Trellix Introduction Video

Trellix Introduction

A living security platform with a pulse that is always learning and always adapting.

XDR Solution Brief

XDR Solution Brief

Learn how an XDR ecosystem that’s always adapting can energize your enterprise.

Gartner Magic Quadrant for Endpoint Protection Platforms

Gartner MQ (Endpoint)

Download the Magic Quadrant report, which evaluates the 19 vendors based on ability to execute and completeness of vision.

Gartner Marketplace Guide (XDR)

Gartner® Report: Market Guide for XDR

As per Gartner, "XDR is an emerging technology that can offer improved threat prevention, detection and response."

Prime Minister’s Office Compromised

Prime Minister’s Office Compromised

Multi-stage cyberespionage campaign targeting high-ranking government officials overseeing national security policy and defense industry.

January 2022 - Threat Report

Trellix Threat Report: January 2022

Our new company’s first threat report features research on Log4j, prevalent ransomware, APT tools, ATR malware data, targeted clients, customer sectors, and MITRE ATT&CK techniques.

McAfee Enterprise and FireEye emerge as Trellix

McAfee Enterprise and FireEye emerge as Trellix

Two trusted leaders in cybersecurity have come together to create a resilient digital world.

Trellix CEO

Our CEO on living security

Trellix CEO, Bryan Palma, explains the critical need for security that’s always learning.

Education Services

A broad training portfolio maximizes the benefit and ROI from your solutions.

Explore and Register for Training

Product Training

  • To gain maximum value from your solutions, you need expertly trained staff to configure and manage your solutions more efficiently, and optimally safeguard your critical data. You also need your staff on-site, doing their job. Now you can have both. We offer a wide range of hands-on product training courses to help you design, set up, configure, and manage your solutions.
  • Delivered in classrooms and online, our courses help you make the most of your product investment. Browse our public instructor-led courses and see where they are offered around the world. Browse our selection of eLearning courses, available online at any time.
  • To schedule a private course for your organization or to inquire about a custom course, please contact us.(the user can select Education and Training or the link can pre-set that Area of Interest)

Explore and Register for Training

Security Training

  • Get comprehensive and focused in-person classroom training. Held in private classes at your location, our fully immersive training is led by our experienced security instructors and gives you the opportunity to build best practices for implementing a cybersecurity strategy.
  • Gain the skills you need to proactively defend against the latest security threats. Our comprehensive security training from top industry experts helps your IT professionals gain proficiency in best practices to implement your security strategy and better respond to incidents.
  • Our security courses provide training to help security professionals build secure software and applications, assess vulnerabilities to defend against hacker attacks, and gain critical computer forensics skills to better respond to incidents. Taught by network security experts, our security training features interactive demonstrations and hands-on lab exercises. These instructor-led courses are offered in private classrooms only.
  • To schedule please contact us. (the user can select Education and Training or the link can pre-set that Area of Interest)
  • Courses
    • IT Risk Strategy - Measure and Treat IT Risk Across Your Enterprise.
    • Application Security Training - Courses include: Attacking Web Applications, Attacking Android and iOS, Building Secure Software, Writing Secure Code: Java.
    • Infrastructure Security Training - Courses include: Beginning Assessment & Penetration Testing, Advanced Assessment and Penetration Testing, Attacking Wireless Technologies, Attacking Firmware, Industrial Control Security, Attacking ICS and IoT.
    • Forensics and Incident Response - Courses include: Forensics and Incident Response, Mobile Forensics: Digital Forensics on Android, iOS, and Windows Mobile, Practical Blue Teaming: Hands-on Defense.

Trellix training methods

The Trellix education services portfolio, delivered by Trellix security experts, provides comprehensive and flexible product and security training when you need it and how you need it.

Instructor-led Training

Get comprehensive and focused in-person training from experienced instructors, and connect with other security professionals.

  • Courses are held at a public site or private classes can be arranged at your location
  • Full immersive training
  • Network with other cybersecurity industry peers

eLearning Training*

Gain knowledge at your desk and on your schedule.

  • Trellix solution training on demand
  • Self-paced modules, available anytime, anywhere
  • Option of adding hands-on lab exercises for deeper learning through use case scenarios

* Available for product training only

Explore and Register for Training