Trellix logo
Trellix Xpand Live
Register Now

September 27-29, 2022 ARIA Hotel & Casino Save the date and start planning to align with our leadership teams to learn our vision for a new kind of cybersecurity and learn more about our innovations in cyber intelligence and XDR architecture.

Trellix CEO
Our CEO on Living Security

Trellix CEO, Bryan Palma, explains the critical need for security that’s always learning.

Gartner Marketplace Guide (XDR)
Gartner® Report: Market Guide for XDR

As per Gartner, "XDR is an emerging technology that can offer improved threat prevention, detection and response."

The Threat Report - Summer 2022
Latest Report

Our Summer 2022 threat report details the evolution of Russian cybercrime, research into medical devices and access control systems, and includes analysis of email security trends.

Critical Flaws in Widely Used Building Access Control System
Critical Flaws in Widely Used Building Access Control System

At Hardwear.io 2022, Trellix researchers disclosed 8 zero-day vulnerabilities in HID Global Mercury access control panels, allowing them to remotely unlock and lock doors, modify and configure user accounts and subvert detection from management software.

Trellix CEO
Our CEO on Living Security

Trellix CEO, Bryan Palma, explains the critical need for security that’s always learning.

Trellix Xpand Live
Register Now

September 27-29, 2022 ARIA Hotel & Casino Save the date and start planning to align with our leadership teams to learn our vision for a new kind of cybersecurity and learn more about our innovations in cyber intelligence and XDR architecture.

Antipiracy Policy

Software piracy is a significant problem costing the industry billions of dollars annually. Many businesses and organizations are unaware they may be using illegal software. Illegally distributing and using software is a significant problem that hurts us and all software publishers. Trellix is committed to educating our authorized users and, when necessary, bringing those violating our software licenses into compliance.

Types of Software Piracy

Software piracy is the illegal distribution and/or reproduction of software. Purchasing software is purchasing a license to use the software. That license spells out how you may legally use such software. Any time someone uses the software beyond the scope of the license, that person or company is violating the license agreement and copyright law. Whether software piracy is deliberate or not, it is still illegal and punishable by law. Software piracy comes in many forms; the types that impact our business include:

  1. Corporate or End User:
    • Underreporting software installations acquired through volume purchase agreements
    • Making additional copies of the software without having the proper number of licenses
    • Swapping disks inside or outside of work

  2. Subscription Licensing:
    • Using subscription-licensed software past the expiration date.

  3. Prime Support Entitlement:
    • Accessing support entitlements (e.g., .DATs, super .DATs, updates, or upgrades) without a current agreement.

  4. Internet Piracy:
    • Auction sites that offer counterfeit and/or outdated products
    • Peer-to-peer networks that allow for unauthorized file sharing

  5. Counterfeiting:
    • Someone attempts to copy the product and packaging to look like a Trellix original.

  6. Hard-Disk Loading:
    • Some unscrupulous suppliers illegally install software to help sell computers. While many suppliers are authorized to install products onto the machines they sell, honest vendors supply the software via agreements with software vendors.

First Steps to Effective Software Asset Management

To effectively manage your software assets, you must know what type of our products you have installed on your network. Regular audits can help you determine this. And though you may have policies in place that prohibit employees from making unauthorized copies, those policies do not stop employees from illegally copying software.

Many software audit tools are available to help you determine what type of software is installed on your network. Running these tools and comparing the results to your license documentation is a good first step in determining whether you are in compliance. If you find you are not in compliance, we will work with you to acquire the appropriate licenses necessary to get back in compliance.

Where Can I Buy Authorized Software

Go to Trellix’s website for more information on how to purchase our products and services through an authorized channel partner.

Legal Ramifications

Software piracy can subject an individual to arrest and criminal prosecution, with fines of up to $250,000 USD and prison term of up to five years. An infringer can also be subject to civil liability, including the payment of lost profits plus the infringer’s profits, or statutory damages of up to $150,000 USD per product, and attorneys’ fees.

Reporting a Case of Software Piracy

Please notify our License Management Services if you are aware of any situation where our software is being used or distributed illegally. Reporting this type of action helps us reduce the overall piracy problem and enables us to better support and modify our existing products.

Additional Resources

For more information, tools, and resources, visit: