About Trellix
Trellix brings you a living XDR architecture that not only keeps up with the times but stays ahead of the threats. With cutting-edge cyber threat intelligence and continuous improvement, Trellix is redefining what security is and what it can do.
More about Trellix
Product capabilities
· Protection against ransomware
· Building a Zero Trust Strategy
· Automation of security operations
· Threat intelligence
· SecOps modernization
Trellix solutions are the best in Email Security, EDR (Endpoint Detection and Response), NDR (Network Detection and Response) and XDR (Advanced Detection and Response).
Challenges products address
The platform lets reduce risks, costs, complexity and payback time. Powered by artificial intelligence, it helps improve SOC resource levels, consolidate tools, and speed up decision-making.
Trellix benefits include full control over the infrastructure, instant threat detection and response, increased SOC efficiency, and optimal pricing.
Application areas
These include financial services companies, healthcare companies and US Department of Defense agencies.
In addition to those mentioned, Trellix offers its products to such industries as retail, manufacturing, transportation, hospitality, telecommunications and many others.
Trellix Benefits
Modern architecture and approaches to information security
Building comprehensive security
Effectively combat complex attacks
Seamless solution integration
Automation of information security processes
Availability of State Service for Special Communications and Protection certificates
Fewer resources for support
Unified on-prem and cloud management console
Trellix Products
Endpoint Detection and Response (EDR)
A tool for detecting and responding to advanced threats
Endpoint Forensics (HX)
Fast, accurate forensic investigations across thousands of endpoints
Application and Change Control
Application launch control module based on black/white lists
Virtualization Protection (MOVE)
Security of virtual desktops and servers
Mobile Security
Threat detection and protection for mobile devices
Trellix Network Security (NX)
Detect suspicious behavior on the network and prevent attacks that are invisible to traditional signature systems.
Trellix Network Forensics (PX)
Quickly detect and eliminate a wide range of threats, as well as restore a secure network state.
Trellix Network Intrusion Prevention System (IPS)
Scan network traffic for new and unknown threats.
Network Forensics
Security analytics solution that analyzes notifications and network metadata collected from all connected devices.
Trellix Network Detection and Response (NDR)
Focusing on real attacks, containing intrusions and eliminating weak points.
Trellix Intelligent Sandbox (IVX on-prem)
Detect advanced malware and translate threat intelligence into immediate action and protection. Deployed locally.
Trellix Intelligent Sandbox (IVX cloud)
Securely send files and scan content for threats at any stage of your workflow. Deployed in the cloud.
Trellix Helix Connect
Complete visibility and control of your company’s security: collect, correlate and analyze critical data to identify threats.
Trellix Insights
Information base of cyber attacks, audit tool, security policies.
Trellix ePolicy Orchestrator (ePO)
The central endpoint management server can be deployed both on-prem and in the cloud, including SaaS.
Trellix Security Analytics
Improved threat detection using advanced malware scanning methods.
Trellix Threat Intelligence Exchange
Transforming your security infrastructure into a collaborative system.
Trellix Data Loss Prevention
A set of solutions to protect against data leakage into the network and beyond.
Trellix Endpoint Encryption
Encryption that protects data from unauthorized access, loss and disclosure using pre-authentication and a powerful encryption engine.
Database Security
Monitoring a database management system (DBMS), protecting it from internal and external threats, as well as from exploits within the databases themselves.
Trellix Email Security – Server
Detects, isolates and blocks the latest URL attacks and provides contextual information to prioritize and speed response. Deployed on-prem.
Trellix Email Security – Cloud
Detects, isolates, and immediately stops ransomware, business email compromise, spear phishing, impersonation, and attachment-based attacks before they enter your environment. Deployed in the cloud.
Trellix Cloud Workload Security
Protect all hybrid cloud infrastructure workloads.
Detection as a Service (IVX Cloud)
Send files securely while protecting them from today’s threats, whether they exploit vulnerabilities in Microsoft Windows, Apple OS X, Linux, or applications.
Endpoint/Server Protection (ENS)
Next-Gen protection for Windows, macOS and Linux
Related resources
Trellix Solution Map
Vendor technologies, filtered by area.
Trellix Network Detection and Response
Trellix’s NDR Brief Review focuses on network attack protection and the potential of Trellix IPS.
Trellix Cyber Spring. SIEM vs Hackers
Webinar with an overview of real cases of using SIEM for analyzing security events and responding to incidents.
Internet and Mail Security in XDR Architecture
Everything about protecting mail and repelling attacks on the web vector: how threats are transformed, what countermeasures are and how to use them effectively.
Countries
Order a consultation