Trellix
Trellix
28 reviews
WH Score
8.9

Top Trellix Features

What are the Best Trellix Features?


Cybersecurity Features
  • Network Security
  • Data Security
  • Cloud Security
  • Web Security
  • Email Security
  • Gateway Security
  • Server Security
  • Wireless Security
  • Workload Security
  • Runtime Security
  • IoT Security
  • Endpoint Detection and Response (EDR)
  • Firewall
  • Encryption
  • Filtering
  • IP Black/White List
  • Attack Surface Monitoring
  • Threat Hunting
  • Threat Blocking
  • Threat Intelligence
  • Threat Library
  • Incident Triage
  • Incident Response & Remediation
  • Security Awareness Training
  • Cloud Access Security Broker (CASB)
  • Security Information and Event Management (SIEM)
  • Security Orchestration and Automation Response (SOAR)
  • Security Operations Center (SOC)
Cybersecurity Protection Types
  • Antivirus
  • DDoS Protection
  • Anti-Malware
  • Anti-Ransomware
  • Anti-Spyware
  • Anti-Phishing
  • Anti-Spam
  • Exfiltration Prevention
  • Bot Mitigation
  • Zero-Day Mitigation
Reporting & Analytics
  • Vulnerability Assessments
  • Compliance Reports
  • Breach Assessments
  • Perimeter Assessments
  • Threat Analytics
  • File Integrity Monitoring
  • Risk Assessments
  • Risk Register
  • Risk Scoring
  • Device Analytics
  • Policy Assessments
  • Server Assessments
  • Wireless Assessments
  • Network Assessments
  • IoT Assessments
  • Infrastructure Assessments
  • VPN Assessments
  • Privacy Assessments
  • Traffic Analysis
  • Threat Modeling
  • Gap Assessments
Device Management
  • Device Discovery
  • Device Control
  • Device Isolation
  • Device Lockdown
  • Device Lifecycle Management
Network Management
  • Network Discovery
  • Network Control
  • Network Isolation
Application Management
  • Application Discovery
  • Application Control
  • Application Isolation
  • Application Gateway
  • Application Lifecycle Management
Data Management
  • Data Indexing
  • Data Classification
  • Data Discovery
  • Data Mapping
Systems/Administrative
  • Policy Management
  • Centralized Console
Configuration Management
  • Drift Management
Sync/Refresh
  • Device Sync
Governance, Risk, & Compliance (GRC)
  • Risk Management
Collaboration Tools
  • Playbooks
Reminders/Alerts
  • Threat Alerts
Workflow Automation
  • Application Automation
Software Development Lifecycle (SDLC) Integrations
  • DevOps
  • DevSecOps
Supported Technologies
  • Artificial Intelligence (AI)
  • Machine Learning (ML)

Trellix Top Features Related Review


J
James
Reviewed on 20 November 2019

The security is unmatched with MES

You feel confident in doing anything when you know you have such immense security system protecting everything you do from malicious virus and things of the sort.

Pros
  • The way our system is running, we do see a monthly report that tells us how many threats were detected or averted during that given month
  • Otherwise, we can always click and see how the security system was performing over the last week, etc
  • With McAfee Endpoint Security the protection is always on
  • You need not lose your sleep over the possibility of threats or attacks that could damage your system or data stored on any part of it
  • The firewall is pretty much impenetrable
  • The real time protection filters everything before letting it be a part of any function or process.
Cons
  • It is excellent in the way that it is built and functions
  • Yet to nitpick, we can suggest more options to customize some features
  • But I wouldn’t want any compromise to the security as a result of such flexibility
  • Until now, the software works well without any need for custom features, so it is not something essential anyway.

Have you used Trellix in the past?

Help other people find the right software by sharing your Trellix experience.

The right software for your business

Get your personalized recommendations now.