Trellix Introduction Video
Trellix Introduction

A living security platform with a pulse that is always learning and always adapting.

Gartner Magic Quadrant for Endpoint Protection Platforms
Gartner MQ (Endpoint)

Download the Magic Quadrant report, which evaluates the 19 vendors based on ability to execute and completeness of vision.

Gartner Marketplace Guide (XDR)
Gartner® Report: Market Guide for XDR

As per Gartner, "XDR is an emerging technology that can offer improved threat prevention, detection and response."

Trellix Threat Labs Research Report: April 2022

Trellix Threat Labs Research Report: April 2022

Our report on the rise of cyberattacks in the fourth quarter and Ukraine in the start of the new year.

Cyberattacks Targeting Ukraine and HermeticWiper Protections

Cyberattacks Targeting Ukraine and HermeticWiper Protections

Analysis from the Trellix Advanced Threat Research (ATR) team of wipers deployed in Ukraine leading to likely connection between Whispergate, and HermeticWiper.

Trellix CEO

Our CEO on Living Security

Trellix CEO, Bryan Palma, explains the critical need for security that’s always learning.

Trellix Introduction Video
Trellix Introduction

A living security platform with a pulse that is always learning and always adapting.

Trellix
Complete Data Protection

Comprehensive endpoint encryption.

Protect against data loss and theft

Secure Critical Data

Available in two suites, Trellix Complete Data Protection keeps data safe with enterprise-grade drive encryption, access control, and user behavior monitoring.

Manage Endpoint Encryption with a Single Console

Manage Apple FileVault on macOS and Microsoft BitLocker on Windows PCs via Trellix ePolicy Orchestrator.

Protect Data on Removable Media and the Cloud

Secure network file shares and protect removable media such as USB flash drives and data in cloud storage services.

Robust Data Protection

Trellix Complete Data Protection—Advanced features data loss prevention, full-disk encryption, device control, and protection for cloud storage.

Protect Data from Loss and Theft

Render data unreadable in the event of device loss or theft. Our enterprise-grade endpoint encryption solution is FIPS 140-2 and Common Criteria EAL2+ certified.

Encrypt Removable Media, File Shares, and Cloud Data

Control the specific file types and folders to encrypt or block. Encrypt files to cloud storage services such as Box, Dropbox, Google Drive, and Microsoft OneDrive.

Product Features

Gain Control Over Data

Monitor and regulate how employees access, use, and transfer data via common channels, such as email, instant messages, printing, and USB drives—both in and away from the office.

Advanced Reporting and Auditing

Monitor real-time events and generate detailed reports that show auditors and senior management compliance with internal and regulatory privacy requirements.

Simple Security and Policy Management

Establish and enforce data protection policies while centralizing data security management.

Complete Data Protection suites

Suite
Trellix Complete Data Protection
Trellix Complete Data Protection—Advanced
Trellix Complete Data Protection
Trellix Complete Data Protection—Advanced
Drive Encryption

Removable Media Encryption

File, Folder, and Cloud Storage Encryption

FileVault and BitLocker Management

Centralized Management

Device Control

Data Loss Prevention

More Information