Próximos webinars

Live Webinar 29 January ❘ 9am GMT / 10am CET
Translating Key CISO Priorities and Global Threat Findings into Endpoint Resiliency

Discover how Trellix Endpoint Security solutions help organizations achieve robust endpoint security across cloud, on-premises, and hybrid environments, leveraging threat intelligence, forensics capabilities, and AI-guided investigations to prioritize correlated threat detections.

Register Now
Live Webinar January 29 | 10am CT
Trellix Spotlight Series: Performing Kernel Module Updates for ENS & TACC for Linux

Join us as we walk through best practices for performing kernel module updates on Linux systems, ensuring continued protection with Trellix Endpoint Security for Linux and Trellix Application and Change Control for Linux.

Register Now

Webinars sob demanda

On-Demand
Beyond the Blind Spots: Mapping Hidden Risk Across Your Healthcare Ecosystem

In the modern hospital setting, legacy systems, unmanaged IoT/IoMT devices, and third-party exposure result in blind spots that put patient safety at risk from care-disrupting cyberattacks.Join this informative, 30-minute session to learn how you can go from blind spots to assured clinical resilience.

Watch Now
On-Demand
Threat Trajectories: What 2025 Taught Us — And What 2026 Will Test (APJ)

In 2025, cyber threat actors adopted faster, smarter, and more collaborative playbooks—so what can we expect in 2026? Join Trellix experts in our upcoming webinar as we recap the defining trends of 2025 and equip you with actionable predictions for 2026.

Watch Now
On-Demand
Threat Trajectories: What 2025 Taught Us — And What 2026 Will Test (AMER)

In 2025, cyber threat actors adopted faster, smarter, and more collaborative playbooks—so what can we expect in 2026? Join Trellix experts in our upcoming webinar as we recap the defining trends of 2025 and equip you with actionable predictions for 2026.

Watch Now
On-Demand Spotlight Series
Accelerate your Security Operations with Helix’s Improved Analyst Experience

When analysts are slowed by disconnected tools and manual steps, the entire SecOps mission suffers. The latest Trellix Helix enhancements deliver deeper visibility, faster pivots, and powerful automation to remove friction and stop threats faster.

Watch Now
On-Demand
Red Storm Rising: The Surge of China’s Typhoon APT Groups

Gain deep insights into the strategic intent and global impact of China's Typhoon APT groups, known for everything from espionage to infrastructure disruption. Join Trellix Guardians experts as they unpack the latest tactics, techniques, and procedures use by these Chinese state-sponsored actors.

Watch Now
On-Demand Spotlight Series
Meet Trellix Hyperautomation - a true no-code tool for automated security workflows

Trellix Hyperautomation is designed to put orchestration and automation directly in the hands of your SOC team, helping you respond faster and more effectively. Join us as we walk through a real-world Security Operations process, from the first alert all the way to automated enrichment, investigation, and containment.

Watch Now
On-Demand
EMEA Virtual OT Security Summit 2025

ICS and OT environments demand protection and availability. Protecting your critical OT systems from cyber attacks is essential for business resilience. Trellix provides solutions validated by industry vendors to protect OT systems whether they are air-gapped networks, hybrid IT/OT scenarios, or OT cloud environments.

Watch Now
On-Demand
Code, Conflict, and Chaos: Iranian Cyber Operations in a Regional Crisis

Get ahead of cyber threats during heightened geopolitical conflict. Join our experts for a webinar on the latest tactics used by Iranian cyber groups and receive a complimentary threat report.

Watch Now
On-Demand
Hunting with Trellix Endpoint Forensics

Hunt smarter, respond faster with Trellix Endpoint Forensics. Every second a threat lingers, risk grows. Don’t miss our exclusive, live webinar where Trellix experts Raghu Subash Narapareddy and Robert Lourenco show you how they use Trellix Endpoint Forensics to uncover hidden threats, accelerate investigations, and minimize dwell time.

Watch Now
On-Demand
EMEA Best Practices — From Weak Link to Human Firewall: How Trellix Solutions Transform Security Awareness

Cybersecurity awareness training plays a pivotal role, and Trellix offers comprehensive solutions to empower organizations and their employees to become the first line of defense. Join us to get an in-depth look at how threat actors are using AI against you and how you can elevate your cybersecurity awareness with Trellix.

Watch Now
On-Demand
Operational Threat Intel Virtual Summit: Move from Risk to Response

Threat intel is the signal. Operationalization is the strategy. You’ll learn proactive security strategies from experts at CISA, industry leaders, Trellix, and our customers. Come away with a plan to operationalize threat intelligence to fortify against potential threats.

Watch Now
On-Demand Spotlight Series
Comprehensive Structured Data Protection with Trellix Database Security

As organizations navigate increasingly complex environments, including migrating to cloud platforms like Amazon RDS and embracing hybrid infrastructures, robust security for the enterprise's most vital information - its databases - is essential.

Watch Now
On-Demand
Beyond the Feed: Operationalizing Threat Intelligence with Trellix

Operationalizing threat intelligence is crucial for transforming data insights into actionable defense. By operationalizing intelligence, security teams can prioritize vulnerabilities, enhance detection capabilities, and enrich alerts with context, ultimately reducing reaction times and strengthening their overall security posture against an ever-evolving threat landscape.

Watch Now
On-Demand Spotlight Series
Beyond Detection: Rapid Response & Deep Forensics with EDRF - A Special Replay

We are thrilled to offer a special replay of our Trellix Spotlight Series webinar "Beyond Detection: Rapid Response & Deep Forensics with EDRF." Is your organization truly prepared for the next sophisticated cyberattack? Join us for an exclusive webinar unveiling the groundbreaking new capabilities of Trellix’s Enhanced Endpoint Detection and Response with Forensics (EDRF) platform.

Watch Now
On-Demand Spotlight Series
Beyond Detection: Rapid Response & Deep Forensics with EDRF

Is your organization truly prepared for the next sophisticated cyberattack? Join us for an exclusive webinar unveiling the groundbreaking new capabilities of Trellix’s Enhanced Endpoint Detection and Response with Forensics (EDRF) platform. As the threat landscape evolves, relying solely on reactive detection is no longer enough.

Watch Now
On-Demand Spotlight Series
Trellix NDR 4.0 - The Next Step in Network Detection & Response

Is your team drowning in alerts while attackers slip through unseen paths across your network? Join us for an exclusive look at Trellix Network Detection and Response 4.0 - our most advanced NDR release yet, purpose-built to meet the challenges of today’s dynamic and high-stakes threat landscape.

Watch Now
On-Demand AWS
Verpassen Sie mit GenAI von Trellix und AWS keine Warnmeldung

Lernen Sie in unserem Webinar wie Trellix Wise, basierend auf Amazon Bedrock, mithilfe von generativer KI alle Sicherheitsmeldungen automatisch und in Echtzeit untersucht. Erfahren Sie außerdem, wie Sie die Reaktionszeiten verkürzen, die Produktivität Ihrer Analysten steigern und Überlastung durch zu viele Warnungen vermeiden können.

Watch Now
On-Demand
EMEA Best Practices: Protecting OT Systems with Trellix

Operational technology (OT) systems are the backbone of critical infrastructure and industrial environments, making them a prime target for cyber attacks that can wreak havoc on our daily lives. Join our upcoming webinar to learn from our security experts. They’ll discuss how critical industries must increase their OT security levels and provide a practical overview of OT security fundamentals.

Watch Now
On-Demand
EMEA Best Practices: Why Trellix for DORA compliance

Want to know more about the DORA regulation and how Trellix can help you maintain compliance? Join our upcoming webinar, “Why Trellix for DORA compliance” to learn more.

Watch Now
On-Demand Spotlight Series
Secure Your Perimeter - Seamless Two-Way Protection for Email and Cloud Applications

Today’s organizations rely heavily on email and cloud applications to collaborate and operate efficiently—but these tools also introduce serious risks. Join as Andy Logan and Nasir Shakour demonstrate Trellix's integrated security controls in action as they deliver comprehensive two-way protection.

Watch Now
On-Demand
"Paging Dr. Zero Trust" with Carahsoft

Join Trellix and Carahsoft for Paging Dr. Zero Trust: Securing Healthcare Data Before it Flatlines, a focused webinar built for leaders and security professionals across healthcare providers, payers, public health and life sciences. We’ll examine how attackers are exploiting healthcare’s expanding attack surface and explore how Zero Trust principles can help you detect and stop data exfiltration, mitigate insider threats and safeguard sensitive health information with an integrated, Zero Trust approach.

Watch Now
On-Demand
Trellix MDR: Surgical Threat Response and Expert Protection

Join Trellix experts Jim Coffman and Christina DiCarlo for an exclusive webinar introducing Trellix MDR, a powerful combination of AI-driven analytics with 24/7 expert monitoring. Discover how Trellix MDR accelerates surgical threat response, reduces alert fatigue, and minimizes dwell time, providing comprehensive security that extends your team's capabilities without adding headcount.

Watch Now
On-Demand
EMEA Cyber Threat Landscape Update, May 2025

Join us to get an in-depth look at the latest threats and most common attack vectors from Trellix experts. Following a global and EMEA cyber threat update, you’ll gain detailed insights into cyber threat findings for specific countries and discover how security teams can enhance threat detection, speed up investigations, and respond swiftly and effectively.

Watch Now
On-Demand Spotlight Series
Data Loss Prevention - Prevent USB Data Leakage with Trellix DLP Endpoint Device Control Features

Protecting sensitive data is a top priority for organizations. Controlling information transferred between the endpoint and external media, such as USB devices, is one essential step in safeguarding against data leaks. Join us as our expert George Peña offers valuable insights into strengthening your security posture using the Device Control features within Trellix Data Loss Prevention (DLP) Endpoint Complete.

Watch Now
On-Demand
Best Practices: Unmasking Hidden Threats

Leveraging malware-as-a-platform frameworks, obfuscation, asynchronous communications, tunneling, and arsenal kits, they make interception during exploitation and post-exploitation phases increasingly challenging. Discover how Trellix Network Detection and Response (NDR) empowers organizations to contain even the most advanced threats.

Watch Now
On-Demand
Best Practices: NCA Cybersecurity Controls

The National Cybersecurity Authority (NCA) in Saudi Arabia protects critical infrastructure, businesses, and citizens from cyber threats by setting security frameworks and guidelines. Trellix helps customers comply with NCA standards. Join Mo Cashman and Rob Lourenco to explore key threats in KSA, how Trellix Services aid compliance, and top Trellix solutions for resilience.

Watch Now
On-Demand
EMEA Cyber Threat Landscape - Beyond the Breach: Mitigating the Risks of Infostealers with Trellix

Are your defenses strong enough against Infostealers? Learn how to fortify your security in our upcoming webinar.

Watch Now
On-Demand
Work Smarter, Not Harder: Trellix Wise vs. Microsoft Copilot

Discover how Trellix Wise outpaces basic GenAI tools like Microsoft Copilot by delivering actionable insights powered by decades of threat intelligence and machine learning. Join our webinar to see how we help analysts make faster, smarter security decisions.

Watch Now
On-Demand Spotlight Series
Data Loss Prevention - Analyzing Data Protection Needs with Modern Use Cases

Are you ready to bolster your data security strategy? Trellix Data Loss Prevention (DLP) delivers unprecedented protection for sensitive and proprietary information from the keyboard to the cloud. Join our expert Anthony Newsome as he dives into real-world use cases and shares best practices for safeguarding your information, wherever it resides!

Watch Now
On-Demand
GenAI Powered Threat Hunting - Solution Webinar

Join our webinar to learn how top threat hunters leverage AI-powered tools and techniques to outpace adversaries. Discover how Trellix delivers the intelligence and precision today's security teams need to detect, track, and eradicate threats.

Watch Now
On-Demand
Trellix DLP: Présentation de la solution et nouveautés

Le vol des données représente l'un des premiers objectifs des auteurs de ransomware, comment votre entreprise peut-elle mettre en place une protection efficace ? La sécurisation des données est l'un des fondements essentiels de tout programme de sécurité des informations.

Watch Now