About Trellix

Cybercriminals are getting smarter — and so should your cybersecurity!

Trellix brings you a living XDR architecture that not only keeps up with the times but stays ahead of the threats. With cutting-edge cyber threat intelligence and continuous improvement, Trellix is redefining what security is and what it can do.

More about Trellix

Product capabilities

Trellix’s extensive portfolio of solutions provides comprehensive protection that takes into account:
· Protection against ransomware
· Building a Zero Trust Strategy
· Automation of security operations
· Threat intelligence
· SecOps modernization

Trellix solutions are the best in Email Security, EDR (Endpoint Detection and Response), NDR (Network Detection and Response) and XDR (Advanced Detection and Response).

Challenges products address

Trellix XDR is a comprehensive cybersecurity solution that helps you identify cyber incidents and respond to them at all levels of the infrastructure, covering all possible attack vectors.

The platform lets reduce risks, costs, complexity and payback time. Powered by artificial intelligence, it helps improve SOC resource levels, consolidate tools, and speed up decision-making.

Trellix benefits include full control over the infrastructure, instant threat detection and response, increased SOC efficiency, and optimal pricing.

Application areas

More than 40,000 customers, including 80% of the Fortune 100, rely on Trellix and its approach to protection.

These include financial services companies, healthcare companies and US Department of Defense agencies.

In addition to those mentioned, Trellix offers its products to such industries as retail, manufacturing, transportation, hospitality, telecommunications and many others.

Trellix Benefits

Modern architecture and approaches to information security

Building comprehensive security

Effectively combat complex attacks

Seamless solution integration

Automation of information security processes

Availability of State Service for Special Communications and Protection certificates

Fewer resources for support

Unified on-prem and cloud management console

Trellix Products

Endpoint Detection and Response (EDR)

A tool for detecting and responding to advanced threats

Endpoint Forensics (HX)

Fast, accurate forensic investigations across thousands of endpoints

Application and Change Control

Application launch control module based on black/white lists

Virtualization Protection (MOVE)

Security of virtual desktops and servers

Mobile Security

Threat detection and protection for mobile devices

Trellix Network Security (NX)

Detect suspicious behavior on the network and prevent attacks that are invisible to traditional signature systems.

Trellix Network Forensics (PX)

Quickly detect and eliminate a wide range of threats, as well as restore a secure network state.

Trellix Network Intrusion Prevention System (IPS)

Scan network traffic for new and unknown threats.

Network Forensics

Security analytics solution that analyzes notifications and network metadata collected from all connected devices.

Trellix Network Detection and Response (NDR)

Focusing on real attacks, containing intrusions and eliminating weak points.

Trellix Intelligent Sandbox (IVX on-prem)

Detect advanced malware and translate threat intelligence into immediate action and protection. Deployed locally.

Trellix Intelligent Sandbox (IVX cloud)

Securely send files and scan content for threats at any stage of your workflow. Deployed in the cloud.

Trellix Helix Connect

Complete visibility and control of your company’s security: collect, correlate and analyze critical data to identify threats.

Trellix Insights

Information base of cyber attacks, audit tool, security policies.

Trellix ePolicy Orchestrator (ePO)

The central endpoint management server can be deployed both on-prem and in the cloud, including SaaS.

Trellix Security Analytics

Improved threat detection using advanced malware scanning methods.

Trellix Threat Intelligence Exchange

Transforming your security infrastructure into a collaborative system.

Trellix Data Loss Prevention

A set of solutions to protect against data leakage into the network and beyond.

Trellix Endpoint Encryption

Encryption that protects data from unauthorized access, loss and disclosure using pre-authentication and a powerful encryption engine.

Database Security

Monitoring a database management system (DBMS), protecting it from internal and external threats, as well as from exploits within the databases themselves.

Trellix Email Security – Server

Detects, isolates and blocks the latest URL attacks and provides contextual information to prioritize and speed response. Deployed on-prem.

Trellix Email Security – Cloud

Detects, isolates, and immediately stops ransomware, business email compromise, spear phishing, impersonation, and attachment-based attacks before they enter your environment. Deployed in the cloud.

Trellix Cloud Workload Security

Protect all hybrid cloud infrastructure workloads.

Detection as a Service (IVX Cloud)

Send files securely while protecting them from today’s threats, whether they exploit vulnerabilities in Microsoft Windows, Apple OS X, Linux, or applications.

Endpoint/Server Protection (ENS)

Next-Gen protection for Windows, macOS and Linux

Related resources

Trellix Solution Map

Vendor technologies, filtered by area.

Show more

Trellix Network Detection and Response

Trellix’s NDR Brief Review focuses on network attack protection and the potential of Trellix IPS.

Trellix Cyber Spring. SIEM vs Hackers

Webinar with an overview of real cases of using SIEM for analyzing security events and responding to incidents.

Internet and Mail Security in XDR Architecture

Everything about protecting mail and repelling attacks on the web vector: how threats are transformed, what countermeasures are and how to use them effectively.

News

Whenhackersplaydisguise:thestoryofBianLianandsecuritytips

When hackers play disguise: the story of BianLian and security tips

Countries

Kazakhstan Kazakhstan
Kyrgyzstan Kyrgyzstan
Moldova Moldova
Tajikistan Tajikistan
Turkmenistan Turkmenistan
Ukraine Ukraine
Uzbekistan Uzbekistan

Order a consultation

Get free professional advice on manufacturers, products and services