Trellix Endpoint Detection and Response Datasheet
Trellix Endpoint Detection and Response Datasheet
Overview
Adversaries maneuver in covert ways, camouflaging their actions
Key Benefits
within trusted components already in your environment. They don’t
Provides high-quality always install something tangible like malware, but they always leave
actionable threat detection behind a behavioral trail. Trellix Endpoint Detection and Response (EDR)
without the noise continuously monitors and gathers data to provide the visibility and
Offers proactive insight on context needed to detect and respond to threats. But current approaches
threats before the attack often dump too much information on already stretched security teams.
AI automatically correlates
alerts and attacker TTPs to Trellix EDR helps manage a high volume of alerts, empowering analysts of
previous breaches all skill levels to investigate more alerts, more effectively. Unique to Trellix
EDR is Trellix® Insights,* the first technology to proactively prioritize threats
Uses AI-guided investigations before they affect your organization and simultaneously predict if your
to provide analysts with countermeasures will stop them, all while prescribing exactly what you
machine-generated insights need to do if they won’t.
into attacks
1- click report generation so you Strengthen, accelerate, and simplify EDR
can close investigations fast
Trellix EDR reduces mean time to detect and respond to threats by
Simplified deployment using enabling all analysts to understand alerts, fully investigate, and quickly
Trellix® ePO software or SaaS- respond. Advanced analytics broaden detection and make sense of alerts.
based ePO Trellix Wise™ artificial intelligence (AI) reduces security analyst burnout
Enables analysts to focus on with automated investigation, alert correlation, and report generation..
strategic incident response
without burdensome Detect advanced endpoint threats & respond faster
administration overhead Without the right data, context, and analytics, EDR systems either
generate too many alerts or miss emerging threats, wasting precious time
and resources without improving security. Trellix EDR offers always-on
data collection and multiple analytic engines throughout detection and
investigation stages to help accurately surface suspicious behavior, make
sense of alerts, and inform action.
*Trellix Insights requires Trellix Endpoint
Security telemetry (opt-in) to function properly.
If you do not want to provide this telemetry, you
should not choose this product, as you won’t be
able to receive full value.
DATA SHEET
Easily navigate
Alert ranking further helps analysts understand risk severity and
formulate an appropriate response. Flexible data display and visualization
at this stage help analysts with different levels of experience easily
navigate the data to quickly understand why an alert was raised and
determine next steps: dismiss, respond, or investigate.
With Trellix EDR, analysts at any level can take the next step and rapidly
investigate with Trellix Wise. Wise guides investigations, correlates threat
activity, and automates manual tasks such as report generation.
AI-enhanced investigations
Trellix EDR with Wise automatically collects and correlates related
breaches, artifacts, network connections, and more into a visual graph
to accelerate investigation. Wise provides detailed recommendations
of next steps to take based on the nature and severity of the threat
identified, cutting down response time. It also provides one-click report
generation so analysts can focus on security instead of paperwork.
The right data at the right time for the task at hand
In addition to guided investigation, analysts and threat hunters can use
the powerful Trellix EDR search and data collection capabilities to expand
inquiries across systems, and look deeply into and across those systems.
Historical search
The comprehensive and always-on data collection feature streams
endpoint event information from all monitored systems to the cloud.
Analysts can search this centralized data—regardless of online or
offline status of endpoints—to find indicators of compromise (IoCs) and
indicators of attack that may be present along with deleted files.
Real-time search
For active incident inquiries, real-time search reaches out to endpoints
across your estate to quickly query for up-to-the-moment information.
Flexible syntax enables capabilities like simple queries for searching
workstations. You can also run more complex searches that return more
data from the workstation, such as identifying a user at the time of event,
command-line execution, and when the suspected application was
started. Trellix EDR can easily scale queries across the enterprise to tens of
thousands of machines.
Trending campaigns
Orchestrated and targeted attacks (based on region or industry) are
alerted upon, identifying IoCs to proactively search for with Trellix EDR.
Figure 1. The Trellix Insights dashboard Trellix EDR leverages the proactive context on new outside
automatically surfaces threats that threats provided by Trellix Insights, accelerating investigation and
matter and guidance on what to do
before the attack. It offers additional EDR remediation efforts.
insights to accelerate investigation and
response efforts. Trellix Insights alerts you to potential campaigns, prioritized
according to whether they are targeting your sector or
geographies. It predicts which endpoints lack protection against
the campaigns and what to do to improve this threat detection.
It also informs analysts of campaign attack operation and the
objective of attack, and provides strategic and mitigation advice
across countermeasures. Trellix Insights gives your organization
a complete set of IoCs to proactively search for with Trellix EDR.
Analysts can execute proactive searches or use other tools to carry
out further research.
Figure 2. Trellix EDR with Wise investigates for you. It automatically collects
artifacts and presents the key findings. This visualization clarifies relationships and
speeds analyst understanding.