The role of the CISO is demanding and multi-faceted, especially when resources and support are in short supply. According to our survey of 500+ security executives, learning from peers and sharing information broadly enables CISOs to be more efficient and refocus efforts on strategic initiatives. 🧠 More findings in our eBook. https://bit.ly/4dPLuUi
Trellix
Computer and Network Security
Plano, Texas 470,710 followers
The Future of XDR. We Bring Security to Life.
About us
Trellix is a global company redefining the future of cybersecurity and soulful work. The company’s comprehensive, open and native cybersecurity platform helps organizations confronted by today’s most advanced threats gain confidence in the protection and resilience of their operations. Trellix, along with an extensive partner ecosystem, accelerates technology innovation through artificial intelligence, automation, and analytics to empower over 50,000 business and government customers with responsibly architected security. More at https://trellix.com.
- Website
-
https://www.trellix.com
External link for Trellix
- Industry
- Computer and Network Security
- Company size
- 1,001-5,000 employees
- Headquarters
- Plano, Texas
- Type
- Privately Held
- Founded
- 2022
Locations
-
Primary
Plano, Texas, US
Employees at Trellix
-
Kirk D'Orazio
Global Strategic Alliances Exec | Expertise in Cloud/SaaS, Cybersecurity and IoT Business Development
-
Swamy Karnam
beginning farmer and bottle washer
-
Aidan Foley
Staff Software Engineer at Trellix
-
Laurie Yousefi
Results-Driven Regional Sales Executive at Trellix | Driving Growth & Innovation in Cybersecurity Solutions
Updates
-
Not all security solutions are created equal. The market is flooded with claims, but how do you identify the critical capabilities and prioritize outcomes that matter? 📥 Download the Gartner® Market Guide for Extended Detection and Response to gain clarity on: ✅ When to use #XDR vs. #SIEM tools ✅ Essential features every XDR solution must have ✅ The top 3 use cases to evaluate vendors ✅ How to lower operational costs while boosting efficiency Get your complimentary copy of the report today! #CyberDefense #ThreatDetection https://bit.ly/3Dsqt5W
-
As adversaries leverage AI, defenders must respond with AI-driven threat-hunting tools and techniques. John Fokker and Brent King discuss how your organization can leverage Trellix #GenAI to combat threats with speed and precision. Watch our GenAI Powered Threat Hunting Webinar on-demand now. https://bit.ly/40Zbavg
-
Don’t let a cyber threat snowball this season. Stay ahead by looking at this week’s latest #cybersecurity threats. ❄️ https://bit.ly/46JIoxB 1️⃣ Cleo Software Active Exploitation In The Wild (CVE-2024-50623/CVE-2024-55956) Threat level: High 🟥 Researchers identified exploitation of Cleo's file transfer products (LexiCom, VLTransfer, Harmony) through CVE-2024-50623, granting unauthenticated remote code execution. 2️⃣ Threat Profile: Sandworm Team Threat level: High 🟥 The Sandworm Team is a highly sophisticated cyber-espionage and cyber-warfare group believed to be associated with the Russian military intelligence agency GRU (Main Intelligence Directorate). 3️⃣ High-Profile Organizations In Southeast Asia Under Attack By China-Based Threat Actors Threat level: Medium 🟧 A sophisticated cyber espionage campaign targeting high-profile organizations in Southeast Asia has been attributed to likely China-based threat actors. 4️⃣ Socks5Systemz Botnet Continues To Thrive Threat level: Medium 🟧 Socks5Systemz, a malware active since 2013, was initially identified during large-scale campaigns involving Privateloader, Smokeloader, and Amadey. 5️⃣ Head Mare Group Continues To Target Russian Entities With PhantomCore Malware Threat level: Medium 🟧 Hacktivist group, Head Mare, continues to target Russian entities with the PhantomCore backdoor, delivered via ZIP archives including malicious LNK files and executables. 6️⃣ Threat Profile: XWorm Threat level: Medium 🟧 XWorm is a .NET binary appearing around 2022. Upon execution, the malware sleeps and then performs various checks, such as checking for a mutex, detecting virtual machines, emulators, debuggers, sandbox environments, and Anyrun. 7️⃣ Inside Zloader's Latest Trick: DNS Tunneling Threat level: Medium 🟧 Zloader version 2.9.4.0 introduces DNS tunneling for covert C2 communications, an interactive shell for enhanced threat actor control, and improved anti-analysis features. 8️⃣ Threat Profile: AsyncRAT Threat level: Medium 🟧 AsyncRAT is an open-source Remote Access Trojan (RAT) written in C# that cybercriminals have used to steal sensitive information from users. 9️⃣ Chinese APT Compromises Critical Digital Infrastructure Via Visual Studio Code Tunnels Threat level: Medium 🟧 Operation Digital Eye was a complex cyber espionage campaign led by a suspected Chinese APT group targeting IT providers in Southern Europe from June to July 2024. 🔟 Analyzing The PUMAKIT Loadable Kernel Module Rootkit Threat level: Low 🟨 PUMAKIT is a sophisticated Linux rootkit employing a multi-stage architecture with advanced stealth capabilities.
-
Trellix Endpoint Security now supports Qualcomm #SnapdragonXSeries processors, allowing you to run more workloads while staying secure. 🙌 We thank Qualcomm for making this integration happen to enhance efficiency for our customers. https://bit.ly/4glorD8
-
You can’t scale your cybersecurity solutions without addressing alert fatigue, and with 1,000 alerts per day coming into a typical SOC, security analysts clearly need a helping hand. Take the No Alert Left Behind Challenge to evaluate where you are in your #GenAI journey and see how Trellix can help you save time while investigating 100% of threats detected. ✅ https://bit.ly/4ePZA9p
-
Trellix #EmailSecurity defends against multi-stage campaigns, accelerates alert investigation, and prevents data leaks via email. Click through our self-guided tour today. 💻 https://bit.ly/4cCXiJu
-
#TeamTrellix sends warm wishes and happy holidays to all. 🩵 May this holiday season be filled with peace, love, and joy.
-
Nearly half of cybersecurity professionals feel the lack of uniform practices and accountability has created serious challenges in their roles. 💡 In response, #TeamTrellix and CTO Ashok Banerjee developed a guideline to ensure #ResponsibleSecurity based on principles of respect, protect, and connect. Dive in via the blog. https://bit.ly/41FTpkO