[Home](https://www.selecthub.com/) \> [Endpoint Security](https://www.selecthub.com/category/endpoint-security/) \> [Endpoint Security Software](https://www.selecthub.com/c/endpoint-security-software/) \> Trellix EndPoint Security 

Categories:

* [Endpoint Security Software](https://www.selecthub.com/c/endpoint-security-software/)
* [Endpoint Management Software](https://www.selecthub.com/c/endpoint-management-software/)
* [...](#)

## What Is Trellix EndPoint Security?

**Industry Specialties:** Serves all industries

Trellix Endpoint Security (formerly McAfee Endpoint Security) is a digital security and malware defense software that covers most users’ security needs in a single package, from web threats to applications. 

  
It offers a number of standard features to equip enterprises with the tools they need to manage their business. Features like integration, machine learning, automation and more help businesses stay on top of their enterprise. It is affordable and scalable to companies of any size. 

PRICE

$

$

$

$

$

COMPANY SIZE

S

M

L

DEPLOYMENT

PLATFORM

[ Try Before You Buy. Request a Free Demo Today! Request Demo It's completely free! ](https://pmo.selecthub.com/get-product-demo/?category=Endpoint+Security+Software&product%5Fname=Trellix%2BEndPoint%2BSecurity&origin%5Furl=https%3A%2F%2Fwww.selecthub.com%2Fp%2Fendpoint-security-software%2Ftrellix-endpoint-security%2F&product%5Flogo=https%3A%2F%2Fcdn.selecthub.com%2Fproducts%2F2406a0a94c80406914ff2f6c9fdd67d5-a253d0f16a28b8ff306538a1336afd8b%2Fresources%2Foriginal%2Flogo.svg%3F1746066742) 

[Contributors](#view-contributors) 

![Richard Allen]() Written by Richard Allen Technical Content Writer [ Read Bio](https://www.selecthub.com/author/richard-allen/) 

![Jason Keller]() Edited by Jason Keller Content Editor [ Read Bio](https://www.selecthub.com/author/jason-keller/) 

 User Sentiment i 

![User satisfaction level icon: great]() 

Based on 2316 reviews:

 Add your rating:

![Screenshots]()![Screenshots]() 

 Product Screenshots and Videos

## #12

 Trellix EndPoint Security is ranked #12 in the Endpoint Security Software product directory based on the latest available data collected by SelectHub. Compare the leaders with our In-Depth Report.

[ Get the Report Now](https://pmo.selecthub.com/request-custom-scorecard?category%5Fslug=endpoint-security-software&product%5Fslug=trellix-endpoint-security&slug=trellix-endpoint-security&product%5Fname=Trellix+EndPoint+Security&category=Endpoint+Security+Software&origin%5Furl=https%3A%2F%2Fwww.selecthub.com%2Fp%2Fendpoint-security-software%2Ftrellix-endpoint-security%2F) 

## Trellix EndPoint Security Pricing

Based on our most recent analysis, Trellix EndPoint Security pricing starts at $40 (One-Time).

[Get Price Quote](https://pmo.selecthub.com/get-product-pricing/?category=Endpoint+Security+Software&product%5Fname=Trellix%2BEndPoint%2BSecurity&origin%5Furl=https%3A%2F%2Fwww.selecthub.com%2Fp%2Fendpoint-security-software%2Ftrellix-endpoint-security%2F&product%5Flogo=https%3A%2F%2Fcdn.selecthub.com%2Fproducts%2F2406a0a94c80406914ff2f6c9fdd67d5-a253d0f16a28b8ff306538a1336afd8b%2Fresources%2Foriginal%2Flogo.svg%3F1746066742&price=2) 

Price

$

$

$

$

$

 i

Starting From

$39.99

Pricing Model

One-Time

Free Trial

Yes ([Request for Free](https://pmo.selecthub.com/free-trial/?product%5Fname=Trellix+EndPoint+Security&category=Endpoint+Security+Software&product%5Flogo=https://cdn.selecthub.com/products/2406a0a94c80406914ff2f6c9fdd67d5-a253d0f16a28b8ff306538a1336afd8b/resources/original/logo.svg?1746066742)) 

## Training Resources

 Trellix EndPoint Security is supported with the following types of training:

Documentation

In Person

Live Online

Videos

Webinars

## Support

 The following support services are available for Trellix EndPoint Security:

Email

Phone

Chat

FAQ

Forum

Help Desk

Knowledge Base

Tickets

Training

24/7 Live Support

## Trellix EndPoint Security Benefits and Insights

Why use Trellix EndPoint Security?

### Key differentiators & advantages of Trellix EndPoint Security

* **Gain Peace of Mind:** Users get persistent protection from a top security vendor. It uses advanced features like machine learning and application containment to stay at the forefront of the endpoint security landscape.
* **Stay Proactive Against Threats:** It is designed for infection prevention, but also control if a system is infected. Using threat forensics, it tracks where infections are and how long the system has been exposed.
* **Consolidated Defense:** Users benefit from system and web protection and infection recovery, all in one platform. They do not need to learn additional software to round out their defense from all potential attack vectors.
* **Flexible Management:** It is easy to manage users and endpoint deployment. The software can be hosted on-premise or in the cloud.

### Industry Expertise

Trellix has served customers across all industries, since 1987\. It has grown to more than 40 active security products. The company serves customers in finance, merchandise, international governments and more. 

## Trellix EndPoint Security Reviews

Based on our most recent analysis, Trellix EndPoint Security reviews indicate a 'great' User Satisfaction Rating of 84% based on 2316 user reviews from 4 recognized software review sites.

![User satisfaction level icon: great]() 

2316 reviews

84%

of users would recommend this product

###  Synopsis of User Ratings and Reviews

Based on an aggregate of Trellix EndPoint Security reviews taken from the sources above, the following pros & cons have been curated by a SelectHub Market Analyst.

#### Pros

* **User-Friendly Interface:** A user-friendly interface makes it very easy to manage and understand, as noted by 70% of reviewers who mention ease of use.
* **Regular Updates:** Around 90% of reviewers who refer to updates state that it keeps all endpoint devices safe through regular updates.
* **Customer Support:** Offers fast and reliable customer support over email and phone, as observed by 80% of reviewers who specify customer service.
* **Application Updates:** All the users who specify application updates report that constant application updates enhance attack protection.

#### Cons

* **Slows the System:** Over 90% of reviewers who mention resource utilization note that it is resource-intensive and can slow systems down.
* **Time-Consuming:** Virus and error scanning can take a long time to complete, as stated by over 80% of reviewers who observe scanning.
* **Frequent Alerts:** Around 70% of reviewers who mention alerts specify that frequent alerts and notifications can interrupt users.
* **False Positives:** It can report false positives and does not detect low-impact viruses, as noted by more than 70% of the users who refer to false positives.

#### Researcher's Summary:

Trellix Endpoint Security is a versatile tool that provides advanced security solutions for businesses of all sizes. It can provide its users with digital security in a single package. Many reviewers have noted that it takes a long time to complete scans, which slows down the systems. It can also distract users with frequent notifications and false-positive detection. Nonetheless, it does provide a user-friendly interface with regular updates to keep endpoint devices safe. If you are looking for well-rounded endpoint protection at an affordable price, this might be an appropriate product.

## Key Features

* **Core Threat Protection:** The product comes equipped with a core threat protection suite that contains standard anti-virus, exploit protection, firewall and web control features.
* **Machine Learning:** Machine learning, and eventual evolution into AI and deep learning, allow the software to dissect threats and vulnerabilities at deeper levels than humans can, at faster speeds than a human could ever achieve. It identifies, resolves and learns lessons from exposures before a human might even become aware of the problem.
* **Application Containment:** It utilizes an application reputation grading system to determine how closely a new process should be monitored and contained to protect the system. Applications deemed above the threshold can be permitted to run without containment.
* **Actionable Threat Forensics:** Users can quickly and easily see where an infection is, why it’s occurring and how long the exposure has been present, in order to inform containment protocols.
* **Web Control:** Web control ensures safe browsing across a user’s enterprise. Potentially hostile or dangerous websites are tested and blacklisted if needed and network traffic is monitored to ensure hostile agents aren’t operating within the network. Blocking and detecting settings can be configured by an administrator.

  
## Suite Support

Trellix offers several support options for its customers, including phone, e-learning and ticketing support. It provides a support portal on its website.

  
_mail\_outline_Email: Users cannot contact support via email.

_phone_Phone: North American customers can all 1-888-847-8766, with additional phone numbers for international customers available on the vendor’s support website.

_school_Training: Trellix offers a number of training options for its software solution. Options include e-learning solutions (with accompanying, hands-on labs), live classrooms for administration, and endpoint security upgrade, which is an e-learning course. It also hosts a community forum on its website.

_local\_offer_Tickets: Enterprise customers can submit tickets by visiting the vendor’s “Contact Us” page on the Trellix website. They will be directed to a form that will ask their information, the nature of the request, error numbers (if applicable), company number and grant number.

## Head-to-Head  
 Comparison

![Trellix EndPoint Security Software Tool]() 

vs

* [Bitdefender GravityZone](https://www.selecthub.com/endpoint-security-software/trellix-endpoint-security-vs-bitdefender-gravityzone/)
* [Cisco Secure Client](https://www.selecthub.com/endpoint-security-software/cisco-secure-client-vs-trellix-endpoint-security/)
* [Cisco Secure Endpoint](https://www.selecthub.com/endpoint-security-software/trellix-endpoint-security-vs-cisco-secure-endpoint/)
* [CrashPlan](https://www.selecthub.com/endpoint-security-software/crashplan-vs-trellix-endpoint-security/)
* [Deep Instinct](https://www.selecthub.com/endpoint-security-software/trellix-endpoint-security-vs-deep-instinct/)
* [Emsisoft](https://www.selecthub.com/endpoint-security-software/emsisoft-vs-trellix-endpoint-security/)
* [FortiClient](https://www.selecthub.com/endpoint-security-software/forticlient-vs-trellix-endpoint-security/)
* [Jamf Protect](https://www.selecthub.com/endpoint-security-software/trellix-endpoint-security-vs-jamf-protect/)
* [Kaspersky Endpoint Security For Business](https://www.selecthub.com/endpoint-security-software/trellix-endpoint-security-vs-kaspersky-endpoint-security-for-business/)
* [Microsoft Defender for Business](https://www.selecthub.com/endpoint-security-software/trellix-endpoint-security-vs-microsoft-defender-for-business/)
* [Microsoft Defender for Endpoint](https://www.selecthub.com/endpoint-security-software/microsoft-defender-for-endpoint-vs-trellix-endpoint-security/)
* [Sophos Intercept X](https://www.selecthub.com/endpoint-security-software/trellix-endpoint-security-vs-sophos-intercept-x/)
* [Symantec Endpoint Protection](https://www.selecthub.com/endpoint-security-software/symantec-endpoint-protection-vs-trellix-endpoint-security/)
* [Symantec Endpoint Security Complete](https://www.selecthub.com/endpoint-security-software/trellix-endpoint-security-vs-symantec-endpoint-security-complete/)
* [ThreatDown](https://www.selecthub.com/endpoint-security-software/trellix-endpoint-security-vs-threatdown/)
* [WatchGuard Endpoint Security](https://www.selecthub.com/endpoint-security-software/trellix-endpoint-security-vs-watchguard-endpoint-security/)
* [Webroot Endpoint](https://www.selecthub.com/endpoint-security-software/trellix-endpoint-security-vs-webroot-endpoint/)

## Similar Products

Here are the most similar products to Trellix EndPoint Security.

[ Symantec Endpoint Security Complete ](https://www.selecthub.com/p/endpoint-security-software/symantec-endpoint-security-complete/) 

[ WatchGuard Endpoint Security ](https://www.selecthub.com/p/endpoint-security-software/watchguard-endpoint-security/) 

[ ESET Endpoint Security ](https://www.selecthub.com/p/endpoint-security-software/eset-endpoint-security/) 

[ Cisco Secure Endpoint ](https://www.selecthub.com/p/endpoint-security-software/cisco-secure-endpoint/) 

[ Sophos Intercept X ](https://www.selecthub.com/p/endpoint-security-software/sophos-intercept-x/) 

[ Symantec Endpoint Protection ](https://www.selecthub.com/p/endpoint-security-software/symantec-endpoint-protection/) 

[ FortiClient ](https://www.selecthub.com/p/endpoint-security-software/forticlient/) 

[ Blackberry Cyber Suite ](https://www.selecthub.com/p/endpoint-security-software/blackberry-cyber-suite/) 

[ F-Secure Protection Service for Business ](https://www.selecthub.com/p/endpoint-security-software/f-secure-protection-service/) 

[ Comodo Endpoint Security ](https://www.selecthub.com/p/endpoint-security-software/comodo-endpoint-security/) 

## About the Contributors

 The following expert team members are responsible for creating, reviewing, and fact checking the accuracy of this content. 

[ ](https://www.selecthub.com/author/richard-allen/) 

 Written by  
[Richard Allen](https://www.selecthub.com/author/richard-allen/) 

Technical Content Writer

Richard Allen is a Market Analyst at SelectHub, writing content on big data analytics, embedded analytics, enterprise reporting, and time and attendance. He studied journalism at Metropolitan State University of Denver and comes from a sports journalism background. He has covered the Colorado Rockies and worked as a media relations assistant for the New Orleans Baby Cakes.

[See Full Bio](https://www.selecthub.com/author/richard-allen/)

[ ](https://www.selecthub.com/author/jason-keller/) 

 Edited by  
[Jason Keller](https://www.selecthub.com/author/jason-keller/) 

Content Editor

Jason Keller is a Market Analyst and Content Editor at SelectHub who writes content on Electronic Medical Record (EMR), Electronic Health Record (EHR) and Marketing Automation Software. He studied journalism at the University of Northern Colorado, and in his free time likes reading and writing creatively, listening to music, hiking and hanging out with his dogs.

[See Full Bio](https://www.selecthub.com/author/jason-keller/)

 Your review has been submitted  
and should be visible within 24 hours.

Review Title 

Pros 

Cons 

Overall feedback 

Your name 

Your job title 

Industry

[ Choose your main industry](javascript:void%28%29) 

* [Accounting / CPA](javascript:void%28%29)
* [Advertising](javascript:void%28%29)
* [Aerospace & Defense](javascript:void%28%29)
* [Agriculture](javascript:void%28%29)
* [Apparel](javascript:void%28%29)
* [Architecture](javascript:void%28%29)
* [Auto Dealership](javascript:void%28%29)
* [Automotive](javascript:void%28%29)
* [Banking & Financial Services](javascript:void%28%29)
* [Banking & Mortgage](javascript:void%28%29)
* [Chemicals](javascript:void%28%29)
* [Construction & Engineering](javascript:void%28%29)
* [Construction / Contracting](javascript:void%28%29)
* [Consulting](javascript:void%28%29)
* [Consumer Products](javascript:void%28%29)
* [Distribution](javascript:void%28%29)
* [E-commerce](javascript:void%28%29)
* [Education](javascript:void%28%29)
* [Electronics](javascript:void%28%29)
* [Energy & Utilities](javascript:void%28%29)
* [Federal Government](javascript:void%28%29)
* [Field Maintenance](javascript:void%28%29)
* [Food & Beverage](javascript:void%28%29)
* [Healthcare / Social Services](javascript:void%28%29)
* [Hospitality / Gaming / Travel](javascript:void%28%29)
* [Human Resources](javascript:void%28%29)
* [Industrial Machinery](javascript:void%28%29)
* [Information Technology & High Tech](javascript:void%28%29)
* [Insurance](javascript:void%28%29)
* [Legal](javascript:void%28%29)
* [Maintenance / Field Service](javascript:void%28%29)
* [Manufacturing](javascript:void%28%29)
* [Marketing Services](javascript:void%28%29)
* [Media & Communications / Entertainment](javascript:void%28%29)
* [Mill Products](javascript:void%28%29)
* [Mining / Metals](javascript:void%28%29)
* [Mortgage](javascript:void%28%29)
* [Non-Profit](javascript:void%28%29)
* [Not Available](javascript:void%28%29)
* [Oil & Gas](javascript:void%28%29)
* [Other](javascript:void%28%29)
* [Other Services](javascript:void%28%29)
* [Payroll Provider](javascript:void%28%29)
* [Pharmaceuticals](javascript:void%28%29)
* [Professional Employer Organization](javascript:void%28%29)
* [Professional Services](javascript:void%28%29)
* [Property Management](javascript:void%28%29)
* [Public Sector](javascript:void%28%29)
* [Real Estate](javascript:void%28%29)
* [Recruiting Agency](javascript:void%28%29)
* [Religious Institutions](javascript:void%28%29)
* [Retail](javascript:void%28%29)
* [Sales & Marketing](javascript:void%28%29)
* [Semiconductors](javascript:void%28%29)
* [Software / IT](javascript:void%28%29)
* [Sports and Recreation](javascript:void%28%29)
* [Staffing Agency](javascript:void%28%29)
* [State & Local Government](javascript:void%28%29)
* [Telecommunications](javascript:void%28%29)
* [Third-Party Administrator](javascript:void%28%29)
* [Transportation & Logistics](javascript:void%28%29)
* [Wholesale Distribution](javascript:void%28%29)

Company Size

[ Choose your company size](javascript:void%28%29) 

* [1 employee](javascript:void%28%29)
* [2 to 9 employees](javascript:void%28%29)
* [10 - 19 employees](javascript:void%28%29)
* [20 - 49 employees](javascript:void%28%29)
* [50 - 99 employees](javascript:void%28%29)
* [100 - 499 employee](javascript:void%28%29)
* [500 - 999 employees](javascript:void%28%29)
* [1,000 - 2,499 employees](javascript:void%28%29)
* [2,500 - 4,999 employees](javascript:void%28%29)
* [5,000 - 9,999 employees](javascript:void%28%29)
* [10,000 - 24,999 employees](javascript:void%28%29)
* [25,000 - 49,999 employees](javascript:void%28%29)
* [50,000 + employees](javascript:void%28%29)

```json
{
              "@context": "https://schema.org",
              "@type": "BreadcrumbList",
              "itemListElement": [
              {
                "@type": "ListItem",
                "position": 1,
                "name": "Home",
                "item": "https://www.selecthub.com/"
              }, 
              {
                "@type": "ListItem",
                "position": 2,
                "name": "Endpoint Security",
                "item": "https://www.selecthub.com/category/endpoint-security/"
              }, 
              {
                "@type": "ListItem",
                "position": 3,
                "name": "Endpoint Security Software",
                "item": "https://www.selecthub.com/c/endpoint-security-software/"
              }, 
              {
                "@type": "ListItem",
                "position": 4,
                "name": "Trellix EndPoint Security"
              }
            ]
          }
{
          "@context": "http://schema.org",
          "@type": "SoftwareApplication",
          "name": "Trellix EndPoint Security",
          "description": "Trellix Endpoint Security (formerly McAfee Endpoint Security) is a digital security and malware defense software that covers most users’ security needs in a single package, from web threats to applications. 

It offers a number of standard features to equip enterprises with the tools they need to manage their business. Features like integration, machine learning, automation and more help businesses stay on top of their enterprise. It is affordable and scalable to companies of any size. ", 
          "review": {
            "@type": "Review",
            "author": {
              "@type": "Person",
              "name": "Richard Allen",
              "reviewBody": "Trellix Endpoint Security is a versatile tool that provides advanced security solutions for businesses of all sizes. It can provide its users with digital security in a single package. Many reviewers have noted that it takes a long time to complete scans, which slows down the systems. It can also distract users with frequent notifications and false-positive detection. Nonetheless, it does provide a user-friendly interface with regular updates to keep endpoint devices safe. If you are looking for well-rounded endpoint protection at an affordable price, this might be an appropriate product."
            }
          },
              
            "image": "https://cdn.selecthub.com/products/2406a0a94c80406914ff2f6c9fdd67d5-a253d0f16a28b8ff306538a1336afd8b/resources/original/logo.svg?1746066742",
            "aggregateRating": {
              "@type": "AggregateRating",
              "ratingValue": "84",
              "bestRating": "100",
              "worstRating": "1",
              "ratingCount": "2316"
            }, 
            "offers": {
              "@type": "Offer",
              "priceSpecification": {
                "@type": "priceSpecification",
                "price": "39.99",
                "priceCurrency": "USD"
              }
            },
              "positiveNotes": {
                "@type": "ItemList",
                "itemListElement": [  
                  {
                      "@type": "ListItem",
                      "position": 1,
                      "name": "User-Friendly Interface: A user-friendly interface makes it very easy to manage and understand, as noted by 70% of reviewers who mention ease of use."
                    },
                     
                  {
                      "@type": "ListItem",
                      "position": 2,
                      "name": "Regular Updates: Around 90% of reviewers who refer to updates state that it keeps all endpoint devices safe through regular updates."
                    },
                     
                  {
                      "@type": "ListItem",
                      "position": 3,
                      "name": "Customer Support: Offers fast and reliable customer support over email and phone, as observed by 80% of reviewers who specify customer service."
                    }
                ]
              },
              "negativeNotes": {
                "@type": "ItemList",
                "itemListElement": [  
                  {
                    "@type": "ListItem",
                    "position": 1,
                    "name": "Slows the System: Over 90% of reviewers who mention resource utilization note that it is resource-intensive and can slow systems down."
                    },
                     
                  {
                    "@type": "ListItem",
                    "position": 2,
                    "name": "Time-Consuming: Virus and error scanning can take a long time to complete, as stated by over 80% of reviewers who observe scanning."
                    },
                     
                  {
                    "@type": "ListItem",
                    "position": 3,
                    "name": "Frequent Alerts: Around 70% of reviewers who mention alerts specify that frequent alerts and notifications can interrupt users."
                    }
                ]
              },
          "applicationCategory": "Endpoint Security Software"
        }
```
