Since 2004, Mandiant has been a partner to security-conscious organizations. Mandiant’s approach helps organizations develop more effective and efficient cyber security programs and instills confidence in their readiness to defend against and respond to cyber threats.
N/A
Trellix ePolicy Orchestrator
Score 6.8 out of 10
N/A
Trellix ePolicy Orchestrator (formerly McAfee ePolicy Orchestrator) software centralizes and streamlines management of endpoint, network, data security, and compliance solutions.
N/A
Pricing
Mandiant Advantage Attack Surface Management
Trellix ePolicy Orchestrator
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Mandiant Advantage Attack Surface Management
Trellix ePolicy Orchestrator
Free Trial
Yes
No
Free/Freemium Version
Yes
No
Premium Consulting/Integration Services
Yes
No
Entry-level Setup Fee
Required
No setup fee
Additional Details
—
—
More Pricing Information
Features
Mandiant Advantage Attack Surface Management
Trellix ePolicy Orchestrator
Threat Intelligence
Comparison of Threat Intelligence features of Product A and Product B
Mandiant Advantage Attack Surface Management
7.7
1 Ratings
3% below category average
Trellix ePolicy Orchestrator
6.6
1 Ratings
18% below category average
Network Analytics
8.21 Ratings
5.01 Ratings
Threat Recognition
7.31 Ratings
6.01 Ratings
Vulnerability Classification
7.31 Ratings
7.01 Ratings
Automated Alerts and Reporting
8.21 Ratings
7.01 Ratings
Threat Analysis
8.21 Ratings
8.01 Ratings
Threat Intelligence Reporting
6.41 Ratings
7.01 Ratings
Automated Threat Identification
8.21 Ratings
6.01 Ratings
Vulnerability Management Tools
Comparison of Vulnerability Management Tools features of Product A and Product B
Many companies that have an presence can benefit from using Mandiant ASM to identify and manage their internet facing assets, like web servers, email servers and DNS servers. This helps reduce the risk of cyberattacks targeting these assets.However smaller organizations with exposure might not always need the extensive attack surface monitoring provided by Mandiant ASM. For example a small company with one website may not require much monitoring, as a larger corporation.
[McAfee ePolicy Orchestrator] seems to be better suited to large enterprise applications... I don't feel it really suits the or self-managed SMB market. The general joe is not going to understand how to wield this product to it's full potential. For those of us managing large networks, this is a very ideal product for managing multiple sites and users.
Mandiant ASM combines sources of information such, as assets through the internet cloud resources and suppliers from third parties. This comprehensive approach provides organizations with an understanding of their external attack surface.
With scanning Mandiant ASM identifies threats and vulnerabilities present on the external attack surface and promptly notifies users. Whenever a new threat or vulnerability is detected an alert is generated to empower enterprises to take action in mitigating the risks.
Mandiant ASM assesses risks based on their likelihood of exploitation impact on organizations and severity. This prioritization enables organizations to focus their efforts, on addressing the risks effectively.
Static malware scans for known bad processes and files works well and can be schedules on endpoints easily
Preventing users from accessing USB drives and other peripherals is easily configured. We can also allow users to access to USB drives with user codes for the times they need it for business reasons.
ePO provides access into our MSME software so that we're not managing many different products from different locations.
In recent years the console has gotten much easier to navigate even though there is a ton of information to be accessed.
To enhance user experience it would be beneficial to make the interface more user friendly and easier to navigate. This can be achieved by simplifying the layout offering help when needed and utilizing terminology that's easily understandable.
Additionally incorporating reporting features that are customizable will empower users to generate reports tailored to their individual requirements.
In order to enhance the solutions efficiency optimizing the code and implementing data structures would prove valuable.
It has a slow mechanism when adding custom threat feeds. For example, if McAfee didn't have a signature or detection about a new virus and we try to add it to our console it is like a really big process in adding that to our available signatures.
Whenever a scan is performed, the system CPU utilization goes up 100 percent.
Installation fails due to difference in timestamp when we try to shuffle between packages.
McAfee support is definitely GREAT! It is one of the best technical support on a business level. GOLD support is recommended to business. Their website is easy and quick to create a ticket. Their technical team usually responds right away with an email or call. Via call and web they provide a full and complete support until the issue is resolved. The best, most of the time they explain in detail what is the issue, the reason and how to resolve it.
I decided to go with Mandiant Advantage Attack Surface Management because it offers a range of features performs excellently and is easy to use. What I really appreciate about Mandiant is their commitment, to innovation and their proven track record, in ensuring security.
I have used Symantec Endpoint Encryption before. Symantec and EPO are both good in their own ways. EPO allows integration of other McAfee products. I have been using ePolicy Orchestrator for years. I have a lot of experience with the product. That is why I like it.
Automation plays a role in saving time by streamlining operations related to attack surface management. These include automated asset discovery, vulnerability scanning and continuous monitoring of threat intelligence. As a result security teams can allocate their efforts towards projects such as security planning and incident response.
ASM provides a view of the external attack surface, for businesses encompassing internet facing assets, cloud resources and third party vendors. This enhances the understanding of assets enabling organizations to identify and prioritize risks effectively and make decisions on security investments
One notable advantage is cost savings. By eliminating the need to purchase and maintain security tools ASM becomes a solution for enterprises. It can replace products, like asset discovery tools, vulnerability management tools and threat intelligence feeds with its capabilities.