Trellix logo
Trellix Introduction Video
Trellix Introduction

A living security platform with a pulse that is always learning and always adapting.

Gartner Magic Quadrant for Endpoint Protection Platforms
Gartner MQ (Endpoint)

Download the Magic Quadrant report, which evaluates the 19 vendors based on ability to execute and completeness of vision.

Gartner Marketplace Guide (XDR)
Gartner® Report: Market Guide for XDR

As per Gartner, "XDR is an emerging technology that can offer improved threat prevention, detection and response."

Critical Flaws in Widely Used Building Access Control System
Critical Flaws in Widely Used Building Access Control System

At Hardwear.io 2022, Trellix researchers disclosed 8 zero-day vulnerabilities in HID Global Mercury access control panels, allowing them to remotely unlock and lock doors, modify and configure user accounts and subvert detection from management software.

Trellix Threat Labs Research Report: April 2022
Trellix Threat Labs Research Report: April 2022

Our report on the rise of cyberattacks in the fourth quarter and Ukraine in the start of the new year.

Trellix CEO
Our CEO on Living Security

Trellix CEO, Bryan Palma, explains the critical need for security that’s always learning.

Trellix Introduction Video
Trellix Introduction

A living security platform with a pulse that is always learning and always adapting.

Security Operations

Intelligent security operations solutions enable you to confidently detect and correct sophisticated threats faster.

Security Operations Topics

What is SOC?

Security Operation Center (SOC) is a centralized function within an organization employing people, processes, and technology to continuously monitor and improve an organization's security posture.

Learn More

What is SIEM?

Security Information and Event Management (SIEM) is software that improves security awareness of an IT environment by combining security information management (SIM) and security event management (SEM).

Learn More

What is Cyber Threat Hunting?

Cyber threat hunting is a proactive security search through networks, endpoints, and datasets to hunt malicious, suspicious, or risky activities that have evaded detection by existing tools.

Learn More

What is Security Analytics?

Security analytics is a combination of software, algorithms, and analytic processes used to detect potential threats to IT systems. The need for security analytics technologies is growing thanks to rapid advancements in malware and other cyberexploit

Learn More

What is Information Security Management and Operations?

The Information Technology Infrastructure Library (ITIL) defines information security management as the process that “aims to ensure the confidentiality, integrity and availability of an organization's information, data and IT services.

Learn More

What is UEBA?

UEBA stands for User and Entity Behavior Analytics and was previously known as user behavior analytics (UBA). UEBA uses large datasets to model typical and atypical behaviors of humans and machines within a network. 

Learn More

What is SOAR?

SOAR stands for Security Orchestration, Automation, and Response. SOAR platforms are a collection of security software solutions and tools for browsing and collecting data from a variety of sources.

Learn More

What is DevSecOps?

DevSecOps integrates an organization's security team into the traditional DevOps organization. While DevOps integrates software development and production teams to produce bug-free applications.

Learn More