Trellix logo
Trellix Xpand Live
Register Now

September 27-29, 2022 ARIA Hotel & Casino Save the date and start planning to align with our leadership teams to learn our vision for a new kind of cybersecurity and learn more about our innovations in cyber intelligence and XDR architecture.

Trellix CEO
Our CEO on Living Security

Trellix CEO, Bryan Palma, explains the critical need for security that’s always learning.

Gartner Marketplace Guide (XDR)
Gartner® Report: Market Guide for XDR

As per Gartner, "XDR is an emerging technology that can offer improved threat prevention, detection and response."

The Threat Report - Summer 2022
Latest Report

Our Summer 2022 threat report details the evolution of Russian cybercrime, research into medical devices and access control systems, and includes analysis of email security trends.

Critical Flaws in Widely Used Building Access Control System
Critical Flaws in Widely Used Building Access Control System

At Hardwear.io 2022, Trellix researchers disclosed 8 zero-day vulnerabilities in HID Global Mercury access control panels, allowing them to remotely unlock and lock doors, modify and configure user accounts and subvert detection from management software.

Trellix CEO
Our CEO on Living Security

Trellix CEO, Bryan Palma, explains the critical need for security that’s always learning.

Trellix Xpand Live
Register Now

September 27-29, 2022 ARIA Hotel & Casino Save the date and start planning to align with our leadership teams to learn our vision for a new kind of cybersecurity and learn more about our innovations in cyber intelligence and XDR architecture.

Trellix Malware Analysis

Safely execute and analyze malware in a secure environment

Benefits

  • Gain Deep Insights to Detect and Prevent Future Cyber Attacks
    Stop the spread of attacks with auto-generated local attack profiles shared across the Trellix ecosystem and inform future prevention strategies with deeper insights into attacker tools and tactics.
  • Assess OS, Browser and Application Attacks
    Inspect common web objects, email attachments and files through a pre-configured, instrumented Microsoft Windows and Apple MacOS X virtual analysis environment.
  • Automate Analysis to Improve Efficiency
    Eliminate the cost and overhead of creating and maintaining multiple test configurations with built-in customization and granular control over payload detonations.

Datasheet

Features

Analyze Attacks with 360-Degree Visibility

Conduct deep forensic analysis of an attack – from the initial exploit to callback destinations and follow-on binary download attempts – using the Trellix Multi-Vector Virtual Execution engine.

Enable Customization with YARA-Based Rules

Import YARA-based rules to specify byte-level rules and quickly analyze suspicious objects for threats specific to your organization.

Track Advanced Attacks Across Multiple Vectors

Deploy in live mode to track advanced attacks across multiple stages and different vectors or in sandbox mode to contain execution paths of malware samples.

Share Malware Data Across Trellix Solutions

Share malware forensics data across Trellix solutions, block outbound data exfiltration attempts, and stop known inbound attacks.

Trellix Network Security

Protect your network, servers, and data centers with a living, learning ecosystem.

Learn More

Get to know the Trellix Ecosystem

The Trellix Platform learns and adapts for living protection while delivering native and open connections and providing expert and embedded support for your team.

View Products

Take the next steps to future-proof your defenses.

Contact Us