Trellix operates as an international entity devoted to reshaping the cybersecurity landscape. The key business issue the company addresses revolves around the escalation of sophisticated threats challenging organizations today. To combat this, Trellix offers an open and native detection and response platform, building a secure and resilient operational structure. The company embraces machine learning and automation, drawing upon the proficiency of its security professionals and an expansive partner ecosystem to deliver technological advancements. The application of their expertise serves to benefit an extensive user base comprising numerous business and government organizations.
Do You Manage Peer Insights at Trellix?
Access Vendor Portal to update and manage your profile.
1. Solid endpoint telemetry for a managed SOC. With the sensor feeding our managed SOC, Trellix provided consistent file, process, and behavioral data that popped alerts and provided the information needed for investigations. 2. Behavior-based detection. Rather than just signature-based antivirus scanning, Trellix did an excellent job of surfacing suspicious behavior, which aligned well with how the SOC hunted threats. 3. Multiple Signals. Rather than just being used on workstations, we were able to collect logs from servers, serverless jobs, and network appliances using Trellix.
1. Solid endpoint telemetry for a managed SOC. With the sensor feeding our managed SOC, Trellix provided consistent file, process, and behavioral data that popped alerts and provided the information needed for investigations. 2. Behavior-based detection. Rather than just signature-based antivirus scanning, Trellix did an excellent job of surfacing suspicious behavior, which aligned well with how the SOC hunted threats. 3. Multiple Signals. Rather than just being used on workstations, we were able to collect logs from servers, serverless jobs, and network appliances using Trellix.
1. Solid endpoint telemetry for a managed SOC. With the sensor feeding our managed SOC, Trellix provided consistent file, process, and behavioral data that popped alerts and provided the information needed for investigations. 2. Behavior-based detection. Rather than just signature-based antivirus scanning, Trellix did an excellent job of surfacing suspicious behavior, which aligned well with how the SOC hunted threats. 3. Multiple Signals. Rather than just being used on workstations, we were able to collect logs from servers, serverless jobs, and network appliances using Trellix.
Deployment is very complex and even the administrator doesn't know about the settings we have, its bit complex and also integration with Google's second SIEM solution was bit difficult due to log parsing issues
Deployment is very complex and even the administrator doesn't know about the settings we have, its bit complex and also integration with Google's second SIEM solution was bit difficult due to log parsing issues
Deployment is very complex and even the administrator doesn't know about the settings we have, its bit complex and also integration with Google's second SIEM solution was bit difficult due to log parsing issues