Trellix logo
Trellix Xpand Live
Register Now

September 27-29, 2022 ARIA Hotel & Casino Save the date and start planning to align with our leadership teams to learn our vision for a new kind of cybersecurity and learn more about our innovations in cyber intelligence and XDR architecture.

Gartner Magic Quadrant for Endpoint Protection Platforms
Gartner MQ (Endpoint)

Download the Magic Quadrant report, which evaluates the 19 vendors based on ability to execute and completeness of vision.

Gartner Marketplace Guide (XDR)
Gartner® Report: Market Guide for XDR

As per Gartner, "XDR is an emerging technology that can offer improved threat prevention, detection and response."

The Threat Report - Summer 2022
Latest Report

Our Summer 2022 threat report details the evolution of Russian cybercrime, research into medical devices and access control systems, and includes analysis of email security trends.

Critical Flaws in Widely Used Building Access Control System
Critical Flaws in Widely Used Building Access Control System

At Hardwear.io 2022, Trellix researchers disclosed 8 zero-day vulnerabilities in HID Global Mercury access control panels, allowing them to remotely unlock and lock doors, modify and configure user accounts and subvert detection from management software.

Trellix CEO
Our CEO on Living Security

Trellix CEO, Bryan Palma, explains the critical need for security that’s always learning.

Trellix Xpand Live
Register Now

September 27-29, 2022 ARIA Hotel & Casino Save the date and start planning to align with our leadership teams to learn our vision for a new kind of cybersecurity and learn more about our innovations in cyber intelligence and XDR architecture.

Trellix Endpoint Detection and Response (EDR)

Endpoint threat detection, investigation, and response—modernized.

2021 Gartner Magic Quadrant for EEP:   Read Report Now

AI-guided threat investigation

Reduce Alert Noise

Reduce the time to detect and respond to threats. Trellix EDR helps security analysts quickly prioritize threats and minimize potential disruption.

Do More with Existing Resources

Guided investigation automatically asks and answers questions while gathering, summarizing, and visualizing evidence from multiple sources—reducing the need for more SOC resources.

Low-Maintenance Cloud Solution

Cloud-based deployment and analytics enables your skilled security analysts to focus on strategic defense, instead of tool maintenance. Benefit from implementing the right solution for you.

 

Gartner® Report: Market Guide for Extended Detection and Response

Download Report

Product Tour

Product Features

Simplify Deployment

Use an existing Trellix ePolicy Orchestrator (Trellix ePO) on-premises management platform or SaaS-based Trellix ePO to reduce infrastructure maintenance.

Focus on Incident Response

Remove administration overhead, allowing more senior analysts to apply their skills to the threat hunt and accelerate response time.

Gain Visibility into Emerging Threats

Monitor endpoint activity, detect suspicious behavior, make sense of high-value data, and understand context.

Trellix EDR

AI-guided Investigations

Trellix EDR provides machine-generated insights into attacks..

Grow Analysts' Skills

Guided investigations help security analysts continually learn and fine-tune their skills.

Remove Manual Processes

Automate and remove the manual tasks to gather and analyze evidence.

Trellix EDR related products

Trellix Endpoint

Trellix Endpoint provides enhanced threat detection and correction capabilities to augment basic native security controls in Microsoft Windows.

Learn more

Trellix Mobile

Get on-device threat detection and protection for all iOS and Android mobile devices. Trellix Mobile protects against application and network threats, using machine learning algorithms to help identify malicious behavior.

Learn more

Trellix ePO

Trellix ePO is a software-as-a-service (SaaS), centralized security management console that enables management of Microsoft Defender along with Trellix security technologies, and extends security visibility and control from device to cloud.

Learn more

Complete Protection with Endpoint Security

Complete Protection with Endpoint Security

Get an automated assessment of your security posture risks from device to cloud against top threats and campaigns to find exactly where you have potential gaps in your countermeasures.

Watch Video

Take the next steps to future-proof your defenses.

Contact Us