Trellix logo
Trellix CEO
Our CEO on Living Security

Trellix CEO, Bryan Palma, explains the critical need for security that’s always learning.

Gartner Marketplace Guide (XDR)
Gartner® Report: Market Guide for XDR

As per Gartner, "XDR is an emerging technology that can offer improved threat prevention, detection and response."

Trellix Launches Advanced Threat Research Center
Trellix Launches Advanced Research Center

Trellix announced the establishment of the Trellix Advanced Research Center to advance global threat intelligence.

The Threat Report - Fall 2022
Latest Report

Trellix Advanced Research Center analyzes Q3 2022 threat data on ransomware, nation-states, sectors, vectors, LotL, MITRE ATT&CK techniques, and emails.

Trellix CEO
Our CEO on Living Security

Trellix CEO, Bryan Palma, explains the critical need for security that’s always learning.

Webinars

Keep up with the latest innovations and announcements from Trellix.

Trellix Spotlight Series: Endpoint Security - Adaptive Threat Protection Best Practices

Date: December 15, 2022 - 10AM CT
Webinar Type: Live Webinar
Speakers: Aaron Kattawar, Sr Technical Support Engineer - Dynamic Endpoint @Trellix

Installing and configuring security software can present unexpected challenges. When that software has as large an impact as your Endpoint Security software, we know that performance considerations and fine tuning become frequent topics of conversation. That’s why the Trellix Spotlight Series is pleased to invite you to our upcoming webinar which will focus on the best practices for installing and configuring Adaptive Treat Protection (ATP) for Endpoint Security (ENS). You will also get some key recommendations for the journey – as well as get the chance to ask questions to our experienced professional. This is all designed to ensure that you're taking the best advantage of the protection software at your disposal.

In this webinar, you will learn about:

  • ENS ATP Overview
  • Configuration
  • Best Practices
Register Now

Trellix Spotlight Series: Optimize Your Trellix Environment with Diagnostics and Reporting with Health Watch

Date: December 12, 2022 - 9AM CT
Webinar Type: Live Webinar
Speakers: Zak Krider, Mgr, Professional Service Delivery, @ Trellix
and Mike Meikle, Professional Service Architect, @Trellix

Security technology and risks are ever evolving, and the velocity of new threats is moving faster than ever before. As new tools and technologies are added to your security infrastructure, your Trellix ePolicy Orchestrator (ePO), Trellix Endpoint Security (ENS), Trellix Data Loss Prevention, Trellix Application Control and Trellix Network Security Platform (NSP) environments often go unmanaged due to a shortage of skilled IT staff and/or lack of time or product training. Join Trellix experts, Zak Krider and Mike Meikle, who will discuss how the Trellix Health Watch Service can proactively help you achieve a consistent, up-to-date, and optimized environment.

Register Now

Trellix Spotlight Series: Application and Change Control for Linux - Installation Process And Troubleshooting Issues

Date: December 8, 2022 - 10AM CT
Webinar Type: Live Webinar
Speakers: Bhavani Shankar Sharma, Technical Support Engineer @Trellix
and Bharath T, Technical Support Engineer @Trellix

Join us as Technical Support Engineers Bhavani Shankar Sharma and Bharath T present and discuss the Application and Change Control for Linux Installation Process and Troubleshooting Issues. Topics include – Installation process of MACC, Installation with SE Linux in Enforced status in Linux, Installing of MACC with Build_Target.sh to prepare MACC for unsupported/Unlisted kernels.

Register Now

Trellix: Sandboxing | Empfohlene Vorgehensweisen

Date: November 24, 2022
Webinar Type: On-Demand Webinar
Speakers: Jerzy Michno, Security Engineer, Trellix
Harald Swieca, Senior Security Engineer @Trellix

Mit der Intelligent Sandbox-Lösung von Trellix kann Ihr Unternehmen hochentwickelte getarnte Malware erkennen und mithilfe von Bedrohungsinformationen Aktionen und Schutzmaßnahmen starten.

Das sind nur einige der Fragen, die uns besonders häufig gestellt werden.

Sehen Sie sich diese Webinar-Aufzeichnung an, wenn wir über die Konfiguration und Problembehebungsfunktionen der Trellix Intelligent Sandbox-Lösung sprechen.

Watch Now

Trellix: Sandboxing | Meilleures pratiques

Date: November 23, 2022
Webinar Type: On-Demand Webinar
Speakers: Fabrice Bankhauser, Senior Systems Engineer, Trellix
Olivier Morel, Sales Engineer, Trellix

Trellix Intelligent Sandbox permet non seulement de détecter les malwares avancés furtifs, mais aussi de traduire les informations sur les menaces en actions afin d'assurer à l'entreprise une protection immédiate.

Ce ne sont là que quelques-unes des questions qui nous sont souvent posées.

Regardez cet enregistrement pour en savoir plus sur la configuration et la résolution de problèmes de la solution Trellix Intelligent Sandbox.

Watch Now

Trellix: Sandboxing | Best Practices

Date: November 22, 2022
Webinar Type: On-Demand Webinar
Speakers: Peter Helms, Senior Security Engineer, Trellix
Jerzy Michno, Security Engineer, Trellix

Intelligent Sandbox by Trellix enables your organization to detect advanced, evasive malware and convert threat information into immediate action and protection.

These are just some of the questions we are asked most often.

Watch this recording, when we'll talk about configuration and troubleshooting capabilities of the Trellix Intelligent Sandbox solution.

Watch Now

Cyber Threat Intelligence Briefing: Update for France

Date: November 17, 2022
Webinar Type: On-Demand Webinar
Speakers: Tomer Shloman, Security Researcher @Trellix
Evelyne Lescuyer, Enterprise Sales Engineer @Trellix

Le paysage des cybermenaces est en constante évolution, et il est important de rester informé des dernières campagnes d'attaques et d'être conscient des cybermenaces les plus importantes.

Regardez cet enregistrement pour faire un point sur le paysage des cybermenaces en France, en compagnie de nos ingénieurs, du Centre de Recherche Avancée Trellix, en charge des cybermenaces.

Watch Now

Trellix Spotlight Series: Leveraging EDR Integrations into SOC Processes to Build a Better Defense

Date: November 17, 2022 - 11AM CT
Webinar Type: Live Webinar
Speakers: Matt Smith, Sr Mgr, Professional Services @Trellix

When adding another SecOps tool into the day-to-day mix of tools and techniques used during investigation and triaging threats, a common concern for the SOC is how they can best incorporate the data and features of that tool into their processes so that they aren't duplicating functionality provided by an assortment of a mixture of free and commercial tools and they are getting the full value of the data gathered from the tool into the defense layer to quickly preemptively block and interrupt attacks before they need to be triaged. MVISION EDR offers several features natively and externally via API integration which can provide the SOC the ability to consolidate their tools and techniques used during investigation and triage as well as interact directly with the defense layer to save the business both on time and costs when tackling threats.

Learn how MVISION EDR is being used by Professional Services Consulting to enable SOCs to both collect information needed during DFIR processes as well as provide abilities to react to threat activity using a combination of MVISION EDR, McAfee DXL, McAfee ePO, and common tools found in many SOC toolkits as well as serve as a data stream to other Threat Intelligence, Data Analysis and defensive platforms.

Register Now

Cyber Threat Intelligence Briefing: Update for the Netherlands

Date: November 16, 2022
Webinar Type: On-Demand Webinar
Speakers: Tomer Shloman, Security Researcher @Trellix
Evelyne Lescuyer, Enterprise Sales Engineer @Trellix

The Cyber Threat landscape is constantly changing, and it's important to stay informed of the latest attack campaigns and to be aware about the most impactful Cyber threats.

Watch this recording as the Trellix Advanced Threat Research team and Cyber Threat Management Engineers give an update on the Cyber Threat Landscape for the Netherlands.

Watch Now

Cyber Threat Intelligence Briefing: Update for South Africa, November Edition

Date: November 15, 2022
Webinar Type: On-Demand Webinar
Speakers: Tomer Shloman, Security Researcher @Trellix
Carlo Bolzonello, Threat Intelligence Specialist and Country Leader South Africa @Trellix

The Cyber Threat landscape is constantly changing, and it's important to stay informed of the latest attack campaigns and to be aware about the most impactful Cyber threats.

Watch this recording as the Trellix Advanced Threat Research team and Cyber Threat Management Engineers give an update on the Cyber Threat Landscape for South Africa.

Watch Now

Trellix Spotlight Series: Malware - Ransomware

Date: November 15, 2022 - 9AM CT
Webinar Type: Live Webinar
Speakers: Sean Campbell, Sr. Advanced Malware Technical Support Engineer @Trellix

Join us as Advanced Malware Technical Support Engineer, Sean Campbell, presents and discusses Ransomware as well as mitigation steps for containment using Trellix Endpoint Security technologies. We'll discuss Ransomware tactics, techniques, and procedures (TTPs), along with common Endpoint Security countermeasures for an overall strategic approach.

Register Now

Trellix: Prévention des fuites de données – Meilleures pratiques

Date: November 10, 2022
Webinar Type: On-Demand Webinar
Speakers: Olivier Morel, Pre-Sales Engineer @Trellix

La protection des données est la priorité n° 1 de nos clients. Les solutions Trellix Data Loss Prevention vous aident à répondre à vos exigences en matière de sécurité, de conformité et de protection des données critiques. Malgré tout, l'implémentation d'une solution DLP peut constituer un véritable casse-tête.

Regardez cet enregistrement à l'occasion duquel Olivier Morel, Solution Engineers et Data Protection Specialists chez Trellix, présentera quelques meilleures pratiques.

Au programme

  • Développement de programmes DLP
  • Gestion du cycle de vie des stratégies DLP
  • Obtention rapide de résultats avec la DLP
  • Cas d'utilisation courants et procédure d'implémentation
Watch Now

Trellix: E-Mail-Sicherheit | Empfohlene Vorgehensweisen

Date: November 10, 2022
Webinar Type: On-Demand Webinar
Speakers: Harald Swieca, Senior Security Engineer @Trellix
Josef Gillhuber, Senior Security Engineer @Trellix

E-Mail-Sicherheit ist nach wie vor ein hochaktuelles Thema!

Auch wenn 2022 in der Welt der Cyber-Sicherheit mehr von Weiterentwicklungen als von grundlegend neuen Bedrohungen geprägt wurde, verstetigten sich Techniken und die Häufigkeit von Ransomware-Angriffen, während sich Cyber-Angriffe mit dem Beginn des russisch-ukrainischen Kriegs intensivierten. Angreifer machen vor nichts mehr halt: Allein im Gesundheitsbereich stieg die Zahl der Ransomware-Angriffe im vergangenen Jahr um 650%. Und 75% der Ransomware-Angriffe beginnen mit dem Öffnen einer verhängnisvollen E-Mail. Aber wie lässt sich das Risiko einer Infektion senken, damit es erst gar nicht so weit kommt?

In unserem Webinar werden wir Ihnen anhand eines konkreten Falls demonstrieren, welche Risiken ein Unternehmen auch dann eingeht, wenn es sich aufgrund seines Schutzniveaus durch die aktiven Absicherungsmaßnahmen seines E-Mail-Anbieters in Sicherheit wähnt. Außerdem werden wir Ihnen zeigen, wie Sie das Risiko einer Infektion umgehend durch Verstärkung des Schutzniveaus Ihres Microsoft 365-Messagings reduzieren können.

Und das erwartet Sie in diesem Webinar:

  • Aktuelle Trends im unternehmensinternen E-Mail-Management
  • Konkretes Fallbeispiel eines Unternehmens, das seine E-Mails in einen abgesicherten Cloud-Dienst migriert hat
  • Effektiver Endpunktschutz mit Trellix Email Security
  • Betriebliche Effizienz durch Orchestrierung und Automatisierung der Neutralisierung von Ransomware-Angriffen
Watch Now

Trellix: Sécurité des e-mails | Meilleures pratiques

Date: November 9, 2022
Webinar Type: On-Demand Webinar
Speakers: Jérôme Delaville, Senior Systems Engineer @Trellix

La Protection Email reste d’actualité !

Alors que des outils et services tels que Microsoft Office 365 se démocratisent dans l’ensemble des entreprises – grandes ou petites, et que le télétravail n’a jamais eu autant le vent en poupe, les employés n’ont jamais autant mis à risque le réseau de leur société par le biais de ce canal de communication qui leurs permet de travailler de n’importe où, n’importe quand et depuis n’importe quel poste.

Bien que l’année 2022 dans le monde de la Cybersécurité ait plus été une évolution qu’une révolution, les techniques et la prévalence des attaques de type ransomware se confirment tandis que les cyber-attaques en lien avec la guerre russo-ukrainienne s’intensifient. Ainsi les attaquants n’ont plus de limites infranchissables, le ransomware connaît une croissance annuelle de 650 % pour le seul secteur de la santé, et 75% des attaques de ransomwares débutent par la réception d'un email malicieux. Mais comment réduire le risque d'infection avant qu'il ne soit trop tard ?

Au travers d’un cas concret réel, nous démontrerons dans ce webinar les risques encourus par une entreprise alors même qu’elle se sent en sécurité de par son niveau de protection actif chez son fournisseur email ; puis nous vous montrerons comment réduire rapidement le risque d'infection grâce au renforcement de la protection de votre messagerie Microsoft Office 365.

Découvrez lors de ce webinar :

  • Les grandes tendances actuelles de la gestion de l’Email en entreprise
  • Un cas concret d’une société ayant migré ses emails dans un service Cloud sécurisé
  • La protection effective en dernière barrière grâce à Trellix Email Security
  • L’efficacité opérationnelle grâce à l'orchestration et l’automatisation de la neutralisation des attaques de type ransomware
Watch Now

Trellix: E-mail Security | Best Practices

Date: November 8, 2022
Webinar Type: On-Demand Webinar
Speakers: Benjamin Marandel, Solution Architect EMEA @Trellix

Email Protection is still relevant!

As tools and services, such as Microsoft Office 365, become widely available to businesses large and small, and as remote working become more popular, email is a lifeblood of corporate communication and the main entry point for attackers.

In 2022 ransomware is growing at an annual rate of 650% in the healthcare sector alone, and 75% of ransomware attacks begin with the receipt of a malicious email. But how do you reduce the risk of infection before it's too late?

In this webinar, we will demonstrate the risks incurred by a company even if it feels safe with its current email protection level; then we will show you and how to quickly reduce the risk of infection by strengthening the protection of Microsoft Office 365 email service.

During this webinar you will learn:

  • The current trends in email security management in companies
  • A case study of a company that migrated its email infrastructure to a secure cloud service
  • Effective last mile protection with Trellix Email Security
  • Operational efficiency through orchestration and automation of ransomware attack neutralization
Watch Now

Trellix: Helix - Meilleures pratiques

Date: November 3, 2022
Webinar Type: On-Demand Webinar
Speakers: Nicolas Stricher, EMEA XDR Solution Architect @Trellix

Les deux années hors du commun que nous venons de vivre ont vu le périmètre de l'entreprise se dissoudre face à la migration accélérée vers le cloud et à l'adoption croissante du télétravail. Etendant toujo urs plus la surface d'attaque.

Aujourd’hui, les équipes SecOps se heurtent à plusieurs obstacles :

  • Nombre trop élevé d'alertes avec faux positifs
  • Absence d'intégration de trop nombreux outils
  • Manque de visibilité rendant fastidieuse l'agrégation des données pour identifier une compromission
  • Manque de contexte empêchant une réaction rapide face à une compromission
Watch Now

Trellix: Data Loss Prevention – Empfohlene Vorgehensweisen

Date: October 27, 2022
Webinar Type: On-Demand Webinar
Speakers: Oliver Stuck, Senior Security/Data Protection Engineer @Trellix
Alexander Haug, Senior Security/Data Protection Engineer @Trellix

Datenschutz ist das wichtigste Ziel unserer Kunden – und mit Trellix Data Loss Prevention-Lösungen können Sie Ihre Anforderungen an Sicherheit, Compliance und den Schutz kritischer Daten erfüllen. Die Implementierung einer DLP-Lösung kann jedoch komplex sein.

Sehen Sie sich diese Webinar-Aufzeichnung an, wenn Oliver Stuck und Alexander Haug, Solution Engineers und Data Protection Specialisten bei Trellix, einige Vorgehensweisen empfiehlen.

Folgende Themen werden besprochen:

  • Entwicklung von DLP-Programmen
  • Lebenszyklus und Verwaltung von DLP-Richtlinien
  • Schnelle und effektive Maßnahmen mit DLP
  • Typische Anwendungsszenarien und Implementierungsschritte
Watch Now

Trellix: Data Loss Prevention - Best Practices

Date: October 25, 2022
Webinar Type: On-Demand Webinar
Speakers: Leon Matthasen, Senior Pre-Sales Engineer @Trellix
Adrian Culley, Senior Pre-Sales Engineer @Trellix

Protecting data is our customers number one goal and Trellix Data Loss Prevention solutions are a key to meeting your security, compliance, and critical data protection requirements. However, implementing a DLP solution can be daunting.

Watch this recording as Trellix Solution Engineers and Data Protection specialist Leon Matthasen and Adrian Culley describe some best practices.

Best Practice Topics:

  • DLP program development
  • DLP policy lifecycle and management
  • Quick wins with DLP
  • Common Use Cases and how to implement
Watch Now

Data Protection - der Weg aus dem Anforderungs-Dschungel

Date: October 20, 2022
Webinar Type: On-Demand Webinar
Speakers: Oliver Stuck, Data Protection Specialist @Trellix
Alexander Haug, Senior Security Engineer EMEA @Trellix

Cyber-Kriminelle finden kontinuierlich neue Möglichkeiten, um Zugriff auf Unternehmensressourcen zu erhalten, Daten zu stehlen oder Systeme zu kompromittieren. Im Zuge von HomeOffice, Cloud-Anwendungen und Zero Trust-Ansätzen spielt daher der Endpunkt und vor allem der Schutz von Daten eine übergreifende Rolle.

Denn eines ist klar: Egal, ob es sich um Daten im allgemeinen Sinne oder um Geistiges Eigentum (Intelectual Property) handelt - jeder Sicherheitsvorfall ist gleichzeitig auch ein Datenschutzvorfall.

Sehen Sie sich diese Webinar-Aufzeichnung an, und erfahren Sie, welche Anforderungen Sie zum Thema Datenschutz erwarten und wie Trellix Sie hierbei unterstützen kann.

Watch Now

cXc Security Bites: Data Protection

Date: October 19, 2022
Webinar Type: On-Demand Webinar
Speakers: Mo Cashman, Principal Engineer @Trellix
Ligia Forgaciu, DLP Program Advisor and Pro Services Architect @Trellix
Oliver Stuck, Data Protection Specialist @Trellix
Alexander Haug, Senior Security Engineer EMEA @Trellix
Gus Arias, XDR Solution Architect @Trellix

Building a strategic Data Protection Program encompasses comprehensive visibility, detection, and optimized response processes and controls. This means having a Data Protection Program that incorporates more than DLP product. A robust Data Protection program that has the right Technical Controls, Processes, Integration with Business Units, and Provides Data-Centric Extended Detect and Respond for Sec Ops will help ensure protection of your organization's crucial data.

Watch this recording as the Trellix Data Protection Solution Architects and Specialists deliver an in-depth data protection workshop that will help you build the right program foundations.

Watch Now

Trellix: Helix - Empfohlene Vorgehensweisen

Date: October 13, 2022
Webinar Type: On-Demand Webinar
Speakers: Michael Stanik, Senior Sales Engineer EMEA @Trellix
Christoph Kiechle, Senior Sales Engineer EMEA @Trellix

Während der besonderen Umstände der letzten zwei Jahre, haben sich nicht nur die Unternehmensgrenzen aufgelöst, die Cloud-Transformation und der Trend zum Home Office haben auch die Angriffsflächen erweitert. Ransomware-Akteure zielen nun auch aktiv auf kleine und mittlere Unternehmen ab, sodass die unternehmenseigenen Sicherheitskontrollen zur Abwehr solcher Angriffe mit aktuellen Daten und Living Security von Trellix neu ausgerichtet werden müssen.

Watch Now

Cyber Threat Landscape Briefing for the Kingdom of Saudi Arabia

Date: October 5, 2022
Webinar Type: On-Demand Webinar
Speakers: John Fokker, Principal Engineer & Head of Trellix Labs @Trellix
Hemant Pandya, Enterprise Sales Engineer @Trellix

The Cyber Threat landscape is constantly changing, and it's important to stay informed of the latest attack campaigns and to be aware about the most impactful Cyber threats.

Watch this recording as the Trellix Advanced Threat Research team and Cyber Threat Management Engineers give an update on the Cyber Threat Landscape for the Saudi Arabian Market.

Watch Now

Cyber Threat Intelligence Briefing: Aggiornamento per l'ITALIA

Date: October 4, 2022
Webinar Type: On-Demand Webinar
Speakers: John Fokker, Principal Engineer & Head of Trellix Lab @Trellix and Filippo Sitzia, SecOps Solution Architect @Trellix

Il panorama delle minacce informatiche è in continua e costante evoluzione. E piu che mai importante monitorare le recenti campagne d'attacco ed essere pronti ad affrontare le minacce cyber piu` pericolose.

Guarda la registrazione dove il Trellix Advanced Research Center team e i Cyber Threat Management Engineers danno un aggiornamento sui trend e sul panorama delle minacce in Italia.

Watch Now

Trellix Endpoint Security 10.7 - Meilleures pratiques

Date: September 20, 2022
Webinar Type: On-Demand Webinar
Speakers: Julien Bianco, Senior Security Engineer @Trellix

Dans le contexte du télétravail, des applications cloud et du Zero Trust, les terminaux jouent un rôle crucial en matière de sécurité. Les pirates trouvent sans cesse de nouvelles stratégies pour accéder aux ressources d’entreprise, dérober des données ou compromettre des systèmes. Souvent, le système client de l’employé constitue le point d’entrée — ou « patient zéro ». Il est donc essentiel de configurer votre solution de sécurité des terminaux de manière optimale, afin de renforcer autant que possible la protection qu’elle procure. La solution Trellix Endpoint Security offre de nombreuses possibilités à cet égard.

Mais par où commencer ?
Qu’entend-on par configuration optimale, et à quoi faut-il être attentif ?
Que faire si, une fois configurée, la solution ne fonctionne pas comme attendu ?

Ce ne sont là que quelques-unes des questions qui nous sont souvent posées. Regardez cet enregistrement pour en savoir plus sur les fonctionnalités de configuration et de résolution de problèmes de la solution Trellix Endpoint Security.

Watch Now

Trellix Endpoint Security 10.7 - Best Practices

Date: September 13, 2022
Webinar Type: On-Demand Webinar
Speakers: Heiko Brückle, Senior Security Engineer EMEA @Trellix and Konstantin Berger, Senior Security Engineer EMEA @Trellix

With hybrid working the new normal, combined with rapid adoption of cloud applications and zero trust approaches, endpoints plays a central role in security considerations. Hackers are constantly finding new ways to gain access to corporate resources, steal data or compromise systems. Often, an employee’s client system is the entry point – or ‘patient zero’. That’s why it is important to configure the endpoint security solution on the systems as securely as possible. Trellix’s endpoint security solution offers many possibilities here.

But where should you start?
What does the ‘best configuration’ look like, and what do you need to bear in mind?
What do you do if it doesn’t work as expected?

These are just some of the questions we are asked most often. Watch this recording to learn more about the configuration and troubleshooting capabilities of the Trellix Endpoint Security solution.

Watch Now

Przegląd zagrożeń cybernetycznych: aktualne informacje dla rynku polskiego, edycja wrzesień

Date: September 22, 2022
Webinar Type: On-Demand Webinar
Speakers: Tomer Shloman, Analityk cyberzagrożeń @Trellix and Piotr Tobiaszewski, inżynier ds. sprzedaży rozwiązań zabezpieczających @Trellix

Krajobraz cyberataków nieustannie się zmienia, dlatego ważne jest, by śledzić najnowsze kampanie cybernetyczne i mieć wiedzę na temat najpoważniejszych zagrożeń.

Obejrzyj nagranie i zobacz prezentację zespołu Trellix Advanced Research Center oraz inżynierów ds. zarządzania cyberzagrożeniami. Zapoznaj się z aktualnymi informacjami o krajobrazie zagrożeń w Polsce.

Watch Now

Cyber Threat Intelligence Briefing für den deutschen Markt, September-Ausgabe

Date: September 15, 2022
Webinar Type: On-Demand Webinar
Speakers: Tomer Shloman, Security Researcher @Trellix and Heiko Brückle, Senior Security Engineer Germany @Trellix

Um mit den dynamischen und raffinierten Sicherheitsbedrohungen Schritt halten zu können, ist es wichtig, die neuesten Cyber-Kampagnen im Auge zu behalten und sich über die wichtigsten Bedrohungen zu informieren.

Sehen Sie sich diese Webinar-Aufzeichnung an und erhalten Sie ein Update zur Bedrohungslandschaft im deutschen Markt.

Watch Now

Cyber Threat Intelligence Briefing: Update for Spain

Date: September 8, 2022 - 10AM CT
Webinar Type: On-Demand Webinar
Speakers: John Fokker - Principal Engineer & Head of Cyber Investigations ATR @Trellix and Javier Inesta - Security Sales Engineer @Trellix

The Cyber Threat landscape is constantly changing, and it's important to stay informed of the latest attack campaigns and to be aware about the most impactful Cyber threats.
Watch this recording as the Trellix Advanced Threat Research team and Cyber Threat Management Engineers give an update on the Cyber Threat Landscape for Spain.

Watch Now

Trellix Spotlight Series: Malware - Ransomware

Date: September 8, 2022 - 10AM CT
Webinar Type: Live Webinar
Speakers: Sean Campbell

Join us as Advanced Malware Technical Support Engineer, Sean Campbell, presents and discusses Ransomware as well as mitigation steps for containment using Trellix Endpoint Security technologies. We'll discuss Ransomware tactics, techniques, and procedures (TTPs), along with common Endpoint Security countermeasures for an overall strategic approach.

Watch Now

Trellix Spotlight Series: ENS for Linux - Installation Process and Troubleshooting

Date: August 31, 2022 10:00 AM CT
Webinar Type: Live Webinar
Speakers: Nitisha Awasthi, Revathi R

Protecting Endpoint security is the practice of safeguarding the data and workflows associated with the individual devices that connect to your network, including Linux systems. Join ENS for Linux experts Nitisha Awasthi and Revathi R as they discuss the process to install ENS for Linux. Topics include the installation process, kernel compilation process, installation with SELinux, and more.

Watch Now

Trellix Spotlight Series: Network Security Platform - Allow List_Block List Enhancements

Date: August 25, 2022 10:00 AM CT
Webinar Type: Live Webinar
Speakers: Vidya Lakshmi Vilvamani

Join Vidya Lakshmi Vilvamani, Technical Lead, as she gives you an in-depth look at the latest enhancements to the IP AllowList_BlockList in the NSP 10.1 M9 release. Vidya will cover the new and improved features in IP AllowList and BlockList, additional enhancements, as well as some applicable troubleshooting steps.

Watch Now

Trellix Spotlight Series: Network Security Platform - Device Manager Update

Date: July 21, 2022 - 10AM CT
Webinar Type: Live Webinar
Speakers: Matt Zipf - Master Technical Support Engineer

Join Matt Zipf, Master Technical Support Engineer, as he gives you an in-depth look at what’s new in NSP Device Manager version 10.1.7.55+. Matt will cover the new and improved features in the Device Manager user interface, new workflows for managing sensors, as well as steps to upgrade sensors in the Device Manager UI.

Watch Now

Trellix Spotlight Series: ENS for Linux - Troubleshooting System Utilization

Date: May 26, 2022 10:00 AM CT
Webinar Type: Live Webinar
Speakers: Vishnu VS and Aravind Kumarappan

Protecting Endpoint security is the practice of safeguarding the data and workflows associated with the individual devices that connect to your network, including Linux systems. Endpoint Security for Linux is a comprehensive security solution that protects your Linux systems and minimizes the risk of exposure to threats. Join ENS for Linux experts Vishnu VS and Aravind Kumarappan as they discuss how to troubleshoot CPU utilization in ENS for Linux. Topics include troubleshooting Disk, CPU and Memory utilization.

Watch Now

Trellix Endpoint Security 10.7 Best Practices

Date: April 29, 2022 10:00 AM CT
Webinar Type:On-Demand
Speakers: Tanja Hofmann - Lead Security Engineer Trellix and Konstantin Berger - Senior Security Engineer EMEA Trellix

Im Zuge von Home-Office, Cloud-Anwendungen und Zero Trust-Ansätzen spielt der Endpoint bei der Sicherheitsbetrachtung eine zentrale Rolle. Hacker finden kontinuierlich neue Möglichkeiten Zugriff auf Unternehmensressourcen zu erhalten, Daten zu stehlen oder Systeme zu kompromittieren. Oft ist ein Client-System eines Mitarbeiters der Einstiegspunkt – der Patient Zero. Daher ist es wichtig, die Endpoint Security-Lösung auf den Systemen möglichst sicher zu konfigurieren. Die Endpoint-Sicherheitslösung von Trellix bietet hier viele Möglichkeiten.
Doch wo sollen Sie beginnen?
Wie sieht die “beste Konfiguration” aus und was gibt es zu beachten?
Und was macht man, wenn es doch mal nicht so funktioniert wie es soll?
Das sind nur einige der Fragen, die uns am häufigsten gestellt werden. Sehen Sie sich diese Webinar-Aufzeichnung an, wenn wir über die Konfigurations- und Troubleshooting-Möglichkeiten von Trellix Endpoint Security sprechen werden.

Watch Now

Trellix Spotlight Series: Malware - Resurgence of Emotet

Date: March 16, 2022 10:00 AM CT
Webinar Type: Live Webinar
Speakers: Sean Campbell - Sr. Advanced Malware Technical Support Engineer

Organizations of all sizes are at risk from nation-states, hacktivists, organized crime, and malicious and accidental insider threats. Endpoint security is often seen as cybersecurity's frontline, and represents one of the first places organizations look to secure their enterprise networks. Join us as Advanced Malware Technical Support Engineer, Sean Campbell, presents and discusses the Emotet Trojan as well as mitigation steps for containment using Endpoint Security technologies. We'll discuss Emotet new tactics, techniques, and procedures (TTPs), along with common Endpoint Security countermeasures from a layered security approach.

Watch Now

Trellix Spotlight Series: ENS for Mac - Best Practices

Date: March 09, 2022 10:00 AM CT
Webinar Type: Live Webinar
Speakers: Gururaj MD – Sr Technical Support Engineer - Trellix & Hitesh Reddy – Technical Support Engineer - Trellix

Endpoint security is the practice of safeguarding the data and workflows associated with the individual devices that connect to your network, including Apple Macintosh systems. Endpoint Security for Mac is a comprehensive security solution that protects your Apple Macintosh endpoints and minimizes the risk of exposure to threats.

Join ENS for Mac experts Gururaj MD and Hitesh Reddy for an overview and look at some best practices for protecting your systems.

Topics include understanding jamf, exclusions for ENS for MAC, Firewall Debug log analysis, and more.

Watch Now