Trellix logo
Trellix Xpand Live
Register Now

September 27-29, 2022 ARIA Hotel & Casino Save the date and start planning to align with our leadership teams to learn our vision for a new kind of cybersecurity and learn more about our innovations in cyber intelligence and XDR architecture.

Gartner Magic Quadrant for Endpoint Protection Platforms
Gartner MQ (Endpoint)

Download the Magic Quadrant report, which evaluates the 19 vendors based on ability to execute and completeness of vision.

Gartner Marketplace Guide (XDR)
Gartner® Report: Market Guide for XDR

As per Gartner, "XDR is an emerging technology that can offer improved threat prevention, detection and response."

The Threat Report - Summer 2022
Latest Report

Our Summer 2022 threat report details the evolution of Russian cybercrime, research into medical devices and access control systems, and includes analysis of email security trends.

Critical Flaws in Widely Used Building Access Control System
Critical Flaws in Widely Used Building Access Control System

At Hardwear.io 2022, Trellix researchers disclosed 8 zero-day vulnerabilities in HID Global Mercury access control panels, allowing them to remotely unlock and lock doors, modify and configure user accounts and subvert detection from management software.

Trellix CEO
Our CEO on Living Security

Trellix CEO, Bryan Palma, explains the critical need for security that’s always learning.

Trellix Xpand Live
Register Now

September 27-29, 2022 ARIA Hotel & Casino Save the date and start planning to align with our leadership teams to learn our vision for a new kind of cybersecurity and learn more about our innovations in cyber intelligence and XDR architecture.

Trellix Data Loss Prevention (DLP) Prevent

Secure your data through stronger policy enforcement.

Enforce network DLP policies

Integrate with Web Proxies and Message Transfer Agents (MTAs)

Combine a range of commercial email and web gateway products by using simple mail transfer protocol (SMTP) and internet content adaptation protocol (ICAP).

Perform Detailed Forensics

Use redesigned Capture technology to act as a digital recorder and replay after-the-fact DLP incidents for thorough investigation.

Simplified Management and Remediation

It's centrally managed by ePolicy Orchestrator and shares the same policy engine with Trellix DLP Endpoint.

Gain Control of Data

Protect sensitive data across all your channels, including email, blogs, portals, FTP transfers, and more.

Ensure Consistent Policy Enforcement

Establish data security policies to ensure that data protection is uniformly enforced.

Remediate Policy Violations

If a data protection policy violation is detected, Trellix DLP Prevent can encrypt, redirect, quarantine, or block the data transmission in question.

Product Features

Support Compliance

Built-in policy controls support compliance with privacy regulations and reduce the likelihood of data breaches, while enabling legitimate data use.

Product Support