GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Our commitment
Independent research methodology
Our researchers use a mix of verified reviews, independent research, and objective methodologies to bring you selection and ranking information you can trust. While we may earn a referral fee when you visit a provider through our links or speak to an advisor, this has no influence on our research or methodology.
How GetApp verifies reviews
GetApp carefully verified over 2.5 million+ reviews to bring you authentic software experiences from real users. Our human moderators verify that reviewers are real people and that reviews are authentic. They use leading tech to analyze text quality and to detect plagiarism and generative AI.
How GetApp ensures transparency
GetApp lists all providers across its website—not just those that pay us—so that users can make informed purchase decisions. GetApp is free for users. Software providers pay us for sponsored profiles to receive web traffic and sales opportunities. Sponsored profiles include a link-out icon that takes users to the provider’s website.

Trellix Endpoint Security
Computer security and endpoint protection platform
Last updated: April 2025
Table of Contents
Trellix Endpoint Security - 2025 Pricing, Features, Reviews & Alternatives


All user reviews are verified by in-house moderators and provider data by our software research team. Learn more
Last updated: April 2025
Starting from
No pricing info
Alternatives with better value for money
Trellix Endpoint Security’s pros and cons based on 1,808 verified reviews
To identify what users like and dislike about Trellix Endpoint Security, our data scientists apply advanced modeling techniques to our proprietary reviews data. We've sorted the resulting list of pros and cons based on the percentage of users who expressed positive sentiment toward the given topic in their reviews.



Comprehensive computer security
90% of reviewers feel positive about McAfee's computer security. Reviewers appreciate its robust protection against malware, viruses, and cyber threats, which is essential for safeguarding personal and business data. They value features like advanced anti-malware protection, regular security updates, and the ability to scan systems effectively. Users also highlight the software's ease of management and compatibility with multiple operating systems.
Extensive device security
89% of reviewers feel positive about McAfee's device security. Users appreciate the software's ability to protect a wide range of devices, including desktops, laptops, tablets, and mobile phones. They find the full encryption feature particularly valuable for preventing data theft from lost or stolen devices. Reviewers also mention the convenience of managing all devices under one interface and the high malware detection rate.
See related user reviews
Robust endpoint security
86% of reviewers feel positive about McAfee's endpoint security. Reviewers highlight the software's ability to provide comprehensive protection for endpoints, including servers and mobile devices. They appreciate features like endpoint detection and response (EDR), machine learning analysis, and the integration with McAfee ePolicy Orchestrator for centralized management. Users also value the regular updates that keep the protection up-to-date.


See related user reviews
Seamless background performance
80% of reviewers feel positive about McAfee's background performance. Users appreciate that the software runs quietly in the background without interrupting their work or slowing down their systems. They find it easy to use and value the automatic updates and scans that ensure continuous protection without requiring user intervention.

See related user reviews
Intuitive user interface
80% of reviewers feel positive about McAfee's user interface. Users find the interface intuitive and user-friendly, making it easy for individuals at all experience levels to navigate and use the software effectively. They appreciate the modern design, clear organization of features, and the ease of managing security settings.
See related user reviews
Difficult software removal
89% of reviewers feel negative about McAfee's software removal process. Users report that uninstalling the software can be cumbersome and often requires additional tools or administrative privileges. They find the process intrusive and frustrating, with some experiencing residual files and adware even after uninstallation.
Annoying pop-ups
86% of reviewers feel negative about the frequent pop-ups in McAfee. Users are frustrated by the constant notifications and advertisements, which they find intrusive and disruptive to their work. They mention that the pop-ups persist even after attempts to disable them, leading to a poor user experience.


See related user reviews
System performance slowdown
82% of reviewers feel negative about McAfee's impact on system performance. Users report that the software consumes significant processing power, causing their computers to slow down, especially during scans and updates. They find this particularly problematic on lower-end devices, where the performance lag is more noticeable.

See related user reviews
High memory consumption
80% of reviewers feel negative about McAfee's memory consumption. Users indicate that the software uses a substantial amount of RAM, which can hinder the performance of their computers, especially those with lower specifications. They find that this high memory usage leads to system slowdowns and reduced efficiency.
See related user reviews
Heavy resource consumption
76% of reviewers feel negative about McAfee's resource consumption. Users report that the software is resource-intensive, consuming significant CPU and disk space. They find this impacts the overall performance of their systems, causing slowdowns and making it difficult to run other applications smoothly.


See related user reviews
Trellix Endpoint Security's key features
Most critical features, based on insights from Trellix Endpoint Security users:
All Trellix Endpoint Security features
Features rating:
Trellix Endpoint Security awards
Trellix Endpoint Security alternatives
Trellix Endpoint Security integrations (9)
Integrations rated by users
We looked through 1,808 user reviews, to identify which products are mentioned as Trellix Endpoint Security integrations, and what is the users perception.
Trellix Endpoint Security support options
Typical customers
Platforms supported
Support options
Trellix Endpoint Security reviews
Overall rating
4.2
/5
1.8K
Positive reviews
82
%
- Value for money
- Ease of use
- Features
- Customer support
- Likelihood to recommend7.89/10
848
638
205
76
41
Trellix Endpoint Security FAQs
Trellix Endpoint Security has the following typical customers:
Freelancers, Large Enterprises, Mid Size Business, Non Profit, Public Administrations, Small Business
These products have better value for money
Q. What languages does Trellix Endpoint Security support?
Trellix Endpoint Security supports the following languages:
English
Q. Does Trellix Endpoint Security support mobile devices?
Trellix Endpoint Security supports the following devices:
Android, iPad, iPhone
Q. Does Trellix Endpoint Security offer an API?
No, Trellix Endpoint Security does not have an API available.
Q. What level of support does Trellix Endpoint Security offer?
Trellix Endpoint Security offers the following support options:
Chat
Popular comparisons with Trellix Endpoint Security













