Trellix Introduction Video
Trellix Introduction

A living security platform with a pulse that is always learning and always adapting.

Gartner Magic Quadrant for Endpoint Protection Platforms
Gartner MQ (Endpoint)

Download the Magic Quadrant report, which evaluates the 19 vendors based on ability to execute and completeness of vision.

Gartner Marketplace Guide (XDR)
Gartner® Report: Market Guide for XDR

As per Gartner, "XDR is an emerging technology that can offer improved threat prevention, detection and response."

Trellix Threat Labs Research Report: April 2022

Trellix Threat Labs Research Report: April 2022

Our report on the rise of cyberattacks in the fourth quarter and Ukraine in the start of the new year.

Cyberattacks Targeting Ukraine and HermeticWiper Protections

Cyberattacks Targeting Ukraine and HermeticWiper Protections

Analysis from the Trellix Advanced Threat Research (ATR) team of wipers deployed in Ukraine leading to likely connection between Whispergate, and HermeticWiper.

Trellix CEO

Our CEO on Living Security

Trellix CEO, Bryan Palma, explains the critical need for security that’s always learning.

Trellix Introduction Video
Trellix Introduction

A living security platform with a pulse that is always learning and always adapting.

Antipiracy Policy

Software piracy is a significant problem costing the industry billions of dollars annually. Many businesses and organizations are unaware they may be using illegal software. Illegally distributing and using software is a significant problem that hurts us and all software publishers. Trellix is committed to educating our authorized users and, when necessary, bringing those violating our software licenses into compliance.

Types of Software Piracy

Software piracy is the illegal distribution and/or reproduction of software. Purchasing software is purchasing a license to use the software. That license spells out how you may legally use such software. Any time someone uses the software beyond the scope of the license, that person or company is violating the license agreement and copyright law. Whether software piracy is deliberate or not, it is still illegal and punishable by law. Software piracy comes in many forms; the types that impact our business include:

  1. Corporate or End User:
    • Underreporting software installations acquired through volume purchase agreements
    • Making additional copies of the software without having the proper number of licenses
    • Swapping disks inside or outside of work

  2. Subscription Licensing:
    • Using subscription-licensed software past the expiration date.

  3. Prime Support Entitlement:
    • Accessing support entitlements (e.g., .DATs, super .DATs, updates, or upgrades) without a current agreement.

  4. Internet Piracy:
    • Auction sites that offer counterfeit and/or outdated products
    • Peer-to-peer networks that allow for unauthorized file sharing

  5. Counterfeiting:
    • Someone attempts to copy the product and packaging to look like a Trellix original.

  6. Hard-Disk Loading:
    • Some unscrupulous suppliers illegally install software to help sell computers. While many suppliers are authorized to install products onto the machines they sell, honest vendors supply the software via agreements with software vendors.

First Steps to Effective Software Asset Management

To effectively manage your software assets, you must know what type of our products you have installed on your network. Regular audits can help you determine this. And though you may have policies in place that prohibit employees from making unauthorized copies, those policies do not stop employees from illegally copying software.

Many software audit tools are available to help you determine what type of software is installed on your network. Running these tools and comparing the results to your license documentation is a good first step in determining whether you are in compliance. If you find you are not in compliance, we will work with you to acquire the appropriate licenses necessary to get back in compliance.

Where Can I Buy Authorized Software

Go to Trellix’s website for more information on how to purchase our products and services through an authorized channel partner.

Legal Ramifications

Software piracy can subject an individual to arrest and criminal prosecution, with fines of up to $250,000 USD and prison term of up to five years. An infringer can also be subject to civil liability, including the payment of lost profits plus the infringer’s profits, or statutory damages of up to $150,000 USD per product, and attorneys’ fees.

Reporting A Case Of Software Piracy

Please notify our License Compliance Services Group if you are aware of any situation where our software is being used or distributed illegally. Reporting this type of action helps us reduce the overall piracy problem and enables us to better support and modify our existing products.

Additional Resources

For more information, tools, and resources, visit:

  • Business Software Alliance
  • Software & Information Industry Association