Trellix logo
Trellix Introduction Video
Trellix Introduction

A living security platform with a pulse that is always learning and always adapting.

Gartner Magic Quadrant for Endpoint Protection Platforms
Gartner MQ (Endpoint)

Download the Magic Quadrant report, which evaluates the 19 vendors based on ability to execute and completeness of vision.

Gartner Marketplace Guide (XDR)
Gartner® Report: Market Guide for XDR

As per Gartner, "XDR is an emerging technology that can offer improved threat prevention, detection and response."

Critical Flaws in Widely Used Building Access Control System
Critical Flaws in Widely Used Building Access Control System

At Hardwear.io 2022, Trellix researchers disclosed 8 zero-day vulnerabilities in HID Global Mercury access control panels, allowing them to remotely unlock and lock doors, modify and configure user accounts and subvert detection from management software.

Trellix Threat Labs Research Report: April 2022
Trellix Threat Labs Research Report: April 2022

Our report on the rise of cyberattacks in the fourth quarter and Ukraine in the start of the new year.

Trellix CEO
Our CEO on Living Security

Trellix CEO, Bryan Palma, explains the critical need for security that’s always learning.

Trellix Introduction Video
Trellix Introduction

A living security platform with a pulse that is always learning and always adapting.

Supplier Portal

Trellix Supplier Code of Conduct

Trellix expects all of its suppliers to comply with Trellix’s Supplier Code of Conduct.

 

Trellix Purchase Order Terms and Conditions

In the absence of any separately executed agreement between Trellix and a supplier, Trellix’s Purchase Order Terms and Conditions shall govern Trellix’s purchase of goods and services.

 

Trellix Products & Services in Support of a U.S. Government Contract

In the event you are a Supplier providing products and services to a U.S. Govt. customer in support of a U.S. Government Contract on behalf of Trellix, the following terms and clauses shall apply.

 

Trellix Supplier Security Requirements

All Trellix suppliers are expected to meet Trellix’s Security Requirements and Expectations. Additionally, all Trellix suppliers who provide or develop software for Trellix are expected to use industry recognized software security best practices that exceed or are substantially similar to Trellix’s Product Security Practices, including running software security testing prior to delivering any software release to Trellix.

 

Trellix Anti-Piracy Policy

Software piracy is a significant problem costing the software industry billions of dollars annually.  Trellix is committed to educating our authorized users and, when necessary, bringing those violating our licenses into compliance.  Please review our Anti-Piracy Policy.

 

Supplier Diversity Program

Trellix’s Supplier Diversity Program encourages the use of minority, women, and disabled veteran-owned businesses (MWDVBEs) while maintaining best-in-class supply chain practices for obtaining goods and services.