Trellix XDR

Trellix XDR

Trellix
+
+

Related Products

  • ThreatLocker
    684 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • Criminal IP ASM
    18 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    104 Ratings
    Visit Website
  • Criminal IP
    17 Ratings
    Visit Website
  • ManageEngine Log360
    168 Ratings
    Visit Website
  • Guardz
    118 Ratings
    Visit Website
  • ManageEngine EventLog Analyzer
    210 Ratings
    Visit Website
  • Blumira
    150 Ratings
    Visit Website
  • Wiz
    1,452 Ratings
    Visit Website

About

Take control of cyber threats. Identify, prioritize and track all your security threats with Defense.com. Simplify your cyber threat management. Detection, protection, remediation, and compliance, are all in one place. Make intelligent decisions about your security with automatically prioritized and tracked threats. Improve your security by following the effective remediation steps provided for each threat. Gain knowledge and advice from experienced cyber and compliance consultants when you need assistance. Take control of your cyber security with easy-to-use tools that can work with your existing security investment. Live data from penetration tests, VA scans, threat intelligence and more all feeds into a central dashboard, showing you exactly where your risks are and their severity. Remediation advice is included for each threat, making it easy to make effective security improvements. Powerful threat intelligence feeds are mapped to your unique attack surface.

About

Introducing the Trellix Platform, a composable XDR ecosystem that adapts to the challenges of your business. The Trellix Platform learns and adapts for living protection while delivering native and open connections and providing expert and embedded support for your team. Keep your organization resilient with adaptive prevention that adjusts and responds in machine time to threats. Customers trust 75M endpoints to Trellix. Maximize business agility through zero trust principles and protect against front-door, side-door, and back-door attacks, all while streamlining policy management. Get comprehensive, non-invasive protection for your cloud-native applications, through secure agile DevOps and visible deployment environments. Our email and collaboration tool security protects against high-volume exposure points and attackers, automating for optimized productivity and enabling secure and agile teamwork.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Businesses searching for a solution to to identify threats, protect against hackers, train your staff and maintain compliance

Audience

IT security teams and professionals interested in a powerful XDR platform

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

$30 per node per month
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Defense.com
United States
www.defense.com

Company Information

Trellix
Founded: 2022
United States
www.trellix.com/platform/

Alternatives

Alternatives

TrendAI Vision One

TrendAI Vision One

Trend Micro
CrowdStrike Falcon

CrowdStrike Falcon

CrowdStrike
TrendAI Vision One

TrendAI Vision One

Trend Micro

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

SIEM Features

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Integrations

F5 BIG-IP SSL Orchestrator
Google Digital Risk Protection
OctoXLabs
PC Matic
StrikeReady
ThreatAware
Trellix ATLAS
Trellix Application Control
Trellix Cloud Workload Security
Trellix Cloudvisory
Trellix Data Loss Prevention
Trellix Database Security
Trellix EDR
Trellix Endpoint Security (HX)
Trellix Enterprise Security Manager
Trellix Network Security
Trellix Threat Intelligence Exchange
Trellix Wise

Integrations

F5 BIG-IP SSL Orchestrator
Google Digital Risk Protection
OctoXLabs
PC Matic
StrikeReady
ThreatAware
Trellix ATLAS
Trellix Application Control
Trellix Cloud Workload Security
Trellix Cloudvisory
Trellix Data Loss Prevention
Trellix Database Security
Trellix EDR
Trellix Endpoint Security (HX)
Trellix Enterprise Security Manager
Trellix Network Security
Trellix Threat Intelligence Exchange
Trellix Wise
Claim Defense.com and update features and information
Claim Defense.com and update features and information
Claim Trellix XDR and update features and information
Claim Trellix XDR and update features and information