Trellix logo
Trellix Logo
Trellix CEO
Our CEO on Living Security

Trellix CEO, Bryan Palma, explains the critical need for security that’s always learning.

Gartner Marketplace Guide (XDR)
Gartner® Report: Market Guide for XDR

As per Gartner, "XDR is an emerging technology that can offer improved threat prevention, detection and response."

Trellix Launches Advanced Threat Research Center
Trellix Launches Advanced Research Center

Trellix announced the establishment of the Trellix Advanced Research Center to advance global threat intelligence.

The Threat Report - Fall 2022
Latest Report

Trellix Advanced Research Center analyzes Q3 2022 threat data on ransomware, nation-states, sectors, vectors, LotL, MITRE ATT&CK techniques, and emails.

Complete Data Protection

Comprehensive endpoint encryption.

Protect against data loss and theft

Secure Critical Data

Available in two suites, Trellix Complete Data Protection keeps data safe with enterprise-grade drive encryption, access control, and user behavior monitoring.

Manage Endpoint Encryption with a Single Console

Manage Apple FileVault on macOS and Microsoft BitLocker on Windows PCs via Trellix ePolicy Orchestrator.

Protect Data on Removable Media and the Cloud

Secure network file shares and protect removable media such as USB flash drives and data in cloud storage services.

Robust Data Protection

Trellix Complete Data Protection—Advanced features data loss prevention, full-disk encryption, device control, and protection for cloud storage.

Protect Data from Loss and Theft

Render data unreadable in the event of device loss or theft. Our enterprise-grade endpoint encryption solution is FIPS 140-2 and Common Criteria EAL2+ certified.

Encrypt Removable Media, File Shares, and Cloud Data

Control the specific file types and folders to encrypt or block. Encrypt files to cloud storage services such as Box, Dropbox, Google Drive, and Microsoft OneDrive.

Product Features

Gain Control Over Data

Monitor and regulate how employees access, use, and transfer data via common channels, such as email, instant messages, printing, and USB drives—both in and away from the office.

Advanced Reporting and Auditing

Monitor real-time events and generate detailed reports that show auditors and senior management compliance with internal and regulatory privacy requirements.

Simple Security and Policy Management

Establish and enforce data protection policies while centralizing data security management.

Complete Data Protection suites

Trellix Complete Data Protection
Trellix Complete Data Protection—Advanced
Trellix Complete Data Protection
Trellix Complete Data Protection—Advanced
Drive Encryption

Removable Media Encryption

File, Folder, and Cloud Storage Encryption

FileVault and BitLocker Management

Centralized Management

Device Control

Data Loss Prevention

More Information