Trellix
Trellix
28 reviews
WH Score
8.9

Top Trellix Features

What are the Best Trellix Features?


Cybersecurity Features

  • Network Security
  • Data Security
  • Cloud Security
  • Web Security
  • Email Security
  • Gateway Security
  • Server Security
  • Wireless Security
  • Workload Security
  • Runtime Security
  • IoT Security
  • Endpoint Detection and Response (EDR)
  • Firewall
  • Encryption
  • Filtering
  • IP Black/White List
  • Attack Surface Monitoring
  • Threat Hunting
  • Threat Blocking
  • Threat Intelligence
  • Threat Library
  • Incident Triage
  • Incident Response & Remediation
  • Security Awareness Training
  • Cloud Access Security Broker (CASB)
  • Security Information and Event Management (SIEM)
  • Security Orchestration and Automation Response (SOAR)
  • Security Operations Center (SOC)

Cybersecurity Protection Types

  • Antivirus
  • Anti-Malware
  • Anti-Ransomware
  • Anti-Spyware
  • Anti-Phishing
  • Anti-Spam
  • DDoS Protection
  • Exfiltration Prevention
  • Bot Mitigation
  • Zero Day Mitigation

Reporting & Analytics

  • Network Performance Monitoring (NPM)
  • Infrastructure Monitoring
  • Incident Tracking
  • Vulnerability Assessments
  • Compliance Reports
  • Breach Assessments
  • Perimeter Assessments
  • Threat Analytics
  • File Integrity Monitoring
  • Risk Assessments
  • Risk Register
  • Risk Scoring
  • Device Analytics
  • Policy Assessments
  • Server Assessments
  • Wireless Assessments
  • IoT Assessments
  • VPN Assessments
  • Privacy Assessments
  • Traffic Analysis
  • Threat Modeling
  • Gap Assessments

Device Management

  • Device Discovery
  • Device Control
  • Device Isolation
  • Device Lockdown
  • Device Lifecycle Management

Network Management

  • Network Discovery
  • Network Control
  • Network Isolation

Governance, Risk, & Compliance (GRC)

  • Risk Management

Systems/Administrative

  • Policy Management
  • Centralized Console

Configuration Management

  • Drift Management

Sync/Refresh

  • Device Sync

Reminders/Alerts

  • Threat Alerts

Application Management

  • Application Discovery
  • Application Control
  • Application Isolation
  • Application Gateway
  • Application Lifecycle Management

Data Management

  • Data Indexing
  • Data Classification
  • Data Discovery
  • Data Mapping

Supported Technologies

  • Artificial Intelligence (AI)
  • Machine Learning (ML)

Collaboration Tools

  • Playbooks

Workflow Automation

  • Application Automation
  • Incident Automation

Software Development Lifecycle (SDLC) Integrations

  • DevOps
  • DevSecOps

Trellix Top Features Related Review


J
James
Reviewed on 20 November 2019

The security is unmatched with MES

You feel confident in doing anything when you know you have such immense security system protecting everything you do from malicious virus and things of the sort.

Pros
  • The way our system is running, we do see a monthly report that tells us how many threats were detected or averted during that given month
  • Otherwise, we can always click and see how the security system was performing over the last week, etc
  • With McAfee Endpoint Security the protection is always on
  • You need not lose your sleep over the possibility of threats or attacks that could damage your system or data stored on any part of it
  • The firewall is pretty much impenetrable
  • The real time protection filters everything before letting it be a part of any function or process.
Cons
  • It is excellent in the way that it is built and functions
  • Yet to nitpick, we can suggest more options to customize some features
  • But I wouldn’t want any compromise to the security as a result of such flexibility
  • Until now, the software works well without any need for custom features, so it is not something essential anyway.

Have you used Trellix in the past?

Help other people find the right software by sharing your Trellix experience.

The right software for your business

Get your personalized recommendations now.