23 Integrations with Trellix XDR

View a list of Trellix XDR integrations and software that integrates with Trellix XDR below. Compare the best Trellix XDR integrations as well as features, ratings, user reviews, and pricing of software that integrates with Trellix XDR. Here are the current Trellix XDR integrations in 2025:

  • 1
    Trellix Endpoint Security (HX)
    Trellix Endpoint Security (HX) performs fast, targeted forensic investigations across thousands of endpoints. Protect and empower your workforce with an integrated security framework that protects every endpoint. Trellix Endpoint Security solutions apply proactive threat intelligence and defenses across the entire attack lifecycle to keep your organization safer and more resilient. Keep your endpoints secure in today’s dynamic threat landscape. Explore how our integrated suite of endpoint protection technologies gives you the power of actionable intelligence, machine learning, and more to help you continuously monitor threats and avert attacks. Endpoint security is the practice of safeguarding the data and workflows associated with the individual devices that connect to your network. Endpoint protection platforms (EPP) work by examining files as they enter the network.
  • 2
    Trellix Enterprise Security Manager
    Real-time monitoring and analysis allowing you to quickly prioritize, investigate, and respond to hidden threats. A central view of potential threats with built-in workflows removes the complexity of threat protection. Be ready anytime for the audit with automated compliance. Get greater transparency monitoring users, applications, networks and devices. Data correlated and enriched to deliver purposeful intelligence on the threat and how to mitigate. Real-time threat identification and response powered by advanced threat intelligence reduces lead time to protect against threats such as phishing, insider threats, data exfiltration and Distributed Denial of Service (DDOS) attacks.
  • 3
    PC Matic

    PC Matic

    PC Matic

    PC Matic Pro's application whitelisting is a critical preventative layer of cyber-protection that resides on top of other endpoint security solutions. zero trust whitelisting solutions prevent hacking and cyber-attacks. Block all malware, ransomware, and malicious scripts from executing. Protect your business data, users, and network with our whitelist cybersecurity solution. PC Matic Pro represents a long overdue shift in the cybersecurity industry to absolute prevention. Today's threats to critical infrastructure, industry, and all levels of government demand nothing less. PC Matic Pro provides a patented default-deny security layer at the device that blocks all unknown executions without introducing headaches for IT. Unlike traditional security solutions, customer infections aren’t required to strengthen the whitelist architecture. Local overrides can be added after prevention with a focus on accuracy and without concern for responding to an already active infection.
    Starting Price: $50 per year
  • 4
    ThreatAware

    ThreatAware

    ThreatAware

    Leveraging API feeds from your existing tools, validate your controls are correctly deployed and functioning across every cyber asset. Our clients come from all industries, from legal to finance, charities to retail. We are trusted by leading organizations to discover and protect their valuable cyber assets. Create a highly accurate device inventory by connecting to your existing systems via API. When issues arise the workflow automation engine can trigger actions via a webhook. ThreatAware provides clarity of the security control health of your cyber assets in a clear and simple design. Gain a macro view of your security control health regardless of how many controls you are monitoring. Generated from any field from a device, allows you to quickly group your cyber assets for monitoring and configuration purposes. When your monitoring systems accurately depicts your live environment, every alert is real.
  • 5
    F5 BIG-IP SSL Orchestrator
    Bad actors take advantage of SSL/TLS encryption to hide malicious payloads to outsmart and bypass security controls. Don’t leave your organization vulnerable to attack with security solutions that can’t inspect encrypted traffic efficiently at scale. BIG-IP SSL Orchestrator delivers high-performance decryption of inbound and outbound SSL/TLS traffic, enabling security inspection that exposes threats and stops attacks before they happen. Maximize infrastructure and security investments with dynamic, policy-based decryption, encryption, and traffic steering through security inspection devices. Protect against outbound traffic dispersing malware, exfiltrating data, or reaching out to a command-and-control server to trigger attacks. Decrypt incoming encrypted traffic to ensure it’s not hiding ransomware, malware, or other threats that lead to attacks, infections, and data breaches. Prevent new security blind spots by enabling greater flexibility without architectural changes.
  • 6
    NXLog

    NXLog

    NXLog

    Achieve complete security observability with powerful insights from your log data. Improve your infrastructure visibility and enhance threat prevention with a versatile multi-platform tool. With support for over 100 operating system versions and more than 120 configurable modules, gain comprehensive insights and increased security. Cut the cost of your SIEM solution by reducing noisy and unnecessary log data. Filter events, truncate unused fields, and remove duplicates to increase the quality of your logs. Collect and aggregate logs from systems across the entire breadth of your organization with a single tool. Reduce complexity in managing security-related events and decrease detection and response times. Empower your organization to meet compliance requirements by centralizing some logs in an SIEM and archiving others in your long-term storage. NXLog Platform is an on-premises solution for centralized log management, with versatile processing.
  • 7
    Trellix Data Loss Prevention
    Protects sensitive information across top threat vectors. Trellix Data Loss Prevention (DLP) delivers unprecedented protection for sensitive and proprietary information from the keyboard to the cloud. Get industry-leading discovery and classification, deploy policies across top threat vectors, respond to events in real-time, coach users, and generate reports. Trellix DLP offers a convenient single console to manage deployment, administer policies, monitor events in real-time, and get out-of-the-box reports to ensure compliance.
  • 8
    Trellix Data Encryption
    Trellix Data Encryption products secure devices and removable media to ensure that only authorized users can access the information they contain. Deploy encryption policies through a single management console, while monitoring encryption status and generating compliance reports. Choose from an extensive catalog of policy options to secure information across devices, files, and removable media - easily managed from a single location. Trellix Native Drive Encryption centralizes and simplifies management of both BitLocker and FileVault into a central console that is available on-premises or via SaaS. This saves time and resources for organizations managing multiple operating systems, since reporting and administrative tasks like encryption key and pin management are centralized.
  • 9
    Trellix Email Security
    Keep your email infrastructure and users safe— whether on-premises or in the cloud. Identify and mitigate advanced email threats—including ransomware, business email compromise (BEC), and phishing—with Trellix Email Security. You’ll get leading detection and response capabilities to build a trusted, resilient email environment. Identify current threats quickly and accurately with prioritized alerts to help analysts take immediate action. Keep your email safe—whether it’s hosted on-premises or in the cloud—with leading sandbox technology, AI, and machine learning. Connect with as many as 650 Trellix solutions and third-party products to deliver insights and create a unified, living security ecosystem. Minimize the risk of breaches and identify, isolate, and protect against advanced URL and attachment-based attacks with this on-premises solution. Choose Advanced Threat mode to unearth malicious URLs with custom plug-ins, or Full Hygiene mode to reduce impersonation, BEC, and more.
  • 10
    Trellix Threat Intelligence Exchange
    Transform security infrastructure into a collaborative system. Operationalize threat intelligence data in real time, delivering protection to all points in your enterprise as new threats emerge. Leverage Data Exchange Layer (DXL) to instantly share threat data to all connected security systems, including third-party solutions. Detect unknown files for faster time to protection and lower costs. Broader threat intelligence helps make accurate file execution decisions and customize policies based on risk tolerance. Enable better decision-making to handle never-before-seen and potentially malicious files. Combine and share threat information from Trellix Global Threat Intelligence, third parties, and locally collected data from your security solutions. DXL, an open communications framework, connects disparate security solutions. Share real-time security intelligence among endpoint, gateway, network, and data center security solutions.
  • 11
    Trellix EDR
    Endpoint threat detection, investigation, and response—modernized. Reduce the time to detect and respond to threats. Trellix EDR helps security analysts quickly prioritize threats and minimize potential disruption. Guided investigation automatically asks and answers questions while gathering, summarizing, and visualizing evidence from multiple sources—reducing the need for more SOC resources. Cloud-based deployment and analytics enables your skilled security analysts to focus on strategic defense, instead of tool maintenance. Benefit from implementing the right solution for you. Use an existing Trellix ePolicy Orchestrator (Trellix ePO) on-premises management platform or SaaS-based Trellix ePO to reduce infrastructure maintenance. Remove administration overhead, allowing more senior analysts to apply their skills to the threat hunt and accelerate response time.
  • 12
    Trellix Cloudvisory
    Uniform visibility into disparate, multi-cloud infrastructure through a single console. Reduce risk of cloud security misconfiguration resulting in exposure and compliance violation. Proactive cloud security posture using machine learning to intelligently detect anomalies. As companies continue the rush to the cloud, new threats bring additional challenges to cyber defense. At the same time, cyber security teams must shift from being perceived as a bottleneck to an enabler of business. Learn from seasoned experts, with real world examples of how to move at the speed of cloud while keeping your organization secure. Cloud-native governance of microsegmentation policies via cloud-native firewalls and security controls. Orchestrated remediation of compliance failures & governance of desired-state security policies.
  • 13
    Trellix Application Control
    Advanced persistent threats (APTs) to control points, servers, and fixed devices via remote attack or social engineering make it increasingly difficult to protect your business. Trellix Application Control helps you outsmart cybercriminals and keeps your business secure and productive. Ensure that only trusted applications run on devices, servers, and desktops. As users demand more flexibility to use applications in their social and cloud-enabled business world, Trellix Application Control gives organizations options to maximize their whitelisting strategy for threat prevention. For unknown applications, Trellix Application Control provides IT with multiple ways to enable users to install new applications: User Notifications and user self-approvals. Prevents zero-day and APT attacks by blocking the execution of unauthorized applications. Use inventory search and pre-defined reports to quickly find and fix vulnerabilities, compliance, and security issues in your environment.
  • 14
    Google Digital Risk Protection
    Learn what a digital risk protection solution is and how it can help you be better prepared by understanding who is targeting you, what they’re after, and how they plan to compromise you. Google Digital Risk Protection delivers a broad digital risk protection solution either via stand-alone self-managed SaaS products or a comprehensive service. Both options give security professionals visibility outside their organization, the ability to identify high-risk attack vectors, malicious orchestration from the deep and dark web, and attack campaigns on the open web.  The Google Digital Risk Protection solution also provides contextual information on threat actors and their tactics, techniques, and procedures to provide a more secure cyber threat profile. Gain visibility into risk factors impacting the extended enterprise and supply chain by mapping your attack surface and monitoring deep and dark web activity.
  • 15
    Mindflow

    Mindflow

    Mindflow

    Embrace hyper-automation at scale with intuitive no-code & AI-generated flows. Access every tool you need through the most extensive integration library ever provided. Pick the service you want from the Integrations library and automate your way. Onboard and build your first workflows in minutes. Use pre-built templates if you need them, help yourself with the AI assistant, or benefit from the Mindflow excellence center. Type your input in plain-language text and let Mindflow do the rest. Generate workflows adapted to your tech stack from any input. Create AI-generated workflows to help you address any use case and reduce the building time to the minimum. Mindflow redefines enterprise automation, offering an extensive catalog of integrations. Add any new tool to our platform within minutes, breaking the barriers of traditional integration. Connect and orchestrate your tech stack, no matter the tools you use.
  • 16
    StrikeReady

    StrikeReady

    StrikeReady

    StrikeReady delivers the industry's first unified, vendor-agnostic, AI-powered security command center, purpose-built to optimize, centralize, and accelerate a company’s threat response. StrikeReady’s platform levels the entire security team by centralizing, analyzing, and operationalizing security data across a company’s entire security tech stack. StrikeReady empowers smarter, faster decision-making with actionable insights by providing security teams with real-time, holistic, end-to-end visibility across an ever-changing security ecosystem. This transforms SOC teams into proactive defense teams by allowing them to stay ahead of constantly evolving threats. StrikeReady delivers a revolutionary, AI-powered security command center that is changing the way SOC teams work and defend. The platform is the first to be truly vendor-neutral and seamless, providing a unified, end-to-end view of your entire security operation.
  • 17
    OctoXLabs

    OctoXLabs

    OctoXLabs

    Detect, prioritize, and respond to asset security threats in minutes. Get Cyber asset attack surface management and improve your visibility. Manage all your cybersecurity inventory. Discover vulnerabilities for all your assets. Fill in the gaps left by agent-based asset management solutions. Discover server, client, cloud, and IoT device gaps. Octoxlabs works with agentless technology and enhances your visibility with 50+ API integrations. Keep track of your installed applications licenses at any time. You can see how many licenses you have left, how many have been used, and the renewal date from a single point. Keep track of your installed applications licenses at any time. Users that you have to open separately for each product. Enrich your user data with integrations with intelligence services. Follow the local account and you can do this for all products. Devices that have a vulnerability but no security agents installed can be discovered.
  • 18
    Trellix Database Security
    Trellix Database Security finds and protects sensitive information in databases from accidental leakage and intentional exposure while maintaining security, optimizing performance, and managing access. Discover sensitive and proprietary information in databases across the environment. Improve regulatory compliance by blocking unauthorized access to sensitive data. Address vulnerabilities quickly, with little to no downtime. Monitor, log, and control database access, in addition to identifying and blocking potential threats before they can damage the environment. Perform automated scans to find supported databases and the sensitive data they contain. Identify and prioritize known vulnerabilities, and receive detailed remediation advice. Protect databases from known and unknown vulnerabilities without downtime. Stop intrusions and other exploits before they impact your environment.
  • 19
    Trellix Cloud Workload Security
    A single-pane view helps consolidate management across physical, virtual, and hybrid-cloud environments. Benefit from secure workloads all the way from on-prem to cloud, across the board. Automates the defense of elastic workloads to eliminate blind spots and deliver advanced threat defense. Leverage advanced host-based workload defense optimized specifically for virtual instances to avoid straining overall infrastructure. Avail virtual machine-optimized threat defenses that help deliver multilayer countermeasures. Gain awareness and protect your virtualized environment and network from external malicious sources. Comprehensive countermeasures, including machine learning, application containment, virtual machine-optimized anti-malware, whitelisting, file integrity monitoring, and micro-segmentation, to protect your workloads. Helps assign and manage all workloads automatically with the ability to import AWS and Microsoft Azure tag information into Trellix ePO.
  • 20
    Trellix Wise
    Built on over a decade of AI modeling and 25 years in analytics and machine learning, Trellix Wise XDR capabilities relieve alert fatigue and surface stealthy threats. Automatically escalate with context, and empower every member of your team to hunt for and resolve threats. Wise leverages 3x more third-party integrations than competing solutions and delivers real-time threat intelligence leveraging 68 billion queries a day from >100 million endpoints. Automatically investigate all your alerts and prioritize with automated escalations. With workflows and analytics trained on more than 1.5 petabytes and decades of data. Find, investigate, and remediate threats with AI prompts in everyday language. Recover 8 hours of SOC work for every 100 alerts and see saved time in dashboards. Trellix Wise relieves alert fatigue for security operations, enabling teams of any experience level to investigate 100% of their alerts and automate investigation and remediation.
  • 21
    Trellix Global Threat Intelligence
    Global Threat Intelligence (GTI) is a comprehensive, real-time, cloud-based reputation service, fully integrated into Trellix products. Protects organizations and their users from both known and emerging cyber threats, regardless of the source of those threats or where they propagate. Arms your security infrastructure with shared threat intelligence, enabling security products to act in concert, based on the same robust, real-time information. Closes the threat window with instantaneous, and often predictive, reputation-based threat intelligence, reducing the probability of attack and cost of remediation and lost downtime. Threat data is collected from billions of Trellix product sensor queries around the globe and correlated to produce our threat intelligence. Trellix products query GTI in the cloud, and GTI renders the latest reputation or categorization intelligence to the products so that they can take action.
  • 22
    Trellix ATLAS
    Giving customers a unique insight into malicious files, domains, and IP detections seen worldwide. Advanced Threat Landscape Analysis System (ATLAS) data is aggregated from various Trellix data sources to provide the latest global emerging threats with enriched data such as industry sector and geolocation. ATLAS correlates these threats with campaign data containing research from Trellix’s Advanced Research Center (ARC) and Threat Intelligence Group (TIG), as well as open source data, to provide a dedicated view for campaigns consisting of events, dates, threat actors, IOCs, and more. Enables customers with unique global insight into the malicious threat detections seen worldwide by Trellix. Geospatially enabled situational awareness. Utilizes the Trellix telemetry data collected worldwide. Highlights current and emerging threats by highlighting those of particular interest by type, industry sector, geolocation, most seen, etc.
  • 23
    Trellix Network Security
    Gain unparalleled visibility and apply state-of-the-art, signatureless detection and protection against the most advanced and evasive threats, including zero-day attacks. Improve analyst efficiency with high-fidelity alerts that trigger when it matters most, saving time and resources and reducing alert volume and fatigue. Generate concrete real-time evidence and Layer 7 metadata to provide further security context to pivot to investigation and alert validation, endpoint containment, and incident response. Detect multi-flow, multi-stage, zero-day, polymorphic, ransomware, and other advanced attacks with signature-less threat detection. Detect known and unknown threats in real-time while also enabling back-in-time detection of threats. Track and block lateral threats propagating within your enterprise network to reduce post-breach dwell time. Separate critical and non-critical malware (such as adware and spyware) to prioritize alert response.
  • Previous
  • You're on page 1
  • Next