Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Heimdal Endpoint Detection and Response (EDR) Reviews & Ratings
    54 Ratings
    Company Website
  • Blumira Reviews & Ratings
    131 Ratings
    Company Website
  • Criminal IP Reviews & Ratings
    11 Ratings
    Company Website
  • ConnectWise SIEM Reviews & Ratings
    184 Ratings
    Company Website
  • ESET PROTECT Advanced Reviews & Ratings
    2,052 Ratings
    Company Website
  • Safetica Reviews & Ratings
    358 Ratings
    Company Website
  • ManageEngine EventLog Analyzer Reviews & Ratings
    155 Ratings
    Company Website
  • Avast Free Antivirus Reviews & Ratings
    1 Rating
    Company Website
  • Cynet All-in-One Cybersecurity Platform Reviews & Ratings
    374 Ratings
    Company Website
  • Synchredible Reviews & Ratings
    12 Ratings
    Company Website

What is Trellix Detection as a Service?

Recognize possible threats during every phase of your operational workflows. Scrutinize your cloud framework and the business logic relating to the data stored in your cloud applications. Maintain the integrity of your documents and content by leveraging the latest threat intelligence, complemented by advanced machine learning, artificial intelligence, and correlation engines. Effortlessly connect with your trusted cloud services, online applications, and collaboration tools. Perform scans on files, hashes, and URLs for potential malware in a live virtual setting while ensuring the protection of your internal resources. Integrate Detection as a Service into your Security Operations Center routines, Security Information and Event Management analytics, data storage systems, and applications, among other areas. Evaluate the potential for secondary or cumulative impacts during various stages of the cyber-attack lifecycle to reveal hidden exploits and malware threats. Take advantage of our intuitive Chrome extension to submit MD5 hashes or local files, which can be seamlessly integrated into your current toolsets or workflows to further bolster your security measures. This integration not only optimizes your threat detection capabilities but also significantly enhances your team's ability to tackle new security challenges as they arise, fostering a proactive approach to cybersecurity.

What is TXOne Security Inspection?

Ensure asset integrity by conducting rapid scans of assets and devices that do not require installation, thus improving security for air-gapped environments and bolstering supply chain defenses. The malware detection and remediation tool, built on a zero trust framework for operational technology (OT), aims to prevent insider threats and protect against vulnerabilities in the supply chain. This zero trust methodology is activated the moment a device arrives at your facility, whether for onboarding or when being managed by authorized personnel. By prioritizing the security of assets from the beginning of their life cycle, organizations can significantly reduce the risk of insider threats and avert potential supply chain complications. Additionally, even after the initial onboarding phase, certain endpoints, particularly air-gapped and standalone assets, require ongoing specialized protection. These assets often contain sensitive information and are unable to support any installations or adjustments. This approach guarantees that security is upheld without the need for installation while providing thorough protective measures. To address shadow operational technology, asset data will be collected with each scan and sent to a centralized management console for comprehensive analysis and monitoring. This proactive strategy not only boosts security but also facilitates efficient asset management, ensuring effective oversight is maintained throughout the asset's lifecycle. In doing so, organizations can foster a more resilient operational environment.

Media

Media

Integrations Supported

Amazon Web Services (AWS)
Box
Cisco Secure Email Threat Defense
Cisco Webex
Dropbox
Google Chrome
Google Workspace
HashShiny
InsightCloudSec
Microsoft Azure
Microsoft OneDrive
Microsoft SharePoint
Raiz
Risk Radar
Salesforce
Slack
Splunk Cloud Platform
Trellix Data Encryption
Trellix Email Security
Trellix Security Platform

Integrations Supported

Amazon Web Services (AWS)
Box
Cisco Secure Email Threat Defense
Cisco Webex
Dropbox
Google Chrome
Google Workspace
HashShiny
InsightCloudSec
Microsoft Azure
Microsoft OneDrive
Microsoft SharePoint
Raiz
Risk Radar
Salesforce
Slack
Splunk Cloud Platform
Trellix Data Encryption
Trellix Email Security
Trellix Security Platform

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Trellix

Date Founded

2022

Company Location

United States

Company Website

www.trellix.com/products/detection/

Company Facts

Organization Name

TXOne Networks

Company Location

China

Company Website

www.txone.com/products/security-inspection/

Categories and Features

Categories and Features

Popular Alternatives

Popular Alternatives

SecBI XDR Reviews & Ratings

SecBI XDR

SecBI