Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Safetica Reviews & Ratings
    357 Ratings
  • Heimdal Endpoint Detection and Response (EDR) Reviews & Ratings
    54 Ratings
  • ManageEngine EventLog Analyzer Reviews & Ratings
    159 Ratings
  • Criminal IP Reviews & Ratings
    11 Ratings
  • Cloudflare Reviews & Ratings
    1,826 Ratings
  • ConnectWise SIEM Reviews & Ratings
    186 Ratings
  • ThreatLocker Reviews & Ratings
    468 Ratings
  • A10 Defend Threat Control Reviews & Ratings
    32 Ratings
  • Resolver Reviews & Ratings
    254 Ratings
  • Guardz Reviews & Ratings
    56 Ratings

What is Trellix Threat Intelligence Exchange?

Revamp your security framework into a cohesive collaborative network that seamlessly integrates threat intelligence data in real time, guaranteeing extensive protection for your organization as new threats emerge. Leverage the Data Exchange Layer (DXL) to ensure immediate communication of threat information among all connected security systems, including those from third-party vendors. By recognizing unknown files, you can dramatically decrease the time required for protection and lower associated expenses. Advanced threat intelligence facilitates accurate decisions regarding file execution and enables the personalization of security policies aligned with your organization’s risk tolerance. This methodology promotes superior decision-making abilities to tackle previously undetected and potentially dangerous files. Furthermore, amalgamate and distribute threat data sourced from Trellix's Global Threat Intelligence, additional third-party resources, and locally collected insights from your security platforms. DXL acts as an open communication conduit that connects various security solutions, allowing for the exchange of real-time security intelligence across endpoint, gateway, network, and data center defenses. This interconnected approach not only improves your overall security posture but also boosts your ability to swiftly respond to emerging threats. In essence, adopting this system creates a more agile and responsive security environment that can better safeguard against evolving risks.

What is Proofpoint Emerging Threat (ET) Intelligence?

Proofpoint's ET Intelligence stands out as the quickest and most accurate threat intelligence solution available today. Our rigorously validated intelligence not only offers deeper insights but also integrates seamlessly with your existing security frameworks, thus enhancing your decision-making capabilities. Merely recognizing the existing types of threats is not enough to protect your workforce, sensitive data, and corporate image. By leveraging Emerging Threat (ET) intelligence, you can take proactive measures to thwart attacks and reduce vulnerabilities through a thorough comprehension of the historical context of these threats, including their sources, the individuals behind them, the timing of previous incidents, the tactics employed, and their targeted goals. You can instantly access both real-time and historical metadata concerning IP addresses, domains, and other significant threat intelligence, facilitating in-depth threat investigations and incident analysis. Our service goes beyond simple reputation intelligence, offering substantiating evidence, rich context, historical insights, and detection strategies. This extensive data is easily navigable through a user-friendly threat intelligence portal, which displays trends and timestamps of when specific threats were detected, along with their respective categories. With this abundant information available, you can significantly bolster your defenses against potential threats and refine your overall security strategy, ensuring that you are always a step ahead of emerging risks. This proactive approach empowers organizations to remain vigilant in an ever-evolving threat landscape.

Media

Media

Integrations Supported

ThreatConnect Risk Quantifier (RQ)
Corelight
CrowdStrike Falcon
Okta
Palo Alto Networks NGFW
ThreatBlockr
Trellix XDR

Integrations Supported

ThreatConnect Risk Quantifier (RQ)
Corelight
CrowdStrike Falcon
Okta
Palo Alto Networks NGFW
ThreatBlockr
Trellix XDR

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Trellix

Date Founded

2022

Company Location

United States

Company Website

www.trellix.com/products/threat-intelligence-exchange/

Company Facts

Organization Name

Proofpoint

Date Founded

2002

Company Location

United States

Company Website

www.proofpoint.com/us/products/advanced-threat-protection/et-intelligence

Categories and Features

Categories and Features

Popular Alternatives

Popular Alternatives

Palo Alto Networks AutoFocus Reviews & Ratings

Palo Alto Networks AutoFocus

Palo Alto Networks
VIPRE ThreatIQ Reviews & Ratings

VIPRE ThreatIQ

VIPRE Security Group