Trellix

Trellix is an American company based in California, formed in 2022 as a result of the merger of McAfee Enterprise and FireEye. Trellix serves over 53,000 customers worldwide, offering a comprehensive approach to cybersecurity.

  • Trellix

    Trellix Email Threat Prevention Cloud (ETP)

    A cloud-based email security solution that effectively blocks cyber threats before they reach your inbox.

  • Trellix

    Trellix Email Security Server (EX)

    An advanced platform for securing email traffic in local environments, offering multi-layered protection against external threats.

  • Trellix

    Trellix Network Security (NX)

    A modern platform that provides preventive protection against advanced threats (APT), zero-day attacks, and sandbox-evading malware.

  • Trellix

    Trellix File Protect (FX)

    A solution for protecting against threats hidden in files located on network disk shares (CIFS/SMB/WebDAV/NFS) and file sharing solutions such as Microsoft OneDrive or SharePoint.

  • Trellix

    Trellix Malware Analysis (AX)

    A module that provides analysts with a secure environment for detonating potentially dangerous files and URLs.

Use cases 4

E-mail security

Integrated Email Gateway, sandboxing, and DLP solutions effectively block phishing, malware, and data leaks. These are complemented by training programs (security awareness) that increase user awareness of the threats associated with email.

Network security

Advanced network security architecture based on modern technologies (NGFW, IDS/IPS, NDR, DNS Security) guarantees full control over traffic and effective protection against cyber threats. The whole system is supported by SSE/SASE, proxy, and DLP solutions, as well as intelligent inspection tools such as SSL decryption and full data stream analysis.

Data security

Solutions in this area ensure the protection of sensitive information – both at rest and in transit – through encryption, access control, classification, and monitoring. They support compliance with legal regulations, minimize the risk of leaks, and enable secure data management and exchange in local and cloud environments.

Risk and threat analysis

Solutions for malware detection, vulnerability management, and attack surface analysis enable the identification of weaknesses in IT infrastructure. Automated penetration testing supports the assessment of real risks and the prioritization of corrective actions.