We performed a comparison between Trellix Endpoint Security and Wazuh based on real PeerSpot user reviews.
Find out in this report how the two Extended Detection and Response (XDR) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable aspect is undoubtedly the exploration capability"
"Email protection is the most valuable feature of Microsoft Defender XDR."
"The most valuable features of Microsoft 365 Defender are the combination of all the capabilities and centralized management."
"The 'Incidents and Alerts' tab is a valuable feature where we can find triggered alerts."
"It's a great threat intelligence source for us, providing alerts for things it detects on the network and on the machines. We've used it often when there is a potential incident to see what was done on a computer. That works quite nicely because you can see everything that the user has done..."
"It gives a lot of flexibility in terms of configuration and customization as per the business requirements."
"The unified view of the threat landscape on a central dashboard is the most valuable feature."
"From the perspective of Microsoft 365 XDR, the main benefit is a single, centralized dashboard offering the holistic visibility organizations crave."
"The package of protection that it provides is useful. It has antivirus, malware protection, VPN, and a whole bunch of other features."
"Threat prevention is valuable because most clients use other solutions like antivirus as part of web protection. I don't find that kind of solution useful."
"The installation is pretty straightforward."
"I have found many of the features to be useful."
"The solution offers very good endpoint security."
"This product has the capability to check a wide range of vulnerabilities and devices."
"The most valuable features are the adaptive tech on McAfee."
"Dynamic Application Containment."
"The main thing I like about it is that it has an EDR."
"Integrates with various open-source and paid products, allowing for flexibility in customization based on use cases."
"The configuration assessment and Pile integrity monitoring features are decent."
"Wazuh has very flexible and robust features."
"It's very easy to integrate Wazuh with other environments, cloud applications, and on-prem applications. So, the advantage is that it's easy to implement and integrate with other solutions."
"I like that the solution is on top of the Kubernetes stack."
"Wazuh's most beneficial features for our security needs are flexibility, built-in rules, integration capabilities, and documentation."
"Some of the strengths of Wazuh that stand out for us include its scalability when deployed on Azure, its open-source nature, which allows for customization based on our needs, and its compatibility with various security solutions like threat intelligence platforms."
"Microsoft 365 Defender does not have a unique package with emerging endpoint security technologies, such as EDR and XDR."
"Offboarding latency should be reduced. Even after a device has been successfully offboarded using a particular offboarding script, it still shows up as onboarded."
"This solution could be improved if it included features such as those offered by Malwarebytes."
"It would be beneficial to have a more seamless experience with everything consolidated in one place, particularly when dealing with aspects related to the Exchange console."
"The only issue I've had is, when it comes to deployment, the steps I must take around policy setup. That is challenging."
"The support team is not competent or responsive."
"The web filtering solution needs to be improved because currently, it is very simple."
"The logs could be better."
"It would be helpful if the controlling of connections coming to the PC could be done from McAfee's side so that we can block those connections."
"An area in need of improvement involves the overview, which usually does not enable one to get the value in reports."
"Tech support is not as helpful as they were in the past."
"Its pricing needs to be improved."
"The interface is complex."
"The user interface could be improved by making it more user-friendly. There are multiple solutions and there is no clear line differentiating all of them. There is a centralized console where we manage everything but most of the administrators feel a little confused when it comes to managing multiple products from a single place."
"We’re facing remote installation issues sometimes:"
"The solution needs to offer better local technical support."
"I think that the next release should be more suitable for large enterprises, because currently they are not because large companies do not rely on open source solutions."
"Wazuh should come up with more in-built rules and integrations for the cloud."
"The computing resources are consuming and do not make sense."
"Since it's an open-source tool, scalability is the main issue."
"A lack of certain features creates limitations."
"They could include flexibility and customization capabilities by modifying for customers based on partner agreements."
"Its configuration process is time-consuming."
"Its user interface for sure can be improved. It is not so comfortable to use if you're looking for specific logs."
Trellix Endpoint Security is ranked 10th in Extended Detection and Response (XDR) with 95 reviews while Wazuh is ranked 3rd in Extended Detection and Response (XDR) with 38 reviews. Trellix Endpoint Security is rated 8.0, while Wazuh is rated 7.4. The top reviewer of Trellix Endpoint Security writes "Good user behavioral analysis and helpful patching but needs better support services". On the other hand, the top reviewer of Wazuh writes "It integrates seamlessly with AWS cloud-native services". Trellix Endpoint Security is most compared with Microsoft Defender for Endpoint, Trellix Endpoint Security (ENS), CrowdStrike Falcon, Cortex XDR by Palo Alto Networks and Trend Micro Deep Security, whereas Wazuh is most compared with Elastic Security, Security Onion, Splunk Enterprise Security, AlienVault OSSIM and Cortex XDR by Palo Alto Networks. See our Trellix Endpoint Security vs. Wazuh report.
See our list of best Extended Detection and Response (XDR) vendors.
We monitor all Extended Detection and Response (XDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.