我們知道,安全性可以變化。足夠快速,以便跟上動態威脅。足夠智慧,以便從中進行學習。不斷精進,以便保持優勢。
因此,Trellix 為您帶來了一個可適應威脅因子速度的活動 XDR 架構,並提供進階網路威脅情報。我們將改變安全性的含義以及它的作用,為您組織的所有人帶來每天越來越安全的信心。
在混合雲端生態系統中,Trellix 以卓越的威脅和資料防護能力從眾多競爭對手中脫穎而出,同時提供獨特的安全性管理、自動化與大規模的協調。
「為我們的客戶提供支援使其越來越有彈性並領先對手一步,始終是我們的重中之重 — 這就是我們大多數企業和政府客戶與我們保持長達 16 年以上合作的原因。」
Bryan Palma,執行長
Meet Our Leadership
2023 Cybersecurity Excellence Awards Gold Winner Endpoint Security (NA)
2023 Fortress Cyber Security Awards Endpoint Detection Winner
#1 Leading Solution with Gold Medal in the 2023 Info-Tech Data Quadrant for DLP Report.
Representative vendor in the Gartner Market Guide for Email Security, 2023.
2023 Globee Information Technology World Awards Gold Winner for Hot Technologies of the Year, Cybersecurity – Trellix Endpoint Security.
Trellix is positioned as a Large Vendor in The Forrester Endpoint Security Landscape, Q2 2023.
Large Vendor in the Forrester Data Security Platforms (DSP) Landscape, Q1 2023.
Leader with Gold Medal-2022 Info-tech Security Incident and Event Management Data Quadrant.
Representative Vendor in the Gartner Market Guide for Network Detection and Response, 2022.
Leader on the 2022 PeerSpot Extended Detection and Response (XDR) segment.
Leader in the 2022 Gigaom Radar Extended Detection and Response (XDR).
No.1 ranked vendor in the Info-Tech Software Reviews DLP Market.
Join us for the inagural Trellix Xpand Digital on April 27 for Americas / EMEA, and April 28 for APAC. Hear directly from Trellix leadership about our vision for a new kind of cybersecurity and learn more about our innovations in cyber intelligence and XDR architecture.
Learn More
超過 40,000 位客戶 (其中包括近 80% 的 Fortune 500) 信賴 Trellix 提供的活動安全性。
By Niranjan Hegde and Sijo Jacob · October 2, 2025
XWorm V6, a potent malware, has resurfaced with new plugins and persistence methods. Stay informed and enhance your defenses against evolving cyber threats. Protect your organization now!
By Joel Boyd · September 25, 2025
Trellix receives industry recognition as a market leader in the recently published KuppingerCole Leadership Compass for Email Security.
By Maulik Maheta and Lishoy Mathew · September 8, 2025
The tactics of cyber adversaries continue to evolve as they attempt to bypass security vendors. Rather than traditional malware, today’s attackers can exploit trusted system components in fileless ways to move laterally across networks. Abuse of the Windows Service Control Manager (SCM) is one particularly stealthy technique. Attackers can execute malicious payloads without ever dropping a file on disk by remotely modifying service configurations via built-in APIs such as ChangeServiceConfigA.