Trellix
Trellix is an American company based in California, formed in 2022 as a result of the merger of McAfee Enterprise and FireEye. Trellix serves over 53,000 customers worldwide, offering a comprehensive approach to cybersecurity.
-
Trellix
Trellix Email Threat Prevention Cloud (ETP)
A cloud-based email security solution that effectively blocks cyber threats before they reach your inbox.
-
Trellix
Trellix Email Security Server (EX)
An advanced platform for securing email traffic in local environments, offering multi-layered protection against external threats.
-
Trellix
Trellix Network Security (NX)
A modern platform that provides preventive protection against advanced threats (APT), zero-day attacks, and sandbox-evading malware.
-
Trellix
Trellix File Protect (FX)
A solution for protecting against threats hidden in files located on network disk shares (CIFS/SMB/WebDAV/NFS) and file sharing solutions such as Microsoft OneDrive or SharePoint.
-
Trellix
Trellix Malware Analysis (AX)
A module that provides analysts with a secure environment for detonating potentially dangerous files and URLs.
E-mail security
Integrated Email Gateway, sandboxing, and DLP solutions effectively block phishing, malware, and data leaks. These are complemented by training programs (security awareness) that increase user awareness of the threats associated with email.
Network security
Advanced network security architecture based on modern technologies (NGFW, IDS/IPS, NDR, DNS Security) guarantees full control over traffic and effective protection against cyber threats. The whole system is supported by SSE/SASE, proxy, and DLP solutions, as well as intelligent inspection tools such as SSL decryption and full data stream analysis.
Data security
Solutions in this area ensure the protection of sensitive information – both at rest and in transit – through encryption, access control, classification, and monitoring. They support compliance with legal regulations, minimize the risk of leaks, and enable secure data management and exchange in local and cloud environments.
Risk and threat analysis
Solutions for malware detection, vulnerability management, and attack surface analysis enable the identification of weaknesses in IT infrastructure. Automated penetration testing supports the assessment of real risks and the prioritization of corrective actions.
Chcesz zgłosić incydent?
- dane kontaktowe (imię i nazwisko oraz nazwa i adres organizacji),
- adres e-mail,
- numer telefonu,
- opis wpływu incydentu,
- szczegóły dotyczące incydentu (system)