On the other hand, the top reviewer of Trend Micro Apex One writes "We can get consolidated logs of suspicious objects and malware attacks in a single console". Elastic Security is most compared with Wazuh, Splunk Enterprise Security, Microsoft Sentinel, IBM Security QRadar and Microsoft Defender for Endpoint, whereas Trend Micro Apex One is most compared with Trend Micro Deep Security, Microsoft Defender for Endpoint, Cortex XDR by Palo Alto Networks, CrowdStrike Falcon and Trend Micro Smart Protection. See our Elastic Security vs. Trend Micro Apex One report.
See our list of best Endpoint Detection and Response (EDR) vendors.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.