Trellix logo
Trellix Introduction Video
Trellix Introduction

A living security platform with a pulse that is always learning and always adapting.

Gartner Magic Quadrant for Endpoint Protection Platforms
Gartner MQ (Endpoint)

Download the Magic Quadrant report, which evaluates the 19 vendors based on ability to execute and completeness of vision.

Gartner Marketplace Guide (XDR)
Gartner® Report: Market Guide for XDR

As per Gartner, "XDR is an emerging technology that can offer improved threat prevention, detection and response."

Critical Flaws in Widely Used Building Access Control System
Critical Flaws in Widely Used Building Access Control System

At Hardwear.io 2022, Trellix researchers disclosed 8 zero-day vulnerabilities in HID Global Mercury access control panels, allowing them to remotely unlock and lock doors, modify and configure user accounts and subvert detection from management software.

Trellix Threat Labs Research Report: April 2022
Trellix Threat Labs Research Report: April 2022

Our report on the rise of cyberattacks in the fourth quarter and Ukraine in the start of the new year.

Trellix CEO
Our CEO on Living Security

Trellix CEO, Bryan Palma, explains the critical need for security that’s always learning.

Trellix Introduction Video
Trellix Introduction

A living security platform with a pulse that is always learning and always adapting.

Stories

The latest cybersecurity trends, best practices,
security vulnerabilities, and more

RECENT STORIES

Threat Intel Consumption and Sharing

In the current threat environment, organizations rely on accurate threat intelligence to identify and understand threats targeting their industry.

Read More

Trellix Case Study: Teck Resources

Teck Resources: A Major North American Mining Company Saves Time and Resources Defending Against Cyberattacks with Trellix XDR.

Read More

Five Eyes Alliance Advisory & Using Threat Intelligence

Global Defender overview providing initiative-taking steps for initial access prevention, utilizing threat intelligence for correlation and detections.

Read More

Cyber Readiness of U.S. Healthcare Services

This blog focuses on the cyber readiness of the U.S. healthcare sector, which traditionally lags due to under investment and simple neglect.

Read More

A New Approach to Security Operations

As threat landscapes grow and threat actors become craftier, security practitioners must constantly adapt their tools and practices to keep their organizations safe.

Read More

Get the latest

We’re no strangers to cybersecurity. But we are a new company.
Stay up to date as we evolve.

Please enter a valid email address.
Zero spam. Unsubscribe at any time.