Trellix Endpoint Security vs Harmony Endpoint
GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links.
Learn more
Overview
Trellix Endpoint Security provides protection for endpoints, including laptops, PCs, and mobile devices. Its main functionalities include anti-virus, anti-spyware, automatic updates, firewall settings, and registry protection.
Trellix Endpoint Security provides protection for endpoints, including laptops, PCs, and mobile devices. Its main functionalities include anti-virus,...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- Knowledge Base
- Phone Support
- Chat
Harmony Endpoint is a cloud-based and on-premise security platform designed to help enterprises protect the remote workforce from potential threats such as malware, ransomware, or phishing attack.
Harmony Endpoint is a cloud-based and on-premise security platform designed to help enterprises protect the remote workforce from potential threats...
Deployment
- Cloud-based
- On-premise
Support Options
- Email/Help Desk
- Knowledge Base
- Phone Support
- Chat
Images
Pricing
Starting from
Not provided by vendor
- Free Version
- Free Trial
- Subscription
Starting from
Not provided by vendor
- Free Version
- Free Trial
- Subscription
Reviews
Ease of Use
4.2/ 5Features
4.2/ 5Customer Service
4.1/ 5Value for Money
4.0/ 5Ease of Use
4/ 5Features
4.5/ 5Customer Service
4.5/ 5Value for Money
4/ 5Features
Total features 8
- Activity Tracking
- Application Security
- Data Security
- Device Management
- Endpoint Protection Software
- IT Incident Management
- Incident Reporting
- Investigation Management
- Network Monitoring
- Network Provisioning
- Real-Time Monitoring
- Reporting/Analytics
- Threat Intelligence
- Threat Protection
- Threat Response
Total features 9
- Activity Tracking
- Application Security
- Data Security
- Device Management
- Endpoint Protection Software
- IT Incident Management
- Incident Reporting
- Investigation Management
- Network Monitoring
- Network Provisioning
- Real-Time Monitoring
- Reporting/Analytics
- Threat Intelligence
- Threat Protection
- Threat Response