Ratings and Reviews 4 Ratings

Total
ease
features
design
support

Ratings and Reviews 1 Rating

Total
ease
features
design
support

Alternatives to Consider

  • ESET PROTECT Advanced Reviews & Ratings
    2,231 Ratings
    Company Website
  • ManageEngine Endpoint Central Reviews & Ratings
    2,506 Ratings
    Company Website
  • Bitdefender Ultimate Small Business Security Reviews & Ratings
    3 Ratings
    Company Website
  • DriveLock Reviews & Ratings
    1 Rating
    Company Website
  • Iru Reviews & Ratings
    1,487 Ratings
    Company Website
  • Guardz Reviews & Ratings
    106 Ratings
    Company Website
  • NinjaOne Reviews & Ratings
    4,254 Ratings
    Company Website
  • ThreatLocker Reviews & Ratings
    501 Ratings
    Company Website
  • Securden Endpoint Privilege Manager Reviews & Ratings
    5 Ratings
    Company Website
  • TeleRay Reviews & Ratings
    6 Ratings
    Company Website

What is Trellix Endpoint Security (HX)?

Trellix Endpoint Security (HX) facilitates swift and accurate forensic analyses across multiple endpoints. By adopting a holistic security strategy, you can effectively protect and reinforce your workforce across all devices. Trellix's Endpoint Security offerings utilize proactive threat intelligence and strong defense mechanisms at every stage of the attack lifecycle, thereby fortifying your organization's safety and resilience. In an age where threats are continuously evolving, it is vital to ensure the security of your endpoints is never compromised. Explore how our integrated suite of endpoint protection technologies provides you with actionable insights, machine learning features, and additional resources that enable ongoing threat monitoring and attack prevention. The core of endpoint security focuses on safeguarding data and workflows associated with each device connected to your network. Endpoint protection platforms (EPP) work by analyzing files as they enter the network, contributing to a safer digital space for all users. By prioritizing investment in cutting-edge security solutions, organizations can proactively defend against potential cyber threats, thereby significantly enhancing their overall security posture. Additionally, fostering a culture of security awareness among employees can further mitigate risks and ensure a collective commitment to safeguarding digital assets.

What is Tanium?

Our mission is to empower the largest enterprises in the world to monitor and protect their critical networks effectively. Through our cutting-edge data model, we enable the swift collection of real-time data within seconds, allowing customers, partners, and Tanium to rapidly enhance features on this versatile platform. Our patented architecture allows us to aggregate and distribute data to millions of endpoints in seconds, eliminating the need for cumbersome infrastructure. This method promotes informed decision-making right at the source of data generation, which is the endpoint itself. Our lightweight agent is crafted to consume minimal resources and bandwidth, fitting seamlessly into even the tiniest chip firmware. As a result, you can expand your capabilities without enlarging Tanium’s operational footprint. We hold the belief that the best way for clients to fully understand our offerings is through a live demonstration of our platform's capabilities. Orion Hindawi, co-founder and CEO of Tanium, will guide you through an interactive tutorial that highlights the functionalities of Tanium, enabling real-time identification of all your IT assets. This immersive experience not only showcases the advantages of our technology but also ensures that users can optimize their IT management strategies effectively. By participating in this demonstration, attendees will gain firsthand insight into the transformative potential of our solutions.

Media

Media

Integrations Supported

Google Digital Risk Protection
NorthStar Navigator
Swimlane
ThreatConnect Risk Quantifier (RQ)
AssetLabs Streamline License Tracker
Azure Marketplace
BackBox
CYREBRO
Cynerio
Filigran
Genian NAC
Medigate
Mesh Security
OpenText Core MDR
Revelstoke
Sunrise IT Service Management
The Respond Analyst
Trellix Data Encryption
TrustCloud
appNovi

Integrations Supported

Google Digital Risk Protection
NorthStar Navigator
Swimlane
ThreatConnect Risk Quantifier (RQ)
AssetLabs Streamline License Tracker
Azure Marketplace
BackBox
CYREBRO
Cynerio
Filigran
Genian NAC
Medigate
Mesh Security
OpenText Core MDR
Revelstoke
Sunrise IT Service Management
The Respond Analyst
Trellix Data Encryption
TrustCloud
appNovi

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Trellix

Date Founded

2022

Company Location

United States

Company Website

www.trellix.com/products/endpoint-security-hx/

Company Facts

Organization Name

Tanium

Company Location

United States

Company Website

www.tanium.com

Categories and Features

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Categories and Features

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

System Monitoring

Alerts / Notifications
Antivirus Management
Data Backup / Recovery
Device Monitoring
Inventory Management
Patch Management
Policy-based Automation
Remote Monitoring
Reporting / Analytics
Risk Analysis
Server Monitoring
Service Configuration Management

Popular Alternatives

Popular Alternatives

CrowdStrike Falcon Reviews & Ratings

CrowdStrike Falcon

CrowdStrike
Flexera One Reviews & Ratings

Flexera One

Flexera