Logo
Sign in
Product Logo
Trellix Application and Change ControlTrellix

Trellix Application Control is a robust security solution designed to prevent zero-day and Advanced Persistent Threat (APT) attacks by blocking the execution of unauthorized applications. This powerful tool enhances an organization's security posture by leveraging global threat intelligence and providing comprehensive application control features. It offers flexible rule creation, inventory search capabilities, and pre-defined reports to quickly identify and address vulnerabilities, compliance issues, and security concerns. The software's dynamic policy discovery feature allows for adaptabl...

Vendor

Vendor

Trellix

Company Website

Company Website

Product details

Trellix Application Control is an advanced security solution that protects against zero-day and APT attacks by preventing unauthorized applications from executing. It utilizes global threat intelligence and offers comprehensive control features, including customizable rules, inventory search, and pre-defined reports. The software's flexibility allows for effective security management in dynamic environments without compromising user productivity

Key Features

Advanced Threat Prevention Blocks execution of unauthorized applications to prevent zero-day and APT attacks

  • Real-time protection against emerging threats
  • Proactive defense against unknown malware

Global Threat Intelligence Integration Enhanced with Trellix Global Threat Intelligence (GTI) for up-to-date threat information

  • Utilizes millions of sensors worldwide
  • Tracks reputation of files, messages, and senders in real-time

Flexible Rule Creation Allows combination of various parameters for enhanced protection

  • File name, process name, and parent process name rules
  • Command line parameters and username-based rules

Comprehensive Reporting and Search Provides inventory search and pre-defined reports for quick issue resolution

  • Identifies vulnerabilities, compliance issues, and security concerns
  • Facilitates rapid remediation of detected problems

Dynamic Policy Discovery Enables policy creation for changing desktop environments

  • Adapts to evolving IT landscapes
  • Avoids strict whitelisting lockdown

Benefits

Improved Security Posture Enhances overall organizational cybersecurity

  • Prevents execution of malicious applications
  • Reduces risk of successful cyber attacks

Efficient Compliance Management Simplifies adherence to security regulations and standards

  • Pre-defined reports for compliance checks
  • Quick identification of non-compliant applications

Streamlined Security Operations Facilitates easier management of application control

  • Centralized control and monitoring
  • Customizable rules for specific organizational needs

Adaptive Protection Provides flexible security suitable for dynamic environments

  • Balances security with user productivity
  • Accommodates changes in IT infrastructure
Find more products by segment
Large BusinessEnterpriseB2BView all