getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Trellix Endpoint Security Logo

Computer security and endpoint protection platform

Last updated: April 2025

Table of Contents

Trellix Endpoint Security - 2025 Pricing, Features, Reviews & Alternatives

Verified reviewer profile picture
Verified reviewer profile picture

All user reviews are verified by in-house moderators and provider data by our software research team.  Learn more

Last updated: April 2025

What is Trellix Endpoint Security?

Trellix Endpoint Security provides protection for endpoints, including laptops, PCs, and mobile devices. Its main functionalities include anti-virus, anti-spyware, automatic updates, firewall settings, and registry protection.

The solution offers a centralized dashboard for managing all endpoint devices and protecting them against threats. It uses behavioral analysis based on machine learning to predict when an attack is about to happen, enabling users to take preventative measures before any damage is done.

Starting from

Empty state illustration for "No pricing info"

No pricing info

Alternatives with better value for money

Trellix Endpoint Security’s pros and cons based on 1,808 verified reviews

To identify what users like and dislike about Trellix Endpoint Security, our data scientists apply advanced modeling techniques to our proprietary reviews data. We've sorted the resulting list of pros and cons based on the percentage of users who expressed positive sentiment toward the given topic in their reviews.

Verified reviewer profile picture
Verified reviewer profile picture
Verified reviewer profile picture
To determine these pros and cons insights, we analyzed responses from 1,808 verified reviews

Comprehensive computer security

90% of reviewers feel positive about McAfee's computer security. Reviewers appreciate its robust protection against malware, viruses, and cyber threats, which is essential for safeguarding personal and business data. They value features like advanced anti-malware protection, regular security updates, and the ability to scan systems effectively. Users also highlight the software's ease of management and compatibility with multiple operating systems.

Verified reviewer profile picture
Verified reviewer profile picture

See related user reviews

“Its security levels (perimeter, end point and data security) that include new and advanced scanning functions, identify and eliminate vulnerabilities, increasing user productivity.”
“Things such as advanced anti-malware protection, actionable threat forensics and proactive web security are great features to have and it really helps preventing any bad things,”

Extensive device security

89% of reviewers feel positive about McAfee's device security. Users appreciate the software's ability to protect a wide range of devices, including desktops, laptops, tablets, and mobile phones. They find the full encryption feature particularly valuable for preventing data theft from lost or stolen devices. Reviewers also mention the convenience of managing all devices under one interface and the high malware detection rate.

See related user reviews

“It has got features of full encryption to prevent data theft from the lost or stolen laptops or mobile phones, which makes it really smart and advanced anti-virus solutions available in the market .”
“Mal-ware detection rate is very high, and the fact that it allows the organization of all Products and devices in one place makes it stand out amongst other software of its kind. ”

Robust endpoint security

86% of reviewers feel positive about McAfee's endpoint security. Reviewers highlight the software's ability to provide comprehensive protection for endpoints, including servers and mobile devices. They appreciate features like endpoint detection and response (EDR), machine learning analysis, and the integration with McAfee ePolicy Orchestrator for centralized management. Users also value the regular updates that keep the protection up-to-date.

Verified reviewer profile picture
Verified reviewer profile picture

See related user reviews

“The fact that it provides centrally managed defenses with integrated features such as endpoint detection and response (EDR) and machine learning analysis is great for use in business computers.”
“Endpoint security by McAfee has a good detection system compared to windows defender and several other security tools. And with regular updates, McAfee ensures higher protection from the latest threats. And the user interface seems quite easy and comfortable for users.”

Seamless background performance

80% of reviewers feel positive about McAfee's background performance. Users appreciate that the software runs quietly in the background without interrupting their work or slowing down their systems. They find it easy to use and value the automatic updates and scans that ensure continuous protection without requiring user intervention.

Verified reviewer profile picture

See related user reviews

“It never interrupts my work and carries out its job at the background, thus provides me quality services and prevents my system form unwanted threats.”
“Runs silently in the background, takes care of issues with little need for user interaction, and when interaction is required, it's easy to do.”

Intuitive user interface

80% of reviewers feel positive about McAfee's user interface. Users find the interface intuitive and user-friendly, making it easy for individuals at all experience levels to navigate and use the software effectively. They appreciate the modern design, clear organization of features, and the ease of managing security settings.

See related user reviews

“The software is intuitive and the user interface enables users at all levels of experience to effectively engage with the software.”
“McAfee products always have a clean, elegant user interface, and Endpoint Security is no exception for this.”

Difficult software removal

89% of reviewers feel negative about McAfee's software removal process. Users report that uninstalling the software can be cumbersome and often requires additional tools or administrative privileges. They find the process intrusive and frustrating, with some experiencing residual files and adware even after uninstallation.

Verified reviewer profile picture

See related user reviews

“It won't let you uninstall the program. And even if you stop paying for the program it will constantly pop up saying to scan your computer and then demand you pay before you do. ”
“Removal when Orchestrator messes up requires a tool that expires in 3 months so you need to reach back out for a removal tool”

Annoying pop-ups

86% of reviewers feel negative about the frequent pop-ups in McAfee. Users are frustrated by the constant notifications and advertisements, which they find intrusive and disruptive to their work. They mention that the pop-ups persist even after attempts to disable them, leading to a poor user experience.

Verified reviewer profile picture
Verified reviewer profile picture

See related user reviews

“I see no light for McAfee. McAfee constantly has annoying popups that stop me from using my computer asking us to "buy our software" (harassment) - If you want us to buy your software, give us a good product.”
“The Pop-Ups and notifications drive me crazy. While you can disable some of them I don't need a popup appearing during the middle of a presentation.”

System performance slowdown

82% of reviewers feel negative about McAfee's impact on system performance. Users report that the software consumes significant processing power, causing their computers to slow down, especially during scans and updates. They find this particularly problematic on lower-end devices, where the performance lag is more noticeable.

Verified reviewer profile picture

See related user reviews

“McAfee will slow your computer to a crawl. When running, your computer will take 5x as long to perform normal tasks, and once your membership is about to expire, you will be bombarded with notifications from McAfee.”
“It will slow down your computer, if your computer is below the daily standards, (No SSD, less than 8 GB Memory, entry level cpu's etc.)”

High memory consumption

80% of reviewers feel negative about McAfee's memory consumption. Users indicate that the software uses a substantial amount of RAM, which can hinder the performance of their computers, especially those with lower specifications. They find that this high memory usage leads to system slowdowns and reduced efficiency.

See related user reviews

“If you want to run this software on your machine then you need to have system with good configuration because background process consumes so much memory so if your system have low configuration then it will be very slow.”
“It is taking up too much memory in the operating system, and sometimes it crashes and freezes the operation if the hardware is not up-to-date.”

Heavy resource consumption

76% of reviewers feel negative about McAfee's resource consumption. Users report that the software is resource-intensive, consuming significant CPU and disk space. They find this impacts the overall performance of their systems, causing slowdowns and making it difficult to run other applications smoothly.

Verified reviewer profile picture
Verified reviewer profile picture

See related user reviews

“It does not recognize at a very high level the applications that it must or should not block, and it does not present a way to save our preferences with respect to them and it has a high consumption of resources.”
“The only thing I dont like is the heavy resource it uses on my CPU and hard disk when it perform the deep analysis on PC”

Trellix Endpoint Security's key features

Most critical features, based on insights from Trellix Endpoint Security users:

Device Management
Real-Time Monitoring
Application Security
Data Security
Threat Intelligence
Activity Tracking

All Trellix Endpoint Security features

Features rating:

Threat Response
Network Provisioning

Trellix Endpoint Security awards

Trellix Endpoint Security alternatives

Trellix Endpoint Security logo
4.2
(1.8K)

Starting from

Empty state illustration for "No pricing info"

No pricing info

Free trial
Free version
Ease of Use
Features
Value for Money
Customer Support
Jamf Protect logo
4.5
(36)
visit website

Starting from

5

Per month

Free trial
Free version
Ease of Use
Features
Value for Money
Customer Support
ManageEngine PAM360 logo
4.5
(2)
visit website

Starting from

7995

Per year

Free trial
Free version
Ease of Use
Features
Value for Money
Customer Support
UTunnel VPN logo
5.0
(69)
visit website

Starting from

6

Per month

Free trial
Free version
Ease of Use
Features
Value for Money
Customer Support

Trellix Endpoint Security integrations (9)

Integrations rated by users

We looked through 1,808 user reviews, to identify which products are mentioned as Trellix Endpoint Security integrations, and what is the users perception.

Integration rating: 5.0 (1)

Integration rating: 5.0 (1)

Integration rating: 5.0 (1)

Integration rating: 5.0 (1)

Rippling logo
Rippling

Integration rating: 4.0 (1)

Integration rating: 5.0 (1)

Integration rating: 4.0 (1)

Trellix Endpoint Security support options

Typical customers

Freelancers
Small businesses
Mid size businesses
Large enterprises

Platforms supported

Web
Android
iPhone/iPad

Support options

Chat

Trellix Endpoint Security reviews

Overall rating

4.2

/5

1.8K

Positive reviews

82

%

Rating breakdown
  • Value for money
  • Ease of use
  • Features
  • Customer support
  • Likelihood to recommend7.89/10
Rating distribution

5

4

3

2

1

848

638

205

76

41

Pros
“It doesn't slow the computer down any more than the other software I've used and it's good for anyone from beginner to expert. I'd recommend it if you're looking for a good paid virus software.”
“This helps keep your computer more secure and is especially good for remote work. It helps give peace of mind if your work involves sensitive data.”
“It is a nice software to use to protect my computer from any viruses. I also liked how it is very simplistic and user friendly so I am not confused on what is happening with my computer.”
Cons
“There are sometimes that it may prevent you also from installing something on your computer that has no harm on your computer and detect it as a harmful app.”
“The smaller threats get through the program, raising hell in the computer, disabling the user to continue productively.”
“Sometimes I have experienced system slowness which is quite irritating at times. Also getting the update popups everytime is quite annoying.”

Trellix Endpoint Security FAQs

Q. Who are the typical users of Trellix Endpoint Security?

Trellix Endpoint Security has the following typical customers:
Freelancers, Large Enterprises, Mid Size Business, Non Profit, Public Administrations, Small Business

These products have better value for money


Q. What languages does Trellix Endpoint Security support?

Trellix Endpoint Security supports the following languages:
English


Q. Does Trellix Endpoint Security support mobile devices?

Trellix Endpoint Security supports the following devices:
Android, iPad, iPhone


Q. Does Trellix Endpoint Security offer an API?

No, Trellix Endpoint Security does not have an API available.


Q. What level of support does Trellix Endpoint Security offer?

Trellix Endpoint Security offers the following support options:
Chat

Related categories