Trellix Data EncryptionTrellix
|
Trellix Mobile SecurityTrellix
|
|||||
Related Products
|
||||||
About
Trellix Data Encryption products secure devices and removable media to ensure that only authorized users can access the information they contain. Deploy encryption policies through a single management console, while monitoring encryption status and generating compliance reports.
Choose from an extensive catalog of policy options to secure information across devices, files, and removable media - easily managed from a single location.
Trellix Native Drive Encryption centralizes and simplifies management of both BitLocker and FileVault into a central console that is available on-premises or via SaaS. This saves time and resources for organizations managing multiple operating systems, since reporting and administrative tasks like encryption key and pin management are centralized.
|
About
Unlike cloud-based mobile security solutions that rely on app sandboxing or traffic tunneling, Trellix Mobile sits directly on mobile devices to provide always-on protection no matter how a device is connected—via a corporate network, public access point, or cellular carrier, and even offline. Machine learning algorithms analyze device behavior deviations to uncover indicators of compromise and accurately identify advanced device, application, and network-based attacks. Extend visibility and control of mobile devices from the same console managing OS-based endpoints, servers, containers, and embedded IoT devices. Leave employees to their own devices and accommodate the human factor, without compromising the user experience or violating privacy. Trellix Mobile secures Android and iOS devices, including iPhones and iPads.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
IT teams searching for an advanced data encryption solution
|
Audience
Companies looking for a mobile device threat detection and protection solution
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationTrellix
Founded: 2022
United States
www.trellix.com/products/data-encryption/
|
Company InformationTrellix
Founded: 2022
United States
www.trellix.com/products/mobile-security/
|
|||||
Alternatives |
Alternatives |
|||||
|
|
|
|||||
|
|
||||||
|
|
||||||
Categories |
Categories |
|||||
Encryption Features
Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking
|
||||||
Integrations
A10 Defend DDoS Mitigator
AD Lab
AirShield
Cyble
Cyware
Datacard Secura
Delta Lake
Entrust Certificate Hub
Entrust Identity Enterprise
GoSecure
|
Integrations
A10 Defend DDoS Mitigator
AD Lab
AirShield
Cyble
Cyware
Datacard Secura
Delta Lake
Entrust Certificate Hub
Entrust Identity Enterprise
GoSecure
|
|||||
|
|
|