TrustRadius: an HG Insights company

Trellix Enterprise Security Manager

Score8.5 out of 10

39 Reviews and Ratings

What is Trellix Enterprise Security Manager?

Trellix Enterprise Security Manager (formerly McAfee Enterprise Security Manager) is security information and event management (SIEM) software.

Top Performing Features

  • Integration with Identity and Access Management Tools

    Integration with access control tools like Active Directory and LDAP

    Category average: 7.7

  • Custom dashboards and workspaces

    dashboards that can be customized to meet the needs of specific groups

    Category average: 8

  • Data integration/API management

    Ease and quality of data integrations between SIEM and other systems

    Category average: 8.1

Areas for Improvement

  • Response orchestration and automation

    Quality of built-in response orchestration and automation in Next-Gen SIEM

    Category average: 7.1

  • Incident indexing/searching

    Effectiveness of searching across structured and unstructured events and incidents within SIEM

    Category average: 8.8

  • Correlation

    Correlation of logs and events to pinpoint significant threats

    Category average: 8.4

Identification, neutralization and investigation of threats

Pros

  • Allows data analysis for patterns that may indicate a threat
  • Real-time activity visibility
  • Gives technology support intelligence by creating prioritized alerts that reveal potential threats before they happen
  • Problem reporting is integrated and simplifies analysis and compliance operations

Cons

  • Reports can be difficult to analyze
  • There is little training for technology teams to master the key features of the tools
  • Our team may have problems locating errors in our country's bases
  • Reports can be difficult to customize and adapt

Return on Investment

  • positive impact: increased security of our applications
  • positive impact: we were able to integrate internal applications already developed, through API
  • positive impact: we were able to integrate with other McAfee tools that we already used

Other Software Used

McAfee Endpoint Security, Microsoft Defender for Endpoint (formerly Microsoft Defender ATP), Avast Business Antivirus, AVG AntiVirus Business Edition

Overall, A Great Value Security Solution

Pros

  • Updated and current incident libraries.
  • It monitors the entire enterprise network proactively.
  • Its monitoring activities do not impact the network.

Cons

  • Widen more its integration capabilities, such as integration to some cloud platforms.

Return on Investment

  • It effectively blocks potential attacks from outside.
  • It aids us in doing more effective root-cause analysis whenever an incident occurs, since it gives us enough details to understand what went wrong.

Other Software Used

McAfee Endpoint Security, Trend Micro ServerProtect, Amazon Web Services, SafeNet Authentication Service (SAS), Cisco SSL VPN (AnyConnect)

Manage you events

Pros

  • Integration with other software
  • Log sources integration
  • Very user friendly interface
  • Real-time monitoring

Cons

  • Pre-defined reports
  • The system requirements are quite demanding
  • No other tool issue or operational issue was identified

Return on Investment

  • Improve security
  • Prevent incidents and attacks
  • Reduce the security and continuity risks
  • Correct and independent management information

Alternatives Considered

IBM QRadar

Other Software Used

DenyAll Vulnerability Manager, FortiSIEM, Google Analytics

McAfee Enterprise Security Manager Secures Your Enterprise!

Pros

  • Runs on Startup
  • User-Friendly
  • Identifies Threats

Cons

  • Customer Outreach
  • IT Support
  • Overall Aesthetic

Return on Investment

  • Fewer Attacks
  • More Peace of Mind when Working
  • Improved Efficiency within the Office Staff

Alternatives Considered

Norton

SIEM causing Anger then use Enterprise Security Manager

Pros

  • Advanced Threat intelligence gives us the ability to prioritise alerts quickly and efficiently.
  • SIEM log collection allows us to integrate our other Intel products to a centralised point.
  • Physical appliances is one of the areas we have moved away from, so the ability for ESM to be available as a VDI was key.

Cons

  • If there is a requirement to integrate into other vendor products i.e. (log sharing) then this was very cumbersome.
  • Integration of vulnerability scanning that is available in other vendor products would be a good addition.
  • When integrating all of Intel's products a third party consultancy is usually required, where other vendor products can be configured without this additional cost.

Return on Investment

  • Centralisation of events form NIDS/IPS/IDS, Firewall(s), Web Proxy and Endpoint
  • Ability to have third party management
  • Actively upgraded product with good vendor support

Other Software Used

AlienVault USM, McAfee Endpoint Protection Suite, Microsoft Office 365, IBM Cognos, Zscaler Web Security