Trellix logo
Trellix Xpand Live
Register Now

September 27-29, 2022 ARIA Hotel & Casino Save the date and start planning to align with our leadership teams to learn our vision for a new kind of cybersecurity and learn more about our innovations in cyber intelligence and XDR architecture.

Trellix CEO
Our CEO on Living Security

Trellix CEO, Bryan Palma, explains the critical need for security that’s always learning.

Gartner Marketplace Guide (XDR)
Gartner® Report: Market Guide for XDR

As per Gartner, "XDR is an emerging technology that can offer improved threat prevention, detection and response."

The Threat Report - Summer 2022
Latest Report

Our Summer 2022 threat report details the evolution of Russian cybercrime, research into medical devices and access control systems, and includes analysis of email security trends.

Critical Flaws in Widely Used Building Access Control System
Critical Flaws in Widely Used Building Access Control System

At Hardwear.io 2022, Trellix researchers disclosed 8 zero-day vulnerabilities in HID Global Mercury access control panels, allowing them to remotely unlock and lock doors, modify and configure user accounts and subvert detection from management software.

Trellix CEO
Our CEO on Living Security

Trellix CEO, Bryan Palma, explains the critical need for security that’s always learning.

Trellix Xpand Live
Register Now

September 27-29, 2022 ARIA Hotel & Casino Save the date and start planning to align with our leadership teams to learn our vision for a new kind of cybersecurity and learn more about our innovations in cyber intelligence and XDR architecture.

Black Hat 2022

Mandalay Bay, Las Vegas + Virtual

Trellix Networking Lounge - BHNL A

August 6-11, August 10-11

Demo Station # Collateral Links

DS1: Trellix Platform

The Trellix XDR SAAS platform connects detection, investigation and integrated response across Trellix and third-party products against a panoply of threats.

  • Turn-key Security operations, SOC, response platform
  • SOAR, security orchestration, security automation platform.
  • Threat Intelligence platform, Security Incident Response Platform

DS2: Endpoint Sensor

Collaborate and accelerate the identification of suspicious behaviors, facilitate better coordination of defenses, and provide better protection against targeted attacks and zero-days.

  • Machine learning to identify and prevent new malware
  • Security that aligns with your top priorities
  • Real-time forensics investigation

DS3: Threat Intel

Trellix Insights powered by best in class intelligence capabiltites drives your Security Operations Processes with native, integrated and currated threat intelligence.

  • Native: Realtime Threat Intelligence Assessments
  • Integrated: Flexible and Accessible APIs
  • Curated: Best-In-Class Research yields actionable Threat Intelligence

DS4: Data Protection Sensor

Trellix Data & Users Security gives you real-time visibility and security of data, protecting against data leakage through dynamic access adjustment, intelligent threat identification, and automated response.

  • Protects data everywhere
  • Applies intelligence at scale
  • Adapts across the enterprise

DS5: Network Sensor

Detection On Demand is a threat detection cloud service that scans content on demand to identify resident malware.

  • Detects threats others miss
  • Alerts that matter
  • Security your way

DS6: Open Sensors

Trellix Open XDR Platform helps you secure your internal networks, cloud infrastructure and services, industrial control systems, and air gapped networks.

  • Native: Realtime Threat Intelligence Assessments
  • Integrated: Flexible and Accessible APIs
  • Curated: Best-In-Class Research yields actionable Threat Intelligence

DS7: Multi Cloud

Trellix Cloudvisory is a control center for cloud security management that delivers visibility, compliance and governance to any cloud environment.

  • Go (Cloud) Native
  • Trust, but Verify
  • Detect and Respond

DS8: Email Sensor

Email Security leverages the industry’s best detection and incident response capabilities to protect email infrastructure against the wide range of threats facing organizations.

  • Stops advanced threats other solutions miss
  • Rapidly adapts to the evolving threat landscape
  • Consolidates your email security stack single vendor solution